WorldWideScience

Sample records for stopping car theft

  1. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  2. Car Stopping Distance on a Tabletop

    Science.gov (United States)

    Haugland, Ole Anton

    2013-01-01

    Stopping distances in car braking can be an intriguing topic in physics teaching. It illustrates some basic principles of physics, and sheds valuable light on students' attitude towards aggressive driving. Due to safety considerations, it can be difficult to make experiments with actual car braking. (Contains 2 figures.)

  3. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  4. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... of petition for exemption. SUMMARY: This document grants in full the Porsche Cars North America, Inc. (Porsche) petition for exemption of the Macan vehicle line in accordance with 49 CFR part 543, Exemption...

  5. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  6. Car Delay Model near Bus Stops with Mixed Traffic Flow

    Directory of Open Access Journals (Sweden)

    Yang Xiaobao

    2013-01-01

    Full Text Available This paper proposes a model for estimating car delays at bus stops under mixed traffic using probability theory and queuing theory. The roadway is divided to serve motorized and nonmotorized traffic streams. Bus stops are located on the nonmotorized lanes. When buses dwell at the stop, they block the bicycles. Thus, two conflict points between car stream and other traffic stream are identified. The first conflict point occurs as bicycles merge to the motorized lane to avoid waiting behind the stopping buses. The second occurs as buses merge back to the motorized lane. The average car delay is estimated as the sum of the average delay at these two conflict points and the delay resulting from following the slower bicycles that merged into the motorized lane. Data are collected to calibrate and validate the developed model from one site in Beijing. The sensitivity of car delay to various operation conditions is examined. The results show that both bus stream and bicycle stream have significant effects on car delay. At bus volumes above 200 vehicles per hour, the curbside stop design is not appropriate because of the long car delays. It can be replaced by the bus bay design.

  7. Braking from different speeds: judgments of collision speed if a car does not stop in time.

    Science.gov (United States)

    Svenson, Ola; Eriksson, Gabriella; Gonzalez, Nichel

    2012-03-01

    The purpose of speed limits is to keep driving speed low enough for drivers to be able to pay attention to relevant information and timely execute maneuvers so that the car can be driven in a safe way and stopped in time. If a driver violates a speed limit or drives too fast she or he will not be able to stop as quickly as from a slower speed. We asked participants to imagine that they themselves had driven a car outside a school at a speed of 30 km/h when a child suddenly had rushed into the street. From this speed it was possible to stop the car just in front of the child after braking as quickly and forcefully as possible. We then asked the participants to imagine that they drove the same street at a higher speed of 50 km/h and the child appeared at the same place as before. At what speed would the car hit the child after braking in the same way as before? This kind of problems were presented in three studies and the results showed that the judged speeds of collision were always underestimated in different hypothetical driving context scenarios by judges differing in numerical skills. This indicates an overly optimistic view on the possibilities to reduce speed quickly if the driving speed is too fast, which is an important component of attitudes towards speed limits, their legitimacy and recommended driving speeds. Further implications of the results were discussed last. Copyright © 2011 Elsevier Ltd. All rights reserved.

  8. An Economic Approach to Motor Vehicle Theft

    OpenAIRE

    Carcach, Carlos

    2010-01-01

    Motor vehicle theft costs dearly to the Australian economy. Conservative estimates have put the annual cost of this form of illegal activity at 654 million during 1996. A number of initiatives aimed at reducing the incidence and cost of car theft have been implemented in recent years, yet statistics indicate that car theft is on the increase. Several authors have proposed an integrated approach to the regulation of markets for stolen property. Understanding property crime as a market is centr...

  9. Know Your Master: Driver Profiling-based Anti-theft Method

    OpenAIRE

    Kwak, Byung Il; Woo, JiYoung; Kim, Huy Kang

    2017-01-01

    Although many anti-theft technologies are implemented, auto-theft is still increasing. Also, security vulnerabilities of cars can be used for auto-theft by neutralizing anti-theft system. This keyless auto-theft attack will be increased as cars adopt computerized electronic devices more. To detect auto-theft efficiently, we propose the driver verification method that analyzes driving patterns using measurements from the sensor in the vehicle. In our model, we add mechanical features of automo...

  10. Car sharing means more travel with less pollution: Eco-efficient services: Stop selling cars; sell kilometres instead

    OpenAIRE

    Meijkamp, R.; Van Kasteren, J.

    2000-01-01

    The product, or hardware if you will, still lies at the heart of the production and consumption chain, resulting in a significant environmental impact. Basing design on applied value instead of the product itself can offer substantial ecological advantages. Ir. Rens Meijkamp tested the eco-efficient service theory by examining car sharing schemes, commercial ventures which make rental cars available to their customers on a twenty-four hour seven days a week basis, thus providing an alternativ...

  11. Crash Testing in the Lab: Putting a New Stop to the CO2 Car!

    Science.gov (United States)

    Decker, Rob

    2005-01-01

    Every year in the United States, the federal government, insurance companies and automobile manufacturers wreck hundreds of cars for safety-testing purposes. All this crashing comes in an effort to rate vehicular safety for the public. Inspired by numerous movies with car chases, dramatic wrecks and television commercials showing car safety tests,…

  12. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  13. DETERMINATION OF THE DELAY DEPARTURE TIME OF THE BUS FROM STOPPING POINT INTO THE CAR FLOW

    Directory of Open Access Journals (Sweden)

    P. Gorbachov

    2014-10-01

    Full Text Available An analytical model for estimation of the bus departure delax from the bus stopping point after passenger loading is presented. The model allows to take into account the traffic density on a particular road section of the transport network, as well as the bus parameters.

  14. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  15. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  16. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... with a theft rate higher than 3.5826, four are passenger car lines, none are multipurpose passenger... comments identified by Docket No. NHTSA-2012- 0073 by any of the following methods: Federal eRulemaking Portal: Go to http://www.regulations.gov . Follow the online instructions for submitting comments. Mail...

  17. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  18. Cars, Cars, Cars

    Science.gov (United States)

    McIntosh, Phyllis

    2013-01-01

    Cars are the focus of this feature article, which explores such topics as the history of cars in the United States, the national highway system, safety and pollution concerns, mobility and freedom for women, classic car shows, and the road trip in American literature and film. Also included are links to the websites of Automobile in American Life…

  19. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  20. Exploring Medical Identity Theft

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-01-01

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017

  1. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  2. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  3. Brake response time is significantly impaired after total knee arthroplasty: investigation of performing an emergency stop while driving a car.

    Science.gov (United States)

    Jordan, Maurice; Hofmann, Ulf-Krister; Rondak, Ina; Götze, Marco; Kluba, Torsten; Ipach, Ingmar

    2015-09-01

    The objective of this study was to investigate whether total knee arthroplasty (TKA) impairs the ability to perform an emergency stop. An automatic transmission brake simulator was developed to evaluate total brake response time. A prospective repeated-measures design was used. Forty patients (20 left/20 right) were measured 8 days and 6, 12, and 52 wks after surgery. Eight days postoperative total brake response time increased significantly by 30% in right TKA and insignificantly by 2% in left TKA. Brake force significantly decreased by 35% in right TKA and by 25% in left TKA during this period. Baseline values were reached at week 12 in right TKA; the impairment of outcome measures, however, was no longer significant at week 6 compared with preoperative values. Total brake response time and brake force in left TKA fell below baseline values at weeks 6 and 12. Brake force in left TKA was the only outcome measure significantly impaired 8 days postoperatively. This study highlights that categorical statements cannot be provided. This study's findings on automatic transmission driving suggest that right TKA patients may resume driving 6 wks postoperatively. Fitness to drive in left TKA is not fully recovered 8 days postoperatively. If testing is not available, patients should refrain from driving until they return from rehabilitation.

  4. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  5. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  6. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  7. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    OpenAIRE

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  8. Identity theft prevention in the healthcare setting.

    Science.gov (United States)

    Warren, Bryan

    2005-01-01

    How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated.

  9. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  10. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  11. Employee theft and fraud: bigger than ever and getting worse.

    Science.gov (United States)

    2001-02-01

    Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.

  12. Car stickers for 2011

    CERN Multimedia

    GS Department

    2010-01-01

    The 2011 car stickers are now available. Holders of blue car stickers will receive their 2011 car stickers by internal mail as of 15 December.   Holders of red car stickers are kindly requested to come to the Registration Service (Building 55,1st floor) to renew their 2011 stickers. This service is open from Monday to Friday from 7.30 am to 5.30 pm non-stop. Documents for the vehicles concerned must be presented. Reception and Access Control Service – GS/ISG/SIS General Infrastructure Services Department

  13. Car stickers for 2012

    CERN Multimedia

    GS Department

    2011-01-01

    The 2012 car stickers are now available. Holders of blue car stickers will receive by internal mail their 2012 car stickers as of 5 December. Holders of red car stickers are kindly requested to come to the Registration Service (Building 55,1st floor) to renew their 2011 stickers. This service is open from Monday to Friday from 7.30 am to 5.30 pm non-stop. Documents related to the vehicles concerned are mandatory. Reception and Access Control Service – GS/IS/SIS General Infrastructure Services Department

  14. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  15. Identity theft prevention in CyberCIEGE

    OpenAIRE

    Ruppar, Carrie Aliene

    2005-01-01

    The increase in online activities which involve peopleâ s identification information means that identity theft has become a widespread computer security issue. Identity theft is defined as the misuse of personal information and identity. To address this problem, an Information Assurance training tool, such as CyberCIEGE, can be used for user awareness and education. This thesis incorporated current research on identity theft attacks and prevention techniques into a customized scenario defini...

  16. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production... Investigation. The NCIC is a government system that receives vehicle theft information from nearly 23,000... requested to comment on the accuracy of the data and to provide final production figures for individual...

  17. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-10-24

    ... thefts per thousand vehicles experienced by MY 2008 vehicles in CY 2008. A similar decreasing trend in... showing a 17% reduction in motor vehicle thefts (automobiles, trucks, buses and other vehicles) from 2008... data show that the MY 2009 theft rate reduction is consistent with the general decreasing trend of...

  18. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  19. Design of an intelligent car

    Science.gov (United States)

    Na, Yongyi

    2017-03-01

    The design of simple intelligent car, using AT89S52 single chip microcomputer as the car detection and control core; The metal sensor TL - Q5MC induction to iron, to detect the way to send feedback to the signal of single chip microcomputer, make SCM according to the scheduled work mode to control the car in the area according to the predetermined speed, and the operation mode of the microcontroller choose different also can control the car driving along s-shaped iron; Use A44E hall element to detect the car speeds; Adopts 1602 LCD display time of car driving, driving the car to stop, take turns to show the car driving time, distance, average speed and the speed of time. This design has simple structure and is easy to implement, but are highly intelligent, humane, to a certain extent reflects the intelligence.

