WorldWideScience

Sample records for specifies maxillomandibular identity

  1. Maxillomandibular giant osteosclerotic lesions

    Directory of Open Access Journals (Sweden)

    Constantino LEDESMA-MONTES

    2018-06-01

    Full Text Available Abstract Giant Osteosclerotic Lesions (GOLs are a group of rarely reported intraosseous lesions. Their precise diagnosis is important since they can be confused with malignant neoplasms. Objective This retrospective study aimed to record and analyze the clinical and radiographic Giant Osteosclerotic Lesions (GOLs detected in the maxillomandibular area of patients attending to our institution. Materials and Methods: Informed consent from the patients was obtained and those cases of 2.5 cm or larger lesions with radiopaque or mixed (radiolucid-radiopaque appearance located in the maxillofacial bones were selected. Assessed parameters were: age, gender, radiographic aspect, shape, borders, size, location and relations to roots. Lesions were classified as radicular, apical, interradicular, interradicular-apical, radicular-apical or located in a previous teeth extraction area. Additionally, several osseous and dental developmental alterations (DDAs were assessed. Results Seventeen radiopacities in 14 patients were found and were located almost exclusively in mandible and were two types: idiopathic osteosclerosis and condensing osteitis. GOLs were more frequent in females, and in the anterior and premolar zones. 94.2% of GOLs were qualified as idiopathic osteosclerosis and one case was condensing osteitis. All studied cases showed different osseous and dental developmental alterations (DDAs. The most common were: Microdontia, hypodontia, pulp stones, macrodontia and variations in the mental foramina. Conclusions GOLs must be differentiated from other radiopaque benign and malignant tumors. Condensing osteitis, was considered an anomalous osseous response induced by a chronic low-grade inflammatory stimulus. For development of idiopathic osteosclerosis, two possible mechanisms could be related. The first is modification of the normal turnover with excessive osseous deposition. The second mechanism will prevent the normal bone resorption, arresting the

  2. Axis-I comorbidity in female patients with dissociative identity disorder and dissociative identity disorder not otherwise specified.

    Science.gov (United States)

    Rodewald, Frauke; Wilhelm-Göling, Claudia; Emrich, Hinderk M; Reddemann, Luise; Gast, Ursula

    2011-02-01

    The aim of this study was to investigate axis-I comorbidity in patients with dissociative identity disorder (DID) and dissociative disorder not otherwise specified (DDNOS). Using the Diagnostic Interview for Psychiatric Disorders, results from patients with DID (n = 44) and DDNOS (n = 22) were compared with those of patients with posttraumatic stress disorder (PTSD) (n = 13), other anxiety disorders (n = 14), depression (n = 17), and nonclinical controls (n = 30). No comorbid disorders were found in nonclinical controls. The average number of comorbid disorders in patients with depression or anxiety was 0 to 2. Patients with dissociative disorders averagely suffered from 5 comorbid disorders. The most prevalent comorbidity in DDNOS and DID was PTSD. Comorbidity profiles of patients with DID and DDNOS were very similar to those in PTSD (high prevalence of anxiety, somatoform disorders, and depression), but differed significantly from those of patients with depression and anxiety disorders. These findings confirm the hypothesis that PTSD, DID, and DDNOS are phenomenologically related syndromes that should be summarized within a new diagnostic category.

  3. Muscle-type identity of proprioceptors specified by spatially-restricted signals from limb mesenchyme

    OpenAIRE

    Poliak, Sebastian; Norovich, Amy L.; Yamagata, Masahito; Sanes, Joshua R.; Jessell, Thomas M.

    2016-01-01

    The selectivity with which proprioceptive sensory neurons innervate their central and peripheral targets implies that they exhibit distinctions in muscle-type identity. The molecular correlates of proprioceptor identity and its origins remain largely unknown, however. In screens to define muscle-type proprioceptor character we find all-or-none differences in gene expression for proprioceptors that control antagonistic muscles at a single hindlimb joint. Analysis of three of these genes, cadhe...

  4. Muscle-type Identity of Proprioceptors Specified by Spatially Restricted Signals from Limb Mesenchyme.

    Science.gov (United States)

    Poliak, Sebastian; Norovich, Amy L; Yamagata, Masahito; Sanes, Joshua R; Jessell, Thomas M

    2016-01-28

    The selectivity with which proprioceptive sensory neurons innervate their central and peripheral targets implies that they exhibit distinctions in muscle-type identity. The molecular correlates of proprioceptor identity and its origins remain largely unknown, however. In screens to define muscle-type proprioceptor character, we find all-or-none differences in gene expression for proprioceptors that control antagonistic muscles at a single hindlimb joint. Analysis of three of these genes, cadherin13 (cdh13), semaphorin5a (sema5a), and cartilage-acidic protein-1 (crtac1), reveals expression in proprioceptor subsets that supply muscle groups located at restricted dorsoventral and proximodistal domains of the limb. Genetically altering the dorsoventral character of the limb mesenchyme elicits a change in the profile of proprioceptor cdh13, sema5a, and crtac1 expression. These findings indicate that proprioceptors acquire aspects of their muscle-type identity in response to mesenchymal signals expressed in restricted proximodistal and dorsoventral domains of the developing limb. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Muscle-type identity of proprioceptors specified by spatially-restricted signals from limb mesenchyme

    Science.gov (United States)

    Poliak, Sebastian; Norovich, Amy L.; Yamagata, Masahito; Sanes, Joshua R.; Jessell, Thomas M.

    2016-01-01

    The selectivity with which proprioceptive sensory neurons innervate their central and peripheral targets implies that they exhibit distinctions in muscle-type identity. The molecular correlates of proprioceptor identity and its origins remain largely unknown, however. In screens to define muscle-type proprioceptor character we find all-or-none differences in gene expression for proprioceptors that control antagonistic muscles at a single hindlimb joint. Analysis of three of these genes, cadherin13 (cdh13), semaphorin5a (sema5a) and cartilage-acidic protein-1 (crtac1), reveals expression in proprioceptor subsets that supply muscle-groups located at restricted dorso-ventral and proximo-distal domains of the limb. Genetically altering the dorso-ventral character of the limb mesenchyme elicits a change in the profile of proprioceptor cdh13, sema5a and crtac1 expression. These findings indicate that proprioceptors acquire aspects of their muscle-type identity in response to mesenchymal signals expressed in restricted proximo-distal and dorso-ventral domains of the developing limb. PMID:26824659

  6. Statistical tests for whether a given set of independent, identically distributed draws comes from a specified probability density.

    Science.gov (United States)

    Tygert, Mark

    2010-09-21

    We discuss several tests for determining whether a given set of independent and identically distributed (i.i.d.) draws does not come from a specified probability density function. The most commonly used are Kolmogorov-Smirnov tests, particularly Kuiper's variant, which focus on discrepancies between the cumulative distribution function for the specified probability density and the empirical cumulative distribution function for the given set of i.i.d. draws. Unfortunately, variations in the probability density function often get smoothed over in the cumulative distribution function, making it difficult to detect discrepancies in regions where the probability density is small in comparison with its values in surrounding regions. We discuss tests without this deficiency, complementing the classical methods. The tests of the present paper are based on the plain fact that it is unlikely to draw a random number whose probability is small, provided that the draw is taken from the same distribution used in calculating the probability (thus, if we draw a random number whose probability is small, then we can be confident that we did not draw the number from the same distribution used in calculating the probability).

  7. The E-Id Protein Axis Specifies Adaptive Lymphoid Cell Identity and Suppresses Thymic Innate Lymphoid Cell Development.

    Science.gov (United States)

    Miyazaki, Masaki; Miyazaki, Kazuko; Chen, Kenian; Jin, Yi; Turner, Jacob; Moore, Amanda J; Saito, Rintaro; Yoshida, Kenichi; Ogawa, Seishi; Rodewald, Hans-Reimer; Lin, Yin C; Kawamoto, Hiroshi; Murre, Cornelis

    2017-05-16

    Innate and adaptive lymphoid development is orchestrated by the activities of E proteins and their antagonist Id proteins, but how these factors regulate early T cell progenitor (ETP) and innate lymphoid cell (ILC) development remains unclear. Using multiple genetic strategies, we demonstrated that E proteins E2A and HEB acted in synergy in the thymus to establish T cell identity and to suppress the aberrant development of ILCs, including ILC2s and lymphoid-tissue-inducer-like cells. E2A and HEB orchestrated T cell fate and suppressed the ILC transcription signature by activating the expression of genes associated with Notch receptors, T cell receptor (TCR) assembly, and TCR-mediated signaling. E2A and HEB acted in ETPs to establish and maintain a T-cell-lineage-specific enhancer repertoire, including regulatory elements associated with the Notch1, Rag1, and Rag2 loci. On the basis of these and previous observations, we propose that the E-Id protein axis specifies innate and adaptive lymphoid cell fate. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. MR differentiation of cystic lesions in the maxillomandibular region

    International Nuclear Information System (INIS)

    Minami, M.; Kaneda, T.; Ozawa, K.; Ozawa, M.; Itaz, Y.; Sasaki, Y.

    1991-01-01

    This paper examines the capability of MR imaging in differentiating cystic lesions in the maxillomandibular region. MR imaging of 34 patients with cystic lesions in the maxillomandibular region was performed prospectively. After T1-weighted axial imaging, T1-weighted axial and sagittal/coronal imaging with Gd-DTPA and T2-weighted axial imaging was performed. The pathologic examinations of the cases showed 9 ameloblastomas, 13 odontogenic keratocysts, and 11 other types of cysts. MR differentiation between ameloblastoma and cysts was possible in all cases but one. MR images of ameloblastoma showed solid and cystic components, multilocularity, irregularly thickened walls, mural nodules, marked Gd-DTPA enhancement of the wall, and low T1-weighted signal fluids. MR differentiation between various kinds of cysts was difficult without information from conventional radiography, except odontogenic keratocysts. MR images of 17 keratocysts showed cystic patterns, regularly thin walls monolocular cysts, weak Gd-DTPA enhancement of the walls, and inhomogeneous intensity of the contents

  9. Separate development of the maxilla and mandible is controlled by regional signaling of the maxillomandibular junction during avian development.

    Science.gov (United States)

    Tak, Hye-Jin; Park, Tae-Jin; Piao, Zhenngu; Lee, Sang-Hwy

    2017-01-01

    Syngnathia is a congenital craniofacial disorder characterized by bony or soft tissue fusion of upper and lower jaws. Previous studies suggested some causative signals, such as Foxc1 or Bmp4, cause the disruption of maxillomandibular identity, but their location and the interactive signals involved remain unexplored. We wanted to examine the embryonic origin of syngnathia based on the assumption that it may be located at the separation between the maxillary and mandibular processes. This region, known as the maxillomandibular junction (MMJ), is involved in segregation of cranial neural crest-derived mesenchyme into the presumptive upper and lower jaws. Here we investigated the role of Fgf, Bmp, and retinoid signaling during development of MMJ in chicken embryos. By changing the levels of these signals with bead implants, we induced syngnathia with microstomia on the treated side, which showed increased Barx1 and neural cell adhesion molecule (NCAM) expression. Redistribution of proliferating cells was also observed at the proximal region to maxillary and mandibular arch around MMJ. We propose that interactive molecular signaling by Fgfs, Bmps, and retinoids around MMJ is required for normal separation of the maxilla and mandible, as well as the proper positioning of beak commissure during early facial morphogenesis. Developmental Dynamics 246:28-40, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  10. Specifying Specification.

    Science.gov (United States)

    Paulo, Norbert

    2016-03-01

    This paper tackles the accusation that applied ethics is no serious academic enterprise because it lacks theoretical bracing. It does so in two steps. In the first step I introduce and discuss a highly acclaimed method to guarantee stability in ethical theories: Henry Richardson's specification. The discussion shows how seriously ethicists take the stability of the connection between the foundational parts of their theories and their further development as well as their "application" to particular problems or cases. A detailed scrutiny of specification leads to the second step, where I use insights from legal theory to inform the debate around stability from that point of view. This view reveals some of specification's limitations. I suggest that, once specification is sufficiently specified, it appears astonishingly similar to deduction as used in legal theory. Legal theory also provides valuable insight into the functional range of deduction and its relation to other forms of reasoning. This leads to a richer understanding of stability in normative theories and to a smart division of labor between deduction and other forms of reasoning. The comparison to legal theory thereby provides a framework for how different methods such as specification, deduction, balancing, and analogy relate to one another.

  11. Oral appliances and maxillomandibular advancement surgery : An alternative treatment protocol for the obstructive sleep apnea-hypopnea syndrome

    NARCIS (Netherlands)

    Hoekema, A; de Lange, J; Stegenga, B; de Bont, LGM

    Purpose: The present study comprises a retrospective evaluation of the potential application of mandibular repositioning appliance (MRA) therapy preceding maxillomandibular advancement (MMA) surgery in the treatment of the Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS). Our initial experiences

  12. Dynamic multislice helical CT of maxillomandibular lesions. Distinction of ameloblastomas from other cystic lesions

    Energy Technology Data Exchange (ETDEWEB)

    Tozaki, Mitsuhiro; Hayashi, Katsuhiko; Fukuda, Kunihiko [Jikei Univ., Tokyo (Japan). School of Medicine

    2001-10-01

    The purpose of this study was to evaluate the clinical usefulness of dynamic multislice helical CT in differentiating ameloblastoma from other cystic lesions in cases of maxillomandibular cystic lesions. The study included 32 patients with maxillomandibular cystic lesions (ameloblastoma [n=6], myxofibroma [n=1], odontogenic keratocyst [n=3], dentigerous cyst [n=11], radicular cyst [n=11], and paradental cyst [n=2]). Dynamic study was performed before and 30 sec, and 90 sec after intravenous contrast medium administration. CT density values and percentage of density increase were calculated at 30 and 90 sec. In five cases of ameloblastoma, a rapidly enhancing area was detected within the cystic lesions at 30 sec, while no apparent rapid enhancement was seen in the other cystic lesions. Three cysts showed gradual enhancement in the marginal area at 90 sec. Comparing ameloblastoma and other kinds of cysts, we found significant differences in the percentage of density increase at 30 sec (p<0.01) and 90 sec (p<0.05). Dynamic multislice helical CT is useful in the diagnosis of cystic lesions of the maxillomandibular region, especially in the detection of neovascularities in ameloblastoma. (author)

  13. Dynamic multislice helical CT of maxillomandibular lesions. Distinction of ameloblastomas from other cystic lesions

    International Nuclear Information System (INIS)

    Tozaki, Mitsuhiro; Hayashi, Katsuhiko; Fukuda, Kunihiko

    2001-01-01

    The purpose of this study was to evaluate the clinical usefulness of dynamic multislice helical CT in differentiating ameloblastoma from other cystic lesions in cases of maxillomandibular cystic lesions. The study included 32 patients with maxillomandibular cystic lesions (ameloblastoma [n=6], myxofibroma [n=1], odontogenic keratocyst [n=3], dentigerous cyst [n=11], radicular cyst [n=11], and paradental cyst [n=2]). Dynamic study was performed before and 30 sec, and 90 sec after intravenous contrast medium administration. CT density values and percentage of density increase were calculated at 30 and 90 sec. In five cases of ameloblastoma, a rapidly enhancing area was detected within the cystic lesions at 30 sec, while no apparent rapid enhancement was seen in the other cystic lesions. Three cysts showed gradual enhancement in the marginal area at 90 sec. Comparing ameloblastoma and other kinds of cysts, we found significant differences in the percentage of density increase at 30 sec (p<0.01) and 90 sec (p<0.05). Dynamic multislice helical CT is useful in the diagnosis of cystic lesions of the maxillomandibular region, especially in the detection of neovascularities in ameloblastoma. (author)

  14. Maxillary-driven simultaneous maxillo-mandibular distraction for hemifacial microsomia.

    Science.gov (United States)

    Nakajima, Hideo; Sakamoto, Yoshiaki; Tamada, Ikkei; Ogata, Hisao; Kishi, Kazuo; Sakamoto, Teruo

    2011-12-01

    We treat hemifacial microsomia with a combination of surgery and orthodontic treatment during the growth period, resulting in early improvement in facial asymmetry and the induction of normal growth. We previously used gradual distraction of the mandibular ramus for Pruzansky's type II classification (Pruzansky, 1969). In type II cases, the maxilla should also be treated actively as, using this technique, improvement of the occlusal plane is difficult to achieve, resulting in a cross bite and difficulties in post-operative orthodontic treatment-especially in older patients. Morphologically, the mandibular angle region of the operative side is flat, and the angle of the mouth remains elevated. We performed mandibular-driven simultaneous maxillo-mandibular distraction while the occlusion was maintained using intermaxillary anchorage. However, mandibular-driven distraction tended to elongate the face because the mandible only elongated downwards and the mandibular ramus did not reach the glenoid. Furthermore, external distraction devices produce significant distress for patients until removal of the device and cause scars on the face. We developed a new internal distraction device with a variable angle and performed maxillary-driven simultaneous maxillo-mandibular distraction using this device. The result was morphologically satisfactory and solved the above problems. Because the patient was in the growth period, careful follow-up and induction to normal growth were important while the inferior growth of the affected side was monitored. Copyright © 2010 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  15. Design and application of hybrid maxillomandibular fixation for facial bone fractures.

    Science.gov (United States)

    Park, Kang-Nam; Oh, Seung-Min; Lee, Chang-Youn; Kim, Jwa-Young; Yang, Byoung-Eun

    2013-01-01

    A novel maxillomandibular fixation (MMF) procedure using a skeletal anchorage screw (SAS) (in the maxilla) and an arch bar (in the mandible), which we call "hybrid maxillomandibular fixation," was explored in this study. The aims of the study were to examine the efficacy of our hybrid MMF method and to compare periodontal tissue health and occlusal rehabilitation among 3 MMF methods. In total, 112 patients who had undergone open reduction at the Department of Oral and Maxillofacial Surgery between September 2005 and December 2012 were selected for this study. The participants were assigned to one of the following groups: SAS (maxilla), SAS (mandible), SAS-arch bar, or arch bar-arch bar. Periodontal health was evaluated using the Gingival Index, and the perioperative occlusal reproducibility was evaluated using a score of 1 to 3. Statistical analysis was performed using parametric tests (Student t test or 1-way analysis of variance followed by post hoc Tukey test). In the Gingival Index comparison performed 1 month after the surgery, only the group using the arch bars and wiring was significantly different from the other groups (P fractures. In addition, it overcomes many problems presented by previous MMF methods.

  16. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  17. Specifying pancreatic endocrine cell fates.

    Science.gov (United States)

    Collombat, Patrick; Hecksher-Sørensen, Jacob; Serup, Palle; Mansouri, Ahmed

    2006-07-01

    Cell replacement therapy could represent an attractive alternative to insulin injections for the treatment of diabetes. However, this approach requires a thorough understanding of the molecular switches controlling the specification of the different pancreatic cell-types in vivo. These are derived from an apparently identical pool of cells originating from the early gut endoderm, which are successively specified towards the pancreatic, endocrine, and hormone-expressing cell lineages. Numerous studies have outlined the crucial roles exerted by transcription factors in promoting the cell destiny, defining the cell identity and maintaining a particular cell fate. This review focuses on the mechanisms regulating the morphogenesis of the pancreas with particular emphasis on recent findings concerning the transcription factor hierarchy orchestrating endocrine cell fate allocation.

  18. Orthodontic clockwise rotation of maxillomandibular complex for improving facial profile in late teenagers with Class III malocclusion: A preliminary report

    OpenAIRE

    Eric JW Liou; Yu-Chi Wang

    2018-01-01

    Objective: Orthodontic camouflage treatments improve occlusion but might worsen facial profile in patients with Class III malocclusion. It has been reported that surgical clockwise rotation of maxillomandibular complex (MMc) improves facial profile by reducing chin prominence and chin throat length in patients with Class III malocclusion. The purpose of this report was to illustrate two orthodontic techniques for clockwise rotation of the MMc in late teenagers with Class III malocclusion and ...

  19. A new method of surgical navigation for orthognathic surgery: optical tracking guided free-hand repositioning of the maxillomandibular complex.

    Science.gov (United States)

    Li, Biao; Zhang, Lei; Sun, Hao; Shen, Steve G F; Wang, Xudong

    2014-03-01

    In bimaxillary orthognathic surgery, the positioning of the maxilla and the mandible is typically accomplished via 2-splint technique, which may be the sources of several types of inaccuracy. To overcome the limitations of the 2-splint technique, we developed a new navigation method, which guided the surgeon to free-hand reposition the maxillomandibular complex as a whole intraoperatively, without the intermediate splint. In this preliminary study, the feasibility was demonstrated. Five patients with dental maxillofacial deformities were enrolled. Before the surgery, 3-dimensional planning was conducted and imported into a navigation system. During the operation, a tracker was connected to the osteotomized maxillomandibular complex via a splint. The navigation system tracked the movement of the complex and displayed it on the screen in real time to guide the surgeon to reposition the complex. The postoperative result was compared with the plan by analyzing the measured distances between the maxillary landmarks and reference planes, as determined from computed tomography data. The mean absolute errors of the maxillary position were clinically acceptable (<1.0 mm). Preoperative preparation time was reduced to 100 minutes on average. All patients were satisfied with the aesthetic results. This navigation method without intraoperative image registration provided a feasible means of transferring virtual planning to the real orthognathic surgery. The real-time position of the maxillomandibular complex was displayed on a monitor to visually guide the surgeon to reposition the complex. In this method, the traditional model surgery and the intermediate splint were discarded, and the preoperative preparation was simplified.

  20. Root contact with maxillomandibular fixation screws in orthognathic surgery: incidence and consequences.

    Science.gov (United States)

    Camargo, I B; Van Sickels, J E; Laureano Filho, J R; Cunningham, L L

    2016-08-01

    The use of maxillomandibular fixation (MMF) screws in orthognathic surgery has become common in recent years. The risk of injury to adjacent roots with their placement in this population has not been studied extensively. The aim of this study was to review the incidence and consequences of root contact/injury in patients undergoing orthognathic surgery. A retrospective analysis of the treatment and radiographic records of patients who underwent orthognathic surgery between January 2013 and September 2014 at a university in Kentucky, USA was performed. The mean number of screws used was correlated to the mean number of roots affected using Spearman's test, set to a level of significance of 5%. Of 125 patients who underwent orthognathic surgery, 15 (12%) had evidence of root contact. Subsequent radiographs showed resolution of the bone defects. There was no clinical evidence of pulpal necrosis or pain during follow-up. The average number of screws used was 3.14±0.35 per patient, with an average of 0.17±0.52 root contacts per patient. There was no correlation between the number of screws used and the number of roots injured (P=0.279). Based on these results, MMF screws can safely be used to establish interim fixation during orthognathic surgery. Caution should be taken during placement to avoid direct injury to the roots of teeth. Copyright © 2016 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  1. A new method of prefabricated vascularized allogenic bone grafts for maxillo-mandibular reconstruction

    International Nuclear Information System (INIS)

    Pill-Hoon Choung

    1999-01-01

    Although there are various applications of allogenic bone grafts, a new technique of prevascularized lyophilized allogenic bone grafting for maxillo-mandibular reconstruction will be presented. Allogenic bone has been made by author's protocol for jaw defects as a powder, chip or block bone type. The author used lyophilized allogenic bone grafts for discontinuity defects as a block bone. In those cases, neovascularization and resorption of the allogenic bone were important factors for success of grafting. To overcome the problems, the author designed the technique of prefabricated vascularization of allogenic bone, which was lyophilized cranium, with an application of bovine BMP or not. Lyophilized cranial bone was designed for the defects and was put into the scalp. After confirming a hot spot via scintigram several months later, vascularized allogenic bone was harvested pedicled on the parietotemporal fascia based on the superficial temporal artery and vein. Vascularized allogenic cranial bone was rotated into the defect and fixed rigidly. Postoperatively, there was no severe resorption and functional disturbance of the mandible. In this technique, BMP seems to be an important role to help osteogenesis and neovascularization. Eight patients underwent prefabricated vascularization of allogenic bone grafts. Among them, four cases of reconstruction in mandibular discontinuity defects and one case of reconstruction in maxillectomy defect underwent this method, which will be presented with good results. This method may be an alternative technique of microvascular free bone graft

  2. [Mandibular-driven simultaneous maxillo-mandibular distraction for hemifacial microsomia with rapid prototyping technology].

    Science.gov (United States)

    Gao, Quan-Wen; Song, Hui-Feng; Xu, Ming-Huo; Liu, Chun-Ming; Chai, Jia-Ke

    2013-11-01

    To explore the clinical application of mandibular-driven simultaneous maxillo-mandihular distraction to correct hemifacial microsomia with rapid prototyping technology. The patient' s skull resin model was manufactured with rapid prototyping technology. The osteotomy was designed on skull resin model. According to the preoperative design, the patients underwent Le Fort I osteotomy and mandibular ramus osteotomy. The internal mandible distractor was embedded onto the osteotomy position. The occlusal titanium pin was implanted. Distraction were carried out by mandibular-driven simultaneous maxillo-mandihular distraction 5 days after operation. The distraction in five patients was complete as designed. No infection and dysosteogenesis happened. The longest distance of distraction was 28 mm, and the shortest distance was 16 mm. The facial asymmetry deformity was significantly improved at the end of distraction. The ocelusal plane of patients obviously improved. Rapid prototyping technology is helpful to design precisely osteotomy before operation. Mandibular-driven simultaneous maxillo-mandibular distraction can correct hemifacial microsomia. It is worth to clinical application.

  3. Assessment of obstructive sleep apnoea treatment success or failure after maxillomandibular advancement.

    Science.gov (United States)

    de Ruiter, M H T; Apperloo, R C; Milstein, D M J; de Lange, J

    2017-11-01

    Maxillomandibular advancement (MMA) is an alternative therapeutic option that is highly effective for treating obstructive sleep apnoea (OSA). MMA provides a solution for OSA patients that have difficulty accepting lifelong treatments with continuous positive airway pressure or mandibular advancement devices. The goal of this study was to investigate the different characteristics that determine OSA treatment success/failure after MMA. The apnoea-hypopnoea index (AHI) was used to determine the success or failure of OSA treatment after MMA. Sixty-two patients underwent MMA for moderate and severe OSA. A 71% success rate was observed with a mean AHI reduction of 69%. A statistically significant larger neck circumference was measured in patients with failed OSA treatments following MMA (P=0.008), and older patients had failed OSA treatments with MMA: 58 vs. 53 years respectively (P=0.037). Cephalometric analysis revealed no differences between successful and failed OSA treatment outcomes. There was no difference in maxillary and mandibular advancements between success and failed MMA-treated OSA patients. The complications most frequently reported following MMA were sensory disturbances in the inferior alveolar nerve (60%) and malocclusion (24%). The results suggest that age and neck girth may be important factors that could predict susceptibility to OSA treatment failures by MMA. Copyright © 2017 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  4. Skeletal stability of patients undergoing maxillomandibular advancement for treatment of obstructive sleep apnea.

    Science.gov (United States)

    Lee, Sang Hwa; Kaban, Leonard B; Lahey, Edward T

    2015-04-01

    To determine the long-term stability of maxillomandibular advancement (MMA) in patients with obstructive sleep apnea (OSA). This was a retrospective cohort study of patients who underwent MMA and genial tubercle advancement (GTA) for treatment of OSA. Patients were included if they 1) were older than 19 years; 2) had a confirmatory polysomnogram; 3) underwent a Le Fort I osteotomy, bilateral sagittal split osteotomies, and GTA; 4) had adequate radiographic documentation; and 5) at least 11 months of follow-up. Exclusion criteria included previous orthognathic or other maxillofacial surgery. Predictor variables were the presence of OSA treated by MMA, pre- and postoperative orthodontia or no orthodontia, length of follow-up, and magnitude of advancement. The outcome variable was the stability of MMA judged by clinical examination and cephalometric measurements. Standardized lateral cephalometric measurements were performed preoperatively (T0), immediately postoperatively (T1), and at the latest follow-up beyond 11 months (T2). Differences in cephalometric measurements were calculated between time points (T0 to T1 and T1 to T2) for the overall group and for patients who had orthodontia (group 1) and those who did not (group 2). A correlation analysis using length of follow-up and magnitude of advancement as predictor variables of stability was completed. For all analyses, a P value less than .05 was considered statistically significant. During the 9-year study period, 120 patients with OSA were evaluated and 112 had operative treatment; 25 patients specifically had MMA and GTA, met the inclusion criteria, and formed the study sample. The mean maxillary and mandibular advancements (T1 vs T0) were 9.48 mm (range, 1.6 to 15.2 mm) and 10.85 mm (range, 6.3 to 15.8 mm), respectively. From T1 to T2, no occlusal changes occurred. Changes in the subgroup analyses included a decrease in the angle formed by the sella, nasion, and A point (SNA) and the angle formed by the nasion

  5. Control of nuclear material specified equipment and specified material

    International Nuclear Information System (INIS)

    1982-04-01

    The goal and application field of NE 2.02 regulatory guide of CNEN (Comissao Nacional de Energia Nuclear), are described. This regulatory guide is about nuclear material management, specified equipment and specified material. (E.G.) [pt

  6. A financial analysis of maxillomandibular fixation versus rigid internal fixation for treatment of mandibular fractures.