  20. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  1. Theft of electricity in Indonesia

    Science.gov (United States)

    Priatna, Dedy Supriadi

    In 1996, among 196 million Indonesian people, only 47.6% had access to electricity; 45.4% in rural areas and 51.5% in urban. 64% of population lived in 61,975 villages, and electric power was supplied to 69% of villages. The government has set a goal to achieve nearly universal services by the year 2014. The government can use existing installed capacity of PLN's system more efficiently. Theft of electricity, which currently constitutes a large share of PLN's losses, should be reduced. The potential of the private sector including captive power and local communities, to participate in electric power generation can also be utilized. The large interest that has been shown by the private sector might be followed by making electric power provision profitable and therefore attractive for the private sector. PLN profits, that in 1996 were only 5.22% instead of the 8% recommended by the World Bank as the best practice for Indonesia, have to be increased by improving their performance levels. The government should also seek solutions for the extremely poor households who will never be able to afford both connection charges and a monthly bill. In 1996 the extremely poor households included 5,251,788 households, constituting 12.1% of the total Indonesian households. Only 1.2% of these households had access to electricity. The objective of this study is to seek the policies that can be implemented in Indonesia that will make it possible to generate and deliver electricity profitably, and reduce theft while providing nearly universal services. For this purpose, the options that are proposed in this study are reducing theft of electricity; something like the CAMPFIRE that has successfully reduced poaching of elephants in Africa: that is, consumer-owned systems, both partially (distribution facilities) and completely (generation and distribution facilities); performance-based regulation (PBR); and solutions for supplying the extremely poor based on the minimum subsidies from the

  2. Medical identity theft: an emerging problem for informatics.

    Science.gov (United States)

    Gillette, William; Patrick, Timothy B

    2007-10-11

    This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.

  3. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  4. Identity Theft in Community Mental Health Patients

    Science.gov (United States)

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason

    2007-01-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented. PMID:20806029

  5. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  6. Preventing and responding to medical identity theft.

    Science.gov (United States)

    Amori, Geraldine

    2008-01-01

    Medical identity theft is a crime with two victims: patients and providers. It is easy to commit and lucrative because healthcare record keeping and business interactions are complex and mainly electronic. Patients whose identity has been stolen are vulnerable to both medical error and financial loss. Providers may suffer both reputation loss and financial loss. There are steps to help prevent and to respond appropriately to medical identity theft.

  7. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  8. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  9. The Engine Immobilizer : a Non-Starter For Car Thieves

    NARCIS (Netherlands)

    van Ours, J.C.; Vollaard, B.A.

    2013-01-01

    We provide evidence for a beneficial welfare impact of a crime policy that is targeted at strenghtening victim precaution. Regulation made application of the electronic engine immobilizer, a simple and low-cost anti-theft device, mandatory for all new cars sold within the European Union as of 1998.

  10. CERN car stickers 2005

    CERN Multimedia

    Reception and Access Control Service - TS Department

    2004-01-01

    Please note that the car stickers for 2005 are now available. If you have not received the new one by internal mail, you should go along in person to the Registration Service (bldg. 55 - 1st floor), open non-stop from 7:30 to 16:30, taking with you your 2004 sticker and the log-book of your vehicle. Thank you for your collaboration. Reception and Access Control Service - TS Department.

  11. Identity Theft: A Study in Contact Centres

    Science.gov (United States)

    Moir, Iain; Weir, George R. S.

    This paper explores the recent phenomenon of identity theft. In particular, it examines the contact centre environment as a mechanism for this to occur. Through a survey that was conducted amongst forty-five contact centre workers in the Glasgow area we determined that contact centres can and do provide a mechanism for identity theft. Specifically, we found a particularly high incidence of agents who had previously dealt with phone calls that they considered suspicious. Furthermore, there are agents within such environments who have previously been offered money in exchange for customers' details, or who know of fellow workers who received such offers. Lastly, we identify specific practices within contact centres that may contribute to the likelihood of identity theft.

  12. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... of motor vehicles. E-mail is now included as a means to submit the target area designations. Under the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  13. Car Sickness

    Science.gov (United States)

    ... Preventable Diseases Healthy Children > Health Issues > Conditions > Head Neck & Nervous System > Car Sickness Health Issues Listen Español Text Size Email Print Share Car Sickness Page Content ...

  14. Car stickers for 2009

    CERN Multimedia

    TS Department

    2008-01-01

    All members of the personnel holding a valid contract (except owners of cars with green or CD plates) can come to the Registration Service (Building 55, 1st floor) to obtain their 2009 car sticker, Mondays to Fridays from 7.30 a.m. to 4.00 p.m. non-stop. Please ensure you bring with you the documents relating to the vehicles(s) concerned. If you only wish to register one vehicle, you can obtain the 2009 sticker using the request form on the Web (via internet Explorer only). NB: This notice only applies to members of the personnel who obtained one or several blue car stickers for 2008. Reception and Access Control Service – TS/FM

  15. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  16. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  17. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... show that the theft rate for the 1999 Nissan Maxima equipped with a standard passive immobilizer is 2.5 thefts per thousand vehicles, compared to a theft rate of 5.2 thefts for the 1998 Nissan Maxima without a... Highway Loss Data Institute show that overall theft losses for the 1999 Nissan Maxima (with a passive...

  18. Identity theft as a teachable moment

    OpenAIRE

    Cheney, Julia S.; Hunt, Robert M.; Mikhed, Vyacheslav; Ritter, Dubravka; Vogan, Michael

    2014-01-01

    This paper examines how instances of identity theft that are sufficiently severe to induce consumers to place an extended fraud alert in their credit reports affect their risk scores, delinquencies, and other credit bureau variables on impact and thereafter. We show that for many consumers these effects are relatively small and transitory. However, for a significant number of consumers, especially those with lower risk scores prior to the event, there are more persistent and generally positiv...

  19. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  20. 30 CFR 57.14215 - Coupling or uncoupling cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Coupling or uncoupling cars. 57.14215 Section... and Equipment Safety Practices and Operational Procedures § 57.14215 Coupling or uncoupling cars. Prior to coupling or uncoupling cars manually, trains shall be brought to a complete stop, and then...

  1. 30 CFR 56.14215 - Coupling or uncoupling cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Coupling or uncoupling cars. 56.14215 Section... Equipment Safety Practices and Operational Procedures § 56.14215 Coupling or uncoupling cars. Prior to coupling or uncoupling cars manually, trains shall be brought to a complete stop, and then moved at minimum...

  2. 28 CFR 29.12 - Specified conditions under which stops may be authorized.

    Science.gov (United States)

    2010-07-01

    ... may be authorized. 29.12 Section 29.12 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.12 Specified conditions under which stops may be authorized. A motor vehicle owner may voluntarily enroll his or her vehicle(s) and give written consent to law...

  3. Car stickers for 2010

    CERN Multimedia

    GS Department

    The 2010 car stickers are now available. Holders of blue stickers will receive their 2010 stickers through the internal mail from 1st December onwards. Holders of red stickers are required to go to the Registration Service (Building 55, first floor), which is open non-stop from 7.30 a.m. to 4.00 p.m. Mondays to Fridays, in order to obtain their new stickers. They will be asked to present documents relating to the vehicles concerned. Owners of vehicles registered on green and CD plates should disregard this message. Reception and Access Control Service – GS/SEM/LS

  4. Identity theft in community mental health patients: two case reports.

    Science.gov (United States)

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason; Everett, Anita

    2007-05-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented.

  5. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... none are light-duty truck lines. The agency believes that the theft rate reduction is a result of... 205 HONDA ODYSSEY VAN 28 135,622 0.2065 206 MERCEDES-BENZ SMART FORTWO 4 21,627 0.1850 207 GENERAL...

  6. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ... none are light-duty truck lines. The agency believes that the theft rate reduction is a result of... 5,209 0.5759 151 TOYOTA SCION XD 10 17,587 0.5686 152 MERCEDES-BENZ SMART FORTWO 8 14,169 0.5646 153...

  7. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  8. College Students, Internet Use, and Protection from Online Identity Theft

    Science.gov (United States)

    Norum, Pamela S.; Weagley, Robert O.

    2007-01-01

    The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…

  9. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  10. Assessing the Effects of Pilferage, Mutilation and Theft of Library ...

    African Journals Online (AJOL)

    Assessing the Effects of Pilferage, Mutilation and Theft of Library Resources on Institute for Agricultural Research Library. KM Gabriel. Abstract. The paper presents the prospects, problems and solutions on the effects of pilferage, mutilation and theft of available information resources in an agricultural library. The overall ...

  11. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  12. Exploring the psychological and somatic impact of identity theft.

    Science.gov (United States)

    Sharp, Tracy; Shreve-Neiger, Andrea; Fremouw, William; Kane, John; Hutton, Shawn

    2004-01-01

    Identity theft is a new and growing form of white-collar crime. This exploratory study examined the psychological and somatic impact of identity theft and coping methods utilized by victims. Thirty-seven victims of identity theft participated in regional victim focus groups. Participants completed a victim impact questionnaire designed by the authors and the Brief Symptom Inventory-18 (BSI-18). The majority of participants expressed an increase in maladaptive psychological and somatic symptoms post victimization. Results on the BSI indicated that identity theft victims with unresolved cases, in contrast to those with resolved cases, were more likely to have clinically elevated scores when compared with a normative sample. Relatively similar coping mechanisms were utilized across victims. The results from this study suggest that victims of identity theft do have increased psychological and physical distress, and for those whose cases remain unresolved, distress is maintained over time.

  13. Anti-Theft Automatic Metering Interface

    Directory of Open Access Journals (Sweden)

    Abhijeet Das

    2015-08-01

    Full Text Available Abstract Electricity is now more than a necessity and its need is increasing day by day resulting in power theft and power scarcity. The purpose of this project is to provide automatic control and monitoring of the Domestic Energy Meter enabling the Electricity Department to read meter readings without anyone visiting each house and also prevent electricity theft .This can be achieved by the use of a Microcontroller Unit that continuously monitors and records the Energy Meter readings in its permanent memory location. This system also makes use of a GSM module for remote monitoring and control of Energy Meter with the help of an interfacing circuitry. The Microcontroller based system continuously records the readings and the live meter reading can be sent to the Electricity department after a count period or on request. This system also can be used to disconnect the power supply to the house in case of non-payment of electricity bills. The Substation will be the receiving end. The data received is fed to a microcontroller at the Substation which will automatically calculate the bill based on tariff provider and display it.

  14. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  15. 77 FR 23320 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2006...

    Science.gov (United States)

    2012-04-18

    ... Motor Vehicle Theft for the 2006 Reporting Year AGENCY: National Highway Traffic Safety Administration... publication by NHTSA of the annual ] insurer report on motor vehicle theft for the 2006 reporting year... motor vehicle thefts; and actions taken by insurers to assist in deterring thefts. ADDRESSES: Interested...

  16. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... Range Rover Evoque vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR... theft prevention standard (49 CFR Part 541) for the Range Rover Evoque vehicle line beginning with MY...

  17. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ... Motor Vehicle Theft for the 2005 Reporting Year AGENCY: National Highway Traffic Safety Administration... publication by NHTSA of the annual insurer report on motor vehicle theft for the 2005 reporting year. Section... motor vehicle thefts; and actions taken by insurers to assist in deterring thefts. ADDRESSES: Interested...

  18. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: → Discusses several cases, issues and setbacks in the design of smart meters. → Evaluates socio-economic, infrastructural, political and power quality issues. → Proposes a smart meter that overcame several setbacks in implementation. → Proposes a smart meter that chastises appliances of illegal consumers.

  19. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... that a rule of law where good faith is irrelevant in determining the issue of property rightsPareto dominates a rule where good faith may protect an innocent buyer. Thus, an owner of an assetwill spend more resources on protecting his property and potential buyers will incur higher costs inorder to verify...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  20. Closing the stop gap

    International Nuclear Information System (INIS)

    Czakon, Michal; Mitov, Alexander; Papucci, Michele; California Univ., Berkeley, CA; Ruderman, Joshua T.; California Univ., Berkeley, CA; New York Univ., NY; Weiler, Andreas; CERN - European Organization for Nuclear Research, Geneva

    2014-07-01

    Light stops are a hallmark of the most natural realizations of weak-scale supersymmetry. While stops have been extensively searched for, there remain open gaps around and below the top mass, due to similarities of stop and top signals with current statistics. We propose a new fast-track avenue to improve light stop searches for R-parity conserving supersymmetry, by comparing top cross section measurements to the theoretical prediction. Stop masses below ∝180 GeV can now be ruled out for a light neutralino. The possibility of a stop signal contaminating the top mass measurement is also briefly addressed.

  1. Clean cars

    Energy Technology Data Exchange (ETDEWEB)

    Piffaretti, M.

    2008-07-01

    This well-illustrated presentation made at the Swiss 2008 research conference on traffic by the Protoscar company takes a look at research, design, engineering and communication topics in the area of 'clean cars'. The present situation with electrically driven and hybrid-drive cars is reviewed and the chances and problems of the present-day vehicles are examined. New developments and a number of vehicles that should be on the market in the period from 2012 to 2015 are presented. Also, 'clean' specialist vehicles such as trucks and buses are reviewed. Battery systems and associated problems and new developments are looked at. The promotion scheme in Mendrisio, Switzerland is reviewed. Bottom-up and top-down approaches are discussed and future market developments are looked at, as are promotional activities in various countries.

  2. Stop smoking support programs

    Science.gov (United States)

    Smokeless tobacco - stop smoking programs; Stop smoking techniques; Smoking cessation programs; Smoking cessation techniques ... You can find out about smoking cessation programs from: Your ... Your employer Your local health department The National Cancer ...

  3. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    that left 12 families homeless .57 Citizens in other communities in the United States have also had their lives and homes directly threatened as a...Metal Theft, the Built Environment and the Dark Side of the Global Recycling Market,” Environmental Law and Management 20 (2008): 176–83. 88 “The...European Police Raid Scrapyards in Metal Theft Crackdown,” Global Post, May 31, 2013, accessed August 10, 2015, http://www.globalpost.com/dispatch

  4. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  5. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  6. Local Labor Markets and Theft: New Evidence from Canada

    OpenAIRE

    Fraser Summerfield

    2016-01-01

    This paper provides the first causal evidence of the effect of labor market opportunities on theft crimes in Canada. Synthetic panel data are constructed by combining the Labour Force Survey with the complete Uniform Crime Reports microdata from 2007-2011. Low-skill unemployment rates and corresponding theft rates are measured for age and city-specific groups of young males. Impacts are identified using an instrumental variables approach that captures the exposure of low-skill employment to e...

  7. Religiosity and music copyright theft among Canadian Baptist youth

    OpenAIRE

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005 (a major Canadian Baptist Youth Conference). The data demonstrate a high level of acceptance of music copyright theft, with only 26% of the participa...

  8. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  9. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541...

  10. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  11. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  12. SOME ASPECTS OF MOTOR CAR COERCION COEFFICIENT DETERMINATION

    Directory of Open Access Journals (Sweden)

    О. Denysenko

    2010-01-01

    Full Text Available A short review of motor car coercion coefficient determination is presented. The models designed for the determination of motor car queues time intervals at the stop line is presented. The estimation of modeling results according to experimental data is carried out.

  13. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  14. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  15. CAR STICKERS

    CERN Document Server

    Access and Control Service

    2004-01-01

    Following to the operational circular No2 title III. Conditions of access, paragraph 21 . Except in the case of exemptions authorized by the Director-General, all drivers must facilitate the identification of their vehicle. For CERN car stickers to be valid in 2004, they must have the numbers 04 printed on them. As of Monday, March 15th, the security agents on duty at the various access points will have no alternative but to refuse entry to vehicles which do not have a valid sticker. Anyone in this situation is requested to follow the regularization procedure either by logging on to the web site, or by going in person to the registration service in bldg. 55, first floor, between 07h30 et 16h30, Monday through Friday. Access and Control Service - FM Group, TS Department

  16. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  17. Car Seat Safety

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español Car Seat Safety KidsHealth / For Parents / Car Seat Safety ... certified child passenger safety technician.) Guidelines for Choosing Car Seats Choose a seat with a label that ...

  18. Jet Car Track Site

    Data.gov (United States)

    Federal Laboratory Consortium — Located in Lakehurst, New Jersey, the Jet Car Track Site supports jet cars with J57 engines and has a maximum jet car thrust of 42,000 pounds with a maximum speed of...

  19. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  20. 77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-09-21

    ..., three are passenger car lines, none are multipurpose passenger vehicle lines, and none are light-duty... 57 0 1 0.0000 211 MERCEDES-BENZ....... SMART FORTWO........ 0 3,255 0.0000 212 MITSUBISHI ECLIPSE 0...

  1. Car Club

    CERN Multimedia

    Automobile Club

    2012-01-01

    The Car Club wishes all its members Good road and Happy New Year 2012. It is time to think about renewing your subscription for this year, at a cost of 50 CHF, unchanged since several years. For those of you who are regular users of our equipment and who know all the advantages that the club is in a position to offer, it seems pointless to going to more details, as we are sure that many of you have made use of them and are satisfied. Therefore don’t forget to fill in the payment slip to continue to be a part of our large family. We remind you that everyone who works on the CERN site can be members of our club, this includes industrial support personnel and the personnel of companies which have a contract with CERN. If you are not yet a member, come and visit us! We will be happy to welcome you and show you the installations, alternatively you can visit our web site: http://club-acc.web.cern.ch/club-acc/ The use of the club’s installations is strictly reserved for members. Pour t...

  2. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24... loss. 555.165 Section 555.165 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO...

  3. Re-positioning the law of theft in view of recent developments in ICTS

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  4. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ...), showed that between MYs 1987 and 1993, the Chevrolet Camaro and Pontiac Firebird vehicle lines.... Based on comparison of the reduction in the theft rates of Chevrolet Corvettes using a passive theft... Chevrolet Camaro and the Pontiac Firebird models equipped with a passive theft deterrent device without an...

  5. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention...

  6. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  7. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... National Highway Traffic Safety Administration Ford Petition for Exemption From the Vehicle Theft...'s (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain aspects of the new...

  8. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover... is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Federal Motor Vehicle Theft Prevention Standard, 49 CFR part 541...

  9. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an...

  10. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard...

  11. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft... 543, Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  12. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  13. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts... exemption from parts- marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard...

  14. 76 FR 2631 - Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft...

    Science.gov (United States)

    2011-01-14

    ... Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft Prevention... applicable Federal motor vehicle safety, bumper, and theft prevention standards. The agency proposes amending... and Theft Prevention Standards; part 592, Registered Importers of Vehicles Not Originally Manufactured...

  15. Agutaynen Glottal Stop.

    Science.gov (United States)

    Quakenbush, J. Stephen

    A study investigated the phonemic and morphophonemic patterning of the glottal stop in Agutaynen, a Meso-Philippine language, and some comparison with two northern Philippine languages. Agutaynen glottal stop has as its sole origin a neutralization of contrast rule, the operation of which can be noted in three different linguistic environments.…

  16. Stop the Cravings!

    Science.gov (United States)

    ... need to know how a healthy diet improves health and fights disease—rely on qualified professionals in the field. More on This Topic Stop the Cravings! Eat Right! Feeling guilty after giving in to that chocolate craving? You can stop the cycle without giving ...

  17. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  18. FRICTION BUFFER STOP DESIGN

    Directory of Open Access Journals (Sweden)

    Petr Guziur

    2017-08-01

    Full Text Available Friction buffer stops are the favoured construction of buffer stop, mainly due to its high resistance and variety of layout. Last but not least is its manner of deceleration induced upon impact and during the braking what makes it smart solution in railway transport safety. The general approach of designing buffer stops is via usage of the kinetic energy and its conversion into work. Paper describes input parameters such as train velocity or buffer stop vicinity which is expressed by the safety coefficient implanted within the calculation. Furthermore, the paper shows the principle of calculation the friction buffer stop work, or to be more precise, the work of its braking jaws and optionally the work of additional braking jaws located behind the buffer stop. Last section of the paper is focused on the examples of designing friction buffer stops, points out the main complications and shows the charts of relation amongst braking distance, kinetic energy and braking force and the charts of relation between deceleration rate and braking distance.

  19. Luminescent beam stop

    Energy Technology Data Exchange (ETDEWEB)

    Bryant, Diane; Morton, Simon A.

    2017-10-25

    This disclosure provides systems, methods, and apparatus related to beam stops. In one aspect, a device comprises a luminescent material, a beam stop plate, and an optical fiber. The luminescent material is a parallelepiped having a first side and a second side that are squares and having a third side that is a rectangle or a square. The first side and the second side are perpendicular to the third side. The beam stop plate is attached to the first side of the luminescent material. The optical fiber has a first end and a second end, with the first end of the optical fiber attached to the third side of the luminescent material.

  20. 77 FR 51612 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of...

    Science.gov (United States)

    2012-08-24

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... the Mitsubishi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR...

  1. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft...

  2. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  3. Theft and robbery in chrysostom's time | Stander | Acta Theologica

    African Journals Online (AJOL)

    The aim of this article is to study what Chrysostom said about theft and robbery in his community. His homilies on the New Testament will be scrutinized for information on this negative feature of the ancient world, since homilies are always important sources for information on social issues. It becomes clear that ...

  4. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  5. Evaluation of Theft, Lying, and Fighting in Adolescence.

    Science.gov (United States)

    Keltikangas-Jarvinen, Liisa; Lindeman, Marjaana

    1997-01-01

    Age and gender differences in evaluating three immoral behaviors (theft, lying, and fighting) were studied with 2,594 Finnish preadolescents, midadolescents, and late adolescents. Boys accepted all immoral acts better than girls, and acceptance of these behaviors was highest in middle adolescence. There was flexible use of different rationales for…

  6. 78 FR 23637 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2013-04-19

    ... and guidelines to require certain regulated entities to establish programs to address risks of... address identity theft. First, the rules require financial institutions and creditors to develop and... Financial Institutions and Creditors Are Required to Have a Program 2. The Objectives of the Program 3. The...

  7. Comparison of skid resistance testing to stopping distance testing.

    Science.gov (United States)

    1998-01-01

    This report is intended to statistically summarize the results of a side-by-side test of the skid resistance testing trailer utilized by the Oregon Department of Transportation (ODOT), and the stopping distance car utilized by the Oregon State Police...

  8. "Stop Diabetes Now!"

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Diabetes "Stop Diabetes Now!" Past Issues / Fall 2009 Table of Contents ... Tips for Seniors at Risk for Type 2 Diabetes Lifestyle changes that lead to weight loss—such ...