    Science.gov (United States)

    Schmidt, B L; Kearns, G; Gordon, N; Kaban, L B

    2000-11-01

    The aim of this study was to compare the cost-effectiveness of mandibular fracture treatment by closed reduction with maxillomandibular fixation (CRF) with open reduction and rigid internal fixation (ORIF). This was a retrospective study of 85 patients admitted to the Oral and Maxillofacial Surgery Service at San Francisco General Hospital and treated for mandibular fractures from January 1 to December 31, 1993. The patients were divided into 2 groups: 1) those treated with CRF and 2) those treated with ORIF. The outcome variables were length of hospital stay, duration of anesthesia, and time in operating room. The charge for primary fracture treatment included the fees for the operation and hospitalization without any complications. Within the group of 85 patients treated for mandibular fractures in 1993, 10 patients treated with CRF and 10 patients treated with ORIF were randomly selected, and hospital billing statements were used to estimate the average charge of primary treatment. The average charge to manage a major postoperative infection also was estimated based on the billing statements of 10 randomly selected patients treated in 1992 (5 treated with CRF, 5 with ORIF) who required hospital admission for the management of a complication. The average total charge was computed by using the average charge for primary treatment plus the incidence of postoperative infection multiplied by the average charge for management of that complication. Eighty-five patients were included in the study. The average charge for primary treatment was $10,100 for the CRF group and $28,362 for the ORIF group. The average charge for the inpatient management of a major postoperative infection was $26,671 for the CRF group and $39,213 for the ORIF group. The average total charge for management of a mandible fracture with CRF was $10,927; the total charge for the ORIF group was $34,636. The results of this retrospective study suggest that the use of CRF in the management of mandibular

  7. Dental magnetic resonance tomography (dental-MRT) as a method for imaging of the maxillo-mandibular bone

    International Nuclear Information System (INIS)

    Gahleitner, A.; Nasel, C.; Schick, S.; Dorffner, S.; Imhof, H.; Trattnig, S.; Bernhart, T.; Mailath, G.; Watzek, G.

    1998-01-01

    Purpose: To establish a new method for dental imaging using magnetic resonance tomography named Dental-MRT and to demonstrate its usefulness in diagnosing dentogen pathologies of the mandible and maxilla. Methods: Seven healthy volunteers, three patients with pulpitis, two patients with dentigerous cysts, two patients after tooth transplantation, and three patients with atrophic mandibles have been evaluated. Optimized axial T 1 - and T 2 -weighted gradient echo and spin echo sequences in 2D and 3D technique have been established to perform studies of the jaws. The acquired images were reconstructed with a standard dental software package on a workstation as panorama and cross-sectional views of the mandible or maxilla. Results: The entire maxillo-mandibular bone, teeth, dental pulp, and the content of the mandibular canal were well depicted. Patients with pulpitis demonstrate bone marrow edema in the periapical region. Dentigerous cysts and their relation to the surrounding structures are clearly shown. After contrast media administration marked enhancement of the dental pulp can be demonstrated. Conclusion: Dental-MRT promises to provide a new tool for visualization and detection of dental diseases. (orig.) [de

  8. Fluid structure interaction simulations of the upper airway in obstructive sleep apnea patients before and after maxillomandibular advancement surgery.

    Science.gov (United States)

    Chang, Kwang K; Kim, Ki Beom; McQuilling, Mark W; Movahed, Reza

    2018-06-01

    The purpose of this study was to analyze pharyngeal airflow using both computational fluid dynamics (CFD) and fluid structure interactions (FSI) in obstructive sleep apnea patients before and after maxillomandibular advancement (MMA) surgery. The airflow characteristics before and after surgery were compared with both CFD and FSI. In addition, the presurgery and postsurgery deformations of the airway were evaluated using FSI. Digitized pharyngeal airway models of 2 obstructive sleep apnea patients were generated from cone-beam computed tomography scans before and after MMA surgery. CFD and FSI were used to evaluate the pharyngeal airflow at a maximum inspiration rate of 166 ml per second. Standard steady-state numeric formulations were used for airflow simulations. Airway volume increased, pressure drop decreased, maximum airflow velocity decreased, and airway resistance dropped for both patients after the MMA surgery. These findings occurred in both the CFD and FSI simulations. The FSI simulations showed an area of marked airway deformation in both patients before surgery, but this deformation was negligible after surgery for both patients. Both CFD and FSI simulations produced airflow results that indicated less effort was needed to breathe after MMA surgery. The FSI simulations demonstrated a substantial decrease in airway deformation after surgery. These beneficial changes positively correlated with the large improvements in polysomnography outcomes after MMA surgery. Copyright © 2018 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  9. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  10. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  11. Comparison of soft-tissue changes in simultaneous maxillomandibular distraction with mandibular distraction with second-stage maxillary osteotomy.

    Science.gov (United States)

    Balaji, S M; Balaji, Preetha

    2016-01-01

    The purpose of this study was to compare the frontal lip cant changes in common facial asymmetry (FA) cases after simultaneous maxillomandibular distraction osteogenesis (DO) and mandibular DO with maxillary orthognathic surgery. Retrospective analysis of FA cases at tertiary craniofacial referral was performed. Patients of either gender with all medical imaging records and pre- and post-operative (1 year) facial photographs in natural head position were included in the study. The lip cant change was assessed by the ratio of the linear dimension between affected and unaffected side labial commissures and the bi-pupillary reference line. Difference between the pre- and post-operative ratio was analyzed. Statistical analysis was performed for the outcome. P ≤0.05 was taken as significant. The mean preoperative measured value of the affected side was 0.845 ± 0.036 while the postoperative value was 0.95 ± 0.032. The effective change was 0.11 ± 0.044. The postoperative ratio compared with simultaneous DO case was 0.98 ± 0.06 while that of mandibular distraction with orthognathic surgery was 0.92 ± 0.08 (P = 0.048). The mean change of the simultaneous DO case was measured as 0.114 ± 0.041 while the same for the mandibular distraction with orthognathic surgery was 0.069 ± 0.035 (P = 0.013). The results indicate that the simultaneous DO yields more better frontal lip cant change between both halves than the mono-DO with orthognathic surgery. The mean change is much higher in the simultaneous DO cases indicating a more effective correction and desired result. The biological reason and lip musculature mechanism behind the response in both conditions are discussed.

  12. Maxillomandibular advancement as the initial treatment of obstructive sleep apnoea: Is the mandibular occlusal plane the key?

    Science.gov (United States)

    Rubio-Bueno, P; Landete, P; Ardanza, B; Vázquez, L; Soriano, J B; Wix, R; Capote, A; Zamora, E; Ancochea, J; Naval-Gías, L

    2017-11-01

    Maxillomandibular advancement (MMA) can be effective for managing obstructive sleep apnoea (OSA); however, limited information is available on the predictor surgical variables. This study investigated whether normalization of the mandibular occlusal plane (MOP) was a determinant factor in curing OSA. Patients with moderate or severe OSA who underwent MMA were evaluated by preoperative and postoperative three-dimensional (3D) scans and polysomnograms. The postoperative value of MOP and the magnitude of skeletal advancement were the predictor variables; change in the apnoea-hypopnoea index (AHI) was the main outcome variable. Thirty-four subjects with a mean age of 41±14years and 58,8% female were analysed. The Epworth Sleepiness Scale (ESS) was 17.4±5.4 and AHI was 38.3±10.7 per hour before surgery. Postoperative AHI was 6.5±4.3 per hour (P<0.001) with 52.94% of the patients considered as cured, and 47.06% suffering from a mild residual OSA with ESS 0.8±1.4 (P<0.001). 3D changes revealed a volume increase of 106.3±38.8%. The mandible was advanced 10.4±3.9mm and maxilla 4.9±3.2mm. MOP postoperative value was concluded to be the best predictor variable. Treatment planning should include MOP normalization and a mandibular advancement between 6 and 10mm. The maxillary advancement would depend on the desired aesthetic changes and final occlusion. Copyright © 2017 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  13. Specified assurance level sampling procedure

    International Nuclear Information System (INIS)

    Willner, O.

    1980-11-01

    In the nuclear industry design specifications for certain quality characteristics require that the final product be inspected by a sampling plan which can demonstrate product conformance to stated assurance levels. The Specified Assurance Level (SAL) Sampling Procedure has been developed to permit the direct selection of attribute sampling plans which can meet commonly used assurance levels. The SAL procedure contains sampling plans which yield the minimum sample size at stated assurance levels. The SAL procedure also provides sampling plans with acceptance numbers ranging from 0 to 10, thus, making available to the user a wide choice of plans all designed to comply with a stated assurance level

  14. Anomaly-specified virtual dimensionality

    Science.gov (United States)

    Chen, Shih-Yu; Paylor, Drew; Chang, Chein-I.

    2013-09-01

    Virtual dimensionality (VD) has received considerable interest where VD is used to estimate the number of spectral distinct signatures, denoted by p. Unfortunately, no specific definition is provided by VD for what a spectrally distinct signature is. As a result, various types of spectral distinct signatures determine different values of VD. There is no one value-fit-all for VD. In order to address this issue this paper presents a new concept, referred to as anomaly-specified VD (AS-VD) which determines the number of anomalies of interest present in the data. Specifically, two types of anomaly detection algorithms are of particular interest, sample covariance matrix K-based anomaly detector developed by Reed and Yu, referred to as K-RXD and sample correlation matrix R-based RXD, referred to as R-RXD. Since K-RXD is only determined by 2nd order statistics compared to R-RXD which is specified by statistics of the first two orders including sample mean as the first order statistics, the values determined by K-RXD and R-RXD will be different. Experiments are conducted in comparison with widely used eigen-based approaches.

  15. OPTIMAL AIRCRAFT TRAJECTORIES FOR SPECIFIED RANGE

    Science.gov (United States)

    Lee, H.

    1994-01-01

    For an aircraft operating over a fixed range, the operating costs are basically a sum of fuel cost and time cost. While minimum fuel and minimum time trajectories are relatively easy to calculate, the determination of a minimum cost trajectory can be a complex undertaking. This computer program was developed to optimize trajectories with respect to a cost function based on a weighted sum of fuel cost and time cost. As a research tool, the program could be used to study various characteristics of optimum trajectories and their comparison to standard trajectories. It might also be used to generate a model for the development of an airborne trajectory optimization system. The program could be incorporated into an airline flight planning system, with optimum flight plans determined at takeoff time for the prevailing flight conditions. The use of trajectory optimization could significantly reduce the cost for a given aircraft mission. The algorithm incorporated in the program assumes that a trajectory consists of climb, cruise, and descent segments. The optimization of each segment is not done independently, as in classical procedures, but is performed in a manner which accounts for interaction between the segments. This is accomplished by the application of optimal control theory. The climb and descent profiles are generated by integrating a set of kinematic and dynamic equations, where the total energy of the aircraft is the independent variable. At each energy level of the climb and descent profiles, the air speed and power setting necessary for an optimal trajectory are determined. The variational Hamiltonian of the problem consists of the rate of change of cost with respect to total energy and a term dependent on the adjoint variable, which is identical to the optimum cruise cost at a specified altitude. This variable uniquely specifies the optimal cruise energy, cruise altitude, cruise Mach number, and, indirectly, the climb and descent profiles. If the optimum

  16. Assessment of skeletal stability after counterclockwise rotation of the maxillomandibular complex in patients with long-face pattern subjected to orthognathic surgery.

    Science.gov (United States)

    Esteves, Lucas Senhorinho; Castro, Vanessa; Prado, Roberto; de Moraes e Silva, Carolina Ávila Varginha; do Prado, Célio Jesus; Trindade Neto, Antonio I

    2014-03-01

    The aim of this study was to evaluate the long-term skeletal stability of counterclockwise maxillomandibular complex rotation in patients undergoing orthognathic surgery for long-face pattern. This retrospective study consisted of 10 patients who underwent the procedure between September 2002 and April 2008. To assess the skeletal stability, 30 preoperative (T1), recent postoperative (T2), and late postoperative (T3) cephalometric radiographs of the 10 patients were digitized and traced. To measure the stability in the occlusal plane and mandibular plane, the cephalometric points and planes were determined 3 times. In the long term, on average, the A-point moved 0.21 mm backward (AYT3-AYT2), the B-point moved 0.57 mm backward (BYT3-BYT2), and the posterior nasal spine moved 0.31 mm backward (PNSYT3-PNSYT2). On average, the anterior maxillary area (A-point) moved 0.14 mm downward (AXT3-AXT2), the mandible (B-point) moved 0.07 mm downward (BXT3-BXT2), and the posterior nasal spine moved approximately 0.18 mm upward (PNSXT3-PNSXT2). The occlusal plane increased by 0.75 degrees (OPT3-OPT2), and the mandibular plane increased by 0.45 degrees (MPT3-MPT2). It was observed that the counterclockwise rotation of the maxillomandibular complex produces stable results in patients with long-face pattern undergoing orthognathic surgery.

  17. Long-term maxillomandibular changes after maxillary distraction osteogenesis in growing children with cleft lip with or without palate.

    Science.gov (United States)

    Honda, Aya; Baba, Yoshiyuki; Ogawa, Takuya; Suzuki, Shoichi; Moriyama, Keiji

    2013-03-01

    Objective : To evaluate the long-term maxillomandibular changes after maxillary distraction osteogenesis in growing children having cleft lip with or without cleft palate. Patients : Eight Japanese patients with cleft lip with or without cleft palate aged 9.3 to 13.1 years. Measures : The maxillary and mandibular positions before (T0), immediately after (T1), and 1, 3, and 5 years after distraction osteogenesis (T2, T3, and T4, respectively) measured on cephalograms superimposed at the sella turcica with the Frankfort horizontal plane as the horizontal reference. The anterior nasal spine (x, y), pogonion (x), and menton (y) were used for linear measurements, and sella turcica-nasion-point A, sella turcica-nasion-point B, and point A-nasion-point B angles were used for angular measurements. Results : The mean horizontal maxillary advancement (anterior nasal spine [x]) was 12.3 mm during T0 to T1, but -2.7, -1.1, and -0.1 mm of the posttreatment changes were observed during T1 to T2, T2 to T3, and T3 to T4, respectively. Anterior nasal spine (y) shifted 2.3 mm downward during T0 to T1, and further downward changes were observed during T1 to T2 and T2 to T3 (P < .05). Pogonion (x) did not show distinct changes due to individual variance, but menton (y) shifted downward from T1 to T4. Sella turcica-nasion-point A significantly decreased during T1 to T2 and T2 to T3 but not during T3-T4. Point A-nasion-point B significantly decreased only during T2 to T3, and sella turcica-nasion-point B did not show any distinct change. Conclusions : There was no further maxillary advancement after distraction osteogenesis in the growing children with cleft lip with or without cleft palate. Therefore, long-term observation and management of occlusion in case of the mandibular growth pattern are important.

  18. Orthodontic clockwise rotation of maxillomandibular complex for improving facial profile in late teenagers with Class III malocclusion: A preliminary report

    Directory of Open Access Journals (Sweden)

    Eric JW Liou

    2018-01-01

    Full Text Available Objective: Orthodontic camouflage treatments improve occlusion but might worsen facial profile in patients with Class III malocclusion. It has been reported that surgical clockwise rotation of maxillomandibular complex (MMc improves facial profile by reducing chin prominence and chin throat length in patients with Class III malocclusion. The purpose of this report was to illustrate two orthodontic techniques for clockwise rotation of the MMc in late teenagers with Class III malocclusion and preliminarily evaluate their clinical effects. Patients and Methods: Six patients in late teenage with Class III malocclusion were included in this preliminary report. Bite raisers were first placed on the upper molars to open the bite and clockwise rotate the mandible. Intermaxillary elastics were then applied vertically between the upper and lower dentitions in 3 patients for bimaxillary extrusion (Technique-1 or between the upper dentition and the lower temporary anchorage devices (TADs in another 3 patients (Technique-2 for upper dentition extrusion and closure of the anterior open bite. The three-dimensional cone-beam computed tomography images taken before and after orthodontic treatment were superimposed to evaluate the treatment effects of MMc clockwise rotation for both techniques. Results: The Technique-1 extruded the upper and lower dentitions, rotated the mandible clockwise 2.01°, moved chin down 2.98 mm, and back −1.64 mm, although the mandible grew 2.47 mm during the treatment period. The Technique-2 extruded the upper dentition, rotated the mandible clockwise 0.90°, moved chin down 1.78 mm, but slightly forward 0.47 mm due to the mandible grew 2.50 mm and lower dentition was not extruded. Conclusions: The orthodontic clockwise rotation of MMc is an effective technique for orthognathic camouflage. The applications of bite raisers and bimaxillary dentition extrusion could be more effective than single dentition extrusion with TADs in the

  19. Three-dimensional changes to the upper airway after maxillomandibular advancement with counterclockwise rotation: a systematic review and meta-analysis.

    Science.gov (United States)

    Louro, R S; Calasans-Maia, J A; Mattos, C T; Masterson, D; Calasans-Maia, M D; Maia, L C

    2018-05-01

    The aim of this study was to evaluate the effect of counterclockwise (CCW) rotation and maxillomandibular advancement (MMA) on the upper airway space using three-dimensional images. An electronic search was performed in the PubMed, Cochrane Library, Scopus, Virtual Health Library, Web of Science, and OpenGrey databases (end date July 2016); a hand-search of primary study reference lists was also conducted. The inclusion criteria encompassed computed tomography evaluations of the upper airway spaces of adult patients undergoing orthognathic surgery with CCW rotation and MMA. The articles were evaluated for risk of bias with a tool for before-and-after studies. A meta-analysis was performed with the mean differences using a random-effects model. Heterogeneity was assessed with the Q-test and the I 2 index. The meta-analysis revealed significant (Pspaces. Copyright © 2017 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  20. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  1. Analyzing and Specifying Reusable Security Requirements

    Science.gov (United States)

    2003-09-01

    avionics applications and ecommerce applications need to specify levels of identification, authentication, authorization, integrity, privacy , etc. At...sections specifying functional requirements. Thus, the functional requirements for an embedded avionics application and an ecommerce website may have... Privacy (a.k.a., confidentiality), which is the degree to which sensitive data and communications are kept private from unauthorized individuals and

  2. Reestablishment of the condyle-fossa and maxillomandibular relationships using a flat occlusal plane splint and implant-supported denture: case report with a 2-year follow-up

    OpenAIRE

    MICELLI, Ana Lígia Piza; BUARQUE E SILVA, Wilkens Aurélio; ANDRADE E SILVA, Frederico; BUARQUE E SILVA, Lígia Luzia; ALVES, Josué Nogueira; CASSELLI, Denise de Sa Maia

    2015-01-01

    When the shape, structure, and/or function of one of the parts of the components of the stomatognathic system change, structural and physiological changes also occur to absorb or compensate the consequent loads. Hence, an insightful rehabilitation of this type of patient involves essential procedures, such as: correct orientation of the occlusal plane, determination of the vertical dimension of occlusion, and a stable and healthy maxillomandibular relationship, since the nonobservance of thes...

  3. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  4. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  5. Specifying Functional Requirements Dependency in the REWiki

    OpenAIRE

    ZHANG, ZHANG

    2013-01-01

    Most of the individual requirements cannot be treated in isolation. Requirements may affect each other in various ways. The dependency between requirements impacts a number of software development aspects and activities. How to classify and specify requirements dependency remains a classic research topic. This research aims at providing an approach of specifying functional requirements dependency. In this thesis we generalize a classification of functional requirements dependency. We also pro...

  6. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  7. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  8. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  9. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  10. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  11. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  12. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  13. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  14. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  15. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  16. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  17. A functional language for specifying business reports

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2011-01-01

    We describe our work on developing a functional domain specificlanguage for specifying business reports. The report specificationlanguage is part of a novel enterprise resource planing system basedon the idea of a providing a lean core system that is highlycustomisable via a variety of domain...... specific languages....

  18. A Functional Language for Specifying Business Reports

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2011-01-01

    We describe our work on developing a functional domain specific language for specifying business reports. The report specification language is part of a novel enterprise resource planing system based on the idea of a providing a lean core system that is highly customisable via a variety of domain...

  19. 50 CFR 216.211 - Specified activity and specified geographical region.

    Science.gov (United States)

    2010-10-01

    ... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking of Marine Mammals Incidental to Explosive Severance.... Gulf of Mexico § 216.211 Specified activity and specified geographical region. (a) Regulations in this...

  20. 50 CFR 216.250 - Specified activity and specified geographical region.

    Science.gov (United States)

    2010-10-01

    ... OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking Marine Mammals Incidental to Conducting Precision Strike Weapon Missions in the Gulf of Mexico § 216.250 Specified activity and specified geographical region. (a...

  1. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  2. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  3. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  4. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  5. Frontal Changes in the Lower Face After Clockwise Rotation of the Maxillomandibular Complex Without Perisurgical Orthodontic Treatment in Angle Class I and Skeletal Class III Women.

    Science.gov (United States)

    Lee, Sang Woo; Cho, Jeongmok; Kim, Kikap; Ahn, Seung Hyun

    2017-06-01

    Orthognathic surgery has become more popular to slenderize a wide lower face and to improve facial esthetics in Asian patients with normal occlusion. Clockwise rotation (CR) of the maxillomandibular complex (MMC) steepens the mandibular plane. This study performed a quantitative analysis on the influence of CR on slenderness of the lower face from the frontal view. This retrospective study included 36 female patients with Angle Class I occlusion and skeletal Class III pattern. The subjects underwent CR of the MMC without perioperative orthodontic treatment and change in the occlusion only for the purpose of esthetic improvement. Linear and angular variables were measured on a cephalogram and three-dimensional computed tomography (3D CT) obtained before and at least 6 months after surgery. Data were analyzed using paired t tests and Spearman correlations. Univariate regression analysis was used to predict the postoperative change according to the amount of posterior impaction. The mean posterior impaction was 3.81 mm. All mandibular plane angle (MPA) measurements were increased (ranged from 5.69° to 13.12°, p lower face becomes narrower and more slender as the MMC rotates in a clockwise direction. Orthognathic surgery with CR has the advantage of increasing the MPAs and obtaining natural soft tissue contouring while minimizing the amount of bone resection. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266c .

  6. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  7. Specifying semantic information on functional requirements

    OpenAIRE

    YAO, WUPING

    2012-01-01

    Requirements engineering is a challenging process in software development projects. Requirements, in general, are documented in natural language. They often have issues related to ambiguity, completeness and consistency. How to improve the quality of requirements documentation remains a classic research topic. This research aims at improving the way of editing and documenting functional requirements. We propose a meta-model to specify the semantic information of functional requirements, and d...

  8. Specified radioactive waste final disposal act

    International Nuclear Information System (INIS)

    Yasui, Masaya

    2001-01-01

    Radioactive wastes must be finally and safely disposed far from human activities. Disposal act is a long-range task and needs to be understood and accepted by public for site selection. This paper explains basic policy of Japanese Government for final disposal act of specified radioactive wastes, examination for site selection guidelines to promote residential understanding, general concept of multi-barrier system for isolating the specific radioactive wastes, and research and technical development for radioactive waste management. (S. Ohno)

  9. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  10. Peripheral T cell lymphoma: Not otherwise specified

    Directory of Open Access Journals (Sweden)

    Anusha H Pai

    2015-01-01

    Full Text Available Peripheral T cell lymphoma (PTCL is a heterogeneous group of hematological tumors originating from mature T cells, which constitutes less than 15% of all non-Hodgkins lymphomas in adults. Primary cutaneous PTCL-not otherwise specified (NOS represent a subgroup of PTCLs with no consistent immunophenotypic, genetic or clinical features. PTCL-NOS frequently has an aggressive course with a tendency for systemic involvement, however, a well-defined therapeutic and prognostic approach has not been outlined yet. We report a case of PTCL-NOS with multiple cutaneous lesions in a young adult male with an emphasis on the treatment modality used.

  11. Logic for specifying partially observable stochastic domains

    CSIR Research Space (South Africa)

    Rens, G

    2011-07-01

    Full Text Available to place it back on the floor. In situations where the oil-can is full, the robot gets 5 units of reward for grabbing the can, and it gets 10 units for a drink action. Otherwise, the robot gets no rewards. Rewards motivate an agent to behave as desired... with notions of probability. It will be shown how stochastic domains can be specified, including new kinds of axioms dealing with perception and a frame solution for the proposed logic. 1 Introduction and Motivation In the physical real world...

  12. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  13. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  14. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  15. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  16. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  17. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  18. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  19. Note on specifying and verifying concurrent processes

    Energy Technology Data Exchange (ETDEWEB)

    Holenderski, L.

    1984-02-28

    To represent sequential processes, sets of finite sequences of symbols from a finite alphabet are used in this approach, alphabet symbols denote events occurring when a process is being executed, a sequence of symbols is a record of one execution of the process, and a set of such sequences represents the process itself by combining all its possible executions together. Although this model turned out adequate for specifying concurrent processes and allows proving their properties, there are two reasons, at least, why this note takes the same subject up again. First, by analogy to shuffle and its closure, which express parallel combination and parallel iteration of non-interacting processes, there is a need for a similar operation describing the behaviour of interaction processes. A new extension of shuffle is proposed as a generalization. The closure of this operation provides a tool for specification of parallelly iterated processes. Moreover, the closure makes mutually recursive specification unnecessary. Second, when this model was used to prove properties of concurrent computations, only flow-of-control schemes were considered (thus, only some general properties were proved). When applied to concrete programs using variables that have values, such schemes had to be interpreted. In contrast to such a schematic approach, the usefulness of the same method for concrete programs is argued. This is shown using an example of a correctness proof of an implementation of unbounded semaphore by binary semaphores. 8 references.

  20. Eating disorder not otherwise specified in adolescents.

    Science.gov (United States)

    Eddy, Kamryn T; Celio Doyle, Angela; Hoste, Renee Rienecke; Herzog, David B; le Grange, Daniel

    2008-02-01

    To examine the frequency, type, and clinical severity of eating disorder not otherwise specified (EDNOS) in adolescents seeking treatment through an outpatient eating disorders service. Two hundred eighty-one consecutive referrals to an eating disorders program were assessed using the Eating Disorder Examination (EDE) and self-report measures of depression and self-esteem. The majority of adolescents presented with EDNOS (59.1%; n = 166) relative to anorexia nervosa (AN; 20.3%; n = 57) and bulimia nervosa (BN; 20.6%; n = 58). Most EDNOS youths could be described as subthreshold AN (SAN; 27.7%; n = 46), subthreshold BN (SBN; 19.9%; n = 33), EDNOS purging (27.7%; n = 46), or EDNOS bingeing (6.0%; n = 10); yet 31 (18.7%) could not be categorized as such (EDNOS "other"). Overall differences in eating disorder pathology, depressive symptoms, and self-esteem emerged between the EDNOS types, wherein adolescents with EDNOS bulimic variants (SBN, EDNOS purging, and EDNOS bingeing) had more pathology than youths with SAN or EDNOS "other." There were no differences in these variables between AN and SAN; in contrast, compared with BN, youths with EDNOS bulimic variants reported lower EDE scores and higher self-esteem, although there were no between-group differences in depression. As in adults with eating disorders, EDNOS predominates and is heterogeneous with regard to eating disorder pathology and associated features in an adolescent clinical sample. Lack of differences between AN and SAN suggests that the strict criteria for AN could be relaxed; differences between BN and EDNOS bulimic variants do not support their combination.

  1. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  2. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  3. An outpatient clinical study of dissociative disorder not otherwise specified.