  9. Vaccines Stop Illness

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Vaccines Stop Illness Past Issues / Spring 2008 Table of ... meningitis won't infect, cripple, or kill children. Vaccine Safety In light of recent questions about vaccine ...

  10. Vaccines Stop Illness

    Science.gov (United States)

    ... page please turn JavaScript on. Feature: Diseases and Vaccinations Vaccines Stop Illness Past Issues / Spring 2015 Table ... if we take away the protection given by vaccination, more and more people will be infected and ...

  11. Depression - stopping your medicines

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000570.htm Depression - stopping your medicines To use the sharing features ... prescription medicines you may take to help with depression, anxiety, or pain. Like any medicine, there are ...

  12. A novel anti-theft security system for photovoltaic modules

    Science.gov (United States)

    Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong

    2017-04-01

    Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.

  13. Creating a One-Stop-Shop for Automobile Solutions in Kolkata, India.

    OpenAIRE

    Kanoria, Shrivardhan

    2009-01-01

    This is a research lead business plan concerning making a one-stop-shop for automobile solutions in Kolkata, India, containing three elements of business. Firstly, it would involve restoration, buying and selling of vintage and classic cars. Secondly, it would contain modern car customisation. Thirdly, it would contain modern car servicing, buying and selling. These would be the core activities, having associates non core businesses as well.

  14. How Does Car Parking Availability and Public Transport Accessibility Influence Work-Related Travel Behaviors?

    Directory of Open Access Journals (Sweden)

    Grant M. Schofield

    2010-02-01

    Full Text Available This study investigated the relationships between car parking, public transport, travel behaviors, and health outcomes for adults (n = 1,188 traveling to a worksite. Public transport was used for 12.1% of the work-related commute. Those who had higher levels of walking, no worksite car park access, lived proximal to a public transport stop, had limited automobile availability, traveled to the main business district, perceived public transport as accessible, or did not have company car access were more likely to use public transportation. Accordingly, proximal residential transit stops and restrictions for company car accessibility and parking at the worksite are needed.

  15. Sneaky light stop

    Directory of Open Access Journals (Sweden)

    Till Eifert

    2015-04-01

    Full Text Available A light supersymmetric top quark partner (stop with a mass nearly degenerate with that of the standard model (SM top quark can evade direct searches. The precise measurement of SM top properties such as the cross-section has been suggested to give a handle for this ‘stealth stop’ scenario. We present an estimate of the potential impact a light stop may have on top quark mass measurements. The results indicate that certain light stop models may induce a bias of up to a few GeV, and that this effect can hide the shift in, and hence sensitivity from, cross-section measurements. Due to the different initial states, the size of the bias is slightly different between the LHC and the Tevatron. The studies make some simplifying assumptions for the top quark measurement technique, and are based on truth-level samples.

  16. The Socialist Car

    DEFF Research Database (Denmark)

    Christensen, Lars K.

    2013-01-01

    Review of L.H. Siegelbaum (ed.) The Socialist Car. Automobility in the Eastern Block. Cornell University Press, 2011.......Review of L.H. Siegelbaum (ed.) The Socialist Car. Automobility in the Eastern Block. Cornell University Press, 2011....

  17. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  18. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  19. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  20. Cars, Cycles, and Consumers.

    Science.gov (United States)

    Idleman, Hillis K. Ed.

    The purpose of this consumer education module is to provide information and skills, and the ability to raise questions and find answers, while seeking the best automobile or motorcycle buy available for the money. The module may be used for a full or part semester course. The five sections (cars and the consumer, renting and leasing cars, cars and…

  1. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  2. Optimal Locations of Bus Stops Connecting Subways near Urban Intersections

    Directory of Open Access Journals (Sweden)

    Yuan Cui

    2015-01-01

    Full Text Available Unsuitable locations of bus stops which provide feeder transportation connecting subways near urban intersections usually lead to the low efficiency of public transport and level of passenger service. A multiobjective optimization model to distribute such stop locations is proposed to attain the shortest total walk distance of passengers and minimum delay time of cars through intersections and travel time of buses. The Pareto frontier and optimal solutions for the proposed model are given by the distance-based and enumerative methods. The Xizhimen bus stop is selected to implement case studies for verifying the validity of the proposed model. The analysis of sensitivity on possible solutions is also carried out in the case studies. The results show that the proposed model is capable of optimizing the locations of bus stops connecting subways near intersections and helpful to improve the level of passengers service and operational efficiency of public transportation.

  3. One-stop shopping.

    Science.gov (United States)

    Snow, C

    1996-11-25

    The long-term-care industry's new mantras are "continuum of care" and "one-stop shopping." Companies are trying to please consumers who are clamoring for more senior-living options and managed-care organizations that want administratively simple contracting arrangements.

  4. Stopping the unstoppable

    CERN Multimedia

    2002-01-01

    How do you stop two very high energy proton beams circulating in opposite directions around a 27-kilometre ring? The answer is the beam dumps. Two tunnels, pointing in opposite directions, are being constructed at point 6 of the LHC. These will allow the beams to be directed into two large beam dumps housed at the ends of the tunnels.

  5. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  6. RFID based Anti-theft System for Metropolia UAS Electronics laboratories

    OpenAIRE

    Weldemedhin, Desta

    2016-01-01

    The aim of this thesis is to study different types of RFID based anti-Theft system implementation suitable for Metropolia Electronics laboratory environment to deter theft taking into account several installation requirements. The operating frequencies of the RFID anti-theft system are from low frequency to High frequencies range and governed by different standards based on the region it is going to be implemented. The introduction of this thesis will go through Radio Frequency Identifica...

  7. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  8. 75 FR 67453 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Science.gov (United States)

    2010-11-02

    ... issue jointly guidelines for financial institutions and creditors regarding identity theft with respect.... The regulations require each financial institution and creditor to establish [[Page 67454

  9. Tank car leaks gasoline

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    On January 27, 1994, a Canadian National (CN) tank car loaded with gasoline began to leak from a crack in the tank shell on the end of the car near the stub sill. The tank car had been damaged from impact switching. A part of the tank car was sent for laboratory analysis which concluded that: (1) the fracture originated in two locations in welds, (2) the cracks propagated in a symmetrical manner and progressed into the tank plate, (3) the fracture surface revealed inadequate weld fusion. A stress analysis of the tank car was conducted to determine the coupling force necessary to cause the crack. It was noted that over the last decade several problems have occurred pertaining to stub sill areas of tank cars that have resulted in hazardous material spills. An advisory was sent to Transport Canada outlining many examples where tank cars containing serious defects had passed CN inspections that were specifically designed to identify such defects. 4 figs

  10. CAR2 - Czech Database of Car Speech

    Directory of Open Access Journals (Sweden)

    P. Sovka

    1999-12-01

    Full Text Available This paper presents new Czech language two-channel (stereo speech database recorded in car environment. The created database was designed for experiments with speech enhancement for communication purposes and for the study and the design of a robust speech recognition systems. Tools for automated phoneme labelling based on Baum-Welch re-estimation were realised. The noise analysis of the car background environment was done.

  11. CAR2 - Czech Database of Car Speech

    OpenAIRE

    Pollak, P.; Vopicka, J.; Hanzl, V.; Sovka, Pavel

    1999-01-01

    This paper presents new Czech language two-channel (stereo) speech database recorded in car environment. The created database was designed for experiments with speech enhancement for communication purposes and for the study and the design of a robust speech recognition systems. Tools for automated phoneme labelling based on Baum-Welch re-estimation were realised. The noise analysis of the car background environment was done.

  12. The old-new car sticker

    CERN Multimedia

    2000-01-01

    You have had the same car sticker for ten years and have been driving in and out of CERN every day. Suddenly one morning the guard stops you and tells you need a new one. Hmmm ?! “There were 60 000 stickers in circulation in Geneva and we could not control wether the sticker had been distributed to the right person”, saysa Claude Ducastel, responsible for Entrance Security. “So to solve this problem, last year DSU decided to change Operational Circular N°2 and introduce new car stickers that will be changed every year.” Three types of car stickers were introduced: blue, green and red. The blue one is for staff members whose contract is for one year or more. It indicates the plate number of the car. The green one is for staff members whose contract is for less than one year. It indicates the plate number of the car and the date the contract of the employee terminates. It also has a big L for "Limited". The red one is for enterprise subcontractors whose contracts finish at the end of the year. If ...

  13. University of Calgary solar car set for American solar challenge

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This article described a solar car designed by a team from the University of Calgary for the 2010 American Solar Challenge, a 1100 mile race that starts in Tulsa, Oklahoma and ends 5 days later in Chicago, Illinois. The Shulich Axiom car is comprised of 2000 solar cells with batteries that can store enough power to drive the car for a 4-hour period. The car has a top speed of 140 km per hour and is totally powered by solar energy. The team has taken the car on a 5-day tour of Alberta, stopping in 7 communities across the province before heading back to Calgary. The team is one of only 2 Canadian teams competing in the challenge this year. 1 fig.

  14. Investigation of RADTRAN Stop Model input parameters for truck stops

    International Nuclear Information System (INIS)

    Griego, N.R.; Smith, J.D.; Neuhauser, K.S.

    1996-01-01

    RADTRAN is a computer code for estimating the risks and consequences as transport of radioactive materials (RAM). RADTRAN was developed and is maintained by Sandia National Laboratories for the US Department of Energy (DOE). For incident-free transportation, the dose to persons exposed while the shipment is stopped is frequently a major percentage of the overall dose. This dose is referred to as Stop Dose and is calculated by the Stop Model. Because stop dose is a significant portion of the overall dose associated with RAM transport, the values used as input for the Stop Model are important. Therefore, an investigation of typical values for RADTRAN Stop Parameters for truck stops was performed. The resulting data from these investigations were analyzed to provide mean values, standard deviations, and histograms. Hence, the mean values can be used when an analyst does not have a basis for selecting other input values for the Stop Model. In addition, the histograms and their characteristics can be used to guide statistical sampling techniques to measure sensitivity of the RADTRAN calculated Stop Dose to the uncertainties in the stop model input parameters. This paper discusses the details and presents the results of the investigation of stop model input parameters at truck stops

  15. Tourette Syndrome: Help Stop Bullying

    Science.gov (United States)

    ... Submit Button Past Emails Tourette Syndrome: Help Stop Bullying Language: English (US) Español (Spanish) Recommend on Facebook ... you can increase acceptance by helping to stop bullying of children with TS. Bullying doesn’t just ...

  16. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... theft prevention standard. Criteria 1. Retail price of the vehicle line. 2. Vehicle image or marketing strategy. 3. Vehicle lines with which the new line is intended to compete, and the theft rates of such...

  17. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  18. Breaking car use habits

    DEFF Research Database (Denmark)

    Thøgersen, John; Møller, Berit Thorup

    2008-01-01

    Based on calls for innovative ways of reducing car traffic and research indicating that car driving is often the result of habitual decision-making and choice processes, this paper reports on a field experiment designed to test a tool aimed to entice drivers to skip the habitual choice of the car...... and consider using-or at least trying-public transport instead. About 1,000 car drivers participated in the experiment either as experimental subjects, receiving a free one-month travelcard, or as control subjects. As predicted, the intervention had a significant impact on drivers' use of public transport...... and it also neutralized the impact of car driving habits on mode choice. However, in the longer run (i.e., four months after the experiment) experimental subjects did not use public transport more than control subjects. Hence, it seems that although many car drivers choose travel mode habitually, their final...