    Science.gov (United States)

    Yanartaş, Ömer; Özmen, Hülya Akar; Citak, Serhat; Zincir, Selma Bozkurt; Sünbül, Esra Aydin

    2014-05-01

    The relatively high prevalence of the diagnosis of dissociative disorder not otherwise specified is frequently considered to be disproportionate. The disproportionate rate of this diagnosis is thought to be related to nosologic and/or diagnostic issues in dissociative identity disorder. We sought to investigate and compare the symptom patterns of these two clinical entities. We conducted a cross-sectional study involving 1314 participants who were screened with the Dissociative Experience Scale (DES) and the Somatoform Dissociation Questionnaire (SDQ). Of the participants, 272 who scored above the cut-off points for the screening questionnaires (DES score>30 and/or SDQ score>40 points) were invited to complete a structured interview using the Dissociative Disorders Interview Schedule (DDIS); of this subsample, only 190 participants agreed to participate in the second phase of the study. The mean score for the DES was 18.55±17.23, and the mean score for the SDQ was 30.19±13.32. Of the 190 participants, 167 patients were diagnosed as having a dissociative disorder (87.8%). We found that DD-NOS was the most prevalent category of dissociative disorder. There was a significantly larger percentage of patients in the DID group than in the DD-NOS group according to secondary features of DID and Schneiderian symptoms. The secondary features of DID and Schneiderian symptoms appeared to be more specific for DID, while no differences were detected between DID and DD-NOS based on most of the items on the SCL 90R. Further longitudinal studies are needed to determine the features that are similar and dissimilar between DD-NOS and DID. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. 42 CFR 480.138 - Disclosure for other specified purposes.

    Science.gov (United States)

    2010-10-01

    ...) General requirements for disclosure. Except as specified in paragraph (b) of this section, the following... information is necessary to protect against a substantial risk to the public health. (3) Disclosure to the... 42 Public Health 4 2010-10-01 2010-10-01 false Disclosure for other specified purposes. 480.138...

  5. 31 CFR 129.6 - Penalties specified by law.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Penalties specified by law. 129.6 Section 129.6 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY REPORTING § 129.6 Penalties specified by law. Reporters are advised that the Act provides the...

  6. 77 FR 9877 - Reporting of Specified Foreign Financial Assets; Correction

    Science.gov (United States)

    2012-02-21

    ... Reporting of Specified Foreign Financial Assets; Correction AGENCY: Internal Revenue Service (IRS). ACTION... the reporting of specified foreign financial assets. FOR FURTHER INFORMATION CONTACT: Joseph S.... List of Subjects in 26 CFR Part 1 Income taxes, Reporting and recordkeeping requirements. PART 1...

  7. 77 FR 10422 - Reporting of Specified Foreign Financial Assets; Correction

    Science.gov (United States)

    2012-02-22

    ... Reporting of Specified Foreign Financial Assets; Correction AGENCY: Internal Revenue Service (IRS). ACTION... to the reporting of specified foreign financial assets. DATES: Effective Date: December 19, 2011. FOR... ``Explanation of Provisions'', paragraph B. 2., line three, the language ``or executor is a bank, financial'' is...

  8. 76 FR 78594 - Reporting of Specified Foreign Financial Assets

    Science.gov (United States)

    2011-12-19

    ... Reporting of Specified Foreign Financial Assets AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... foreign financial assets and the value of those assets is more than the applicable reporting threshold... hold specified foreign financial assets generally will be excepted from reporting such assets under...

  9. 77 FR 9845 - Reporting of Specified Foreign Financial Assets; Correction

    Science.gov (United States)

    2012-02-21

    ... Reporting of Specified Foreign Financial Assets; Correction AGENCY: Internal Revenue Service (IRS), Treasury...), which were published in the Federal Register on Monday, December 19, 2011, relating to the reporting of specified foreign financial assets. DATES: Effective date: This correction is effective February 21, 2012...

  10. Examining the Panic Attack Specifier in Social Anxiety Disorder.

    Science.gov (United States)

    Allan, Nicholas P; Oglesby, Mary E; Short, Nicole A; Schmidt, Norman B

    2016-04-01

    Panic attacks (PAs) are characterized by overwhelming surges of fear and discomfort and are one of the most frequently occurring symptoms in psychiatric populations. The most recent version of the Diagnostic and Statistical Manual of Mental Disorders (i.e. DSM-5) allows for a panic attack (PA) specifier for all disorders, including social anxiety disorder (SAD). However, there is little research examining differences between individuals diagnosed with SAD with the PA specifier versus individuals diagnosed with SAD without the PA specifier. The current study examined social anxiety, mood, anxiety, and anxiety sensitivity social concerns, a risk factor for social anxiety in SAD-diagnosed individuals without (N = 52) and with (N = 14) the PA specifier. The groups differed only in somatic symptoms of anxiety. Result of the current study provides preliminary evidence that the presence of the PA specifier in social anxiety does not result in elevated levels of comorbidity or a more severe presentation of social anxiety.

  11. PI3K/Akt1 signalling specifies foregut precursors by generating regionalized extra-cellular matrix

    DEFF Research Database (Denmark)

    Villegas, S Nahuel; Rothová, Michaela; Barrios-Llerena, Martin E

    2013-01-01

    -to-mesenchymal transition (EMT). Akt1 transduced this activity via modifications to the extracellular matrix (ECM) and appropriate ECM could itself induce anterior endodermal identity in the absence of PI3K signalling. PI3K/Akt1-modified ECM contained low levels of Fibronectin (Fn1) and we found that Fn1 dose was key...... to specifying anterior endodermal identity in vivo and in vitro. Thus, localized PI3K activity affects ECM composition and ECM in turn patterns the endoderm. DOI: http://dx.doi.org/10.7554/eLife.00806.001....

  12. Charts for specifying limits on copper stabilizer damage rate

    International Nuclear Information System (INIS)

    Sawan, M.E.

    1984-01-01

    Charts that simplify the task of specifying the damage rate limit in the copper stabilizer of fusion reactor superconducting magnets are presented. Partial damage recovery with annealing is accounted for. Applications to the MARS magnets are discussed. (orig.)

  13. 42 CFR 8.24 - Specifying who represents the parties.

    Science.gov (United States)

    2010-10-01

    ... CERTIFICATION OF OPIOID TREATMENT PROGRAMS Procedures for Review of Suspension or Proposed Revocation of OTP Certification, and of Adverse Action Regarding Withdrawal of Approval of an Accreditation Body § 8.24 Specifying...

  14. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  15. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  16. Zebrafish Mnx proteins specify one motoneuron subtype and suppress acquisition of interneuron characteristics

    Directory of Open Access Journals (Sweden)

    Seredick Steve D

    2012-11-01

    Full Text Available Abstract Background Precise matching between motoneuron subtypes and the muscles they innervate is a prerequisite for normal behavior. Motoneuron subtype identity is specified by the combination of transcription factors expressed by the cell during its differentiation. Here we investigate the roles of Mnx family transcription factors in specifying the subtypes of individually identified zebrafish primary motoneurons. Results Zebrafish has three Mnx family members. We show that each of them has a distinct and temporally dynamic expression pattern in each primary motoneuron subtype. We also show that two Mnx family members are expressed in identified VeLD interneurons derived from the same progenitor domain that generates primary motoneurons. Surprisingly, we found that Mnx proteins appear unnecessary for differentiation of VeLD interneurons or the CaP motoneuron subtype. Mnx proteins are, however, required for differentiation of the MiP motoneuron subtype. We previously showed that MiPs require two temporally-distinct phases of Islet1 expression for normal development. Here we show that in the absence of Mnx proteins, the later phase of Islet1 expression is initiated but not sustained, and MiPs become hybrids that co-express morphological and molecular features of motoneurons and V2a interneurons. Unexpectedly, these hybrid MiPs often extend CaP-like axons, and some MiPs appear to be entirely transformed to a CaP morphology. Conclusions Our results suggest that Mnx proteins promote MiP subtype identity by suppressing both interneuron development and CaP axon pathfinding. This is, to our knowledge, the first report of transcription factors that act to distinguish CaP and MiP subtype identities. Our results also suggest that MiP motoneurons are more similar to V2 interneurons than are CaP motoneurons.

  17. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  18. Psychotherapy and Pharmacotherapy for Patients with Dissociative Identity Disorder

    OpenAIRE

    Gentile, Julie P.; Dillon, Kristy S.; Gillig, Paulette Marie

    2013-01-01

    There is a wide variety of what have been called “dissociative disorders,” including dissociative amnesia, dissociative fugue, depersonalization disorder, dissociative identity disorder, and forms of dissociative disorder not otherwise specified. Some of these diagnoses, particularly dissociative identity disorder, are controversial and have been questioned by many clinicians over the years. The disorders may be under-diagnosed or misdiagnosed, but many persons who have experienced trauma rep...

  19. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  20. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  1. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  2. Conserved gene regulatory module specifies lateral neural borders across bilaterians.

    Science.gov (United States)

    Li, Yongbin; Zhao, Di; Horie, Takeo; Chen, Geng; Bao, Hongcun; Chen, Siyu; Liu, Weihong; Horie, Ryoko; Liang, Tao; Dong, Biyu; Feng, Qianqian; Tao, Qinghua; Liu, Xiao

    2017-08-01

    The lateral neural plate border (NPB), the neural part of the vertebrate neural border, is composed of central nervous system (CNS) progenitors and peripheral nervous system (PNS) progenitors. In invertebrates, PNS progenitors are also juxtaposed to the lateral boundary of the CNS. Whether there are conserved molecular mechanisms determining vertebrate and invertebrate lateral neural borders remains unclear. Using single-cell-resolution gene-expression profiling and genetic analysis, we present evidence that orthologs of the NPB specification module specify the invertebrate lateral neural border, which is composed of CNS and PNS progenitors. First, like in vertebrates, the conserved neuroectoderm lateral border specifier Msx/vab-15 specifies lateral neuroblasts in Caenorhabditis elegans Second, orthologs of the vertebrate NPB specification module ( Msx/vab-15 , Pax3/7/pax-3 , and Zic/ref-2 ) are significantly enriched in worm lateral neuroblasts. In addition, like in other bilaterians, the expression domain of Msx/vab-15 is more lateral than those of Pax3/7/pax-3 and Zic/ref- 2 in C. elegans Third, we show that Msx/vab-15 regulates the development of mechanosensory neurons derived from lateral neural progenitors in multiple invertebrate species, including C. elegans , Drosophila melanogaster , and Ciona intestinalis We also identify a novel lateral neural border specifier, ZNF703/tlp-1 , which functions synergistically with Msx/vab- 15 in both C. elegans and Xenopus laevis These data suggest a common origin of the molecular mechanism specifying lateral neural borders across bilaterians.

  3. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  4. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  5. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  6. Specifying design conservatism: Worst case versus probabilistic analysis

    Science.gov (United States)

    Miles, Ralph F., Jr.

    1993-01-01

    Design conservatism is the difference between specified and required performance, and is introduced when uncertainty is present. The classical approach of worst-case analysis for specifying design conservatism is presented, along with the modern approach of probabilistic analysis. The appropriate degree of design conservatism is a tradeoff between the required resources and the probability and consequences of a failure. A probabilistic analysis properly models this tradeoff, while a worst-case analysis reveals nothing about the probability of failure, and can significantly overstate the consequences of failure. Two aerospace examples will be presented that illustrate problems that can arise with a worst-case analysis.

  7. Specifying structural constraints of architectural patterns in the ARCHERY language

    International Nuclear Information System (INIS)

    Sanchez, Alejandro; Barbosa, Luis S.; Riesco, Daniel

    2015-01-01

    ARCHERY is an architectural description language for modelling and reasoning about distributed, heterogeneous and dynamically reconfigurable systems in terms of architectural patterns. The language supports the specification of architectures and their reconfiguration. This paper introduces a language extension for precisely describing the structural design decisions that pattern instances must respect in their (re)configurations. The extension is a propositional modal logic with recursion and nominals referencing components, i.e., a hybrid µ-calculus. Its expressiveness allows specifying safety and liveness constraints, as well as paths and cycles over structures. Refinements of classic architectural patterns are specified

  8. Finding small OBDDs for incompletely specified truth tables is hard

    DEFF Research Database (Denmark)

    Miltersen, Peter Bro; Kristensen, Jesper Torp

    2006-01-01

    We present an efficient reduction mapping undirected graphs G with n = 2^k vertices for integers k to tables of partially specified Boolean functions g: {0,1}^(4k+1) -> {0,1,*} so that for any integer m, G has a vertex colouring using m colours if and only if g has a consistent ordered binary dec...... decision diagram with at most (2m + 2)n^2 + 4n decision nodes. From this it follows that the problem of finding a minimum-sized consistent OBDD for an incompletely specified truth table is NP-hard and also hard to approximate....

  9. Specifying structural constraints of architectural patterns in the ARCHERY language

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Alejandro [Departamento de Informática, Universidad Nacional de San Luis, Ejército de los Andes 950, D5700HHW San Luis (Argentina); HASLab INESC TEC and Universidade do Minho, Campus de Gualtar, 4710-057 Braga (Portugal); Barbosa, Luis S. [HASLab INESC TEC and Universidade do Minho, Campus de Gualtar, 4710-057 Braga (Portugal); Riesco, Daniel [Departamento de Informática, Universidad Nacional de San Luis, Ejército de los Andes 950, D5700HHW San Luis (Argentina)

    2015-03-10

    ARCHERY is an architectural description language for modelling and reasoning about distributed, heterogeneous and dynamically reconfigurable systems in terms of architectural patterns. The language supports the specification of architectures and their reconfiguration. This paper introduces a language extension for precisely describing the structural design decisions that pattern instances must respect in their (re)configurations. The extension is a propositional modal logic with recursion and nominals referencing components, i.e., a hybrid µ-calculus. Its expressiveness allows specifying safety and liveness constraints, as well as paths and cycles over structures. Refinements of classic architectural patterns are specified.

  10. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  11. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  12. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  13. Developing hospital identity manuals: a reference tool for illustrators.

    Science.gov (United States)

    Schaffer, J A; Zimmerman, S B

    1990-01-01

    Because of an increase in hospital marketing efforts, medical illustrators may be asked to assist in developing and implementing hospital identity manuals, which specify the graphic standards for visual communications media. A checklist survey of existing identity manuals and a literature review were conducted by one of the authors, a medical illustrator, to help her to develop a manual for her hospital employer. This article documents the literature review, the study, and the identity manual development, and presents recommendations to help other medical illustrators who might become involved in similar assignments.

  14. The prevalence of eating disorders not otherwise specified

    NARCIS (Netherlands)

    Machado, Paulo P. P.; Machado, Barbara C.; Goncalves, Sonia; Hoek, Hans W.

    Objective: Eating Disorders Not Otherwise Specified (EDNOS) represent the most common eating disorder diagnosed in specialized treatment settings. The purpose of the current study is to assess the prevalence of EDNOS in a nationwide community sample. Method: Participants were 2,028 female students,

  15. 76 FR 78553 - Reporting of Specified Foreign Financial Assets

    Science.gov (United States)

    2011-12-19

    ... maintained by a foreign financial institution and, to the extent not held in an account at a financial... account, the name and address of the financial institution in which the account is maintained must be... one or more specified foreign financial assets and those assets have an aggregate fair market value...

  16. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  17. Identification and localization of a gene that specifies production of Escherichia coli DNA topoisomerase I

    International Nuclear Information System (INIS)

    Trucksis, M.; Depew, R.E.

    1981-01-01

    A gene that specifies production of Escherichia coli DNA topoisomerase I (ω protein) was identified with the aid of a radioimmunoassay for this protein. E. coli DNA topoisomerase I was produced by Salmonella typhimurium merodiploids that harbored E. coli plasmid F' 123, but not by strains that lost this plasmid. Analysis of strains with spontaneous deletions of F' 123 showed that the gene, topA, required for production of the E. coli ω protein was between the trp operon and the cysB gene. Deletions that eliminated topA also eliminated the supX gene. We suggest that topA is the structural gene of E. coli DNA topoisomerase I and that topA is identical to supX

  18. Working with Specify in a Paleo-Geological Context

    Science.gov (United States)

    Molineux, A.; Thompson, A. C.; Appleton, L.

    2014-12-01

    For geological collections with limited funding an open source relational database provides an opportunity to digitize specimens and related data. At the Non-vertebrate Paleontology Lab, a large mixed paleo and geological repository on a restricted budget, we opted for one such database, Specify. Initially created at Kansas University for neontological collections and based on a single computer, Specify has moved into the networked scene and will soon be web-based as Specify 7. We currently use the server version of Specify 6, networked to all computers in the lab each running a desktop client, often with six users at any one time. Along with improved access there have been great efforts to broaden the applicability of this database to other disciplines. Current developments are of great importance to us because they focus on the geological aspects of lithostratigraphy and chronostratigaphy and their relationship to other variables. Adoption of this software has required constant change as we move to take advantage of the great improvements. We enjoy the interaction with the developers and their willingness to listen and consider our issues. Here we discuss some of the ways in which we have fashioned Specify into a database that provides us with the flexibility that we need without removing the ability to share our data with other aggregators through accepted protocols. We discuss the customization of forms, the attachment of media and tracking of original media files, our efforts to incorporate geological specimens, and our plans to link the individual specimen record GUIDs to an IGSN numbers and thence to future connections to data derived from our specimens.

  19. A Dialectical Approach to Theoretical Integration in Developmental-Contextual Identity Research

    Science.gov (United States)

    Seaman, Jayson; Sharp, Erin Hiley; Coppens, Andrew D.

    2017-01-01

    Future advances in identity research will depend on integration across major theoretical traditions. Developmental-contextualism has established essential criteria to guide this effort, including specifying the context of identity development, its timing over the life course, and its content. This article assesses 4 major traditions of identity…

  20. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  1. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  2. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  3. The effects of specified chemical meals on food intake.

    Science.gov (United States)

    Koopmans, H S; Maggio, C A

    1978-10-01

    Rats received intragastric infusions of various specified chemical meals and were subsequently tested for a reduction in food intake. A second experiment, using a novel technique, tested for conditioned aversion to the meal infusions. The nonnutritive substances, kaolin clay and emulsified fluorocarbon, had no significant effect on food intake. Infusions of 1 M glucose and 1 M sorbitol reduced feeding behavior, but the 1 M sorbitol infusion also produced a conditioned aversion to flavored pellets paired with the sorbitol infusion, showing that the reduced feeding could have been caused by discomfort. Infusion of a high-fat meal consisting of emulsified triolein mixed with small amounts of sugar and protein or the rat's normal liquid diet, Nutrament, also reduced food intake, and both infusions failed to produce a conditioned aversion. The use of specified meals to understand the chemical basis of satiety requires a sensitive behavioral test to establish that the meal does not cause discomfort or other nonspecific effects.

  4. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  5. The prevalence of eating disorders not otherwise specified

    OpenAIRE

    Machado, Paulo P. P.; Machado, Bárbara César; Gonçalves, Sónia; Hoek, Hans W.

    2007-01-01

    Objective: Eating Disorders Not Otherwise Specified (EDNOS) represent the most common eating disorder diagnosed in specialized treatment settings. The purpose of the current study is to assess the prevalence of EDNOS in a nationwide community sample. Method: Participants were 2028 female students, aged 12 to 23, attending public schools in the 9th to 12th grades in Portugal. Participants completed the Eating Disorder Examination Questionnaire in Stage 1 of the study. In Stage 2, we selected a...

  6. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  7. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  8. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  9. Complexity of hierarchically and 1-dimensional periodically specified problems

    Energy Technology Data Exchange (ETDEWEB)

    Marathe, M.V.; Hunt, H.B. III; Stearns, R.E.; Radhakrishnan, V.

    1995-08-23

    We study the complexity of various combinatorial and satisfiability problems when instances are specified using one of the following specifications: (1) the 1-dimensional finite periodic narrow specifications of Wanke and Ford et al. (2) the 1-dimensional finite periodic narrow specifications with explicit boundary conditions of Gale (3) the 2-way infinite1-dimensional narrow periodic specifications of Orlin et al. and (4) the hierarchical specifications of Lengauer et al. we obtain three general types of results. First, we prove that there is a polynomial time algorithm that given a 1-FPN- or 1-FPN(BC)specification of a graph (or a C N F formula) constructs a level-restricted L-specification of an isomorphic graph (or formula). This theorem along with the hardness results proved here provides alternative and unified proofs of many hardness results proved in the past either by Lengauer and Wagner or by Orlin. Second, we study the complexity of generalized CNF satisfiability problems of Schaefer. Assuming P {ne} PSPACE, we characterize completely the polynomial time solvability of these problems, when instances are specified as in (1), (2),(3) or (4). As applications of our first two types of results, we obtain a number of new PSPACE-hardness and polynomial time algorithms for problems specified as in (1), (2), (3) or(4). Many of our results also hold for O(log N) bandwidth bounded planar instances.

  10. The problem of the driverless vehicle specified path stability control

    Science.gov (United States)

    Buznikov, S. E.; Endachev, D. V.; Elkin, D. S.; Strukov, V. O.

    2018-02-01

    Currently the effort of many leading foreign companies is focused on creation of driverless transport for transportation of cargo and passengers. Among many practical problems arising while creating driverless vehicles, the problem of the specified path stability control occupies a central place. The purpose of this paper is formalization of the problem in question in terms of the quadratic functional of the control quality, the comparative analysis of the possible solutions and justification of the choice of the optimum technical solution. As square value of the integral of the deviation from the specified path is proposed as the quadratic functional of the control quality. For generation of the set of software and hardware solution variants the Zwicky “morphological box” method is used within the hardware and software environments. The heading control algorithms use the wheel steering angle data and the deviation from the lane centerline (specified path) calculated based on the navigation data and the data from the video system. Where the video system does not detect the road marking, the control is carried out based on the wheel navigation system data and where recognizable road marking exits - based on to the video system data. The analysis of the test results allows making the conclusion that the application of the combined navigation system algorithms that provide quasi-optimum solution of the problem while meeting the strict functional limits for the technical and economic indicators of the driverless vehicle control system under development is effective.

  11. Design of HIFU Transducers for Generating Specified Nonlinear Ultrasound Fields.

    Science.gov (United States)

    Rosnitskiy, Pavel B; Yuldashev, Petr V; Sapozhnikov, Oleg A; Maxwell, Adam D; Kreider, Wayne; Bailey, Michael R; Khokhlova, Vera A

    2017-02-01

    Various clinical applications of high-intensity focused ultrasound have different requirements for the pressure levels and degree of nonlinear waveform distortion at the focus. The goal of this paper is to determine transducer design parameters that produce either a specified shock amplitude in the focal waveform or specified peak pressures while still maintaining quasi-linear conditions at the focus. Multiparametric nonlinear modeling based on the Khokhlov-Zabolotskaya-Kuznetsov (KZK) equation with an equivalent source boundary condition was employed. Peak pressures, shock amplitudes at the focus, and corresponding source outputs were determined for different transducer geometries and levels of nonlinear distortion. The results are presented in terms of the parameters of an equivalent single-element spherically shaped transducer. The accuracy of the method and its applicability to cases of strongly focused transducers were validated by comparing the KZK modeling data with measurements and nonlinear full diffraction simulations for a single-element source and arrays with 7 and 256 elements. The results provide look-up data for evaluating nonlinear distortions at the focus of existing therapeutic systems as well as for guiding the design of new transducers that generate specified nonlinear fields.

  12. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  13. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  14. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  15. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  16. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  17. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  18. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  19. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  20. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  1. Dental magnetic resonance tomography (dental-MRT) as a method for imaging of the maxillo-mandibular bone; Dentale Magnetresonanztomographie (Dental-MRT) als Verfahren zur Darstellung des maxillomandibulaeren Zahnhalteapparates

    Energy Technology Data Exchange (ETDEWEB)

    Gahleitner, A.; Nasel, C.; Schick, S.; Dorffner, S.; Imhof, H.; Trattnig, S. [Wien Univ. (Austria). Abt. fuer Osteologie; Bernhart, T.; Mailath, G.; Watzek, G. [Wien Univ. (Austria). Abt. fuer Orale Chirurgie

    1998-10-01

    Purpose: To establish a new method for dental imaging using magnetic resonance tomography named Dental-MRT and to demonstrate its usefulness in diagnosing dentogen pathologies of the mandible and maxilla. Methods: Seven healthy volunteers, three patients with pulpitis, two patients with dentigerous cysts, two patients after tooth transplantation, and three patients with atrophic mandibles have been evaluated. Optimized axial T{sub 1}- and T{sub 2}-weighted gradient echo and spin echo sequences in 2D and 3D technique have been established to perform studies of the jaws. The acquired images were reconstructed with a standard dental software package on a workstation as panorama and cross-sectional views of the mandible or maxilla. Results: The entire maxillo-mandibular bone, teeth, dental pulp, and the content of the mandibular canal were well depicted. Patients with pulpitis demonstrate bone marrow edema in the periapical region. Dentigerous cysts and their relation to the surrounding structures are clearly shown. After contrast media administration marked enhancement of the dental pulp can be demonstrated. Conclusion: Dental-MRT promises to provide a new tool for visualization and detection of dental diseases. (orig.) [Deutsch] Ziel: Das Vorstellen der Dental-MRT als neue Methode zur Darstellung des Ober- und Unterkiefers und ihre Anwendung bei der Diagnose zahnmedizinischer Erkankungen. Methoden: 7 gesunde Probanden, drei Patienten mit Pulpitis, zwei Patienten mit odontogenen Zysten, zwei Patienten nach Zahntransplantationen und drei Patienten mit atrophem Unterkiefer wurden untersucht. Optimierte axiale T{sub 1}- und T{sub 2}-gewichtete Gradienten-Echo- und Spin-Echo-Sequenzen in 2D und 3D-Technik wurden angewandt. Nach der Untersuchung wurden Panoramaschnitte und dentale Rekonstruktionen des Ober- und Unterkiefers, unter Verwendung einer gebraeuchlichen Dental-Software, angefertigt. Ergebnisse: Der gesamte Kieferbereich, Zaehne, Pulpa und der Inhalt des

  2. Does Temporomandibular Joint Pathology With or Without Surgical Management Affect the Stability of Counterclockwise Rotation of the Maxillomandibular Complex in Orthognathic Surgery? A Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Al-Moraissi, Essam Ahmed; Wolford, Larry M

    2017-04-01

    This study was designed to determine the stability of counterclockwise rotation (CCWR) of the maxillomandibular complex (MMC) in orthognathic surgery with or without surgical correction of coexisting temporomandibular joint (TMJ) pathology. The authors implemented a systematic review and meta-analysis. A search of major databases through PubMed, EMBASE, and Cochrane CENTRAL was performed. Inclusion criteria were studies that analyzed CCWR of the MMC in regard to skeletal stability after orthognathic surgery in patients with or without pre-existing TMJ pathology that was or was not surgically corrected concomitantly. The predictor variables were patients who underwent CCWR of the MMC in the following subgroups: 1) healthy TMJs (presumed healthy based on history, clinical evaluation, and radiographic analysis but without magnetic resonance imaging [MRI] confirmation), 2) no TMJ assessment, 3) untreated TMJ disc displacement (confirmed by MRI), 4) TMJ disc displacement (confirmed by MRI) repositioned using Mitek anchors, and 5) reconstruction with TMJ total joint prosthesis. Outcome variables were surgical relapse for angular and linear measurements. Postsurgical mean changes for the occlusal plane (OP) and linear measurements using a fixed-effects model with a 95% confidence interval were analyzed. A total of 345 patients enrolled in 12 studies were included in this study. There was significant OP relapse and horizontal relapse at the B point and menton for studies with untreated TMJ disc displacement and studies without TMJ assessment (P < .005). There was significant horizontal relapse at the A point for studies with healthy TMJs, without assessment of the TMJs, and with TMJ reconstruction with total joint prostheses (P < .005). There was no significant vertical relapse at the B and A points for all subgroup analyses (P < .005). The result of the meta-analysis suggests that CCWR of the MMC is a stable procedure for patients with healthy TMJs, patients undergoing

  3. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  5. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  6. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  7. Specifying the Behaviour of Python Programs: Language and Basic Examples

    Directory of Open Access Journals (Sweden)

    2010-04-01

    Full Text Available This manuscript describe BeSSY, a function-centric language for formal behavioural specification that requires no more than high-school mathematics on arithmetic, functions, Boolean algebra and sets theory. An object can be modelled as a union of data sets and functions whereas inherited object can be modelled as a union of supersets and a set of object-specific functions. Python list and dictionary operations will be specified in BeSSY for illustration.

  8. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  9. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  10. Partially specified physics problems: university students' attitudes and performance

    International Nuclear Information System (INIS)

    Marusic, M; Erceg, N; Slisko, J

    2011-01-01

    In this research we asked the fourth year students (N = 50) of a technical faculty of the University of Split (Republic of Croatia) to solve a partially specified physics problem related to gravitational force. The task for the students was to decide whether the situation described in the problem is feasible or not. Nevertheless, the formulation of the problem is such that it does not give students any explicit advice regarding what to calculate or how to judge the feasibility of the given situation in the real world. The research was carried out using a structured written exam method. The worksheet was structured in order to assess explicitly a few elements of the students' problem-solving performance. Based on their results, the examinees were classified into four categories, depending on what they could or could not accomplish during problem solving. A majority of students were not able to solve the given physical problem completely. A selection of students' and professors' observations is also included. Our results show that traditionally formulated numerical exercises, which are mostly used in physics teaching, do not develop students' abilities in higher-order thinking (i.e. planning, decision making or result evaluation) to a desirable extent. We suggest that partially specified problems should be given to students, both in problem-solving sessions and exams, in order to prepare them for dealing with ill-structured tasks in real life.

  11. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  12. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  13. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  14. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  15. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  16. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  17. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  18. Eating disorder not otherwise specified presentation in the US population.

    Science.gov (United States)

    Le Grange, Daniel; Swanson, Sonja A; Crow, Scott J; Merikangas, Kathleen R

    2012-07-01

    To examine prevalence and clinical correlates of eating disorder not otherwise specified (EDNOS) in the US population. Two cross-sectional surveys of adults and adolescents used the WHO CIDI to assess DSM-IV criteria for anorexia nervosa (AN), bulimia nervosa (BN), and EDNOS. Lifetime prevalence of EDNOS was 4.78% in adolescents and 4.64% in adults. The majority of adolescents and adults with an eating disorder presented with EDNOS. Three-quarters of participants with EDNOS met criteria for comorbid disorders, while one-quarter endorsed suicidality. Severity correlates were equally prevalent in EDNOS and AN, whereas comparisons between EDNOS and BN varied by specific correlate and sample. Adolescents with subthreshold AN (SAN) endorsed more anxiety than AN (p EDNOS. Eating disorder diagnostic nomenclature requires modification to capture the full spectrum. © 2012 by Wiley Periodicals, Inc. Int J Eat Disord 2012. Copyright © 2012 Wiley Periodicals, Inc.

  19. [Adolescent medicine: eating disorders not otherwise specified (EDNOS)].

    Science.gov (United States)

    Vust, S; Michaud, P A

    2008-01-09

    Young people (mostly females) suffering from eating disorders not otherwise specified (EDNOS) are more and more numerous and their difficulties pose serious problems to health care providers as well as the society. These situations correspond to eating disorders which do not totally meet the DSM-IV criteria for either anorexia or bulimia nervosa. The duration of the symptoms, the extent of suffering as well as the impact on daily life should be taken into account to set-up the treatment. The therapeutic approach to these disorders should ideally include both cognitive/dietary and psychodynamic approaches. The Multidisciplinary Unit for Adolescent Health in Lausanne has set-up a group treatment for these patients.

  20. A Language for Specifying Compiler Optimizations for Generic Software

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, Jeremiah J. [Indiana Univ., Bloomington, IN (United States)

    2007-01-01

    Compiler optimization is important to software performance, and modern processor architectures make optimization even more critical. However, many modern software applications use libraries providing high levels of abstraction. Such libraries often hinder effective optimization — the libraries are difficult to analyze using current compiler technology. For example, high-level libraries often use dynamic memory allocation and indirectly expressed control structures, such as iteratorbased loops. Programs using these libraries often cannot achieve an optimal level of performance. On the other hand, software libraries have also been recognized as potentially aiding in program optimization. One proposed implementation of library-based optimization is to allow the library author, or a library user, to define custom analyses and optimizations. Only limited systems have been created to take advantage of this potential, however. One problem in creating a framework for defining new optimizations and analyses is how users are to specify them: implementing them by hand inside a compiler is difficult and prone to errors. Thus, a domain-specific language for librarybased compiler optimizations would be beneficial. Many optimization specification languages have appeared in the literature, but they tend to be either limited in power or unnecessarily difficult to use. Therefore, I have designed, implemented, and evaluated the Pavilion language for specifying program analyses and optimizations, designed for library authors and users. These analyses and optimizations can be based on the implementation of a particular library, its use in a specific program, or on the properties of a broad range of types, expressed through concepts. The new system is intended to provide a high level of expressiveness, even though the intended users are unlikely to be compiler experts.

  1. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  2. Hox genes require homothorax and extradenticle for body wall identity specification but not for appendage identity specification during metamorphosis of Tribolium castaneum.

    Science.gov (United States)

    Smith, Frank W; Jockusch, Elizabeth L

    2014-11-01

    The establishment of segment identity is a key developmental process that allows for divergence along the anteroposterior body axis in arthropods. In Drosophila, the identity of a segment is determined by the complement of Hox genes it expresses. In many contexts, Hox transcription factors require the protein products of extradenticle (exd) and homothorax (hth) as cofactors to perform their identity specification functions. In holometabolous insects, segment identity may be specified twice, during embryogenesis and metamorphosis. To glean insight into the relationship between embryonic and metamorphic segmental identity specification, we have compared these processes in the flour beetle Tribolium castaneum, which develops ventral appendages during embryogenesis that later metamorphose into adult appendages with distinct morphologies. At metamorphosis, comparisons of RNAi phenotypes indicate that Hox genes function jointly with Tc-hth and Tc-exd to specify several region-specific aspects of the adult body wall. On the other hand, Hox genes specify appendage identities along the anteroposterior axis independently of Tc-hth/Tc-exd and Tc-hth/Tc-exd specify proximal vs. distal identity within appendages independently of Hox genes during this stage. During embryogenesis, Tc-hth and Tc-exd play a broad role in the segmentation process and are required for specification of body wall identities in the thorax; however, contrasting with results from other species, we did not obtain homeotic transformations of embryonic appendages in response to Tc-hth or Tc-exd RNAi. In general, the homeotic effects of interference with the function of Hox genes and Tc-hth/Tc-exd during metamorphosis did not match predictions based on embryonic roles of these genes. Comparing metamorphic patterning in T. castaneum to embryonic and post-embryonic development in hemimetabolous insects suggests that holometabolous metamorphosis combines patterning processes of both late embryogenesis and

  3. Criminal Social Identity and Suicide Ideation among Pakistani Young Prisoners

    OpenAIRE

    Shagufta, Sonia; Boduszek, Daniel; Dhingra, Katie; Palmer, Derrol

    2015-01-01

    © Emerald Group Publishing Limited. Purpose: Suicidal behaviour is a common in prisoners, yet little is known about the factors that may protect against thoughts of ending one's life. The purpose of this paper is to specify and test a structural model to examine the relationship between three criminal social identity (CSI) dimensions (in-group affect, in-group ties, and cognitive centrality) and suicide ideation while controlling for period of confinement, age, criminal friends, and offense t...

  4. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  5. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  6. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  7. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  8. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  9. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  10. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  11. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...

  12. Splitting Ward identity

    International Nuclear Information System (INIS)

    Safari, Mahmoud

    2016-01-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  13. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion......' expressions of autonomy and choice and their adaptations of such concepts to understandings of social belonging, inclusion and identity formation vis--vis the Danish nation-state....

  14. Editorial: Negotiating Gamer Identities

    Directory of Open Access Journals (Sweden)

    Matthew Barr

    2016-07-01

    Full Text Available The term ‘gamer identity’ is hotly contested, and certainly not understood as a broadly accepted term. From the outdated stereotype of white, heterosexual, teenage boys playing Nintendo in their parents’ basement to the equally contested proclamation that “‘gamers’ are over”, the current game culture climate is such that movements as divisive and controversial as #gamergate can flourish. For this latest special issue of Press Start, we invited submissions regarding the recent controversies surrounding the notion of player identities, with the aim of receiving papers from different viewpoints on gamer identity and culture.

  15. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  16. ASPECT: An advanced specified-profile evaluation code for tokamaks

    International Nuclear Information System (INIS)

    Stotler, D.P.; Reiersen, W.T.; Bateman, G.

    1993-03-01

    A specified-profile, global analysis code has been developed to evaluate the performance of fusion reactor designs. Both steady-state and time-dependent calculations are carried out; the results of the former can be used in defining the parameters of the latter, if desired. In the steady-state analysis, the performance is computed at a density and temperature chosen to be consistent with input limits (e.g., density and beta) of several varieties. The calculation can be made at either the intersection of the two limits or at the point of optimum performance as the density and temperature are varied along the limiting boundaries. Two measures of performance are available for this purpose: the ignition margin or the confinement level required to achieve a prescribed ignition margin. The time-dependent calculation can be configured to yield either the evolution of plasma energy as a function of time or, via an iteration scheme, the amount of auxiliary power required to achieve a desired final plasma energy

  17. Measles virus-specified polypeptides in infected cells

    International Nuclear Information System (INIS)

    Vainionpaepae, R.

    1979-01-01

    The synthesis of wild-type measles virus-specified polypeptides in Vero cells in pulse-chase experiments, in cells with synchronized protein synthesis by high salt concentration, and in the presence of proteolytic enzyme inhibitors was analyzed by polyacrylamide slab-gel electrophoresis. Six major (L, G, 2, NP, 5 and M) structural polypeptides were identified in infected cells. The results of pulse-chase experiments suggested that most of the structural polypeptides were synthesized at their final length. Polypeptide M was found to be sensitive to trypsin. In TLCK-treated cells its molecular weight was about 1000-2000 daltons higher than in untreated cells. A minor virus-specific polypeptide with a molecular weight of about 23,000 was found as a very faint and diffuse band. In addition, three nonstructural polypeptides with molecular weights of 65,000, 38,000 and 18,000 were also detected. The experiments with proteolytic enzyme inhibitors and with synchronized protein synthesis suggested that the polypeptide with a molecular weight of 65,000 might be a precursor of the structural polypeptide 5. (author)

  18. Protein misfolding specifies recruitment to cytoplasmic inclusion bodies.

    Science.gov (United States)

    Bersuker, Kirill; Brandeis, Michael; Kopito, Ron R

    2016-04-25

    Inclusion bodies (IBs) containing aggregated disease-associated proteins and polyubiquitin (poly-Ub) conjugates are universal histopathological features of neurodegenerative diseases. Ub has been proposed to target proteins to IBs for degradation via autophagy, but the mechanisms that govern recruitment of ubiquitylated proteins to IBs are not well understood. In this paper, we use conditionally destabilized reporters that undergo misfolding and ubiquitylation upon removal of a stabilizing ligand to examine the role of Ub conjugation in targeting proteins to IBs that are composed of an N-terminal fragment of mutant huntingtin, the causative protein of Huntington's disease. We show that reporters are excluded from IBs in the presence of the stabilizing ligand but are recruited to IBs after ligand washout. However, we find that Ub conjugation is not necessary to target reporters to IBs. We also report that forced Ub conjugation by the Ub fusion degradation pathway is not sufficient for recruitment to IBs. Finally, we find that reporters and Ub conjugates are stable at IBs. These data indicate that compromised folding states, rather than conjugation to Ub, can specify recruitment to IBs. © 2016 Bersuker et al.

  19. Optimum heat power cycles for specified boundary conditions

    International Nuclear Information System (INIS)

    Ibrahim, O.M.; Klein, S.A.; Mitchell, J.W.

    1991-01-01

    In this paper optimization of the power output of Carnot and closed Brayton cycles is considered for both finite and infinite thermal capacitance rates of the external fluid streams. The method of Lagrange multipliers is used to solve for working fluid temperatures that yield maximum power. Analytical expressions for the maximum power and the cycle efficiency at maximum power are obtained. A comparison of the maximum power from the two cycles for the same boundary conditions, i.e., the same heat source/sink inlet temperatures, thermal capacitance rates, and heat exchanger conductances, shows that the Brayton cycle can produce more power than the Carnot cycle. This comparison illustrates that cycles exist that can produce more power than the Carnot cycle. The optimum heat power cycle, which will provide the upper limit of power obtained from any thermodynamic cycle for specified boundary conditions and heat exchanger conductances is considered. The optimum heat power cycle is identified by optimizing the sum of the power output from a sequence of Carnot cycles. The shape of the optimum heat power cycle, the power output, and corresponding efficiency are presented. The efficiency at maximum power of all cycles investigated in this study is found to be equal to (or well approximated by) η = 1 - sq. root T L.in /φT H.in where φ is a factor relating the entropy changes during heat rejection and heat addition

  20. Synthetic prions with novel strain-specified properties.

    Science.gov (United States)

    Moda, Fabio; Le, Thanh-Nhat T; Aulić, Suzana; Bistaffa, Edoardo; Campagnani, Ilaria; Virgilio, Tommaso; Indaco, Antonio; Palamara, Luisa; Andréoletti, Olivier; Tagliavini, Fabrizio; Legname, Giuseppe

    2015-12-01

    Prions are infectious proteins that possess multiple self-propagating structures. The information for strains and structural specific barriers appears to be contained exclusively in the folding of the pathological isoform, PrP(Sc). Many recent studies determined that de novo prion strains could be generated in vitro from the structural conversion of recombinant (rec) prion protein (PrP) into amyloidal structures. Our aim was to elucidate the conformational diversity of pathological recPrP amyloids and their biological activities, as well as to gain novel insights in characterizing molecular events involved in mammalian prion conversion and propagation. To this end we generated infectious materials that possess different conformational structures. Our methodology for the prion conversion of recPrP required only purified rec full-length mouse (Mo) PrP and common chemicals. Neither infected brain extracts nor amplified PrP(Sc) were used. Following two different in vitro protocols recMoPrP converted to amyloid fibrils without any seeding factor. Mouse hypothalamic GT1 and neuroblastoma N2a cell lines were infected with these amyloid preparations as fast screening methodology to characterize the infectious materials. Remarkably, a large number of amyloid preparations were able to induce the conformational change of endogenous PrPC to harbor several distinctive proteinase-resistant PrP forms. One such preparation was characterized in vivo habouring a synthetic prion with novel strain specified neuropathological and biochemical properties.

  1. 29 CFR 780.908 - Relation of employee's work to specified transportation.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Relation of employee's work to specified transportation... Relation of employee's work to specified transportation. In order for the exemption to apply to an employee... fruits or vegetables from the farm to the specified places within the same State. Engagement in other...

  2. 40 CFR 1065.514 - Cycle-validation criteria for operation over specified duty cycles.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Cycle-validation criteria for operation over specified duty cycles. 1065.514 Section 1065.514 Protection of Environment ENVIRONMENTAL... Over Specified Duty Cycles § 1065.514 Cycle-validation criteria for operation over specified duty...

  3. Language, Identity, and Exile

    Science.gov (United States)

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  4. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  5. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  6. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...

  7. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  8. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  9. Work and Female Identity.

    Science.gov (United States)

    Reohr, Janet R.

    In climbing an organizational ladder dominated by males, the professional woman encounters obstacles to the more traditional feminine behaviors and mannerisms to which she may be accustomed. These obstacles may erode her sense of identity, creating difficulties both inside and outside of her work environment. Traditional distinctions between…

  10. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  11. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  12. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  13. Body Integrity Identity Disorder

    NARCIS (Netherlands)

    Blom, Rianne M.; Hennekam, Raoul C.; Denys, Damiaan

    2012-01-01

    Introduction: Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal

  14. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  15. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  16. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  17. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  18. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  19. Psychotherapy and pharmacotherapy for patients with dissociative identity disorder.

    Science.gov (United States)

    Gentile, Julie P; Dillon, Kristy S; Gillig, Paulette Marie

    2013-02-01

    There is a wide variety of what have been called "dissociative disorders," including dissociative amnesia, dissociative fugue, depersonalization disorder, dissociative identity disorder, and forms of dissociative disorder not otherwise specified. Some of these diagnoses, particularly dissociative identity disorder, are controversial and have been questioned by many clinicians over the years. The disorders may be under-diagnosed or misdiagnosed, but many persons who have experienced trauma report "dissociative" symptoms. Prevalence of dissociative disorders is unknown, but current estimates are higher than previously thought. This paper reviews clinical, phenomenological, and epidemiological data regarding diagnosis in general, and illustrates possible treatment interventions for dissociative identity disorder, with a focus on psychotherapy interventions and a review of current psychopharmacology recommendations as part of a comprehensive multidisciplinary treatment plan.

  20. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  1. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts......This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based....... We further observe considerable interpretive variation in how identity scripts are reproduced and enacted. We contribute to the emerging understanding of institutions as ‘inhabited’ by individuals and extend this literature by demonstrating that the institutional work of reinterpreting competing...

  2. LITERATURE AND IDENTITY

    Directory of Open Access Journals (Sweden)

    Dragana Litričin Dunić

    2015-04-01

    Full Text Available Literature can represent, on the one hand, the establishment of cultural and national identity, and, on the other hand, a constant indicator of the differences. Self-image and the image of the Other in literature is very important not only for understanding national character and preservation of cultural identity, but also for the release from ideological reading and stereotyping. Analyzing the image of the Other, research into the representation of the Balkans symbolically represents in the popular literature of the West, study of the cultural context and the processes that formed the writer’s perceptions that determine the establishment of stereotypes about Homo Balcanicus and many others, are all important tasks of imagological research, as well as the key research tasks conducted nowadays. In this paper we shall discuss some of these issues in the field of comparative literature.

  3. Delineation and analysis of chromosomal regions specifying Yersinia pestis.

    Science.gov (United States)

    Derbise, Anne; Chenal-Francisque, Viviane; Huon, Christèle; Fayolle, Corinne; Demeure, Christian E; Chane-Woon-Ming, Béatrice; Médigue, Claudine; Hinnebusch, B Joseph; Carniel, Elisabeth

    2010-09-01

    Yersinia pestis, the causative agent of plague, has recently diverged from the less virulent enteropathogen Yersinia pseudotuberculosis. Its emergence has been characterized by massive genetic loss and inactivation and limited gene acquisition. The acquired genes include two plasmids, a filamentous phage, and a few chromosomal loci. The aim of this study was to characterize the chromosomal regions acquired by Y. pestis. Following in silico comparative analysis and PCR screening of 98 strains of Y. pseudotuberculosis and Y. pestis, we found that eight chromosomal loci (six regions [R1pe to R6pe] and two coding sequences [CDS1pe and CDS2pe]) specified Y. pestis. Signatures of integration by site specific or homologous recombination were identified for most of them. These acquisitions and the loss of ancestral DNA sequences were concentrated in a chromosomal region opposite to the origin of replication. The specific regions were acquired very early during Y. pestis evolution and were retained during its microevolution, suggesting that they might bring some selective advantages. Only one region (R3pe), predicted to carry a lambdoid prophage, is most likely no longer functional because of mutations. With the exception of R1pe and R2pe, which have the potential to encode a restriction/modification and a sugar transport system, respectively, no functions could be predicted for the other Y. pestis-specific loci. To determine the role of the eight chromosomal loci in the physiology and pathogenicity of the plague bacillus, each of them was individually deleted from the bacterial chromosome. None of the deletants exhibited defects during growth in vitro. Using the Xenopsylla cheopis flea model, all deletants retained the capacity to produce a stable and persistent infection and to block fleas. Similarly, none of the deletants caused any acute flea toxicity. In the mouse model of infection, all deletants were fully virulent upon subcutaneous or aerosol infections. Therefore

  4. A general integral identity

    Energy Technology Data Exchange (ETDEWEB)

    Glasser, M L, E-mail: laryg@clarkson.edu [Department of Physics, Clarkson University, Potsdam, NY 13699-5820 (United States); Departamento de Fisica Teorica, Atomica y Optica, Universidad de Valladolid, Valladolid 470071 (Spain)

    2011-06-03

    The identity {integral}{sub 0}{sup {pi}/2}d{Phi}{integral}{sub 0}{sup {pi}/2}d{Theta} sin{Phi} F(x sn{Phi} sin{Phi})={pi}/2 {integral}{sub 0}{sup 1}F(xt)dt, where F is any function, is derived. Several extensions are given and a few examples of physical interest are described.

  5. Identity, History, Tolerance

    Directory of Open Access Journals (Sweden)

    Surovtsev V.A.

    2016-01-01

    Full Text Available The article discusses the role of historical narratives in the formation of identity. Rüsen’s thesis on the contradiction of traditional historical identities that suggest an ethnocentric position with the processes of intercultural communication is analyzed. The potential of historical narratives in overcoming (or restricting ethnocentrism is considered. It is shown that ethnocentrism is constituted by kinds of the configuration of historical writing rather than by a subjective position of historical narrative authors. The types of stories suggest a the way of making history using only the criteria of success and failure in the interpretation of the past; b interpretation of history as teleological continuity; c merely the necessity to justify (to substantiate claims or to discredit something. It is alleged that the realization that the form of historical knowledge constructs, not discovers, can facilitate liberation from referential fallacy on the whole and enslavement by certain kinds of stories in particular. It is concluded that the recognition of the constitutive nature of historical narratives allows being independent from the traditional forms of historical knowledge and traditional ideas about their cultural value. In particular, it allows reconsidering the need to apply historical knowledge when constructing identity.

  6. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  7. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  8. Wingless, decapentaplegic and EGF receptor signaling pathways interact to specify dorso-ventral pattern in the adult abdomen of Drosophila.

    Science.gov (United States)

    Kopp, A; Blackman, R K; Duncan, I

    1999-08-01

    Adult abdominal segments of Drosophila are subdivided along the dorso-ventral axis into a dorsal tergite, a ventral sternite and ventro-lateral pleural cuticle. We report that this pattern is largely specified during the pupal stage by Wingless (Wg), Decapentaplegic (Dpp) and Drosophila EGF Receptor (DER) signaling. Expression of wg and dpp is activated at the posterior edge of the anterior compartment by Hedgehog signaling. Within this region, wg and dpp are expressed in domains that are mutually exclusive along the dorso-ventral axis: wg is expressed in the sternite and medio-lateral tergite, whereas dpp expression is confined to the pleura and the dorsal midline. Neither gene is expressed in the lateral tergite. Shirras and Couso (1996, Dev. Biol. 175, 24-36) have shown that tergite and sternite cell fates are specified by Wg signaling. We find that DER acts synergistically with Wg to promote tergite and sternite identities, and that Wg and DER activities are opposed by Dpp signaling, which promotes pleural identity. Wg and Dpp interact antagonistically at two levels. First, their expression is confined to complementary domains by mutual transcriptional repression. Second, Wg and Dpp compete directly with one another by exerting opposite effects on cell fate. DER signaling does not affect the expression of wg or dpp, indicating that it interacts with Wg and Dpp at the level of cell fate determination. Within the tergite, the requirements for Wg and DER function are roughly complementary: Wg is required mainly in the medial region, whereas DER is most important laterally. Finally, we show that Dpp signaling at the dorsal midline controls dorso-ventral patterning within the tergite by promoting pigmentation in the medial region.

  9. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  10. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  11. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  12. A two-metric proposal to specify the color-rendering properties of light sources for retail lighting

    Science.gov (United States)

    Freyssinier, Jean Paul; Rea, Mark

    2010-08-01

    Lighting plays an important role in supporting retail operations, from attracting customers, to enabling the evaluation of merchandise, to facilitating the completion of the sale. Lighting also contributes to the identity, comfort, and visual quality of a retail store. With the increasing availability and quality of white LEDs, retail lighting specifiers are now considering LED lighting in stores. The color rendering of light sources is a key factor in supporting retail lighting goals and thus influences a light source's acceptance by users and specifiers. However, there is limited information on what consumers' color preferences are, and metrics used to describe the color properties of light sources often are equivocal and fail to predict preference. The color rendering of light sources is described in the industry solely by the color rendering index (CRI), which is only indirectly related to human perception. CRI is intended to characterize the appearance of objects illuminated by the source and is increasingly being challenged because new sources are being developed with increasingly exotic spectral power distributions. This paper discusses how CRI might be augmented to better use it in support of the design objectives for retail merchandising. The proposed guidelines include the use of gamut area index as a complementary metric to CRI for assuring good color rendering.

  13. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  14. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  15. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  16. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  17. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  18. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  19. Employing Multilevel Intersectionality in Educational Research: Latino Identities, Contexts, and College Access

    Science.gov (United States)

    Núñez, Anne-Marie

    2014-01-01

    The theoretical framework of intersectionality shows much promise in exploring how multiple social identities and their relationships with interlocking systems of power influence educational equity, particularly for historically underserved groups in education. Yet, social scientists have critiqued this framework for not adequately specifying how…

  20. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  1. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  2. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  3. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  4. Identities in Migration

    Directory of Open Access Journals (Sweden)

    Montserrat Clua i Fainé

    2017-08-01

    Full Text Available Young Catalans in London build their identity as immigrants in a close dialectic between their own imaginary about immigration in their country of origin and British perceptions of them. Given the negative stigma attached to the category of «immigrant», not all recognise themselves as such. Some simply refuse to acknowledge they belong to this category, while others use the projection of prejudices on immigrants towards Spaniards as a strategy from which they distance themselves by establishing a distinction between Catalans and Spaniards.

  5. How the Interplay between Consumer Motivations and Values Influences Organic Food Identity and Behavior

    DEFF Research Database (Denmark)

    Hansen, Torben; Ingerslev Sørensen, Maria; Riwerts Eriksen, Marie-Louise

    2018-01-01

    This study develops a baseline model specifying expected relationships between consumer motivations (health, environmental, and social consciousness), organic food identity, and organic food behavior. Based on an online survey of 1176 Danish food consumers, we investigate whether...... to change is low, health consciousness has a positive effect on intentional organic food behavior through organic food identity, whereas social consciousness has a negative effect on intentional organic food behavior through organic food identity. Our results provide guidance to those seeking to segment...... organic food markets based on consumers’ motivations and values....

  6. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  7. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  8. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  9. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  10. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  11. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  12. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity. © 2013, The Society of Analytical Psychology.

  13. Forging a Black identity

    Directory of Open Access Journals (Sweden)

    Barry Chevannes

    1992-07-01

    Full Text Available [First paragraph] The Rastafarians: sounds of cultural dissonance [revised and updated editionj. LEONARD E. BARRETT, SR. Boston: Beacon Press, 1988. xviii + 302 pp. (Paper US$ 11.95 Rasta and resistance: from Marcus Garvey to Walter Rodney. HORACE CAMPBELL. Trenton NJ: Africa World Press, 1987. xiii + 236 pp. (Cloth US$32.95, Paper US$ 10.95 Garvey's children: the legacy of Marcus Garvey. TONY SEWELL. London: Macmillan Caribbean, 1990. 128 pp. (Paper £ 17.95 The central theme linking these three titles is the evolution of a black identity among English-speaking Caribbean peoples, in particular Jamaicans. Consequently all three authors cover the two most important historical phenomena in Caribbean black nationalism, namely Garveyism and Rastafari, one focusing on the former and the other two focusing on the latter.

  14. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    within the Turkish minority in the three countries with special attention to the influence of transnational social transformation. Social communities and organisations such as trade unions, political parties or religious and cultural association have usually been ascribed the capability to enhance...... relations between individuals and to extend trust, values, identity and social belonging. Whether we focus on the individual and the value of face to face contact or we focus on the role of the organisation as an intervening institution between the state, the political system and the citizen...... in prolongation of the previous development. Conversely do the analyses of the Danish and German case show that models are not static. Denmark followed Sweden shortly after in introducing local voting rights for non-citizens and generally non-citizens enjoy considerable political, social and civic rights...

  15. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  16. 36 CFR 223.84 - Small business bid form provisions on sales with specified road construction.

    Science.gov (United States)

    2010-07-01

    ... provisions on sales with specified road construction. 223.84 Section 223.84 Parks, Forests, and Public... specified road construction. For each sale described in § 223.82(b), the bid form must include provision for a small business concern: (a) To elect road construction by the Forest Service and where such...

  17. 75 FR 76940 - Specified Tax Return Preparers Required To File Individual Income Tax Returns Using Magnetic...

    Science.gov (United States)

    2010-12-10

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Parts 1 and 301 [REG-100194-10] RIN 1545-BJ52 Specified Tax Return Preparers Required To File Individual Income Tax Returns Using Magnetic... for ``specified tax return prepares,''. FOR FURTHER INFORMATION CONTACT: Keith L. Brau at (202) 622...

  18. 76 FR 22611 - Specified Tax Return Preparers Required To File Individual Income Tax Returns Using Magnetic...

    Science.gov (United States)

    2011-04-22

    ... Specified Tax Return Preparers Required To File Individual Income Tax Returns Using Magnetic Media... Register on Wednesday, March 30, 2011 (76 FR 17521) providing guidance to specified tax return preparers who prepare and file individual income tax returns using magnetic media pursuant to section 6011(e)(3...

  19. The Effects of Including a Callous-Unemotional Specifier for the Diagnosis of Conduct Disorder

    Science.gov (United States)

    Kahn, Rachel E.; Frick, Paul J.; Youngstrom, Eric; Findling, Robert L.; Youngstrom, Jennifer Kogos

    2012-01-01

    Background: "With Significant Callous-Unemotional Traits" has been proposed as a specifier for conduct disorder (CD) in the upcoming revision of the Diagnostic and Statistical Manual of Mental Disorders (DSM-V). The impact of this specifier on children diagnosed with CD should be considered. Methods: A multi-site cross-sectional design with…

  20. 31 CFR 560.803 - Customs procedures: Goods specified in § 560.201.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Customs procedures: Goods specified... REGULATIONS Procedures § 560.803 Customs procedures: Goods specified in § 560.201. (a) With respect to goods... Customs officers shall not accept or allow any: (1) Entry for consumption or warehouse (including any...