  19. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  20. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  1. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    So, given the sensitivity and its importance in the different societies in recent years, extensive studies have been done in order to identify and explain the causes of crime, particularly theft. It seems the most important causes of crime are economic factors that have a significant impact in the event of theft, because in most ...

  2. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  3. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... equipment is replaced, the replacement is governed by § 3015.167. When that happens, the market value of the... compensated for the damage, loss, or theft and replaces the equipment, § 3015.167 applies to the replacement... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section...

  4. Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making

    Science.gov (United States)

    Jefson, Cristy A.

    2007-01-01

    Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…

  5. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... document grants in full Nissan North America, Inc.'s (Nissan) petition for exemption of the Juke vehicle... compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR part 541). Nissan...

  6. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... of 1984'', (Docket 97-042; Notice 1), showed that between MYs 1987 and 1993, the Chevrolet Camaro and... reduction in the theft rates of Chevrolet Corvettes using a passive antitheft device along with an audible/visible alarm system to the reduction in theft rates for the Chevrolet Camaro and the Pontiac Firebird...

  7. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ...'', (Docket 97-042; Notice 1), showed that between MYs 1987 and 1993, the Chevrolet Camaro and Pontiac... vehicle. Based on comparison of the reduction in the theft rates of Chevrolet Corvettes using a passive... the Chevrolet Camaro and the Pontiac Firebird models equipped with a passive theft deterrent device...

  8. Protecting personal information in the era of identity theft: just how ...

    African Journals Online (AJOL)

    It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace. KEYWORDS: Identity theft; fraud; theft; cybercrime; personal information; data; ...

  9. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... on the line as standard equipment is likely to be as effective in reducing and deterring motor... standard on the MY 2014 S60 vehicle line is effective in reducing and deterring motor vehicle theft. Volvo...

  10. 76 FR 53072 - Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft...

    Science.gov (United States)

    2011-08-25

    ... Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft Prevention Standards; Registered Importers of Vehicles Not Originally Manufactured To Conform to the Federal Motor... Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards,'' OMB control number...

  11. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... National Highway Traffic Safety Administration Volkswagen Petition for Exemption From the Vehicle Theft... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of... of America's (Volkswagen) petition for an exemption of a new vehicle line in accordance with 49 CFR...

  12. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E... FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights... reflect changes to those items that may change over time (such as telephone numbers) to remain in...

  13. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... foreseeable risks to customers or to the safety and soundness of the financial institution or creditor from identity theft. II. Identifying Relevant Red Flags (a) Risk Factors. A financial institution or creditor... creditor has identified that reflect changes in identity theft risks; and (3) Applicable supervisory...

  14. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... institution or creditor from identity theft. II. Identifying Relevant Red Flags (a) Risk Factors. A financial... financial institution or creditor has identified that reflect changes in identity theft risks; and (3... the financial institution or creditor has detected that are commensurate with the degree of risk posed...

  15. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance... Vehicle Theft Prevention Standard. FUSA requested confidential treatment for specific information in its...

  16. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty truck lines with a majority of major parts interchangeable with those of a passenger motor vehicle line... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft...

  17. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft... Hyundai VI vehicle line in accordance with 49 CFR part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR part 541, Federal Motor Vehicle...

  18. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... TRANSPORTATION National Highway Traffic Safety Administration Federal Motor Vehicle Theft Prevention Standard... to the requirements of the Federal motor vehicle theft prevention standard. The final rule also... requirements of the Theft Prevention Standard for the Jaguar XJ vehicle line beginning with MY 2010.'' On page...

  19. UV exposure in cars.

    Science.gov (United States)

    Moehrle, Matthias; Soballa, Martin; Korn, Manfred

    2003-08-01

    There is increasing knowledge about the hazards of solar and ultraviolet (UV) radiation to humans. Although people spend a significant time in cars, data on UV exposure during traveling are lacking. The aim of this study was to obtain basic information on personal UV exposure in cars. UV transmission of car glass samples, windscreen, side and back windows and sunroof, was determined. UV exposure of passengers was evaluated in seven German middle-class cars, fitted with three different types of car windows. UV doses were measured with open or closed windows/sunroof of Mercedes-Benz E 220 T, E 320, and S 500, and in an open convertible car (Mercedes-Benz CLK). Bacillus subtilis spore film dosimeters (Viospor) were attached to the front, vertex, cheeks, upper arms, forearms and thighs of 'adult' and 'child' dummies. UV wavelengths longer than >335 nm were transmitted through car windows, and UV irradiation >380 nm was transmitted through compound glass windscreens. There was some variation in the spectral transmission of side windows according to the type of glass. On the arms, UV exposure was 3-4% of ambient radiation when the car windows were shut, and 25-31% of ambient radiation when the windows were open. In the open convertible car, the relative personal doses reached 62% of ambient radiation. The car glass types examined offer substantial protection against short-wave UV radiation. Professional drivers should keep car windows closed on sunny days to reduce occupational UV exposure. In individuals with polymorphic light eruption, produced by long-wave UVA, additional protection by plastic films, clothes or sunscreens appears necessary.

  20. GMSB with Light Stops

    CERN Document Server

    Delgado, Antonio; Quiros, Mariano

    2015-01-01

    Gauge mediated supersymmetry breaking (GMSB) is an elegant mechanism to transmit supersymmetry breaking from the hidden to the MSSM observable sector, which solves the supersymmetric flavor problem. However the smallness of the generated stop mixing requires superheavy stops to reproduce the experimental value of the Higgs mass. Two possible ways out are: i) To extend GMSB by direct superpotential messenger-MSSM Yukawa couplings to generate sizeable mixing, thus reintroducing the flavor problem; ii) To extend the MSSM Higgs sector with singlets and/or triplets providing extra tree-level corrections to the Higgs mass. Singlets will not get any soft mass from GMSB and triplets will contribute to the $\\rho$ parameter which could be an issue. In this paper we explore the second way by introducing extra supersymmetric triplets with hypercharges $Y=(0,\\pm 1)$, with a tree-level custodial $SU(2)_L\\otimes SU(2)_R$ global symmetry in the Higgs sector protecting the $\\rho$ parameter: a supersymmetric generalization of ...

  1. Book Review: Stop, Write!

    Directory of Open Access Journals (Sweden)

    Hans Thulesius

    2013-06-01

    Full Text Available This book on writing grounded theory is intended for the empirical GT researcher who wants to pursue his/her research until publication. It is the first book devoted entirely to such a crucial issue as writing grounded theory. Thus, Stop, Write: Writing Grounded Theory, is a practical book that fills a gap in GT methodology. In the first chapter of the book, Dr. Glaser says, “Stop unending conceptualization, unending data coverage, and unending listening to others who would egg you on with additional data, ideas and/or requirements or simply wait too long”. The book teaches the reader how to actually write a grounded theory by “simply” writing up the sorted memos. This requires efficient sorting that is dealt with in chapter two on Sorting Memos, which includes precious repetition from Theoretical Sensitivity (1978. How writing can be done effectively is outlined in chapter three The Working Paper. Then follows chapter four on how to rework the first draft with the different tasks of editing for language and professionalism. Thereafter Dr. Glaser discusses Writing Problems in chapter five where he gives useful guidance on how to overcome writing blocks and problems with supervisors and dissertation committees. The book also deals with publishing and with collaboration as experienced between Barney Glaser and the cofounder of grounded theory, Anselm Strauss.

  2. The Electric Cars Challenge

    Science.gov (United States)

    Roman, Harry T.

    2011-01-01

    Over 100 years ago, the great inventor Thomas Edison warned that gasoline cars would pollute the environment and lead to gasoline shortages. He preferred the use of clean electric vehicles. He also put his money where his mouth was and developed an entirely new alkaline storage battery system for his beloved cars, the nickel-iron storage battery.…

  3. Collaborative Car Pooling System

    OpenAIRE

    João Ferreira; Paulo Trigo; Porfírio Filipe

    2009-01-01

    This paper describes the architecture for a collaborative Car Pooling System based on a credits mechanism to motivate the cooperation among users. Users can spend the accumulated credits on parking facilities. For this, we propose a business model to support the collaboration between a car pooling system and parking facilities. The Portuguese Lisbon-s Metropolitan area is used as application scenario.

  4. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  5. ‘Paradise Lost’: A Theft from Helsinki University Library

    Directory of Open Access Journals (Sweden)

    Esko Häkli

    2002-03-01

    Full Text Available Traditionally, research libraries in the Nordic countries have followed the policy of being open, public libraries. They have been rather reluctant to apply restrictions even to the use of their rare materials. In this liberal atmosphere, libraries and, above all, their staff have based their own behaviour on trust. They have believed that their users are honest and will not cause any damage to the collections, much less display any criminal intent. Serious abuse of this trust – if we exclude the everyday behaviour of university students – has been extremely rare, and this has encouraged staff in these beliefs. Thefts and mutilation of items from the collections have seldom occurred. This background explains, at least partly, why the thefts last year in my Library were such a serious shock, and so upset some members of staff. We had to admit that we were no longer living in a paradise, or in a safe haven. As a result of the globalisation of crime, the world had lost its innocence even in remote Helsinki.

  6. Legends of Organ Theft: The Moral Dilemma of Contemporary Society

    Directory of Open Access Journals (Sweden)

    Dragana Antonijević

    2016-03-01

    Full Text Available Legends and rumors of organ theft became a global phenomenon in the beginning of the 80s, with the information originating from the "Third world" countries. Victims where poor and powerless, typically children. The rumor engaged a series of actions from anthropologists, NGO’s and media trying to ascertain their validity. Before long, the world was divided into two camps: on the one hand where those who believed the rumors, condemning the West for its exploitation of the underdeveloped and the poor that lead to organ theft from healthy individuals, to satisfy the needs of the rich white patients; and the other faction that, through the data, tried to negate these assertions as unfounded and illogical. At the beginning of the 90s, similar reports surfaced in the highly developed societies of Europe and the USA. Unlike the rumors, these where developed, structured narratives with specific content – legends of kidney theft, whose victims were left alive. Internet has brought about the expansion of such stories. None the less, they remained the under-analyzed, not attracting the attention of the politically minded and militant anthropologists who, in the Third world rumors, recognized material for their anti-colonial and mediatory theories. Few have tried to explain the legend and folklore origins of the First world narratives and to ascertain their function without insightful analysis. That is why I engaged in a semantic analysis of the legend in the context of the highly developed societies, with the intent of exposing their message of a deep moral dilemma concerning organ donation. I found that their hidden meaning is "revolutionary", not an inversion that I thought previously, but in accordance with the public discourse that encourages voluntary and legal donations, from cadaver as from living donors, wich is real disadaptive problem for those soceties. I proposed such a meaning by analysing the most unusual and astonishing element in the

  7. City Car = The City Car / Andres Sevtshuk

    Index Scriptorium Estoniae

    Sevtshuk, Andres, 1981-

    2008-01-01

    Massachusettsi Tehnoloogiainstituudi (MIT) meedialaboratooriumi juures tegutseva Targa Linna Grupi (Smart City Group) ja General Motorsi koostööna sündinud kaheistmelisest linnasõbralikust elektriautost City Car. Nimetatud töögrupi liikmed (juht William J. Mitchell, töögruppi kuulus A. Sevtshuk Eestist)

  8. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  9. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  10. A Real Time Approach to Theft Prevention in the field of Transportation System

    OpenAIRE

    Vartika Mehta; Deepak Punetha; Vishwanath Bijalwan

    2016-01-01

    This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF ...