  1. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  2. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  3. Multipartite-to-bipartite entanglement transformations and polynomial identity testing

    International Nuclear Information System (INIS)

    Chitambar, Eric; Duan Runyao; Shi Yaoyun

    2010-01-01

    We consider the problem of deciding if some multiparty entangled pure state can be converted, with a nonzero success probability, into a given bipartite pure state shared between two specified parties through local quantum operations and classical communication. We show that this question is equivalent to the well-known computational problem of deciding if a multivariate polynomial is identically zero. Efficient randomized algorithms developed to study the latter can thus be applied to our question. As a result, a given transformation is possible if and only if it is generically attainable by a simple randomized protocol.

  4. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  5. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  6. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  7. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  8. Play Memories and Place Identity.

    Science.gov (United States)

    Sandberg, Anette

    2003-01-01

    This retrospective study examined play memories from childhood to adulthood of 478 university students between ages 20 and 62 as exhibited in drawings of play memories and questionnaire responses. The study focused on the role of the physical environment and place identity in play memories and individual identity development. Findings showed that…

  9. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  10. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  11. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  12. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  14. Ward identities at finite temperature

    International Nuclear Information System (INIS)

    DOlivo, J.C.; Torres, M.; Tututi, E.

    1996-01-01

    The Ward identities for QED at finite temperature are derived using the functional real-time formalism. They are verified by an explicit one-loop calculation. An effective causal vertex is constructed which satisfy the Ward identity with the associated retarded self-energy. copyright 1996 American Institute of Physics

  15. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  16. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  17. Aircraft model prototypes which have specified handling-quality time histories

    Science.gov (United States)

    Johnson, S. H.

    1978-01-01

    Several techniques for obtaining linear constant-coefficient airplane models from specified handling-quality time histories are discussed. The pseudodata method solves the basic problem, yields specified eigenvalues, and accommodates state-variable transfer-function zero suppression. The algebraic equations to be solved are bilinear, at worst. The disadvantages are reduced generality and no assurance that the resulting model will be airplane like in detail. The method is fully illustrated for a fourth-order stability-axis small motion model with three lateral handling quality time histories specified. The FORTRAN program which obtains and verifies the model is included and fully documented.

  18. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  19. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  20. Body integrity identity disorder.

    Science.gov (United States)

    Blom, Rianne M; Hennekam, Raoul C; Denys, Damiaan

    2012-01-01

    Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation) were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  1. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  2. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  3. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  4. 46 CFR 199.610 - Exemptions for vessels in specified services.

    Science.gov (United States)

    2010-10-01

    ... Specified Services Section or paragraph in this part Service Oceans Coastwise Great Lakes Lakes, Bays, and... helpless person can be observed from the navigating bridge; and A(iii) the vessel does not regularly engage...

  5. Criminal social identity and suicide ideation among Pakistani young prisoners.

    Science.gov (United States)

    Shagufta, Sonia; Boduszek, Daniel; Dhingra, Katie; Kola-Palmer, Derrol

    2015-01-01

    Suicidal behaviour is a common in prisoners, yet little is known about the factors that may protect against thoughts of ending one's life. The purpose of this paper is to specify and test a structural model to examine the relationship between three criminal social identity (CSI) dimensions (in-group affect, in-group ties, and cognitive centrality) and suicide ideation while controlling for period of confinement, age, criminal friends, and offense type (violent vs non-violent). Participants were 415 male juvenile offenders incarcerated in prisons in Khyber Pakhtunkhwa Pakistan. A structural model was specified and tested using Mplus to examine the relationships between the three factors of CSI and suicidal thoughts, while controlling for age, offender type, period of confinement, and substance dependence. The model provided an adequate fit for the data, explaining 22 per cent of variance in suicidal thoughts. In-group affect (the level of personal bonding with other criminals) was found to exert a strong protective effect against suicide ideation. The research contributes important information on suicide ideation in Pakistan, an Islamic country in which suicide is considered a sin and subsequently a criminal offence. Results indicate that Juvenile offenders' sense of shared identity may help to prevent the development of thoughts of death by suicide. Consequently, separating and isolating young prisoners may be ill advised.

  6. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  7. A Benchmark for Comparing Different Approaches for Specifying and Verifying Real-Time Systems

    Science.gov (United States)

    1993-01-01

    To be considered correct or useful, real - time systems must deliver results within specified time intervals, either without exception or with high...probability. Recently, a large number of formal methods have been invented for specifying and verifying real - time systems . It has been suggested that...these formal methods need to be tested out on actual real - time systems . Such testing will allow the scalability of the methods to be assessed and also

  8. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  9. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  10. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  11. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and

  12. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  13. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  14. Culture, Identity and the Curriculum.

    Science.gov (United States)

    Burtonwood, Neil

    1996-01-01

    Critiques recent versions of pluralism by examining the concepts of culture and identity underlying them. Proposes a model of education that rejects cultural transmission in favor of a transformational curriculum that goes beyond culture. (SK)

  15. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  16. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  17. Ward identities for conformal models

    International Nuclear Information System (INIS)

    Lazzarini, S.; Stora, R.

    1988-01-01

    Ward identities which express the symmetry of conformal models are treated. Diffeomorphism invariance or locally holomorphic coordinate transformations are used. Diffeomorphism invariance is then understood in terms of Riemannian geometry. Two different sets of Ward identities expressing diffeomorphism invariance in a conformally invariant way are found for the free bosonic string. Using a geometrical argument, the correct invariance for a large class of conformal models is given

  18. Understanding American Identity: An Introduction

    Science.gov (United States)

    2017-12-01

    this leads to is, how can we begin this transformation ? D. HOW TO GET THERE: PATRIOTIC BUILDING BLOCKS 1. Civic Education Many have argued that civic... transformation of the U.S. public education system and writes, “High schools brought young people together into an adolescent world that helped to obscure...Revamped civic education and national service programs can serve to form those cross-cutting ties. 14. SUBJECT TERMS American identity, national identity

  19. The ambiguous identity of auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...... to attribute identity to a distinct evaluative practice become insensitive to issues concerning the relevance of their results to evaluative practices in general and their relation to specific characteristic of certain evaluative practices...

  20. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  1. Recognition of disturbances with specified morphology in time series. Part 1: Spikes on magnetograms of the worldwide INTERMAGNET network

    Science.gov (United States)

    Bogoutdinov, Sh. R.; Gvishiani, A. D.; Agayan, S. M.; Solovyev, A. A.; Kin, E.

    2010-11-01

    The International Real-time Magnetic Observatory Network (INTERMAGNET) is the world's biggest international network of ground-based observatories, providing geomagnetic data almost in real time (within 72 hours of collection) [Kerridge, 2001]. The observation data are rapidly transferred by the observatories participating in the program to regional Geomagnetic Information Nodes (GINs), which carry out a global exchange of data and process the results. The observations of the main (core) magnetic field of the Earth and its study are one of the key problems of geophysics. The INTERMAGNET system is the basis of monitoring the state of the Earth's magnetic field; therefore, the information provided by the system is required to be very reliable. Despite the rigid high-quality standard of the recording devices, they are subject to external effects that affect the quality of the records. Therefore, an objective and formalized recognition with the subsequent remedy of the anomalies (artifacts) that occur on the records is an important task. Expanding on the ideas of Agayan [Agayan et al., 2005] and Gvishiani [Gvishiani et al., 2008a; 2008b], this paper suggests a new algorithm of automatic recognition of anomalies with specified morphology, capable of identifying both physically- and anthropogenically-derived spikes on the magnetograms. The algorithm is constructed using fuzzy logic and, as such, is highly adaptive and universal. The developed algorithmic system formalizes the work of the expert-interpreter in terms of artificial intelligence. This ensures identical processing of large data arrays, almost unattainable manually. Besides the algorithm, the paper also reports on the application of the developed algorithmic system for identifying spikes at the INTERMAGNET observatories. The main achievement of the work is the creation of an algorithm permitting the almost unmanned extraction of spike-free (definitive) magnetograms from preliminary records. This automated

  2. Adaptações do sistema estomatognático em indivíduos com desproporções maxilo-mandibulares: revisão da literatura Adaptations on the stomatognathic system of individuals with maxillomandibular disproportion: literature review

    Directory of Open Access Journals (Sweden)

    Tatiana Albuquerque Coutinho

    2009-01-01

    Full Text Available Esta pesquisa procurou identificar as adaptações do sistema estomatognático em indivíduos com desproporções maxilomandibulares. A revisão bibliográfica se fez por meio das bases de dados nacionais e internacionais, abordando as adaptações do sistema estomatognático em indivíduos com desproporção maxilo-mandibular submetidos a tratamento ortodôntico-cirúrgico (cirurgia ortognática associado à intervenção fonoaudiológica. Observou-se que sujeitos com prognatismo e retrognatismo apresentam adaptações em todas as funções realizadas pelo sistema motor oral, no período pré-cirurgia ortognática. No prognatismo mandibular, a função mais adaptada é a mastigação, caracterizando-se em movimentos verticalizados com utilização do dorso da língua para amassamento do alimento e pouca utilização dos músculos mastigatórios. No retrognatismo mandibular, estudos mostram que a deglutição apresenta-se bastante adaptada, com presença de deslize mandibular anterior somado ao movimento póstero-anterior de língua e com participação da musculatura perioral. Após a cirurgia ortognática, alguns casos podem apresentar adequação das funções do sistema estomatognático, porém em outros persistem as alterações, sendo necessário o conhecimento do fonoaudiólogo sobre as adaptações pré-existentes para traçar o melhor plano de reabilitação.This research had the aim to identify adaptations on the stomatognathic system of individuals with maxillomandibular disproportions. The literature review was carried out using national and international databases, addressing adaptations on the stomatognathic system of subjects with maxillomandibular disproportions submitted to orthognathic surgery associated to speech-language intervention. It was found that subjects with prognathism and retrognathism present adaptations in all oral-motor functions during the presurgical period. In mandibular prognathism, the most adapted function

  3. THE DIFFERENCES IN MORAL, GROUP IDENTITY AND THE PERCON’S VARIABILITY DEPENDING ON THE EDUCATION

    Directory of Open Access Journals (Sweden)

    Irina Aleksandrobna Kolinichenko

    2017-06-01

    Results. The results of the study have revealed the dominance of all specified assessment parameters in the group of test subjects with incomplete higher education: higher level of moral development in all dilemmas (the opposition of life values (compassion and following the law, self-interest – the interests of the city (law, business (benefit and law, personal interests (career and the freedom of another person, except for the dilemma of the opposition between the interests of a majority and a single person. The differences have also been revealed between the two groups of test subjects according to the group identity, group variability, the desirability of the common categories of identity.

  4. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  6. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  7. Influence of vibrational treatment on thermomechanical response of material under conditions identical to friction stir welding

    Energy Technology Data Exchange (ETDEWEB)

    Konovalenko, Ivan S., E-mail: ivkon@ispms.tsc.ru [Institute of Strength Physics and Materials Science SB RAS, Tomsk, 634055 (Russian Federation); Konovalenko, Igor S., E-mail: igkon@ispms.tsc.ru; Kolubaev, Evgeniy A., E-mail: eak@ispms.tsc.ru [Institute of Strength Physics and Materials Science SB RAS, Tomsk, 634055 (Russian Federation); National Research Tomsk Polytechnic University, Tomsk, 634050 (Russian Federation); Dmitriev, Andrey I., E-mail: dmitr@ispms.tsc.ru [Institute of Strength Physics and Materials Science SB RAS, Tomsk, 634055 (Russian Federation); National Research Tomsk Polytechnic University, Tomsk, 634050 (Russian Federation); National Research Tomsk State University, Tomsk, 634050 (Russian Federation); Psakhie, Sergey G., E-mail: sp@ms.tsc.ru [Institute of Strength Physics and Materials Science SB RAS, Tomsk, 634055 (Russian Federation); National Research Tomsk State University, Tomsk, 634050 (Russian Federation)

    2015-10-27

    A molecular dynamics model was constructed to describe material loading on the atomic scale by the mode identical to friction stir welding. It was shown that additional vibration applied to the tool during the loading mode provides specified intensity values and continuous thermomechanical action during welding. An increase in additional vibration intensity causes an increase both in the force acting on the workpiece from the rotating tool and in temperature within the welded area.

  8. Dnd Is a Critical Specifier of Primordial Germ Cells in the Medaka Fish

    Directory of Open Access Journals (Sweden)

    Ni Hong

    2016-03-01

    Full Text Available Primordial germ cell (PGC specification occurs early in development. PGC specifiers have been identified in Drosophila, mouse, and human but remained elusive in most animals. Here we identify the RNA-binding protein Dnd as a critical PGC specifier in the medaka fish (Oryzias latipes. Dnd depletion specifically abolished PGCs, and its overexpression boosted PGCs. We established a single-cell culture procedure enabling lineage tracing in vitro. We show that individual blastomeres from cleavage embryos at the 32- and 64-cell stages are capable of PGC production in culture. Importantly, Dnd overexpression increases PGCs via increasing PGC precursors. Strikingly, dnd RNA forms prominent particles that segregate asymmetrically. Dnd concentrates in germ plasm and stabilizes germ plasm RNA. Therefore, Dnd is a critical specifier of fish PGCs and utilizes particle partition as a previously unidentified mechanism for asymmetric segregation. These findings offer insights into PGC specification and manipulation in medaka as a lower vertebrate model.

  9. Hierarchy of modular graph identities

    International Nuclear Information System (INIS)

    D’Hoker, Eric; Kaidi, Justin

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  10. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  11. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  12. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  13. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  14. IDENTITY AND THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Abrudan Cristina

    2008-05-01

    Full Text Available The purpose of this article is to throw some light on the question of identity in the European Union. The challenge is to understand how identity formation takes place in the contemporary world. The European integration has to be understood both as a process of socio-economic convergence among European states but also as a process of co-operation on different other levels, too. It seems that cultures, traditions and interests are more and more interconnected as societies become increasingly multicultural. This is the reason why people are concerned with the concept of identity and the recognition of their uniqueness in terms of traditions, values and ways of lives.

  15. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  16. National identity in multicultural environment

    Directory of Open Access Journals (Sweden)

    Milena Öbrink Hobzová

    2017-11-01

    Full Text Available In today's globalized world, it is important to find a relationship to our own culture as well as to the other cultures which we encounter due to migration. This goal should be met in multicultural education. As a result of the so-called migration crisis, effectiveness of multicultural education was discussed on social networks and in media. At the same time, national interests and security began to appear in the programmes of political parties. It seems that, due to the fear of refugees, national identity started becoming more important. The situation is reflected in the research presented below. It aimed to determine whether there was a link between the sense of national identity and attitudes to foreigners. The investigation was carried out in 2015 on a sample of 245 respondents. The results showed that the growing sense of national identity deepened the negative attitude to foreigners. It is necessary to work with this fact in multicultural education at schools.

  17. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  18. Theta function identities associated with Ramanujan's modular ...

    Indian Academy of Sciences (India)

    In Chapter 20 of his second notebook [6], Ramanujan recorded several theta function identities associated with modular equations of composite degree 15. These identities have previously been proved by Berndt in [3]. But he proved most of these theta function identities using modular equations. These identities can also ...

  19. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of. Göllnitz–Gordon identities. Keywords. n-Color partitions; lattice paths; Frobenius partitions; Göllnitz–Gordon identities; combinatorial interpretations. 1.

  20. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  1. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  2. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  3. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  4. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  5. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  6. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  7. Layering spatial identities: the identity discourses of new regions

    NARCIS (Netherlands)

    Terlouw, K.; van Gorp, B.H.

    2014-01-01

    The number and importance of regions are increasing at the same time as traditional regional identities are undermined through processes like globalisation and individualisation. Local and other administrations increasingly cooperate and create new regions which are too changeable for a distinct

  8. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context...

  9. Status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  10. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  11. [The history of the concept of gender identity disorder].

    Science.gov (United States)

    Koh, Jun

    2012-01-01

    The Metamorphoses Greek myth includes a story about a woman raised as a male falling in love with another woman, and being transformed into a man prior to a wedding ceremony and staying with her. It is therefore considered that people who desire to live as though they have the opposite gender have existed since ancient times. People who express a sense of discomfort with their anatomical sex and related roles have been reported in the medical literature since the middle of the 19th century. However, homosexual, fetishism, gender identity disorder, and associated conditions were mixed together and regarded as types of sexual perversion that were considered ethically objectionable until the 1950s. The first performance of sex-reassignment surgery in 1952 attracted considerable attention, and the sexologist Harry Benjamin reported a case of 'a woman kept in the body of a man', which was called transsexualism. John William Money studied the sexual consciousness about disorders of sex development and advocated the concept of gender in 1957. Thereafter the disparity between anatomical sex and gender identity was referred to as the psychopathological condition of gender identity disorder, and this was used for its diagnostic name when it was introduced into DSM-III in 1980. However, gender identity disorder encompasses a spectrum of conditions, and DSM-III -R categorized it into three types: transsexualism, nontranssexualism, and not otherwise specified. The first two types were subsequently combined and standardized into the official diagnostic name of 'gender identity disorder' in DSM-IV. In contrast, gender identity disorder was categorized into four groups (including transsexualism and dual-role transvestism) in ICD-10. A draft proposal of DSM-5 has been submitted, in which the diagnostic name of gender identity disorder has been changed to gender dysphoria. Also, it refers to 'assigned gender' rather than to 'sex', and includes disorders of sexual development

  12. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  13. Early perception and structural identity: neural implementation

    Science.gov (United States)

    Ligomenides, Panos A.

    1992-03-01

    It is suggested that there exists a minimal set of rules for the perceptual composition of the unending variety of spatio-temporal patterns in our perceptual world. Driven by perceptual discernment of "sudden change" and "unexpectedness", these rules specify conditions (such as co-linearity and virtual continuation) for perceptual grouping and for recursive compositions of perceptual "modalities" and "signatures". Beginning with a smallset of primitive perceptual elements, selected contextually at some relevant level of abstraction, perceptual compositions can graduate to an unlimited variety of spatiotemporal signatures, scenes and activities. Local discernible elements, often perceptually ambiguous by themselves, may be integrated into spatiotemporal compositions, which generate unambiguous perceptual separations between "figure" and "ground". The definition of computational algorithms for the effective instantiation of the rules of perceptual grouping remains a principal problem. In this paper we present our approach for solving the problem of perceptual recognition within the confines of one-D variational profiles. More specifically, concerning "early" (pre-attentive) recognition, we define the "structural identity of a k-norm, k ∈ K,"--SkID--as a tool for discerning and locating the instantiation of spatiotemporal objects or events. The SkID profile also serves a s a reference coordinate framework for the "perceptual focusing of attention" and the eventual assessment of resemblance. Neural network implementations of pre-attentive and attentive recognition are also discussed briefly. Our principles are exemplified by application to one-D perceptual profiles, which allows simplicity of definitions and of the rules of perceptual composition.

  14. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...... occurring workplace interactions to identify active contributions as well as risks associated with a follower identity. In this study, we use conversation analysis to examine how people collaboratively construct identities, and how identity development shapes and organizes interactions between people...

  15. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  16. Purging behavior in anorexia nervosa and eating disorder not otherwise specified

    DEFF Research Database (Denmark)

    Støving, René Klinkby; Andries, Alin; Brixen, Kim Torsten

    2012-01-01

    Purging behavior in eating disorders is associated with medical risks. We aimed to compare remission rates in purging and non-purging females with anorexia nervosa (AN) and eating disorder not otherwise specified (EDNOS) in a large retrospective single center cohort. A total of 339 patients...

  17. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  18. A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  19. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  20. 75 FR 43137 - Notice of Request for Revision of a Currently Approved Information Collection (Specified Risk...

    Science.gov (United States)

    2010-07-23

    ... via Listserv, a free e-mail subscription service consisting of industry, trade, and farm groups... addition, FSIS offers an e-mail subscription service which provides automatic and customized access to... approved information collection, Specified Risk Materials--Transport. DATES: Comments on this notice must...

  1. A bioinformatics approach to the development of immunoassays for specified risk material in canned meat products

    NARCIS (Netherlands)

    Reece, P.; Bremer, M.G.E.G.; Stones, R.; Danks, C.; Baumgartner, S.; Tomkies, V.; Hemetsberger, C.; Smits, N.G.E.; Lubbe, W.

    2009-01-01

    A bioinformatics approach to developing antibodies to specific proteins has been evaluated for the production of antibodies to heat-processed specified risk tissues from ruminants (brain and eye tissue). The approach involved the identification of proteins specific to ruminant tissues by

  2. An exploration of person perception abilities in children with a pervasive developmental disorder not otherwise specified

    NARCIS (Netherlands)

    Serra, M.; Minderaa, R.B; Van Geert, P. L. C.; Jackson, A.E.

    1995-01-01

    This explorative study investigates differences in person perception abilities between a group of children diagnosed as having a Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS) and a group of normal children of the same age and sex. Person perception, a social-cognitive skill,

  3. 76 FR 18167 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2011-04-01

    ..., many marine animals may need to remain in areas where they are exposed to chronic stimuli (Richardson... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Central Gulf of Alaska, June, 2011 AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric...

  4. 78 FR 34047 - Takes of Marine Mammals Incidental to Specified Activities; Navy Research, Development, Test and...

    Science.gov (United States)

    2013-06-06

    ... levels for these animals may be estimated using TTS data from marine mammals and relationships between... Marine Mammals Incidental to Specified Activities; Navy Research, Development, Test and Evaluation Activities at the Naval Surface Warfare Center Panama City Division AGENCY: National Marine Fisheries Service...

  5. 76 FR 77782 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2011-12-14

    ..., 1963), but because of ecological or physiological requirements, many marine animals may need to remain... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Commonwealth of the Northern Mariana Islands, February to March 2012 AGENCY: National Marine Fisheries Service (NMFS), National...

  6. 77 FR 4765 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2012-01-31

    ... physiological requirements, many marine animals may need to remain in areas where they are exposed to chronic... readily audible to the animals based on measured received levels and the hearing sensitivity of the marine... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Northwest Pacific...

  7. 78 FR 17359 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2013-03-21

    ..., 1963), but because of ecological or physiological requirements, many marine animals may need to remain... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Northeast Atlantic Ocean, June to July, 2013 AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and...

  8. 76 FR 33246 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2011-06-08

    ... ecological or physiological requirements, many marine animals may need to remain in areas where they are... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Central-Western Bering Sea, August 2011 AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and...

  9. 75 FR 8652 - Incidental Takes of Marine Mammals During Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2010-02-25

    ... for marine animals before and during airgun operations. NMFS believes that the realistic possibility... Takes of Marine Mammals During Specified Activities; Marine Geophysical Survey in the Commonwealth of the Northern Mariana Islands, April to June 2010 AGENCY: National Marine Fisheries Service (NMFS...

  10. 77 FR 25966 - Takes of Marine Mammals Incidental to Specified Activities; Three Marine Geophysical Surveys in...

    Science.gov (United States)

    2012-05-02

    ..., 1963), but because of ecological or physiological requirements, many marine animals may need to remain... Marine Mammals Incidental to Specified Activities; Three Marine Geophysical Surveys in the Northeast Pacific Ocean, June Through July 2012 AGENCY: National Marine Fisheries Service, National Oceanic and...

  11. 78 FR 47282 - Takes of Marine Mammals Incidental to Specified Activities; Navy Research, Development, Test and...

    Science.gov (United States)

    2013-08-05

    ..., and location) and marine mammal and/or indicator presence, species, number of animals, their behavior... Marine Mammals Incidental to Specified Activities; Navy Research, Development, Test and Evaluation Activities at the Naval Surface Warfare Center Panama City Division AGENCY: National Marine Fisheries Service...

  12. 76 FR 6430 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2011-02-04

    ..., many marine animals may need to remain in areas where they are exposed to chronic stimuli (Richardson... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Pacific Ocean off Costa Rica, April Through May, 2011 AGENCY: National Marine Fisheries Service (NMFS), National Oceanic...

  13. 76 FR 57959 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the...

    Science.gov (United States)

    2011-09-19

    ..., many marine animals may need to remain in areas where they are exposed to chronic stimuli (Richardson... Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey in the Central Pacific Ocean, November, 2011 Through January, 2012 AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and...

  14. 77 FR 58255 - Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey off the...

    Science.gov (United States)

    2012-09-19

    ... requirements, many marine animals may need to remain in areas where they are exposed to chronic stimuli... Vol. 77 Wednesday, No. 182 September 19, 2012 Part III Department of Commerce Takes of Marine Mammals Incidental to Specified Activities; Marine Geophysical Survey off the Central Coast of California...

  15. 78 FR 33357 - Takes of Marine Mammals Incidental to Specified Activities; Taking Marine Mammals Incidental to...

    Science.gov (United States)

    2013-06-04

    ... confidence in these values is unknown. Table 3--Marine Mammal Density Estimates Density Species (animals/km\\2... unintentional taking of marine animals occurring incidental to the shock testing which involved large explosives... Marine Mammals Incidental to Specified Activities; Taking Marine Mammals Incidental to Conducting...

  16. Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  17. Using the ACT-R architecture to specify 39 quantitative process models of decision making

    NARCIS (Netherlands)

    Marewski, Julian N.; Mehlhorn, Katja

    Hypotheses about decision processes are often formulated qualitatively and remain silent about the interplay of decision, memorial, and other cognitive processes. At the same time, existing decision models are specified at varying levels of detail, making it difficult to compare them. We provide a

  18. 76 FR 23306 - Takes of Marine Mammals Incidental to Specified Activities; Russian River Estuary Management...

    Science.gov (United States)

    2011-04-26

    ... Marine Mammals Incidental to Specified Activities; Russian River Estuary Management Activities AGENCY...) to incidentally harass, by Level B harassment only, three species of marine mammals during estuary... December 31, 2010; and Russian River Estuary Outlet Channel Adaptive Management Plan. NMFS' Environmental...

  19. 77 FR 24471 - Takes of Marine Mammals Incidental to Specified Activities; Russian River Estuary Management...

    Science.gov (United States)

    2012-04-24

    ... Marine Mammals Incidental to Specified Activities; Russian River Estuary Management Activities AGENCY...) to incidentally harass, by Level B harassment only, three species of marine mammals during estuary... Estuary Outlet Channel Adaptive Management Plan; and Feasibility of Alternatives to the Goat Rock State...

  20. Operational considerations in specifying legal weight vehicles for the highway transport of spent nuclear fuel

    International Nuclear Information System (INIS)

    Hill, C.V.; Rutenkroger, E.O.; Ratledge, J.E.

    1990-01-01

    This paper presents the results of a research project in which tractor manufacturers and carrier companies were interviewed to gather information on operational concerns in specifying a tractor to haul legal weight spent fuel casks. The interaction between driver fatigue,safety, and equipment is discussed, as are innovative operating strategies that could save weight

  1. Diagnosing, Conceptualizing, and Treating Eating Disorders Not Otherwise Specified: A Comprehensive Practice Model

    Science.gov (United States)

    Schwitzer, Alan M.

    2012-01-01

    This article presents research and evidence-based practices for identifying, understanding, diagnosing, conceptualizing, and providing a continuum of treatment for the most commonly experienced types of eating-related counseling concerns--namely, eating disorders not otherwise specified--among the population most likely to present these types of…

  2. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  3. 75 FR 42698 - Takes of Marine Mammals Incidental to Specified Activities; Installation of Meteorological Data...

    Science.gov (United States)

    2010-07-22

    ... or ingestion of proposed action-related trash and debris by marine mammals would not be expected... Marine Mammals Incidental to Specified Activities; Installation of Meteorological Data Collection Facilities in the Mid- Atlantic Outer Continental Shelf AGENCY: National Marine Fisheries Service (NMFS...

  4. Course of Subthreshold Bipolar Disorder in Youth: Diagnostic Progression from Bipolar Disorder Not Otherwise Specified

    Science.gov (United States)

    Axelson, David A.; Birmaher, Boris; Strober, Michael A.; Goldstein, Benjamin I.; Ha, Wonho; Gill, Mary Kay; Goldstein, Tina R.; Yen, Shirley; Hower, Heather; Hunt, Jeffrey I.; Liao, Fangzi; Iyengar, Satish; Dickstein, Daniel; Kim, Eunice; Ryan, Neal D.; Frankel, Erica; Keller, Martin B.