  11. The Technical Problems of Anti-theft Diagnostics in a Traction Network

    Science.gov (United States)

    Mikulski, Jerzy; Młynczak, Jakub

    2012-02-01

    The paper presents an analysis of traction lines theft in the Katowice division of the Railroad Development Company (Zakład Linii Kolejowych - ZLK) as well as the principles for the anti-theft protection system, currently in development. The problem of theft is a very important issue concerning the safety of rail transportation. It is also a significant economic problem, as the cost of recreating a stolen network is very high. Moreover, the Administrator of the infrastructure bears the cost of compensation for any delays in train schedules.

  12. Investigation of natural gas theft by magnetic remanence mapping.

    Science.gov (United States)

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  13. Car-use habits

    DEFF Research Database (Denmark)

    Møller, Berit Thorup; Thøgersen, John

    2008-01-01

    consequences. Since the decision is made quite automatically and only one choice alternative is considered (the habitually chosen one), behaviour guided by habit is difficult to change. The implications of car use habits for converting drivers to commuters using public transportation is analysed based......It is often claimed that many drivers use their private car rather habitually. The claim gains credibility from the fact that travelling to many everyday destinations fulfils all the prerequisites for habit formation: it is recurring, performed under stable circumstances and produces rewarding...... to do so, car use habit, and the interaction between the two, confirms the theory-derived hypothesis that car use habits act as an obstacle to the transformation of intentions to commute by public transportation into action....

  14. The Electric Car Challenge.

    Science.gov (United States)

    Diehl, Brian E.

    1997-01-01

    Describes the Electric Car Challenge during which students applied methods of construction to build lightweight, strong vehicles that were powered by electricity. The activity required problem solving, sheet metal work, electricity, design, and construction skills. (JOW)

  15. Distortionary company car taxation: deadweight losses through increased car ownership

    NARCIS (Netherlands)

    van Ommeren, J.N.; Gutierrez Puigarnau, E.

    2013-01-01

    We analyse the effects of distortionary company car taxation through increased household car consumption for the Netherlands. We use several identification strategies and demonstrate that for about 20 % of households company car possession increases car ownership. The annual welfare loss of

  16. Has Human Evolution Stopped?

    Directory of Open Access Journals (Sweden)

    Alan R. Templeton

    2010-07-01

    Full Text Available It has been argued that human evolution has stopped because humans now adapt to their environment via cultural evolution and not biological evolution. However, all organisms adapt to their environment, and humans are no exception. Culture defines much of the human environment, so cultural evolution has actually led to adaptive evolution in humans. Examples are given to illustrate the rapid pace of adaptive evolution in response to cultural innovations. These adaptive responses have important implications for infectious diseases, Mendelian genetic diseases, and systemic diseases in current human populations. Moreover, evolution proceeds by mechanisms other than natural selection. The recent growth in human population size has greatly increased the reservoir of mutational variants in the human gene pool, thereby enhancing the potential for human evolution. The increase in human population size coupled with our increased capacity to move across the globe has induced a rapid and ongoing evolutionary shift in how genetic variation is distributed within and among local human populations. In particular, genetic differences between human populations are rapidly diminishing and individual heterozygosity is increasing, with beneficial health effects. Finally, even when cultural evolution eliminates selection on a trait, the trait can still evolve due to natural selection on other traits. Our traits are not isolated, independent units, but rather are integrated into a functional whole, so selection on one trait can cause evolution to occur on another trait, sometimes with mildly maladaptive consequences.

  17. UDI STOP Femminicidio

    Directory of Open Access Journals (Sweden)

    Giovanna Crivelli

    2014-04-01

    Full Text Available L'UDI, Unione Donne in Italia, ha collaborato con l'Osservatorio dei Processi Comunicativi a un numero monografico della rivista scientifica M@gm@ dal titolo "Violenza maschile e femminicidio". Il numero monografico vuole mettere a disposizione le analisi, l’esperienza e la storia nostra e delle nostre interlocutrici, come contributo al nostro comune lavoro di sensibilizzazione, contrasto alla violenza maschile sulle donne – femminicidio. “UDI STOP femminicidio” è da anni la nostra campagna contro la violenza di genere, la collaborazione con l’Osservatorio dei Processi Comunicativi è parte integrante di questo sforzo. Il primo e dichiarato dei nostri progetti politici è il contrasto alla cultura e al potere ideologico che consente il femminicidio, la subordinazione culturale e sociale, la percezione della donna come oggetto di dominio, la riduzione in schiavitù di tante donne, comprese molte donne prostitute... Sappiamo di non voler tradire una “responsabilità di genere” che deve necessariamente concretizzarsi in tanti “gesti responsabili”, nella lunga pazienza quotidiana che consente la sedimentazione di un cambiamento radicale nelle coscienze. Vogliamo continuare ad essere l’associazione che coniuga insieme la soggettività personale e l'assunzione diretta di responsabilità, della progettualità a lungo termine che non trova “contraddittorio” misurarsi con la solidarietà concreta e quotidiana con le altre donne, nel tentativo di far nascere le nuove maniere di pensare.

  18. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  19. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  20. Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain

    Science.gov (United States)

    Tallón, María Luisa García

    Financial fraud usually goes hand in hand with the complex problem of identity theft in financial transactions. The experience gained in the Complaints Department through the presented cases and queries includes: Traditional falsifications in traditional financial transactions.

  1. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  2. 2013 Vehicle Theft Prevention Quick Reference Guide for the Law Enforcement Community

    Science.gov (United States)

    2013-08-01

    "This and future versions of the Vehicle TheftPrevention Quick Reference Guide for the Law Enforcement Community will provide comprehensive information for vehicle lines. The parts-marking requirements have been : extended to include: : all passe...

  3. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  4. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  5. Nitrogen Research Programme STOP

    International Nuclear Information System (INIS)

    Erisman, J.W.; Van der Eerden, L.

    2000-01-01

    Nitrogen pollution is one of the main threats to the environment now in the Netherlands as well as other parts of Europe. In order to address the main gaps on the issues of nitrogen pollution related to the local scale, the Ministries of Housing, Physical Planning and Environment (VROM) and of Agriculture, Nature Management and Fisheries (LNV) have initiated a research programme, the Dutch Nitrogen Research Programme (STOP), which aims to provide a scientific basis to develop and implement policy on a local scale for the realisation and conservation of the EHS ('Dutch Mainframe of Natural Landscapes'). The results of the programme show that the description of emissions from manure in the field is difficult to describe and show large uncertainties. On the contrary, emissions from housings could be modelled well, if local actual data were available. The OPS model to describe the dispersion and deposition was evaluated with the measurements and the limitations were quantified. It appears that the model works well on the long term, whereas on the short term (hours) and short distance (tenths of meters) there is large uncertainty, especially in complex terrain. Critical loads for nitrogen for ecosystems were evaluated. Furthermore, the effect of management options was quantified. A method to determine critical loads as a function of soil conditions, such as acidification and water availability was derived. This resulted in a combination of the soil model SMART and the so-called 'nature planner' (Natuurplanner). It was concluded that the combination of SMART, the nature planner and OPS provide a good tool to develop and support policy on the local scale. 4 refs

  6. RESTORATIVE JUSTICE AS AN ALTERNATIVE CRIMINAL DISPUTE RESOLUTION FOR THE OFFENCE OF THEFT

    OpenAIRE

    Ab Aziz, Norjihan; Mohamad Amin, Noorshuhadawati; Ab Hamid, Zuraini

    2017-01-01

    Under thetraditional justice system, theft is an offence against a state. Once theoffender is found guilty by the court, he will be punished accordingly. InMalaysia, the Penal Code provides punishment for an offence of theft withimprisonment for a term not exceeding 7 years, or fine or with both. The aim isto punish the offender for the offence that he had committed, while the victimhas no place in the process. However, restorative justice sees a crime isagainst an individual which allows the...

  7. Corporate Role in Protecting Consumers from the Risk of Identity Theft

    OpenAIRE

    Syed (Shawon) M. Rahman; Omondi John Opala

    2013-01-01

    The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations. The paper highlights the inc...

  8. LHC Availability 2017: Technical Stop 1 to Technical Stop 2

    CERN Document Server

    Todd, Benjamin; Apollonio, Andrea; Walsh, David John; CERN. Geneva. ATS Department

    2017-01-01

    This document summarises the LHC machine availability for the period of Technical Stop 1 (TS1) to Technical Stop 2 (TS2) in 2017. This period was dedicated to proton physics with a bunch spacing of 25ns. This note has been produced and ratified by the Availability Working Group which has complied fault information for the period in question using the Accelerator Fault Tracker.

  9. Electromagnetic Devices for Stopping Vehicles

    Directory of Open Access Journals (Sweden)

    Jan Valouch

    2016-10-01

    Full Text Available An effective way to stop a vehicle is to disrupt the operation of electronic systems using high power electromagnetic pulses, which can be generated using electromagnetic weapons. This article describes the design idea of a stationary generator of electromagnetic pulses that would be useful for stopping vehicles at the entrances to the object, at checkpoints, and in front of sensitive infrastructure. An important aspect of the proposal is the comparison of contemporary devices and systems used for stopping vehicles and analysis of the requirements of technical standards for electromagnetic immunity of vehicles.

  10. Connected Car: Quantified Self becomes Quantified Car

    Directory of Open Access Journals (Sweden)

    Melanie Swan

    2015-02-01

    Full Text Available The automotive industry could be facing a situation of profound change and opportunity in the coming decades. There are a number of influencing factors such as increasing urban and aging populations, self-driving cars, 3D parts printing, energy innovation, and new models of transportation service delivery (Zipcar, Uber. The connected car means that vehicles are now part of the connected world, continuously Internet-connected, generating and transmitting data, which on the one hand can be helpfully integrated into applications, like real-time traffic alerts broadcast to smartwatches, but also raises security and privacy concerns. This paper explores the automotive connected world, and describes five killer QS (Quantified Self-auto sensor applications that link quantified-self sensors (sensors that measure the personal biometrics of individuals like heart rate and automotive sensors (sensors that measure driver and passenger biometrics or quantitative automotive performance metrics like speed and braking activity. The applications are fatigue detection, real-time assistance for parking and accidents, anger management and stress reduction, keyless authentication and digital identity verification, and DIY diagnostics. These kinds of applications help to demonstrate the benefit of connected world data streams in the automotive industry and beyond where, more fundamentally for human progress, the automation of both physical and now cognitive tasks is underway.