    2011-01-01

    Objective: To determine the rate of diagnostic conversion from an operationalized diagnosis of bipolar disorder not otherwise specified (BP-NOS) to bipolar I disorder (BP-I) or bipolar II disorder (BP-II) in youth over prospective follow-up and to identify factors associated with conversion. Method: Subjects were 140 children and adolescents…

  5. Differentiating Bipolar Disorder--Not Otherwise Specified and Severe Mood Dysregulation

    Science.gov (United States)

    Towbin, Kenneth; Axelson, David; Leibenluft, Ellen; Birmaher, Boris

    2013-01-01

    Objective: Bipolar disorder--not otherwise specified (BP-NOS) and severe mood dysregulation (SMD) are severe mood disorders that were defined to address questions about the diagnosis of bipolar disorder (BD) in youth. SMD and BP-NOS are distinct phenotypes that differ in clinical presentation and longitudinal course. The purpose of this review is…

  6. 76 FR 37285 - Fisheries in the Western Pacific; Mechanism for Specifying Annual Catch Limits and Accountability...

    Science.gov (United States)

    2011-06-27

    ... Limits and Accountability Measures AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and... procedures and timing for specifying annual catch limits (ACLs) and accountability measures (AMs) for western... accountability measures to ensure that the ACL is not exceeded. Restrictions may include, but are not limited to...

  7. 76 FR 14367 - Fisheries in the Western Pacific; Mechanism for Specifying Annual Catch Limits and Accountability...

    Science.gov (United States)

    2011-03-16

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration 50 CFR Part 665 RIN 0648-AY93 Fisheries in the Western Pacific; Mechanism for Specifying Annual Catch Limits and Accountability... limits (ACLs) and accountability measures (AMs), adopt the ecosystem component species classification...

  8. From the Pews to Policy: Specifying Evangelical Protestantism's Influence on States' Sexual Orientation Policies

    Science.gov (United States)

    Scheitle, Christopher P.; Hahn, Bryanna B.

    2011-01-01

    It is often assumed that the religious culture of a state can shape policies within the state, particularly concerning morality issues such as abortion or homosexuality. However, the precise manner in which religion shapes these policies has not been clearly specified. Drawing from social movements and policy literature, we argue that the…

  9. The syntax of appositive relativization : On specifying coordination, false free relatives, and promotion

    NARCIS (Netherlands)

    de Vries, Mark

    2006-01-01

    Appositive relative clauses differ in some essential respects from restrictive relative clauses. I argue that appositive relatives and appositions can be put together as a third class of coordination denoting specification. Thus, an appositive relative is a specifying conjunct to the visible

  10. Beyond a Definition: Toward a Framework for Designing and Specifying Mentoring Models

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    More than three decades of mentoring research has yet to converge on a unifying definition of mentoring; this is unsurprising given the diversity of relationships classified as mentoring. This article advances beyond a definition toward a common framework for specifying mentoring models. Sixteen design elements were identified from the literature…

  11. 17 CFR 240.15d-20 - Plain English presentation of specified information.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Plain English presentation of specified information. 240.15d-20 Section 240.15d-20 Commodity and Securities Exchanges SECURITIES AND... Regulations Under the Securities Exchange Act of 1934 Other Reports § 240.15d-20 Plain English presentation of...

  12. 17 CFR 240.13a-20 - Plain English presentation of specified information.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Plain English presentation of specified information. 240.13a-20 Section 240.13a-20 Commodity and Securities Exchanges SECURITIES AND... Regulations Under the Securities Exchange Act of 1934 Other Reports § 240.13a-20 Plain English presentation of...

  13. Using eternity variables to specify and prove a serializable database interface

    NARCIS (Netherlands)

    Hesselink, Wim H.

    Eternity variables are introduced to specify and verify serializability of transactions of a distributed database. Eternity variables are a new kind of auxiliary variables. They do not occur in the implementation but are used in specification and verification. Elsewhere it has been proved that

  14. EMOTIONAL ROLE-TAKING ABILITIES OF CHILDREN WITH A PERVASIVE DEVELOPMENTAL DISORDER NOT OTHERWISE SPECIFIED

    NARCIS (Netherlands)

    Serra, M.; Minderaa, R.B; Van Geert, P. L. C.; Jackson, A.E.; Althaus, M.; Til, R.

    Seven to 12-year-old children with a Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS) were compared with normal, healthy children of the same age and sex on three different emotional role-taking tasks. In these tasks, children had to use person-specific information to make an

  15. Effectiveness of psychotherapy in personality disorders not otherwise specified : A comparison of different treatment modalities

    NARCIS (Netherlands)

    Horn, E.K.; Bartak, A.; Meerman, A.M.M.A.; Rossum, B.V.; Ziegler, U.M.; Thunissen, M.A.G.; Soons, M.; Andrea, H.; Hamers, E.F.M.; Emmelkamp, P.M.G.; Stijnen, T.; Busschbach, J.J.V.; Verheul, R.

    2015-01-01

    Objective Although personality disorder not otherwise specified (PDNOS) is highly prevalent and associated with a high burden of disease, only a few treatment studies in this patient group exist. This study is the first to investigate the effectiveness of different modalities of psychotherapy in

  16. Counseling College Women Experiencing Eating Disorder Not Otherwise Specified: A Cognitive Behavior Therapy Model

    Science.gov (United States)

    Choate, Laura H.

    2010-01-01

    Eating disorder not otherwise specified (EDNOS; American Psychiatric Association, 2000) is, by far, the most common eating disorder that college counseling professionals encounter among their female clients. Empirical evidence and best practice guidelines support use of cognitive behavior therapy (CBT) with women experiencing EDNOS. This article…

  17. How doctors apply semantic components to specify search in work-related information retrieval

    DEFF Research Database (Denmark)

    Lykke, Marianne; Price, Susan L.; Delcambre, Lois L. M.

    2012-01-01

    Workplace searching is often context-specific and targets a “right answer” within some domain-specific aspect of the search topic. We have developed the semantic component (SC) model that allows searchers to specify a search within context-specific aspects of the main topic of documents. The goal...

  18. 31 CFR 515.803 - Customs procedures; merchandise specified in § 515.204.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Customs procedures; merchandise... CONTROL REGULATIONS Procedures § 515.803 Customs procedures; merchandise specified in § 515.204. (a) With... thereto) whether or not such merchandise has been imported into the United States, collectors of customs...

  19. 76 FR 33721 - Takes of Marine Mammals Incidental to Specified Activities; Harbor Activities Related to the...

    Science.gov (United States)

    2011-06-09

    ..., incidental to conducting Delta Mariner harbor operations for one year. NMFS reviewed the ULA application and... vitulina), and Northern elephant seals (Mirounga angustirostris) hauled out on Small Haul-out Site 1 to... lions; and 43 Northern elephant seals by Level B harassment only. Description of the Specified...

  20. 75 FR 8677 - Takes of Marine Mammals Incidental to Specified Activities; Seabird and Pinniped Research...

    Science.gov (United States)

    2010-02-25

    ... not more than one year, by United States citizens who engage in a specified activity (other than.... Pinniped research activities involve monitoring breeding northern elephant seals (Mirounga angustirostris) to determine attendance patterns; resighting previously-tagged elephant seals; and conducting weekly...

  1. Mild, moderate, meaningful? Examining the psychological and functioning correlates of DSM-5 eating disorder severity specifiers.

    Science.gov (United States)

    Gianini, Loren; Roberto, Christina A; Attia, Evelyn; Walsh, B Timothy; Thomas, Jennifer J; Eddy, Kamryn T; Grilo, Carlos M; Weigel, Thomas; Sysko, Robyn

    2017-08-01

    This study evaluated the DSM-5 severity specifiers for treatment-seeking groups of participants with anorexia nervosa (AN), the purging form of bulimia nervosa (BN), and binge-eating disorder (BED). Hundred and sixty-two participants with AN, 93 participants with BN, and 343 participants with BED were diagnosed using semi-structured interviews, sub-categorized using DSM-5 severity specifiers and compared on demographic and cross-sectional clinical measures. In AN, the number of previous hospitalizations and the duration of illness increased with severity, but there was no difference across severity groups on measures of eating pathology, depression, or measures of self-reported physical or emotional functioning. In BN, the level of eating concerns increased across the severity groups, but the groups did not differ on measures of depression, self-esteem, and most eating pathology variables. In BN, support was also found for an alternative severity classification scheme based upon number of methods of purging. In BED, levels of several measures of eating pathology and self-reported physical and emotional functioning increased across the severity groups. For BED, however, support was also found for an alternative severity classification scheme based upon overvaluation of shape and weight. Preliminary evidence was also found for a transdiagnostic severity index based upon overvaluation of shape and weight. Overall, these data show limited support for the DSM-5 severity specifiers for BN and modest support for the DSM-5 severity specifiers for AN and BED. © 2017 Wiley Periodicals, Inc.

  2. Face recognition in children with a pervasive developmental disorder not otherwise specified

    NARCIS (Netherlands)

    Serra, M; Althaus, M; de Sonneville, LMJ; Stant, AD; Jackson, AE; Minderaa, RB

    This study investigates the accuracy and speed of face recognition in children with a Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS; DSM-IV, American Psychiatric Association [APA], 1994). The study includes a clinical group of 26 nonretarded 7- to 10-year-old children with PDDNOS

  3. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  4. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and

  5. Developing Students' Professional Digital Identity

    Science.gov (United States)

    Cochrane, Thomas; Antonczak, Laurent

    2015-01-01

    In contrast to the myth of the "Digital Native" and the ubiquity of Facebook use, we have found that students' digital identities are predominantly social with their online activity beyond Facebook limited to being social media consumers rather than producers. Within a global economy students need to learn new digital literacy skills to…

  6. Cultural Identity in Korean English

    Science.gov (United States)

    Chang, Bok-Myung

    2010-01-01

    This study aims to investigate the cultural identity of Korean English and to make the intercultural communications among non-native speakers successful. The purposes of this study can be summarized as follows: 1) to recognize the concept of English as an International Language (EIL), 2) to emphasize cross-cultural understanding in the globalized…

  7. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  8. On 3-way combinatorial identities

    Indian Academy of Sciences (India)

    A K Agarwal

    2018-03-19

    Mar 19, 2018 ... Math. 79 (2009) 145–155), and Agarwal (J. Number Theory 28 (1988) 299–305). Keywords. Basic series; n-color partitions; lattice paths; associated lattice paths; ...... J. Math. 136(2) (1989) 209–228. [5] Agarwal A K and Goyal M, Lattice paths and Rogers identities, Open J. Discrete Math. 1. (2011) 89–95.

  9. Identity Representations in Visual Texts

    Science.gov (United States)

    Hayik, Rawia

    2012-01-01

    In an attempt to address minority issues with Israeli Arab English-as-a-foreign-language ninth-grade students, I as a teacher researcher introduced picture books on the issue and invited students to respond in different modes, one of which was artistic. In one of the lessons, students created collages to represent their identities. In this…

  10. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  11. Rethinking Materiality, Memory and Identity

    Directory of Open Access Journals (Sweden)

    Tracy Ireland

    2016-12-01

    Full Text Available This introductory article  considers and questions exactly how materials and people constitute social worlds and relationships which sustain identity and memory and, in turn, the social and political structures or norms that these attachments invest in, stabilise and maintain.

  12. Identity, causality, and pronoun ambiguity.

    Science.gov (United States)

    Sagi, Eyal; Rips, Lance J

    2014-10-01

    This article looks at the way people determine the antecedent of a pronoun in sentence pairs, such as: Albert invited Ron to dinner. He spent hours cleaning the house. The experiment reported here is motivated by the idea that such judgments depend on reasoning about identity (e.g., the identity of the he who cleaned the house). Because the identity of an individual over time depends on the causal-historical path connecting the stages of the individual, the correct antecedent will also depend on causal connections. The experiment varied how likely it is that the event of the first sentence (e.g., the invitation) would cause the event of the second (the house cleaning) for each of the two individuals (the likelihood that if Albert invited Ron to dinner, this would cause Albert to clean the house, versus cause Ron to clean the house). Decisions about the antecedent followed causal likelihood. A mathematical model of causal identity accounted for most of the key aspects of the data from the individual sentence pairs. Copyright © 2014 Cognitive Science Society, Inc.

  13. Constructing and Reconstructing Narrative Identity

    Directory of Open Access Journals (Sweden)

    Gabriele Lucius-Hoene

    2000-06-01

    Full Text Available The research work done by the author investigates a phenomenological field—the subjective experience of chronic illness and disability—by means of a specific research instrument, the autobiographical narrative interview. It focuses on the concept of narrative identity and its empirical substrate in the scientifically generated texts. Narrative identity is regarded as a situated, pragmatic, autoepistemic and interactive activity drawing on culturally transmitted narrative conventions which is performed within the research context. We have been working with a systematic analytic approach which covers interactive and contextual aspects of the interview situation as well as rhetoric and positioning strategies in the act of telling. Other research questions concern the concept of "narrative coping" and the comparison of partner's narratives on problems of illness and disability, especially on scrutinizing aspects of identity and alterity (self and other in the texts. This work can be understood as combining aspects of the research domains of narratology, identity and coping on the background of a qualitative methodology. URN: urn:nbn:de:0114-fqs0002189

  14. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  15. FRAGMENTED IDENTITIES: THE CULTURAL COLLISION ...

    African Journals Online (AJOL)

    User

    Born in the former French and German colony of. Togo, Komla-Ebri ... of how cultural barriers not only lead to isolation and fragmented identities, but also ..... and, in recreating bits of Italy, in the form of music, cinema and food, absorbs parts of ...

  16. Identity and sortals (and Caesar)

    Czech Academy of Sciences Publication Activity Database

    Klev, Ansten

    2017-01-01

    Roč. 82, č. 1 (2017), s. 1-16 ISSN 0165-0106 Institutional support: RVO:67985955 Keywords : identity * neo-logicism * type theory * Julius Caesar problem Subject RIV: AA - Philosophy ; Religion OBOR OECD: Philosophy, History and Philosophy of science and technology

  17. Arla and Danish National Identity

    DEFF Research Database (Denmark)

    Mordhorst, Mads

    2014-01-01

    into modernity that is more democratic than the traditional process of industrialisation seen in other European countries. Thus the narrative of the co-operatives has become part of Danish memory and identity. In the post-war years, however, and especially in the last two decades, the process of globalisation...

  18. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed into a dis......This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... into a distinct research field and the article sketches a set of different methodological approaches as well as geographical and thematical variations within the field. In particular, the overview points to a recent shift in focus from a preoccupation with the identity-cultivating qualities of monetary...... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  19. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    This chapter examines the concept of identity in relation to youth practices on social network sites (SNSs). The chapter illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNSs is not only a common way for Danish teenagers to communicate and practice...

  20. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    -based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...

  1. Identity Transformation of Korean Immigrants.

    Science.gov (United States)

    Kim, Saekyung; Gaa, John; Swank, Paul; Liberman, Dov

    Immigration is one of the most significant changes which can occur in one's lifetime. Immigrants struggle with their foreign environment and renewed crises; they suffer from "uprootedness" and "missed embeddedness" and have difficulty integrating their identity roles. Erikson's psychosocial development theory and Marcia's…

  2. Digital photography: communication, identity, memory

    NARCIS (Netherlands)

    van Dijck, J.

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to

  3. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  4. Exploring the role of the DSM-5 performance-only specifier in adolescents with social anxiety disorder.

    Science.gov (United States)

    Fuentes-Rodriguez, Gema; Garcia-Lopez, Luis-Joaquin; Garcia-Trujillo, Veronica

    2018-03-23

    The DSM-5 social anxiety disorder section has recently added the performance-only specifier for individuals whose anxiety is limited to speaking or performing in public. The impact of the DSM-5 performance-only specifier remains a neglected area. The sample comprised 44 healthy controls and 50 adolescents with a clinical diagnosis of SAD (20% met criteria for the performance-only specifier). Findings revealed that adolescents with the specifier had a later age of onset; lower levels of depression, social anxiety symptomatology and clinical severity; and a lesser degree of comorbidity relative to adolescents with SAD but excluding the performance-only specifier. Specifiers only evidenced higher (cognitive) social anxiety symptomatology compared to healthy controls. Results of this study also suggested that the performance-only specifier may correspond to a mild form of social anxiety disorder. Data also revealed that SAD exists on a continuum of severity among healthy controls, specifier participants, and those with both interactional and performance fears, which is consistent with a dimensional structure for SAD. Finally, findings suggested a unique comorbid pattern for specifiers and those adolescents with SAD but excluding the performance-only specifier. The implications of these findings for the etiology, assessment, classification, and treatment of social anxiety in youth are discussed. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation...... of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality......This paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests...

  6. EGL-13/SoxD specifies distinct O2 and CO2 sensory neuron fates in Caenorhabditis elegans.

    Directory of Open Access Journals (Sweden)

    Jakob Gramstrup Petersen

    2013-05-01

    Full Text Available Animals harbor specialized neuronal systems that are used for sensing and coordinating responses to changes in oxygen (O2 and carbon dioxide (CO2. In Caenorhabditis elegans, the O2/CO2 sensory system comprises functionally and morphologically distinct sensory neurons that mediate rapid behavioral responses to exquisite changes in O2 or CO2 levels via different sensory receptors. How the diversification of the O2- and CO2-sensing neurons is established is poorly understood. We show here that the molecular identity of both the BAG (O2/CO2-sensing and the URX (O2-sensing neurons is controlled by the phylogenetically conserved SoxD transcription factor homolog EGL-13. egl-13 mutant animals fail to fully express the distinct terminal gene batteries of the BAG and URX neurons and, as such, are unable to mount behavioral responses to changes in O2 and CO2. We found that the expression of egl-13 is regulated in the BAG and URX neurons by two conserved transcription factors-ETS-5(Ets factor in the BAG neurons and AHR-1(bHLH factor in the URX neurons. In addition, we found that EGL-13 acts in partially parallel pathways with both ETS-5 and AHR-1 to direct BAG and URX neuronal fate respectively. Finally, we found that EGL-13 is sufficient to induce O2- and CO2-sensing cell fates in some cellular contexts. Thus, the same core regulatory factor, egl-13, is required and sufficient to specify the distinct fates of O2- and CO2-sensing neurons in C. elegans. These findings extend our understanding of mechanisms of neuronal diversification and the regulation of molecular factors that may be conserved in higher organisms.

  7. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  8. Cell Identity Switching Regulated by Retinoic Acid Signaling Maintains Homogeneous Segments in the Hindbrain.

    Science.gov (United States)

    Addison, Megan; Xu, Qiling; Cayuso, Jordi; Wilkinson, David G

    2018-06-04

    The patterning of tissues to form subdivisions with distinct and homogeneous regional identity is potentially disrupted by cell intermingling. Transplantation studies suggest that homogeneous segmental identity in the hindbrain is maintained by identity switching of cells that intermingle into another segment. We show that switching occurs during normal development and is mediated by feedback between segment identity and the retinoic acid degrading enzymes, cyp26b1 and cyp26c1. egr2, which specifies the segmental identity of rhombomeres r3 and r5, underlies the lower expression level of cyp26b1 and cyp26c1 in r3 and r5 compared with r2, r4, and r6. Consequently, r3 or r5 cells that intermingle into adjacent segments encounter cells with higher cyp26b1/c1 expression, which we find is required for downregulation of egr2b expression. Furthermore, egr2b expression is regulated in r2, r4, and r6 by non-autonomous mechanisms that depend upon the number of neighbors that express egr2b. These findings reveal that a community regulation of retinoid signaling maintains homogeneous segmental identity. Copyright © 2018 The Author(s). Published by Elsevier Inc. All rights reserved.

  9. Absorption properties of identical atoms

    International Nuclear Information System (INIS)

    Sancho, Pedro

    2013-01-01

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions

  10. Variational identities and Hamiltonian structures

    International Nuclear Information System (INIS)

    Ma Wenxiu

    2010-01-01

    This report is concerned with Hamiltonian structures of classical and super soliton hierarchies. In the classical case, basic tools are variational identities associated with continuous and discrete matrix spectral problems, targeted to soliton equations derived from zero curvature equations over general Lie algebras, both semisimple and non-semisimple. In the super case, a supertrace identity is presented for constructing Hamiltonian structures of super soliton equations associated with Lie superalgebras. We illustrate the general theories by the KdV hierarchy, the Volterra lattice hierarchy, the super AKNS hierarchy, and two hierarchies of dark KdV equations and dark Volterra lattices. The resulting Hamiltonian structures show the commutativity of each hierarchy discussed and thus the existence of infinitely many commuting symmetries and conservation laws.

  11. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  12. About identities: What is "hinchada"?

    Directory of Open Access Journals (Sweden)

    Daniel Zambaglione

    2008-11-01

    Full Text Available This text belongs to Chapter I of the master's hesis "The endurance in the body" Building identity of the fans of a club of Argentine football. Such work investigation was developing on a predominantly qualitative approach, involve different methods such as e-depth interviews, participant observation and not a participant and focus groups. In this chapter, we will present to the fans, their practices and performances. Showing the subjects and their actions. , Exhibiting the main mechanisms of association to the group "The stamina." Also, as it conforms rebuild on the one hand as a symbol of prestige and honor. And for another, as one of the most important factors in the formation of identity, understood this from a position constructivita traveling in reverse strict sense of the essential sights

  13. Othering, identity formation and agency

    Directory of Open Access Journals (Sweden)

    Sune Qvotrup Jensen

    2011-10-01

    Full Text Available The article examines the potentials of the concept of othering to describe identity formation among ethnic minorities. First, it outlines the history of the concept, its contemporary use, as well as some criticisms. Then it is argued that young ethnic minority men in Denmark are subject to intersectional othering, which contains elements of exoticist fascination of the other. On the basis of ethnographic material, it is analysed how young marginalized ethnic minority men react to othering. Two types of reactions are illustrated: 1 capitalization on being positioned as the other, and 2 refusing to occupy the position of the other by disidentification and claims to normality. Finally, it is argued that the concept of othering is well suited for understanding the power structures as well as the historic symbolic meanings conditioning such identity formation, but problematic in terms of agency.

  14. Fannish tattooing and sacred identity

    Directory of Open Access Journals (Sweden)

    Bethan Jones

    2015-03-01

    Full Text Available Pleasure is an important motivation for fans to adopt texts. Fannish tattoos function to demonstrate affective investments in a text; they are also a performance of fandom and an example of sacred fan identity. Like engaging in cosplay or wearing clothing that features logos, fannish tattoos mark people as fans of a text. Furthermore, the more obscure the logo or fannish reference, the more performative the tattoo. Fannish tattoos help to construct a sacred fan identity. The sacred experience (as theorized by Émile Durkheim and his concept of the totem is imbued with meaning through choices that set it aside from the mundane. Within the context of fannish tattoos, fan affect gains similar significance.

  15. Vacceans, Past or future identity?

    Directory of Open Access Journals (Sweden)

    Rosalía Hernández García

    2011-06-01

    Full Text Available Nowadays, when talking about the vaccei, discussions focus on the debate of geographic and cultural boundaries and on the definition of their identity, but bearing in mind that the life of this people was sold for thousands of years by the Roman assimilation. A further reflection makes us wonder if this identity has survived to some extension up to the present: concepts such as the controversial “vaccean collectivism” were used to support various ideological discourses, furthermore it shouldn’t be missed the popular uptake of this ancient people today through Rugby’s team (vacceos cavaliers, partnerships, trademarks and wines with the name of vaccei, among many others. The aim of this paper is to study how the various factors that determine or define that culture have been used over recent history.

  16. Organizational Identity, Culture, and Image

    OpenAIRE

    Ravasi, D.

    2016-01-01

    The concept of organizational identity is often confused with similar concepts such as organizational culture or organizational image. This confusion depends in part on the inconsistent use that scholars have made of these terms in the past. This chapter reviews the literature that has discussed how these concepts differ and how they are interrelated, and proposes an integrative framework that summarizes the most widely accepted definitions. It focuses in particular on research on dynamic int...

  17. Communicating a Renewed Brand Identity

    OpenAIRE

    Marttila, Oona

    2017-01-01

    This thesis aims to help the commissioning company in finding a suitable approach to efficiently communicate the renewed brand identity of the company. Theories applied to this research include rebranding, segmentation, as well as theories on customer relationships, service encounters and online marketing. This is complemented by the identification of the company potential through SWOT analysis as well as identifying differentiating factors within the company, in order to gain competitive adv...

  18. Building Place Identity through Heritage

    OpenAIRE

    Alexandra PACESCU; Vlad THIERY

    2015-01-01

    In an increasingly globalized world, the fading specificity is producing homogeneous images that make cities more and more difficult to tell apart. The market economy tends to commodify each and every aspect of urban life, even those belonging to the cultural realm. As a consequence, a need for differentiators arises, which can be best embodied by the local heritage. The present paper is trying to establish a link between the concept of Place Identity, seen from a marketing point of view, ...

  19. Autonoesis and dissociative identity disorder.

    Science.gov (United States)

    Morton, John

    2018-01-01

    Dissociative identity disorder is characterised by the presence in one individual of two or more alternative personality states (alters). For such individuals, the memory representation of a particular event can have full episodic, autonoetic status for one alter, while having the status of knowledge or even being inaccessible to a second alter. This phenomenon appears to create difficulties for a purely representational theory and is presented to Mahr & Csibra (M&C) for their consideration.

  20. Music teacher identity and professionalism

    DEFF Research Database (Denmark)

    Holgersen, Sven-Erik

    2017-01-01

    The present article is concerned with transformative learning and identity formation in student music teachers acting as researchers of a music education practice as part of their MA study programme. More specific, the aim is to discuss how engaging in a research perspective may serve as an eye......-opener for student music teachers and widen their perspective on subject didactics, teaching/learning issues and professional practice....

  1. Gauge invariance and Nielsen identities

    International Nuclear Information System (INIS)

    Lima, A.F. de; Bazaia, D.

    1989-01-01

    The one-loop contribution to the effective potential and mass are computed within the context of scalar electrodynamics for the class of general R gauges in the MS scheme. These calculations are performed in order to construct a non-trivial verification of the corresponding Nielsen identities within the context of the Higgs model. Some brief comments on the Coleman-Weinberg model are also included. (author) [pt

  2. Codimensions of generalized polynomial identities

    International Nuclear Information System (INIS)

    Gordienko, Aleksei S

    2010-01-01

    It is proved that for every finite-dimensional associative algebra A over a field of characteristic zero there are numbers C element of Q + and t element of Z + such that gc n (A)∼Cn t d n as n→∞, where d=PI exp(A) element of Z + . Thus, Amitsur's and Regev's conjectures hold for the codimensions gc n (A) of the generalized polynomial identities. Bibliography: 6 titles.

  3. Ectodermal dysplasia in identical twins

    OpenAIRE

    Puttaraju, Gurkar Haraswarupa; Visveswariah, Paranjyothi Magadi

    2013-01-01

    Hereditary hypohidrotic ectodermal dysplasia (HED) is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facia...

  4. Image Watermarking Scheme for Specifying False Positive Probability and Bit-pattern Embedding

    Science.gov (United States)

    Sayama, Kohei; Nakamoto, Masayoshi; Muneyasu, Mitsuji; Ohno, Shuichi

    This paper treats a discrete wavelet transform(DWT)-based image watermarking with considering the false positive probability and bit-pattern embedding. We propose an iterative embedding algorithm of watermarking signals which are K sets pseudo-random numbers generated by a secret key. In the detection, K correlations between the watermarked DWT coefficients and watermark signals are computed by using the secret key. L correlations are made available for the judgment of the watermark presence with specified false positive probability, and the other K-L correlations are corresponding to the bit-pattern signal. In the experiment, we show the detection results with specified false positive probability and the bit-pattern recovery, and the comparison of the proposed method against JPEG compression, scaling down and cropping.

  5. An efficient approach for computing the geometrical optics field reflected from a numerically specified surface

    Science.gov (United States)

    Mittra, R.; Rushdi, A.

    1979-01-01

    An approach for computing the geometrical optic fields reflected from a numerically specified surface is presented. The approach includes the step of deriving a specular point and begins with computing the reflected rays off the surface at the points where their coordinates, as well as the partial derivatives (or equivalently, the direction of the normal), are numerically specified. Then, a cluster of three adjacent rays are chosen to define a 'mean ray' and the divergence factor associated with this mean ray. Finally, the ampilitude, phase, and vector direction of the reflected field at a given observation point are derived by associating this point with the nearest mean ray and determining its position relative to such a ray.