  11. Car use within the household

    DEFF Research Database (Denmark)

    de Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    2013-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate—for each car owned by the household—own and cross-price effects...... of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, we estimate fuel price elasticities of –0.81 and -0.65 for the primary and secondary cars...... efficient car, finding partial support for the underlying hypothesis. More importantly, the results of this extended model emphasize the importance of behavioural differences related to the position of the most fuel efficient car in the household, suggesting that households’ fuel efficiency choices...

  12. Health Education: Smoke Stop Programming.

    Science.gov (United States)

    Johnson, Ray

    The author examines the traditional emphasis of health educators in preventive approaches to smoking behavior and suggests (through a brief literature review) specific techniques that may be useful in aiding those who would stop smoking. (MJB)

  13. A whistle-stop tour of statistics

    National Research Council Canada - National Science Library

    Everitt, Brian

    2012-01-01

    "Preface according to my Penguin English dictionary, whistle-stop, used before a noun means 'consisting of brief stops in several places' and this whistle-stop tour of statistics does just that, with...

  14. Electromagnetic Devices for Stopping Vehicles

    OpenAIRE

    Jan Valouch

    2016-01-01

    An effective way to stop a vehicle is to disrupt the operation of electronic systems using high power electromagnetic pulses, which can be generated using electromagnetic weapons. This article describes the design idea of a stationary generator of electromagnetic pulses that would be useful for stopping vehicles at the entrances to the object, at checkpoints, and in front of sensitive infrastructure. An important aspect of the proposal is the comparison of contemporary devices and systems use...

  15. Sweet Spots and Door Stops

    Science.gov (United States)

    Thompson, Michael; Tsui, Stella; Leung, Chi Fan

    2011-01-01

    A sweet spot is referred to in sport as the perfect place to strike a ball with a racquet or bat. It is the point of contact between bat and ball where maximum results can be produced with minimal effort from the hand of the player. Similar physics can be applied to the less inspiring examples of door stops; the perfect position of a door stop is…

  16. A theoretical and practical test of geographical profiling with serial vehicle theft in a U.K. context.

    Science.gov (United States)

    Tonkin, Matthew; Woodhams, Jessica; Bond, John W; Loe, Trudy

    2010-01-01

    Geographical profiling is an investigative methodology sometimes employed by the police to predict the residence of an unknown offender from the locations of his/her crimes. The validity of geographical profiling, however, has not been fully explored for certain crime types. This study, therefore, presents a preliminary test of the potential for geographical profiling with a sample of 145 serial vehicle thieves from the U.K. The behavioural assumptions underlying geographical profiling (distance decay and domocentricity) are tested and a simple practical test of profiling using the spatial mean is presented. There is evidence for distance decay but not domocentricity among the spatial behaviour of car thieves from the U.K. A degree of success was achieved when applying the spatial mean on a case-by-case basis. The level of success varied, however, and neither series length in days nor number of crimes could account for the variation. The findings question previously held assumptions regarding geographical profiling and have potential theoretical and practical implications for the study and investigation of vehicle theft in the U.K. 2009 John Wiley & Sons, Ltd.

  17. Divorce your car: ending the love affair with the automobile

    Energy Technology Data Exchange (ETDEWEB)

    Alvord, K.

    2000-07-01

    This book is a guide for people wishing to liberate themselves from their addiction to cars and the automobile culture. It is a repository of examples and actions that individuals and communities can take to reduce dependence on the automobile. The range of possibilities run from using cars less to not owning one at all. The book provides a humorous yet clear-headed approach to a greener world and maps out the road to how people can live happily ever after by breaking free of 'auto-cracy', without insisting on people in car-dependent countries quit their automotive addiction instantly. Nevertheless, it clearly articulates the connection between automobiles, their arteries (i.e. highways) and effluents (i.e. greenhouse gases and particulate emissions), and the increasing number and severity of natural disasters between the urban renewal and freeway construction that, in the author's view, helped ignite the riots in Watts, Newark and Detroit. The disastrous societal and geophysical effects of the automobile are demonstrated in great abundance, and the mountain of evidence of the systematic abuse of the planet that the book provides is a stunning refutation of the notion that technology is neutral. The automobile is accused of being not only the linchpin of Western and primarily American industrialism and resource extraction, it is also accused of being the chief suspect in a century-long theft of time, conviviality and beauty. How to bring about a change in people's love affair with their cars is difficult to comprehend but this author has a multitude of useful suggestions which seem to suggest that it is possible. There is a list of 104 'selected references' and an extensive list of 'other resources'.

  18. Nuclear stopping power of antiprotons

    Science.gov (United States)

    Nordlund, Kai; Sundholm, Dage; Pyykkö, Pekka; Zambrano, Daniel Martinez; Djurabekova, Flyura

    2017-10-01

    The slowing down of energetic ions in materials is determined by the nuclear and electronic stopping powers. Both of these have been studied extensively for ordinary-matter ions. For antiprotons, however, there are numerous studies of the electronic stopping power, but none of the nuclear stopping power. Here, we use quantum-chemical methods to calculate interparticle potentials between antiprotons and different atoms, and derive from these the nuclear stopping power of antiprotons in solids. The results show that the antiproton nuclear stopping powers are much stronger than those of protons, and can also be stronger than the electronic stopping power at the lowest energies. The interparticle potentials are also implemented in a molecular dynamics ion range calculation code, which allows us to simulate antiproton transmission through degrader foil materials. Foil transmission simulations carried out at experimentally relevant conditions show that the choice of antiproton-atom interaction model has a large effect on the predicted yield of antiprotons slowed down to low (a few keV) energies.

  19. Probing Light Stops with Stoponium

    CERN Document Server

    Batell, Brian

    2015-01-01

    We derive new limits on light stops from diboson resonance searches in the $\\gamma\\gamma$, $Z \\gamma$, $ZZ$, $WW$ and $hh$ channels from the first run of the LHC. If the two-body decays of the light stop are mildly suppressed or kinematically forbidden, stoponium bound states will form in $pp$ collisions and subsequently decay via the pair annihilation of the constituent stops to diboson final states, yielding striking resonance signatures. Remarkably, we find that stoponium searches are highly complementary to direct collider searches and indirect probes of light stops such as Higgs coupling measurements. Using an empirical quarkonia potential model and including the first two $S$-wave stoponium states, we find that in the decoupling limit $m_{\\widetilde t_1} \\lesssim 130$ GeV is excluded for any value of the stop mixing angle and heavy stop mass by the combination of the latest resonance searches and the indirect constraints. The $\\gamma \\gamma$ searches are the most complementary to the indirect constraint...

  20. Modeling the Mousetrap Car

    Science.gov (United States)

    Jumper, William D.

    2012-01-01

    Many high school and introductory college physics courses make use of mousetrap car projects and competitions as a way of providing an engaging hands-on learning experience incorporating Newton's laws, conversion of potential to kinetic energy, dissipative forces, and rotational mechanics. Presented here is a simple analytical and finite element…

  1. The market for gasoline cars and diesel cars

    International Nuclear Information System (INIS)

    Verboven, F.

    1999-01-01

    In Europe the tax tariff is much lower for diesel fuel than for gasoline. This benefit is used by manufacturers to increase the price of diesel-fueled cars, which limits the possibility to control the use of diesel cars by means of a fiscal policy (tax incidence). Attention is paid to the impact of fiscal advantages for diesel cars on the purchasing behavior of the consumer and the pricing policy (price discrimination) of the car manufacturers. 1 ref

  2. Second stop and sbottom searches with a stealth stop

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Hsin-Chia; Li, Lingfeng; Qin, Qin [Department of Physics, University of California,Davis, California 95616 (United States)

    2016-11-29

    The top squarks (stops) may be the most wanted particles after the Higgs boson discovery. The searches for the lightest stop have put strong constraints on its mass. However, there is still a search gap in the low mass region if the spectrum of the stop and the lightest neutralino is compressed. In that case, it may be easier to look for the second stop since naturalness requires both stops to be close to the weak scale. The current experimental searches for the second stop are based on the simplified model approach with the decay modes t̃{sub 2}→t̃{sub 1}Z and t̃{sub 2}→t̃{sub 1}h. However, in a realistic supersymmetric spectrum there is always a sbottom lighter than the second stop, hence the decay patterns are usually more complicated than the simplified model assumptions. In particular, there are often large branching ratios of the decays t̃{sub 2}→b̃{sub 1}W and b̃{sub 1}→t̃{sub 1}W as long as they are open. The decay chains can be even more complex if there are intermediate states of additional charginos and neutralinos in the decays. By studying several MSSM benchmark models at the 14 TeV LHC, we point out the importance of the multi-W final states in the second stop and the sbottom searches, such as the same-sign dilepton and multilepton signals, aside from the traditional search modes. The observed same-sign dilepton excesses at LHC Run 1 and Run 2 may be explained by some of our benchmark models. We also suggest that the vector boson tagging and a new kinematic variable may help to suppress the backgrounds and increase the signal significance for some search channels. Due to the complex decay patterns and lack of the dominant decay channels, the best reaches likely require a combination of various search channels at the LHC for the second stop and the lightest sbottom.

  3. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  4. Misuse of car safety seats.

    Science.gov (United States)

    Bull, M J; Stroup, K B; Gerhart, S

    1988-01-01

    Correct use of car seats for small children is essential to prevent serious injuries and death from automotive accidents. Failure to use a car seat properly can contribute to serious injury or death of a child. A case study in which misuse of a car seat occurred is reported. The infant died of hemorrhage and shock secondary to liver laceration which resulted from excessive pressure over the abdomen sustained on impact. Surveys of car seat use for small children prior to and following a child restraint law are also reported. Observers noted types of car seats and specific forms of misuse. Survey results suggest that parents are more likely to misuse car seats for infants than toddlers. Medical professionals can reinforce the importance of proper car seat use by incorporating specific car seat use questions into the patient interview and by providing educational materials.

  5. The CERN car stickers for 2008 are now available

    CERN Multimedia

    2007-01-01

    All members of the personnel holding a valid contract (except owners of cars with green or CD plates) can come to the Registration Service (building 55, 1st floor) to obtain their 2008 car sticker, Mondays to Fridays from 7.30 a.m. to 4.00 p.m. non-stop. Please ensure you bring with you the following documents: the 2007 sticker for the vehicle in question, the "carte grise" registration paper of the vehicle in question (photocopies accepted). If you only wish to register one vehicle, you can obtain the 2008 sticker using the request form on the Web.NB: This notice only applies to members of the personnel who obtained one or several blue car stickers for 2007. Reception and Access Control Service – TS/FM

  6. Voltage Sag Compensator for CAR and SOR of HANARO

    International Nuclear Information System (INIS)

    Kim, Hyung-Kyoo; Jung, Hoan-Sung; Wu, Jong-Sup

    2007-01-01

    HANARO is designed so as to be tripped automatically by insertion of control absorber rods(CAR) and shut-off rods(SOR) and the process systems, such as primary cooling system, secondary cooling system and reflector cooling system, etc., stop whenever the off-site power failure occurs, the reactor trips automatically. When voltage sag or momentary interruption occurs, the process systems are in operation but the reactor has an unwanted trip by insertion of CARs and SORs. We installed the voltage sag compensator on the power supply for CARs and SORs so as to prevent a nuisance trip. The compensated time is decided not to exceed 1 sec in consideration of reactor safety. This paper is concerned with the impact of the momentary interruption on the reactor and the effect of the voltage sag compensator

  7. Our Car as Power Plant

    NARCIS (Netherlands)

    van Wijk, A.J.M.; Verhoef, L.A.