  6. Investigating the DSM-5 severity specifiers based on thinness for adults with anorexia nervosa.

    Science.gov (United States)

    Reas, Deborah Lynn; Rø, Øyvind

    2017-08-01

    The DSM-5 severity classification scheme for adults with anorexia nervosa (AN) is based upon current body mass index (BMI; kg/m 2 ). This study examined the utility of the DSM-5 severity specifiers for adults with AN in relation to core cognitive and behavioral features of eating pathology and associated psychosocial impairment. A clinical sample of 146 adult AN patients (140 women, 6 men) were categorized using DSM-5 current BMI severity specifiers and assessed with the Eating Disorder Examination-Questionnaire (EDE-Q) and Clinical Impairment Assessment (CIA). A total of 34 (23.3%) patients were categorized as mild (>=17.0 BMI), 35 (24.0%) as moderate (16-16.99 BMI), 32 (21.9%) as severe (15-15.99 BMI), and 45 (30.8%) as extreme (DSM-5 severity rating scheme to differentiate adults with AN in terms of core eating disorder pathology or associated psychosocial impairment. © 2017 Wiley Periodicals, Inc.

  7. Epidemiology of Adult DSM-5 Major Depressive Disorder and Its Specifiers in the United States.

    Science.gov (United States)

    Hasin, Deborah S; Sarvet, Aaron L; Meyers, Jacquelyn L; Saha, Tulshi D; Ruan, W June; Stohl, Malka; Grant, Bridget F

    2018-04-01

    No US national data are available on the prevalence and correlates of DSM-5-defined major depressive disorder (MDD) or on MDD specifiers as defined in DSM-5. To present current nationally representative findings on the prevalence, correlates, psychiatric comorbidity, functioning, and treatment of DSM-5 MDD and initial information on the prevalence, severity, and treatment of DSM-5 MDD severity, anxious/distressed specifier, and mixed-features specifier, as well as cases that would have been characterized as bereavement in DSM-IV. In-person interviews with a representative sample of US noninstitutionalized civilian adults (≥18 years) (n = 36 309) who participated in the 2012-2013 National Epidemiologic Survey on Alcohol and Related Conditions III (NESARC-III). Data were collected from April 2012 to June 2013 and were analyzed in 2016-2017. Prevalence of DSM-5 MDD and the DSM-5 specifiers. Odds ratios (ORs), adjusted ORs (aORs), and 95% CIs indicated associations with demographic characteristics and other psychiatric disorders. Of the 36 309 adult participants in NESARC-III, 12-month and lifetime prevalences of MDD were 10.4% and 20.6%, respectively. Odds of 12-month MDD were significantly lower in men (OR, 0.5; 95% CI, 0.46-0.55) and in African American (OR, 0.6; 95% CI, 0.54-0.68), Asian/Pacific Islander (OR, 0.6; 95% CI, 0.45-0.67), and Hispanic (OR, 0.7; 95% CI, 0.62-0.78) adults than in white adults and were higher in younger adults (age range, 18-29 years; OR, 3.0; 95% CI, 2.48-3.55) and those with low incomes ($19 999 or less; OR, 1.7; 95% CI, 1.49-2.04). Associations of MDD with psychiatric disorders ranged from an aOR of 2.1 (95% CI, 1.84-2.35) for specific phobia to an aOR of 5.7 (95% CI, 4.98-6.50) for generalized anxiety disorder. Associations of MDD with substance use disorders ranged from an aOR of 1.8 (95% CI, 1.63-2.01) for alcohol to an aOR of 3.0 (95% CI, 2.57-3.55) for any drug. Most lifetime MDD cases were moderate (39.7%) or severe

  8. VPA: an R tool for analyzing sequencing variants with user-specified frequency pattern

    Directory of Open Access Journals (Sweden)

    Hu Qiang

    2012-01-01

    Full Text Available Abstract Background The massive amounts of genetic variant generated by the next generation sequencing systems demand the development of effective computational tools for variant prioritization. Findings VPA (Variant Pattern Analyzer is an R tool for prioritizing variants with specified frequency pattern from multiple study subjects in next-generation sequencing study. The tool starts from individual files of variant and sequence calls and extract variants with user-specified frequency pattern across the study subjects of interest. Several position level quality criteria can be incorporated into the variant extraction. It can be used in studies with matched pair design as well as studies with multiple groups of subjects. Conclusions VPA can be used as an automatic pipeline to prioritize variants for further functional exploration and hypothesis generation. The package is implemented in the R language and is freely available from http://vpa.r-forge.r-project.org.

  9. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  10. Exhausting management work: conflicting identities.

    Science.gov (United States)

    Mischenko, Jane

    2005-01-01

    The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.

  11. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  12. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-10-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: Identity; Organization; Psycho-socio-analysis

  13. A framework to specify agent-based models in geographic sciences

    OpenAIRE

    Grueau, Cédric; Araújo, João

    2015-01-01

    Agent-Based Modeling (ABM) and simulation have gained popularity in the Geographic Information Systems (GIS) domain. Despite the increasing number of models built by experts and users, it remains challenging for users to specify their models in a manner in which one can understand it. This constraint represents an inhibition to the development and acceptance of the ABM approach. In this paper, we raise the questions that need to be answered in order to cope with ABM specification issues. We r...

  14. Steroid Cell Ovarian Neoplasm, Not Otherwise Specified: A Case Report and Review of the Literature

    Directory of Open Access Journals (Sweden)

    Paul Singh

    2012-01-01

    Full Text Available Background. Steroid cell ovarian tumors, not otherwise specified, represent a unique cause of female virilization. Most commonly encountered in premenopausal women, these tumors can exist throughout a women’s lifetime, from before puberty until after menopause. Case. Steroid cell, not otherwise specified, was diagnosed in a 70-year-old female significant for hirsutism. The patient demonstrated elevated total testosterone levels with normal gonadotropins, DHEA, and DHEA-S levels. CT imaging revealed a right ovarian mass and subsequent laparoscopic right oophorectomy yielded clinical improvement promptly. Conclusion. Virilization in females can occur based on ovarian or adrenal pathology. In terms of ovarian-based female virilization, many tumors exist that may induce women to demonstrate masculine features, such as pure Sertoli, pure Leydig, Sertoli-Leydig combinations, and gynandroblastomas. Each of these tumor types possesses a unique histologic pattern that allows for pathologic identification after removal. A rare source of ovarian-based female virilization is steroid cell neoplasms, not otherwise specified, that do not demonstrate these specific histologic characteristics and thus represent a diagnosis of exclusion after other causes of ovarian-based female virilization have been ruled out.

  15. Identity and power in Ukraine

    Directory of Open Access Journals (Sweden)

    Karina V. Korostelina

    2013-01-01

    Full Text Available This paper analyzes the coercive and legitimate forms of power in Ukraine. It describes the crisis of legitimacy in Ukraine as a contradiction between a blatantly cruel system of capitalism dominated by a few oligarchs, and the lingering remnants of a Soviet mentality. Two strategies are used by the Government to stoke the crisis. First, increased identification with ethnic or regional groups are instrumentally used by the Government to take attention from economic and class issues. Second, the incorporation of a Soviet meaning of power into the new national identity and presentation of it as core norms, believes, and values of the people of Ukraine competes with alternative Ukrainian identity concepts. The paper analyzes five main features of the Soviet meanings of power – political, social, and economic paternalism, perception of power as source of profit and violence, and the dual reality of power with the gap between official narratives of power and a real life. The process of incorporation of the Soviet concept of power into national identity is facilitated by the process of national identity formation that helped to preserve the Soviet perception of power, because of the absence of a new ideology, a lack of critical assessment of the Soviet past, an absence of the vision of outcome, an embryonic culture of democracy, and contributions of all the presidents to the preservation of the Soviet meaning of power. People justify the system as legitimate and fair for many reasons: out of historic habit and deemed moral obligations, self-interests and/or a fear of sanctions, identification with the ruler, zones of indifference, an absence of will and self-confidence, desire to support a strong leader based on ambiguity intolerance, hierarchy – enhancing ideologies, and a general tolerance of injustice. The obedience of subjects is connected with the strength of will of the subjects and the social structures of the society. In Ukraine, the

  16. Christian identity of secular Europe

    Directory of Open Access Journals (Sweden)

    Malešević Miroslava

    2006-01-01

    Full Text Available The Jyllands-Posten Muhammad cartoons controversy began after twelve editorial cartoons, most of which depicted the Islamic prophet Muhammad, were published in the Danish newspaper Jyllands-Posten on September 30, 2005. The newspaper explained that this publication was a contribution to debate regarding criticism of Islam and self-censorship. In response, Danish Muslim organizations held public protests and spread knowledge of Jyllands-Postens publication. As the controversy grew, some or all of the cartoons were reprinted in newspapers in more than fifty other countries, which led to violent protests, particularly in the Muslim world. Critics of the cartoons describe them as islamophobic and argue that they are blasphemous, intended to humiliate a marginalized Danish minority, and a manifestation of ignorance about the history of western imperialism, from colonialism to the current conflicts in the Middle East. Supporters of the cartoons claim they illustrate an important issue in an age of Islamic extremist terrorism and that their publication is a legitimate exercise of the right of free speech. They also note that similar cartoons about other religions are frequently printed, arguing that the followers of Islam were not targeted in a discriminatory way. The dispute has again pointed out to the relevance of religion and religious differences in the contemporary world. Again, several questions presented themselves as significant: citizen freedom, values and the rights to exercise them, secularism, tolerance, multiculturalism majority-minority relationships and so on. The resolution to these issues appears as of the outmost importance, considering the existing tendencies of united Europe to even more firmly establish cultural, economic, and political associations, in order to launch a one, joined European identity with vanishing national, ethnic and religious differences. Therefore, the question becomes: what could serve as a foundation for

  17. Authenticity in Leadership: Intersectionality of Identities.

    Science.gov (United States)

    Jones, Susan R

    2016-12-01

    This chapter situates leadership and the process of becoming a leader within an understanding of identity, particularly intersecting social identities and intersectionality. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  18. Idendity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    markdownabstract__Abstract__ As individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference

  19. Superconformal Ward identities and the supertorus

    International Nuclear Information System (INIS)

    Grundberg, J.; Nakayama, R.

    1987-12-01

    We derive superconformal Ward identities in the context of superspace supergravity. From these Ward identities we extract operator product expansions and the case of a supertorus is studied in some detail. (orig.)

  20. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  1. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  2. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  3. Retirees' Social Identity and Satisfaction with Retirement

    Science.gov (United States)

    Michinov, Estelle; Fouquereau, Evelyne; Fernandez, Anne

    2008-01-01

    The purpose of this study was to examine the structure of retirees' social identity and its impact on satisfaction with retirement. From social identity theory formulations, we assumed that (1) retiree-identity was comprised of three distinct components (cognitive, evaluative, and affective), and (2) only the affective component would play a role…

  4. Fibonacci Identities via the Determinant Sum Property

    Science.gov (United States)

    Spivey, Michael

    2006-01-01

    We use the sum property for determinants of matrices to give a three-stage proof of an identity involving Fibonacci numbers. Cassini's and d'Ocagne's Fibonacci identities are obtained at the ends of stages one and two, respectively. Catalan's Fibonacci identity is also a special case.

  5. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  6. Dehistoricized Cultural Identity and Cultural Othering

    Science.gov (United States)

    Weiguo, Qu

    2013-01-01

    The assumption that each culture has its own distinctive identity has been generally accepted in the discussion of cultural identities. Quite often identity formation is not perceived as a dynamic and interactive ongoing process that engages other cultures and involves change in its responses to different challenges at different times. I will…

  7. Strengthening National Identity through National Symbols and ...

    African Journals Online (AJOL)

    South Africans vacillate in their national identity and remain largely attached to their racial and ethnic group identities. The aim of this article is to illustrate the manner in which a sense of understanding, familiarity and pride with regard to national symbols and thus to national identity can be attained. The objective is that the ...

  8. Convolution identities for quasiprobabilities for Bose functions

    International Nuclear Information System (INIS)

    Haake, F.; Lewenstein, M.

    1982-01-01

    We present identities relating the equations of motion of various quasiprobabilities for quantum oscillators. These identities turn out useful for checking the consistency of approximations made in constructing the equations of motion with the basic Bose commutator. Moreover, our identities allow to identify the quasiprobability distributions which have the easiest-to-solve equations of motion. (orig.)

  9. 40 CFR 725.85 - Microorganism identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Microorganism identity. 725.85 Section... to Information § 725.85 Microorganism identity. (a) Claims applicable to the period prior to... specific microorganism identity at the time of submission of the information. This claim will apply only to...

  10. 40 CFR 720.85 - Chemical identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Chemical identity. 720.85 Section 720... PREMANUFACTURE NOTIFICATION Confidentiality and Public Access to Information § 720.85 Chemical identity. (a... submits information to EPA under this part may assert a claim of confidentiality for the chemical identity...

  11. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  12. Foreign Language Teaching and Cultural Identity.

    Science.gov (United States)

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  13. Developing a Leadership Identity: A Grounded Theory

    Science.gov (United States)

    Komives, Susan R.; Owen, Julie E; Longerbeam, Susan D.; Mainella, Felicia C.; Osteen, Laura

    2005-01-01

    This grounded theory study on developing a leadership identity revealed a 6-stage developmental process. The thirteen diverse students in this study described their leadership identity as moving from a leader-centric view to one that embraced leadership as a collaborative, relational process. Developing a leadership identity was connected to the…

  14. Shifting identities : the musician as theatrical perfomer

    NARCIS (Netherlands)

    Hübner, Falk

    2013-01-01

    The artistic PhD research "Shifting Identities" investigates the musicians' professional identity and how this identity might shift when musicians start acting as theatrical performers. In most of the theatrical situations where musicians "perform", their profession is extended by additional tasks

  15. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  16. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  17. A Survey on Some of Social Factors Related to Cultural Identity Crisis among Tabriz High School Students

    Directory of Open Access Journals (Sweden)

    Akbar Zare Shahabadi

    2012-12-01

    Full Text Available Identity process specifies who the individual is psychically and socially and what position he has. In other words, identification enables social active to reply the fundamental questions referring to who and what he is appropriately and convincingly. Cultural identity crisis is a term applied to describe individuals' disability to adopt the role expected from them by the society.Cultural identity crisis means that human being ruptured and alienated from cultural origins and roots in which he has lived and mixed with it; need for attaching to other cultural origins and roots that is manifested in the form of forgetting and devaluing individual culture and traditions and ignoring it. This study intends to survey some factors related to cultural identity crisis among Tabriz high school students. Required data has been compiled through a questionnaire and sample of 378 high school students by categorical sampling method. In this survey, to clarify and define cultural identity crisis, the theories of theoreticians for symbolic interaction have been combined with Parsons' theory and conformed to Hobermouse's crisis theory. It should be mentioned that cultural identity crisis has been measured by some variables as interest in ethnic language and common history and attention to them, obligation to religious affairs and traditions, influence by friends and coevals and ...The results of performed analyses show that the variables of impressibility by friends and coevals group, individual education, sexuality and impressibility by satellite have most effects on clarifying the dependent variable, i.e., cultural identity crisis, respectively and have clarified about 41% of the variance for cultural identity crisis. The variable for social class can also contribute to specify the dependent variable.

  18. Practicing Identity: A Crafty Ideal?

    Science.gov (United States)

    Brysbaert, A.; Vetters, M.

    This paper focuses on the materialization of technological practices as a form of identity expression. Contextual analyses of a Mycenaean workshop area in the Late Bronze Age citadel of Tiryns (Argolis, Greece) are presented to investigate the interaction of different artisans under changing socio-political and economic circumstances. The case study indicates that although certain technological practices are often linked to specific crafts, they do not necessarily imply the separation of job tasks related to the working of one specific material versus another. Shared technological practices and activities, therefore, may be a factor in shaping cohesive group identities of specialized artisans. Since tracing artisans' identities is easier said than done on the basis of excavated materials alone, we employ the concepts of multiple chaînes opératoires combined with cross-craft interactions as a methodology in order to retrieve distinctive sets of both social and technological practices from the archaeological remains. These methodological concepts are not restricted to a specific set of steps in the production cycle, but ideally encompass reconstructing contexts of extraction, manufacture, distribution and discard/reuse for a range of artefacts. Therefore, these concepts reveal both technological practices, and, by contextualising these technological practices in their spatial layout, equally focus on social contacts that would have taken place during any of these actions. Our detailed contextual study demonstrates that the material remains when analysed in their entirety are complementary to textual evidence. In this case study they even form a source of information on palatial spheres of life about which the fragmentary Linear B texts, so far, remain silent.

  19. [Dissociative identity disorder or schizophrenia?].

    Science.gov (United States)

    Tschöke, S; Steinert, T

    2010-01-01

    We present a case of dissociative identity disorder in which Schneiderian first rank symptoms were present besides of various states of consciousness. Thus the diagnosis of schizophrenia had to be considered. Formally, the symptoms met ICD-10 criteria for schizophrenia. However, taking into account the lack of formal thought disorder and of negative symptoms as well as a typical history of severe and prolonged traumatisation, we did not diagnose a co-morbid schizophrenic disorder. There is good evidence for the existence of psychotic symptoms among patients with dissociative disorders. However, in clinical practice this differential diagnosis is rarely considered.

  20. Ectodermal dysplasia in identical twins

    Directory of Open Access Journals (Sweden)

    Gurkar Haraswarupa Puttaraju

    2013-01-01

    Full Text Available Hereditary hypohidrotic ectodermal dysplasia (HED is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facial esthetics and psychology of patients affected by this disease.

  1. Microsoft Windows Identity Foundation Cookbook

    CERN Document Server

    Chanda, Sandeep

    2012-01-01

    This book is written in a simple, easy to understand format, with lots of screenshots and step-by-step explanations.If you are a .NET developer looking forward to building access control in your applications using claims-based identity, then this is the best guide for you. This book is also an excellent choice for professionals and IT administrators trying to enable Single Sign-On across applications within the enterprise, and in the cloud spanning interoperable platforms. No previous knowledge on the subject is necessary, however a strong foundation in the C# programming language and .NET Fra

  2. 32 CFR 37.810 - What should my TIA's provisions specify for the method and frequency of recipients' payment...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What should my TIA's provisions specify for the... TIA's provisions specify for the method and frequency of recipients' payment requests? The procedure... reimbursements or advance payments, your TIA must allow recipients to submit requests for payment at least...

  3. 77 FR 49277 - Takes of Marine Mammals During Specified Activities; Confined Blasting Operations by the U.S...

    Science.gov (United States)

    2012-08-15

    ... effects that confined blasting can have on marine animals near the blast (Keevin et al., 1999). The visual... Atmospheric Administration Takes of Marine Mammals During Specified Activities; Confined Blasting Operations... Marine Mammals During Specified Activities; Confined Blasting Operations by the U.S. Army Corps of...

  4. 7 CFR 70.13 - Ready-to-cook poultry and rabbits and specified poultry food products.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Ready-to-cook poultry and rabbits and specified... AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG... Poultry Products and Rabbit Products General § 70.13 Ready-to-cook poultry and rabbits and specified...

  5. Prevalence and Red Flags Regarding Specified Causes of Back Pain in Older Adults Presenting in General Practice

    NARCIS (Netherlands)

    Enthoven, Wendy T. M.; Geuze, Judith; Scheele, Jantine; Bierma-Zeinstra, Sita M. A.; Bueving, Herman J.; Bohnen, Arthur M.; Peul, Wilco C.; van Tulder, Maurits W.; Berger, Marjolein Y.; Koes, Bart W.; Luijsterburg, Pim A. J.

    BACKGROUND: In a small proportion of patients experiencing unspecified back pain a specified underlying pathology is present. OBJECTIVE: To identify the prevalence of physician-specified causes of back pain and to assess associations between red flags and vertebral fractures, as diagnosed by the

  6. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  7. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  8. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    Science.gov (United States)

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  9. Cultural Identity of the Industrial Heritage in Gdansk

    Science.gov (United States)

    Szymański, Tomasz

    2017-10-01

    Since its inception, urbanized area passes a number of changes, caused by demands of its inhabitants. Industrial heritage, including historic architecture at the brownfields, that’s more and more present in the centres of our cities, is one of the most important components of the identity. The development of civilization causes the phenomenon of spatial and functional transformations. Revitalization of the areas recently occupied by the industry, provides a unique opportunity to rediscover their values. Increasingly, however, it uses the terms “wasteland” or “brownfields”. Land use by industry is associated only with its “predatory” use, destruction, devastation. However, we can venture to say, that the existing industrial use of the land, “civilized” them. Current developments have restored a public access to the “new” urban space. At these areas preserved quite a lot valuable architectural objects. That can be seen, unfortunately, tend to forget the fact of complexity, multithreaded value areas and facilities. Analyzed causes of the risks, ways to prevent adverse transformations, methods of developing action plans to re-create the industrial architecture - are still discussed. Industrial heritage, particularly architecture, is one of the important components of the material culture that specify identity of the city of Gdansk. It provides with no doubt about its distinctiveness and originality in relation to other cities and regions. Revitalization projects are at the same time the most effective way to protect and preserve the cultural identity of the brownfield facilities. Examples of such transformations are most relevant to Gdansk and also beginning to be more and more visible. Areas of the main activities of revitalization in Gdansk, are the area of the former Imperial Shipyard and the Ołowianka Island are still and only the beginning of the necessary changes. Old industrial plants and technical facilities should be subject of the

  10. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  11. A Temporal Perspective on Organizational Identity

    DEFF Research Database (Denmark)

    Schultz, Majken; Hernes, Tor

    2013-01-01

    time perspective in the use of memory enabled a longer time perspective in formulating claims for future identity, (2) a broader scope of articulated identity claims for the future was related to the combination of a broader range of memory forms, and (3) the depth of claims for future identity...... was related to the way in which memory forms were combined. At a more general level, our paper illustrates how viewing identity construction from the perspective of an ongoing present adds a new dimension to understanding the temporal dynamics of organizational identity....

  12. Corporate visual identity: a case in hospitals.

    Science.gov (United States)

    Alkibay, Sanem; Ozdogan, F Bahar; Ermec, Aysegul

    2007-01-01

    This paper aims to present a perspective to better understand corporate identity through examining the perceptions of Turkish patients and develop a corporate visual identity scale. While there is no study related to corporate identity research on hospitals in Turkey as a developing country, understanding consumer's perceptions about corporate identity efforts of hospitals could provide different perspectives for recruiters. When the hospitals are considered in two different groups as university and state hospitals, the priority of the characteristics of corporate visual identity may change, whereas the top five characteristics remain the same for all the hospitals.

  13. Recognizing Moral Identity as a Cultural Construct.

    Science.gov (United States)

    Jia, Fanli; Krettenauer, Tobias

    2017-01-01

    Current research on moral identity shows that moral identity predicts moral action in Western cultures but not in non-Western cultures. The present paper argues that this may be due to the fact that the concept of moral identity is culturally biased. In order to remedy this situation, we argue that researchers should broaden their scopes of inquiry by adding a cultural lens to their studies of moral identity. This change is important because although some concept of moral identity likely exists in all cultures, it may function in different ways and at different levels in each place. We propose that moral identity is a context-dependent construct tied to varying social and cultural obligations. We argue that Western moral identity stresses an individually oriented morality, whereas, people from Eastern cultures consider a highly moral person to be societally oriented. We conclude by discussing the implications of this view for future research.

  14. Co-creating Stakeholder and Brand Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Voyer, Benjamin; Kastanakis, Minas

    2017-01-01

    This article introduces the special section on reciprocal co-creation of stakeholder and brand identities. Branding research and practice traditionally focus on the managerial creation and implementation of brand identity. Based on recent paradigmatic shifts from managerial to co-creative branding...... and from consumer to multi-stakeholder approaches in marketing, this special section develops a dynamic, process-oriented perspective on brand identity. Brand identity continuously emerges as a dynamic outcome of social processes of stakeholder interaction. Reciprocally, brand identity plays a potentially...... important role in ongoing interactive identity development processes of stakeholders. The special section contributes to deepening the understanding of this reciprocal co-creation of stakeholder and brand identities, through a series of conceptual and empirical articles. The Introduction reviews four...

  15. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  16. A scanning tunneling microscope capable of imaging specified micron-scale small samples.

    Science.gov (United States)

    Tao, Wei; Cao, Yufei; Wang, Huafeng; Wang, Kaiyou; Lu, Qingyou

    2012-12-01

    We present a home-built scanning tunneling microscope (STM) which allows us to precisely position the tip on any specified small sample or sample feature of micron scale. The core structure is a stand-alone soft junction mechanical loop (SJML), in which a small piezoelectric tube scanner is mounted on a sliding piece and a "U"-like soft spring strip has its one end fixed to the sliding piece and its opposite end holding the tip pointing to the sample on the scanner. Here, the tip can be precisely aligned to a specified small sample of micron scale by adjusting the position of the spring-clamped sample on the scanner in the field of view of an optical microscope. The aligned SJML can be transferred to a piezoelectric inertial motor for coarse approach, during which the U-spring is pushed towards the sample, causing the tip to approach the pre-aligned small sample. We have successfully approached a hand cut tip that was made from 0.1 mm thin Pt∕Ir wire to an isolated individual 32.5 × 32.5 μm(2) graphite flake. Good atomic resolution images and high quality tunneling current spectra for that specified tiny flake are obtained in ambient conditions with high repeatability within one month showing high and long term stability of the new STM structure. In addition, frequency spectra of the tunneling current signals do not show outstanding tip mount related resonant frequency (low frequency), which further confirms the stability of the STM structure.

  17. A scanning tunneling microscope capable of imaging specified micron-scale small samples

    Science.gov (United States)

    Tao, Wei; Cao, Yufei; Wang, Huafeng; Wang, Kaiyou; Lu, Qingyou

    2012-12-01

    We present a home-built scanning tunneling microscope (STM) which allows us to precisely position the tip on any specified small sample or sample feature of micron scale. The core structure is a stand-alone soft junction mechanical loop (SJML), in which a small piezoelectric tube scanner is mounted on a sliding piece and a "U"-like soft spring strip has its one end fixed to the sliding piece and its opposite end holding the tip pointing to the sample on the scanner. Here, the tip can be precisely aligned to a specified small sample of micron scale by adjusting the position of the spring-clamped sample on the scanner in the field of view of an optical microscope. The aligned SJML can be transferred to a piezoelectric inertial motor for coarse approach, during which the U-spring is pushed towards the sample, causing the tip to approach the pre-aligned small sample. We have successfully approached a hand cut tip that was made from 0.1 mm thin Pt/Ir wire to an isolated individual 32.5 × 32.5 μm2 graphite flake. Good atomic resolution images and high quality tunneling current spectra for that specified tiny flake are obtained in ambient conditions with high repeatability within one month showing high and long term stability of the new STM structure. In addition, frequency spectra of the tunneling current signals do not show outstanding tip mount related resonant frequency (low frequency), which further confirms the stability of the STM structure.

  18. Men, masculine identities and childbirth.

    Science.gov (United States)

    Dolan, Alan; Coe, Christine

    2011-11-01

    In recent years, fathers' experiences during childbirth have attracted much research and policy interest. However, little of this work has been grounded in the first-hand accounts of men and there is a lack of theory-based research to help understand men's thoughts and practices around childbirth. This paper is based on qualitative research undertaken with first-time fathers and healthcare professionals. It draws on Connell's (1995) conceptualisation of hegemonic masculinity to explore how men construct masculine identities within the context of pregnancy and childbirth and also how healthcare professionals construct masculinity. The paper demonstrates the ways in which men can find themselves marginalised within the context of pregnancy and childbirth, but are still able to draw on identifiable markers of masculine practice which enable them to enact a masculine form congruent with dominant masculinity. It also illustrates how healthcare professionals' constructions of masculinity enable them to predict how men will behave and allow them to position men in ways that involve minimum disruption to their own practice. The paper also highlights how men's marginal status is embedded in the dynamics of the social structure, which produce and reproduce dominant masculine identities within the context of childbirth. © 2011 The Authors. Sociology of Health & Illness © 2011 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.

  19. Globalization and the identity dilemma

    Directory of Open Access Journals (Sweden)

    Alina-Petronela NEGREA

    2012-09-01

    Full Text Available The paper begins with a review of theoretical aspects including a conceptual delimitation of the term “economic globalization” from the perspective of different theorists, its main features, dimensions and vectors that boost and promote the process expansion. The phenolmenon is extensive, complex and difficult to control, fact that includes in this “wave” of globalization advantages and disadvantages also.The globalization of the economic activity is studied through globalization indicators such as: FDI, financial dimension, the role of transnational economic actors in the global economy, the relationship between international trade growth and increased domestic production, internationalization of the financial markets. The structure of the global economic system and the problems that the current global economy is facing are also analysed.The “thorny” subject of the influence that globalization has on national identity from an economic perspective is seen through the eyes of Romania, analyzing the economic implications of globalization for our country, how much the identity of Romanian companies was affected over the last years, which are now the Romanian multinationals and what challenges and opportunities globalization has brought to the country that was written with envy during the interwar period that is has “oil and wheat”.

  20. Postmodernist Identity Construction and Consumption

    Directory of Open Access Journals (Sweden)

    Reyhan KARABABA

    2016-09-01

    Full Text Available Abstract. With the transition from modernism to postmodernism, identity as a concept has started to become redefined in sociology literature. The aim of this study is to show that postmodernism and symbolic interactionism are fused together to delineate both the scene as well as an actor’s identity. In that way, the interaction of a social structure with a culture that won’t be completely ignored, and, with the opinion that the categorized roles can skillfully be shaped and diversified by actors, it is possible to refrain from a pure determinism. But the transformation to enter different roles lacks meaning. Individuals pay more attention to their appearance more than who they are in order to be accepted by each group. In this manner, a metaphysical shell game begins. In the following study, the “Social Appearance Anxiety” was used as an indicator of this game.  And to determine who is willing to play the game, cultural parameters were utilized.       This study was based on the analysis of the data collected through two questionnaires given to 181 students studying at Hitit University. The INDCOL questionnaire [Singelis et al., 1995] measuring cultural values and “Social Appearance Anxiety” scale developed by [Hart, 2008] were used in the study.

  1. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  2. A scheme of quantum state discrimination over specified states via weak-value measurement

    Science.gov (United States)

    Chen, Xi; Dai, Hong-Yi; Liu, Bo-Yang; Zhang, Ming

    2018-04-01

    The commonly adopted projective measurements are invalid in the specified task of quantum state discrimination when the discriminated states are superposition of planar-position basis states whose complex-number probability amplitudes have the same magnitude but different phases. Therefore we propose a corresponding scheme via weak-value measurement and examine the feasibility of this scheme. Furthermore, the role of the weak-value measurement in quantum state discrimination is analyzed and compared with one in quantum state tomography in this Letter.

  3. Chronic Eosinophilic Leukemia—Not Otherwise Specified (NOS in the Background of a Large Cell Lymphoma

    Directory of Open Access Journals (Sweden)

    Wilson I. Gonsalves

    2013-01-01

    Full Text Available Clonal eosinophilic disorders are rare among hematological malignancies. Most eosinophilia tends to be due to secondary causes such as infections, hypersensitivity conditions, drug reactions, and connective tissue disorders. The presence of a primary clonal eosinophilic disorder such as chronic eosinophilic leukemia—not otherwise specified (NOS in the presence of a synchronous large cell lymphoma—is rare making the diagnosis challenging. We present a case of a 51-year-old female with the aforementioned presentation and demonstrate the extensive workup performed to identify the diagnosis.

  4. Identity as a Moderator and Mediator of Communication Effects: Evidence and Implications for Message Design.

    Science.gov (United States)

    Comello, Maria Leonora G; Farman, Lisa

    2016-10-02

    Advertisements, movies, and other forms of media content have potential to change behaviors and antecedent psychological states by appealing to identity. However, the mechanisms that are responsible for persuasive effects of such content have not been adequately specified. A recently proposed model of communication effects (the prism model) advances the study of mechanisms and argues that identity can serve as both a moderator and mediator of communication effects on behavior-relevant outcomes. These intervening roles are made possible by the complex nature of identity (including multiple self-concepts and sensitivity to cues) and messages that cue the importance of and activate particular self-concepts. This article builds on development of the model by presenting empirical support based on re-analysis of an experiment in which participants viewed either a more-stigmatizing or less-stigmatizing portrayal of a recovering drug addict. In line with the model's propositions, exposure to the less-stigmatizing condition led to increases in perspective taking which then led to more acceptance (mediation by identity), while level of perspective taking also changed the effect of condition on acceptance (moderation by identity). These results provide support for the model's proposition of simultaneous intervening roles. The authors discuss implications for strategic communication research and practice.

  5. Variation in Sexual Identification Among Behaviorally Bisexual Women in the Midwestern United States: Challenging the Established Methods for Collecting Data on Sexual Identity and Orientation.

    Science.gov (United States)

    Baldwin, Aleta; Schick, Vanessa R; Dodge, Brian; van Der Pol, Barbara; Herbenick, Debby; Sanders, Stephanie A; Fortenberry, J Dennis

    2017-07-01

    Collecting information on sexual identity is critical to ensuring the visibility of minority populations who face stigmatization and discrimination related to sexual identities. However, it is challenging to capture the nuances of sexual identity with traditional survey research methods. Using a mixed-methods approach, we gathered data on the sexual identities of 80 behaviorally bisexual women in the Midwestern United States through an online survey. When provided different types of measures (e.g., open ended and fixed response) and different contexts in which to identify (e.g., private and public), participants varied in how they reported their sexual identities. Qualitative analysis of participant narratives around identity change finds partitioning and ranking of attraction is a key component in understanding behaviorally bisexual women's identities. We further identify a division regarding the desired outcomes of identity development processes. Given the multiple ways in which participants identified depending upon the type of measure and the context specified, and the variation in identification over time, results support reconsidering the capability of typical measures and methods used in survey research to capture sexual identity information. Additionally, findings highlight the utility of including multiple, context-specific measures of sexual identities in future research.

  6. Partially specified physics problems: university students' attitudes and performance

    Energy Technology Data Exchange (ETDEWEB)

    Marusic, M [Prva Gimnazija, Teslina 10, 21000 Split (Croatia); Erceg, N [Department of Physics, University of Rijeka, Omladinska 14, 51000 Rijeka (Croatia); Slisko, J, E-mail: mirko@marusic.inf, E-mail: nerceg@phy.uniri.hr, E-mail: jslisko@fcfm.buap.mx [Benemerita Universidad Autonoma de Puebla, Apartado Postal 1152, Puebla, Puebla CP 72000 (Mexico)

    2011-05-15

    In this research we asked the fourth year students (N = 50) of a technical faculty of the University of Split (Republic of Croatia) to solve a partially specified physics problem related to gravitational force. The task for the students was to decide whether the situation described in the problem is feasible or not. Nevertheless, the formulation of the problem is such that it does not give students any explicit advice regarding what to calculate or how to judge the feasibility of the given situation in the real world. The research was carried out using a structured written exam method. The worksheet was structured in order to assess explicitly a few elements of the students' problem-solving performance. Based on their results, the examinees were classified into four categories, depending on what they could or could not accomplish during problem solving. A majority of students were not able to solve the given physical problem completely. A selection of students' and professors' observations is also included. Our results show that traditionally formulated numerical exercises, which are mostly used in physics teaching, do not develop students' abilities in higher-order thinking (i.e. planning, decision making or result evaluation) to a desirable extent. We suggest that partially specified problems should be given to students, both in problem-solving sessions and exams, in order to prepare them for dealing with ill-structured tasks in real life.

  7. Artificial ground motion compatible with specified peak ground displacement and target multi-damping response spectra

    International Nuclear Information System (INIS)

    Zhang Yushan; Zhao Fengxin

    2010-01-01

    With respect to the design ground motion of nuclear power plant (NPP), the Regular Guide 1.60 of the US not only defined the standard multi-damping response spectra, i.e. the RG1.60 spectra, but also definitely prescribed the peak ground displacement (PGD) value corresponding to the standard spectra. However, in the engineering practice of generating multi-damping-spectra-compatible artificial ground motion for the seismic design of NPP, the PGD value had been neglected. Addressing this issue, this paper proposed a synthesizing method which generates the artificial ground motion compatible with not only the target multi-damping response spectra but also the specified PGD value. Firstly, by the transfer formula between the power spectrum and the response spectrum, an initial uniformly modulated acceleration time history is synthesized by multiplying the stationary Gaussian process with the prescribed intensity envelope to simulate the amplitude-non-stationarity of earthquake ground motion. And then by superimposing a series of narrow-band time histories in the time domain, the initial time history is modified in the iterative manner to match the target PGD as well as the target multi-damping spectra with the pre-specified matching precisions. Numerical examples are provided to demonstrate the matching precisions of the proposed method to the target values.

  8. Using the ACT-R architecture to specify 39 quantitative process models of decision making

    Directory of Open Access Journals (Sweden)

    Julian N. Marewski

    2011-08-01

    Full Text Available Hypotheses about decision processes are often formulated qualitatively and remain silent about the interplay of decision, memorial, and other cognitive processes. At the same time, existing decision models are specified at varying levels of detail, making it difficult to compare them. We provide a methodological primer on how detailed cognitive architectures such as ACT-R allow remedying these problems. To make our point, we address a controversy, namely, whether noncompensatory or compensatory processes better describe how people make decisions from the accessibility of memories. We specify 39 models of accessibility-based decision processes in ACT-R, including the noncompensatory recognition heuristic and various other popular noncompensatory and compensatory decision models. Additionally, to illustrate how such models can be tested, we conduct a model comparison, fitting the models to one experiment and letting them generalize to another. Behavioral data are best accounted for by race models. These race models embody the noncompensatory recognition heuristic and compensatory models as a race between competing processes, dissolving the dichotomy between existing decision models.

  9. Measures of the DSM-5 mixed-features specifier of major depressive disorder.

    Science.gov (United States)

    Zimmerman, Mark

    2017-04-01

    During the past two decades, a number of studies have found that depressed patients frequently have manic symptoms intermixed with depressive symptoms. While the frequency of mixed syndromes are more common in bipolar than in unipolar depressives, mixed states are also common in patients with major depressive disorder. The admixture of symptoms may be evident when depressed patients present for treatment, or they may emerge during ongoing treatment. In some patients, treatment with antidepressant medication might precipitate the emergence of mixed states. It would therefore be useful to systematically inquire into the presence of manic/hypomanic symptoms in depressed patients. We can anticipate that increased attention will likely be given to mixed depression because of changes in the DSM-5. In the present article, I review instruments that have been utilized to assess the presence and severity of manic symptoms and therefore could be potentially used to identify the DSM-5 mixed-features specifier in depressed patients and to evaluate the course and outcome of treatment. In choosing which measure to use, clinicians and researchers should consider whether the measure assesses both depression and mania/hypomania, assesses all or only some of the DSM-5 criteria for the mixed-features specifier, or assesses manic/hypomanic symptoms that are not part of the DSM-5 definition. Feasibility, more so than reliability and validity, will likely determine whether these measures are incorporated into routine clinical practice.

  10. Biochemical map of polypeptides specified by foot-and-mouth disease virus.

    OpenAIRE

    Grubman, M J; Robertson, B H; Morgan, D O; Moore, D M; Dowbenko, D

    1984-01-01

    Pulse-chase labeling of foot-and-mouth disease virus-infected bovine kidney cells revealed stable and unstable viral-specific polypeptides. To identify precursor-product relationships among these polypeptides, antisera against a number of structural and nonstructural viral-specific polypeptides were used. Cell-free translations programmed with foot-and-mouth disease virion RNA or foot-and-mouth disease virus-infected bovine kidney cell lysates, which were shown to contain almost identical pol...

  11. Development and validation of a measure of criminal social identity within a sample of Polish recidivistic prisoners.

    Science.gov (United States)

    Boduszek, Daniel; Adamson, Gary; Shevlin, Mark; Hyland, Philip

    2012-12-01

    Social identity is a well-established theoretical concept within psychological research; however, the role of criminal social identity has received far less research attention. One salient reason for the limited research relating to the concept of criminal social identity is the absence of a specific measure. To develop and test the construct validity of a new measure of criminal social identity (MCSI) and to provide additional evidence relating to Cameron's three-factor conceptualisation of social identity. The eight-item MCSI was used to collect data from recidivists incarcerated in high-security prison (N=312) to assess criminal social identification. These data were subjected to confirmatory factor analysis. Three alternative models of criminal social identity were specified and tested in Mplus 6, and results revealed that the data were best explained by a three-factor model of criminal social identity (cognitive centrality, in-group affect and in-group ties). The current study is important in terms of future research in criminology and psychology because the MCSI provides the first reliable MCSI, which was developed and validated on a relatively large recidivistic prison sample. Copyright © 2012 John Wiley & Sons, Ltd.

  12. Historic Cosmology Identity and Exploration

    Science.gov (United States)

    Nebergall, K.

    The role of the soul and spirit in the composition of human endeavour generally takes the form of motivational poster catch phrases or third-hand quotes. If the spirit equals the life of a creature, and one of the signs of life is locomotion, are humans not obliged by something even deeper than our humanity to explore the universe? This paper examines the roots and perspectives of our worldviews on identity, exploration, and the limitations and capacities of humanity. It will equip the reader to discuss the nature of exploration with audiences across a wide range of worldviews. Current cultures, regardless of religion or politics, are looped into a series of nihilistic patterns that must be broken by rediscovering our nature as living beings, and our obligations as human beings.

  13. Unskilled work and learner identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    The main argument in this paper is: In order to comprehend the ‘invisible’ conditions for forming motivation to participate in different kinds of learning activities (formal, non-formal and informal) in relation to work-life it is crucial to develop a dialectic concept of learner identity....... A concept enabling researcher in the field of work and learning to examine how the orientation toward learning activities are situated in and conditioned by specific work-life experiences. Based on a qualitative research-project (Kondrup 2012) the paper outlines how unskilled work forms a specific condition...... for engaging in learning. The aim of the project was to examine the challenges in order to fulfil the Danish national strategy on Lifelong learning and training for all. Danish as well as international research reveals that low skilled workers and workers in small and medium sized private companies tend...

  14. Sharing Status and Appropriating Identity

    DEFF Research Database (Denmark)

    de Oliveira, Sandi Michele

    2013-01-01

    On 26 December 2012 President Cavaco Silva announced the creation of the Conselho da Diápora Portuguesa, an association of 300 “notable” (notáveis) Portuguese to be individually invited by the Council’s Board. Their function will be to service as lobbyists working to improve the country’s image...... to their relatives in Portugal as well as to the needs of the Portuguese Government. This initiative, however, is different; here, in addition to direct economic benefits that the Council’s members may provide, their identity itself as successful Portuguese is put into play. Using tools from discourse analysis...... of Portugal, Camões and the Portuguese Communities (10 June 2013). The study focuses specifically on strategies of legitimization and delegitimization of Portuguese transnationals....

  15. Bianchi identities in higher dimensions

    International Nuclear Information System (INIS)

    Pravda, V; Pravdova, A; Coley, A; Milson, R

    2004-01-01

    A higher dimensional frame formalism is developed in order to study implications of the Bianchi identities for the Weyl tensor in vacuum spacetimes of the algebraic types III and N in arbitrary dimension n. It follows that the principal null congruence is geodesic and expands isotropically in two dimensions and does not expand in n - 4 spacelike dimensions or does not expand at all. It is shown that the existence of such principal geodesic null congruence in vacuum (together with an additional condition on twist) implies an algebraically special spacetime. We also use the Myers-Perry metric as an explicit example of a vacuum type D spacetime to show that principal geodesic null congruences in vacuum type D spacetimes do not share this property

  16. Identity transformation in medical students.

    Science.gov (United States)

    Cohen, Mitchell J M; Kay, Abigail; Youakim, James M; Balaicuis, John M; Balacius, John M

    2009-03-01

    This paper reviews the literature on the impact of medical school on personal development and consolidation of core identity. The limited literature relies on reports from medical students' journaling exercises, discussion groups, post-graduation surveys, and repeated personality testing. We review forces acting on medical students, with potential transforming effects. These forces include high external expectations and internal fear of superficial knowledge and skills, entry into the culture of medicine with its insider jargon and hierarchy, high academic workload, and the emotional burdens of confronting cadavers and death as well as bearing witness to patients' suffering. Potential developmental delay, emergence of substance abuse and hedonic acting out, cynicism, and loss of individual core values are possible consequences. Protections against these adverse outcomes include identification of strong mentors and role models, developing post-conventional morality and relativistic thinking, finding healthy coping strategies such as peer support, and remaining intellectually creative and personally reflective.

  17. Identical twins in forensic genetics

    DEFF Research Database (Denmark)

    Tvedebrink, Torben; Morling, Niels

    2015-01-01

    The increase in the number of forensic genetic loci used for identification purposes results in infinitesimal random match probabilities. These probabilities are computed under assumptions made for rather simple population genetic models. Often, the forensic expert reports likelihood ratios, where...... published results accounting for close familial relationships. However, we revisit the discussion to increase the awareness among forensic genetic practitioners and include new information on medical and societal factors to assess the risk of not considering a monozygotic twin as the true perpetrator......, then data relevant for the Danish society suggests that the threshold of likelihood ratios should approximately be between 150,000 and 2,000,000 in order to take the risk of an unrecognised identical, monozygotic twin into consideration. In other societies, the threshold of the likelihood ratio in crime...

  18. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  19. Singapore: The Politics of Inventing National Identity

    Directory of Open Access Journals (Sweden)

    Stephan Ortmann

    2009-01-01

    Full Text Available This study wants to shed new light on the politics of Singapore’s national identity invention. Since independence in 1965, the Singaporean government has tried to generate a sense of national identity in Singapore. While at first, the priority was on pragmatic values to promote the economic development, this changed in the late 1980s when the government became concerned with the widespread materialism within the society. As an alternative, so-called Asian values sought to provide an ideological alternative and a new basis for a stronger national identity. At the same time, average Singaporeans have developed their own unique conceptions of the city-state’s national identity, which sometimes contradict the official nation-building efforts and thus constitute a subtle form of opposition. Many Singaporeans demand greater participation in the negotiation of their Singaporean identity, which demonstrates the difficulty of constructing a sustainable authoritarian civic national identity.

  20. Political Identities and Latin American Film Portraits

    Directory of Open Access Journals (Sweden)

    Juan Bautista Lucca

    2015-07-01

    Full Text Available This assay uses the cinema as an expression of culture that has the ability to portray different ways to build identities, to condense on an image different identities path. For example, in the film Machuca, we can see how political identities experience a social split; in Memoria del saqueo we can observe how social and political construction of an identity could be understood as a sign of the past that came back to the present; in Fresa y chocolate and also the films Santera, La estrategia del caracol and La ley de Herodes, we can observe the identity clash with the “other”, that shapes and stressed that thing “we” are; finally, a film is also becomes a field to think about identity construction process that open a new future like in Diario de motocicleta, or open the possibility to return to our old certainties like in El hijo de la novia. Keywords:

  1. Rethinking social identity theory in international encounters:

    DEFF Research Database (Denmark)

    Lauring, Jakob

    2008-01-01

    In a globalized business environment, interaction across linguistic boundaries is becoming a normal part of everyday life. In these encounters language differences may affect the formation of social identities among organization members. While studies based on Social Identity Theory perceive...... the link between identity and language to be linear, this article takes a different approach. By drawing on anthropological theories on ethnic identity it is argued that the relation between language and social identity is negotiated in interaction. In the empirical analysis the article focuses...... on the encounter between expatriates and local employees of a Danish subsidiary in England. The findings show that identity making may be actualized by competition for resources and recognition. This can be done by investing certain objects such as the symbolic application of language with certain identifications...

  2. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  3. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    Science.gov (United States)

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  4. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  5. Social Identity Perspective on Brand loyalty

    OpenAIRE

    He, Hongwei; Li, Yan; Harris, Lloyd

    2012-01-01

    This paper proposes a social identity perspective of customer–brand relationship and integrates brand identity and identification with value, trust and satisfaction in predicting brand loyalty. Two studies' empirical results support this path to brand loyalty framework. The results offer several theoretical implications. First, this research confirms the presence of significant direct and indirect effects of brand identity and brand identification on traditional antecedents of brand loyalty (...

  6. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  7. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  8. Canonical ward identities in generalized QCD

    International Nuclear Information System (INIS)

    Li Ziping

    1995-01-01

    The canonical Ward identities for a system with singular higher-order Lagrangian are derived and some application to the generalized QCD are given. The new relations of the Ward identities for gauge ghost field proper vertices are obtained which differ from the usual Ward-Takahashi identities arising from BRS invariance. The expressions for PCAC and generalized PCAC of AVV vertices are also obtained

  9. The Multiple In-group Identity Framework

    OpenAIRE

    Lock, Daniel; Funk, D.C.

    2016-01-01

    The effects of team identification on sport consumer behaviour are well established. Recent research, however, has moved beyond this perspective to examine how groups within and beyond the team identity influence consumption. Assimilating previous research findings, we advance a Multiple In-group Identity Framework (MIIF), which consists of three levels: (1) superordinate (e.g., team identity), (2) subgroup (e.g., specific stadium area), and (3) relational group (e.g., friends or family). In ...

  10. Citizenship education and identity in Europe

    OpenAIRE

    Ross, Alistair

    2007-01-01

    This article surveys some of the theoretical bases of identity and citizenship and their implications for potential European identity and citizenship, and relates these to the CiCe network of teacher educators and others. CiCe (Children’s identity and Citizenship in Europe) is a European Commission supported network of 100 European Universities, in 19 countries, who have worked together since 1998 in building links in higher education courses and research, in the education of teachers, socia...

  11. Material Construction of Care Workers’ Identity

    OpenAIRE

    Sanna Laulainen; Anneli Hujala

    2016-01-01

    This article takes a critical look at the unconscious and unnoticed effects of materiality on care workers’ identity. The data was collected through nonactive role-playing using written accounts, in which the respondents described how they felt about working in fictitious ‘good’ or ‘bad’ elderly care homes. The data was analyzed with rhetorical analysis. Five different identity strategies were identified in the accounts. Strong professional identity was defended by downplaying the significanc...

  12. Smoker Identity Development among Adolescents who Smoke

    Science.gov (United States)

    Hertel, Andrew W.; Mermelstein, Robin J.

    2016-01-01

    Adolescents who smoke are more likely to escalate their smoking frequency if they believe smoking is self-defining. Knowing factors that are associated with development of a smoker identity among adolescents who smoke may help to identify who will become a regular smoker. We investigated whether smoker identity development is associated with internal and external motives for smoking. For comparison, we also investigated whether social smoker identity development is associated with internal and external motives for smoking. Adolescents who smoke (n = 292) completed measures of smoker and social smoker identity, internal motives for smoking (negative affect coping, positive affect enhancement), and external motives for smoking (social fit) at baseline, 6-, 15-, and 24-month assessments of an ongoing longitudinal study of smoking patterns. We examined whether change in smoker and social smoker identity from 6 to 24 months was associated with change in motives at earlier assessment waves. We also explored whether gender moderated these relationships. Increases in negative affect coping motives were associated with smoker identity development among both males and females. Increases in social motives were associated with smoker identity development among males, and increases in negative affect coping motives were associated with social smoker identity development among females. Smoker and social smoker identities are signaled by negative affect coping as well as social motives for smoking. PMID:27136374

  13. Identity theory and personality theory: mutual relevance.

    Science.gov (United States)

    Stryker, Sheldon

    2007-12-01

    Some personality psychologists have found a structural symbolic interactionist frame and identity theory relevant to their work. This frame and theory, developed in sociology, are first reviewed. Emphasized in the review are a multiple identity conception of self, identities as internalized expectations derived from roles embedded in organized networks of social interaction, and a view of social structures as facilitators in bringing people into networks or constraints in keeping them out, subsequently, attention turns to a discussion of the mutual relevance of structural symbolic interactionism/identity theory and personality theory, looking to extensions of the current literature on these topics.

  14. John Locke on persons and personal identity

    OpenAIRE

    Boeker, Ruth

    2013-01-01

    John Locke claims both that ‘person’ is a forensic term and that personal identity consists in sameness of consciousness. The aim of my dissertation is to explain and critically assess how Locke links his moral and legal account of personhood to his account of personal identity in terms of sameness of consciousness. My interpretation of Locke’s account of persons and personal identity is embedded in Locke’s sortal-dependent account of identity. Locke’s sortal-dependent ac...

  15. Advertising identities: virtual galleries as places of identity

    Directory of Open Access Journals (Sweden)

    Alexandra Zontea

    2010-10-01

    Full Text Available This paper is focused on the public presentation of self through virtual art galleries, singling out the field of photography. Photography has always been disputed as being part of the highbrow arts because of its popular character. Today, anyone who owes a photo camera can experience photography as art, without a rigorous training. Everybody is able to expose the photos freely to a large number of people, on the Internet. Consequently, the Internet opens up a virtual space, in which photo artists and amateurs can promote their works and exhibit them in a personal online gallery, which represents their place in the virtual vastness. Therefore, my research approaches the matter of the virtual gallery as an identitary place, being focused on finding out why artists choose to exhibit in virtual galleries. I asked myself what are the new functions of the virtual art galleries?Are they understood as online markers that distinguish the owners in these virtual environments? In other words, are these personal galleries a way of expressing online identities?

  16. Storing files in a parallel computing system based on user-specified parser function

    Science.gov (United States)

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Manzanares, Adam; Torres, Aaron

    2014-10-21

    Techniques are provided for storing files in a parallel computing system based on a user-specified parser function. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a parser from the distributed application for processing the plurality of files prior to storage; and storing one or more of the plurality of files in one or more storage nodes of the parallel computing system based on the processing by the parser. The plurality of files comprise one or more of a plurality of complete files and a plurality of sub-files. The parser can optionally store only those files that satisfy one or more semantic requirements of the parser. The parser can also extract metadata from one or more of the files and the extracted metadata can be stored with one or more of the plurality of files and used for searching for files.

  17. SGV: a code to evaluate plasma reaction rates to a specified accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Devoto, R.S.; Hanson, J.D.

    1978-09-22

    A FORTRAN code to evaluate binary reaction rates (sigmav) for a plasma to a specified accuracy is described. Distribution functions permitted are (1) two Maxwellian species at different temperatures, (2) beam-Maxwellian, (3) cold gas with Maxwellian, and (4) beam-plasma with mirror distribution of the form f(v) varies as f(v) M (cos theta). Several functional forms are permitted for f(v) and M(cos theta). Cross-section subroutines for a number of interactions involving hydrogen, helium, and electrons are included, as is a routine allowing input of numerical data. The code is written as a subroutine to allow ready incorporation into larger plasma codes.

  18. A Computer Program for Simplifying Incompletely Specified Sequential Machines Using the Paull and Unger Technique

    Science.gov (United States)

    Ebersole, M. M.; Lecoq, P. E.

    1968-01-01

    This report presents a description of a computer program mechanized to perform the Paull and Unger process of simplifying incompletely specified sequential machines. An understanding of the process, as given in Ref. 3, is a prerequisite to the use of the techniques presented in this report. This process has specific application in the design of asynchronous digital machines and was used in the design of operational support equipment for the Mariner 1966 central computer and sequencer. A typical sequential machine design problem is presented to show where the Paull and Unger process has application. A description of the Paull and Unger process together with a description of the computer algorithms used to develop the program mechanization are presented. Several examples are used to clarify the Paull and Unger process and the computer algorithms. Program flow diagrams, program listings, and a program user operating procedures are included as appendixes.

  19. Eating disorder not otherwise specified: the view from a tertiary care treatment center.

    Science.gov (United States)

    Rockert, Wendi; Kaplan, Allan S; Olmsted, Marion P

    2007-11-01

    This study sought to characterize a large number of adult outpatients diagnosed with eating disorder not otherwise specified (EDNOS). The sample consisted of 1,449 patients who were classified as anorexia nervosa (AN), bulimia nervosa (BN), or assigned to one of six EDNOS categories. Eating disorder groups were compared on demographic features, symptom frequencies, and psychological functioning. Forty percent of the sample was categorized as EDNOS. A subgroup of purging only patients closely resembled the BN purging subtype. Although EDNOS subthreshold BN patients reported less psychopathology than full syndrome BN they, nevertheless, displayed clinical levels of disturbance. Patients who binge-eat once a week demonstrate a profile of psychological functioning similar to those who binge eat twice a week. Consistent with previous research, in this sample there were subgroups embedded in the EDNOS category that both share similarities with and differ from full syndrome BN. (c) 2007 by Wiley Periodicals, Inc.

  20. Planning GPS Measurements of a Linear Object for a Specified Time Interval

    Directory of Open Access Journals (Sweden)

    Specht Cezary

    2017-12-01

    Full Text Available The previous measurement campaigns planning used in geodesy is conducted exclusively for individual points. For the natural process aimed at the adoption of the introduction of the planning (prediction of constellation state in navigation, which is characterized by the movement, one should adopt measurement campaigns planning for linear objects. In contrast to the existing planning solutions, focused on point presentation of the state of the constellation of navigation system, the author of this article rearranges the proposal of determination of geometrical factors, and their summation. In the presented simulation, one has specified the route of passing at certain times and it was assumed that the receiver will move with variable motion. One has defined the geometric ratios (PDOP, which allow to distinguish the results corresponding to the adopted criteria for the measurement of linear object to be conducted with the best possible accuracy.