    2014-01-01

    Fuel cell cars can provide more efficient and cleaner transportation. However, we use our cars for transportation only 5% of the time. When parked, the fuel cell in the car can produce electricity from hydrogen, which is cleaner and more efficient than the current electricity system, generating

  8. DOES ELECTRIC CAR PRODUCE EMISSIONS?

    Directory of Open Access Journals (Sweden)

    Vladimír RIEVAJ

    2017-03-01

    Full Text Available This article focuses on the comparison of the amount of emissions produced by vehicles with a combustion engine and electric cars. The comparison, which is based on the LCA factor results, indicates that an electric car produces more emissions than a vehicle with combustion engine. The implementation of electric cars will lead to an increase in the production of greenhouse gases.

  9. Design optimization for car compatibility

    NARCIS (Netherlands)

    Nastic, T.; Schoofs, A.J.G.; Mooi, H.G.

    1999-01-01

    Nowadays traffic safety and occupant protection get a lot of attention due to the large number of fatalities and injuries in car accidents. The occupant protection in two-vehicle crashes can be improved by car-to-car compatibility, which means well balanced crashworthiness characteristics of both

  10. Compatibility optimization of passenger cars

    NARCIS (Netherlands)

    Nastic, T.; Schoofs, A.J.G.; Mooi, H.G.

    1999-01-01

    Nowadays traffic safety and occupant protection get a lot of attention due to the large number of fatalities and injuries in car accidents. The occupant protection in two-vehicle crashes can be improved by car-to-car compatibility, which means well balanced crashworthiness characteristics of both

  11. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  12. Resource Theft in Tropical Forest Communities: Implications for Non-timber Management, Livelihoods, and Conservation

    Directory of Open Access Journals (Sweden)

    Amy E. Duchelle

    2011-03-01

    Full Text Available Increased devolution of forest ownership and management rights to local control has the potential to promote both conservation and livelihood development in remote tropical regions. Such shifts in property rights, however, can generate conflicts, particularly when combined with rapidly increasing values of forest resources. We explored the phenomenon of Brazil nut (Bertholletia excelsa theft in communities in Western Amazonia. Through interviews with 189 Brazil nut collectors in 12 communities in Bolivia and Brazil and participation in the 2006 and 2007 harvests, we quantified relative income derived from Brazil nuts, reported nut thefts, and nut collection and management practices. We found a much greater incidence of reported Brazil nut thefts in Pando, Bolivia than in the adjacent state of Acre, Brazil. Our analyses suggest that three factors may have affected nut thefts in the forest: (1 contrasts in the timing and process of formally recognizing property rights, (2 different historic settlement patterns, and (3 varying degrees of economic dependence on Brazil nuts. Threat of theft influenced Brazil nut harvest regimes, with potentially long-term implications for forest-based livelihoods, and management and conservation of Brazil nut-rich forests in Western Amazonia.

  13. Space and crime in Dutch built environments : Macro and micro scale spatial conditions for residential burglaries and thefts from cars

    NARCIS (Netherlands)

    Lopez, M.J.J.; Van Nes, A.

    2007-01-01

    At this moment, more knowledge is available on the physical characteristics of the built environment and their relationship to criminal opportunity rather than the spatial characteristics of potential targets and the public and private space between them. To improve this situation, a research

  14. Stopped nucleons in configuration space

    Energy Technology Data Exchange (ETDEWEB)

    Bialas, Andrzej [Jagellonian Univ., Krakow (Poland); Bzdak, Adam [AGH - Univ. of Science and Technology, Krakow (Poland); Koch, Volker [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-05-09

    In this note, using the colour string model, we study the configuration space distribution of stopped nucleons in heavy-ion collisions. We find that the stopped nucleons from the target and the projectile end up separated from each other by the distance increasing with the collision energy. In consequence, for the center of mass energies larger than 6 or 10 GeV (depending on the details of the model) it appears that the system created is not in thermal and chemical equilibrium, and the net baryon density reached is likely not much higher than that already present in the colliding nuclei.

  15. CuseCar--community car-sharing program : car sharing lessons learned.

    Science.gov (United States)

    2011-08-01

    CuseCar of Syracuse launched services in December 2008 with 3 Toyota Prius Hybrids. CuseCar initially, due to : concerns about availability, limited membership to Origination Sponsor Locations, which in turn developed few : members. In 2009 CuseCar o...

  16. Are cars the new tobacco?

    Science.gov (United States)

    Douglas, Margaret J; Watkins, Stephen J; Gorman, Dermot R; Higgins, Martin

    2011-06-01

    Public health must continually respond to new threats reflecting wider societal changes. Ecological public health recognizes the links between human health and global sustainability. We argue that these links are typified by the harms caused by dependence on private cars. We present routine data and literature on the health impacts of private car use; the activities of the 'car lobby' and factors underpinning car dependence. We compare these with experience of tobacco. Private cars cause significant health harm. The impacts include physical inactivity, obesity, death and injury from crashes, cardio-respiratory disease from air pollution, noise, community severance and climate change. The car lobby resists measures that would restrict car use, using tactics similar to the tobacco industry. Decisions about location and design of neighbourhoods have created environments that reinforce and reflect car dependence. Car ownership and use has greatly increased in recent decades and there is little public support for measures that would reduce this. Car dependence is a potent example of an issue that ecological public health should address. The public health community should advocate strongly for effective policies that reduce car use and increase active travel.

  17. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Document Server

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  18. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  19. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  20. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence

    NARCIS (Netherlands)

    van Lier, P.A.C.; Vitaro, F.; Barker, E.D.; Koot, H.M.; Tremblay, R.E.

    2008-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism

  1. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence

    NARCIS (Netherlands)

    van Lier, P.A.C.; Vitaro, F.; Barker, E.D.; Koot, H.M.; Tremblay, R.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism

  2. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  3. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  4. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  5. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT...

  6. Correlated ion stopping in plasmas

    International Nuclear Information System (INIS)

    Zwicknagel, G.; Deutsch, C.

    1997-01-01

    The basic features of correlated ion stopping in plasmas are demonstrated by employing two opposite extremes of cluster structures, a statistical model with a spatial ion distribution of Gaussian shape and the highly regular configuration of N-ion chains and cubic boxes. In the case of the ion chains the resonant character of correlated stopping due to the interference of the excited wake fields is discussed in detail. The general behavior of correlation effects is summarized and its dependence on the ratio of cluster size and interion spacing to the screening length in the plasma, as well as the ratio of the cluster velocity to the mean electron velocity in the target, is stressed out. The validity and applicability of the dielectric response formalism used for describing correlated stopping is critically reviewed. A scheme is presented to extend the linear formalism to weak nonlinear situations that occur, in particular, for small highly charged clusters at moderate or low velocities. For the Gaussian cluster a fit formula is given, which allows a fast and accurate calculation of the enhancement of stopping due to correlation effects and applies for all degrees of degeneracy of the electrons and arbitrary cluster velocities. copyright 1997 The American Physical Society

  7. Stopping Power for Degenerate Electrons

    Energy Technology Data Exchange (ETDEWEB)

    Singleton, Jr., Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-16

    This is a first attempt at calculating the BPS stopping power with electron degeneracy corrections. Section I establishes some notation and basic facts. Section II outlines the basics of the calculation, and in Section III contains some brief notes on how to proceed with the details of the calculation. The remaining work for the calculation starts with Section III.

  8. Stop searches in flavourful supersymmetry

    CERN Document Server

    Crivellin, Andreas; Tunstall, Lewis C.

    2016-01-01

    Natural realisations of supersymmetry require light stops ${\\tilde t}_1$, making them a prime target of LHC searches for physics beyond the Standard Model. Depending on the kinematic region, the main search channels are ${\\tilde t_1}\\to t \\tilde \\chi^0_1$, ${\\tilde t_1}\\to W b \\tilde \\chi^0_1$ and ${\\tilde t_1}\\to c \\tilde \\chi^0_1$. We first examine the interplay of these decay modes with ${\\tilde c_1}\\to c \\tilde \\chi^0_1$ in a model-independent fashion, revealing the existence of large regions in parameter space which are excluded for any ${\\tilde t_1}\\to c \\tilde \\chi^0_1$ branching ratio. This effect is then illustrated for scenarios with stop-scharm mixing in the right-handed sector, where it has previously been observed that the stop mass limits can be significantly weakened for large mixing. Our analysis shows that once the LHC bounds from ${\\tilde c_1}\\to c \\tilde \\chi^0_1$ searches are taken into account, non-zero stop-scharm mixing leads only to a modest increase in the allowed regions of parameter...

  9. In Defence of Thought Stopping

    Science.gov (United States)

    Bakker, Gary Maria

    2009-01-01

    Thought stopping (TS) has a long and established history as an effective mental control technique among the cognitive behavioural therapies (CBT). Recent claims have arisen, particularly from acceptance and mindfulness-based authors, that thought suppression--and therefore TS--is counterproductive. These claims take the syllogistic form: TS is a…

  10. Car monitoring information systems

    Directory of Open Access Journals (Sweden)

    Alica KALAŠOVÁ

    2008-01-01

    Full Text Available The objective of this contribution is to characterize alternatives of information systems used for managing, processing and evaluation of information related to company vehicles. Especially we focus on logging, transferring and processing of on-road vehicle movement information in inland and international transportation. This segment of company information system has to monitor the car movement – actively or passively – according to demand of the company and after the processing it has to evaluate and give the complex monitoring of a situation of all the company vehicles to the controller.

  11. Carboxylic acid reductase enzymes (CARs).

    Science.gov (United States)

    Winkler, Margit

    2018-04-01

    Carboxylate reductases (CARs) are emerging as valuable catalysts for the selective one-step reduction of carboxylic acids to their corresponding aldehydes. The substrate scope of CARs is exceptionally broad and offers potential for their application in diverse synthetic processes. Two major fields of application are the preparation of aldehydes as end products for the flavor and fragrance sector and the integration of CARs in cascade reactions with aldehydes as the key intermediates. The latest applications of CARs are dominated by in vivo cascades and chemo-enzymatic reaction sequences. The challenge to fully exploit product selectivity is discussed. Recent developments in the characterization of CARs are summarized, with a focus on aspects related to the domain architecture and protein sequences of CAR enzymes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Electric Cars and Oil Prices

    OpenAIRE

    Azar, Jose

    2009-01-01

    This paper studies the joint dynamics of oil prices and interest in electric cars, measured as the volume of Google searches for related phrases. Not surprisingly, I find that oil price shocks predict increases in Google searches for electric cars. Much more surprisingly, I also find that an increase in Google searches predicts declines in oil prices. The high level of public interest in electric cars between April and August of 2008 can explain approximately half of the decline in oil prices...

  13. Product declaration for cars

    International Nuclear Information System (INIS)

    Gruetter, J.M.

    2000-01-01

    This reports for the Swiss Federal Office of Energy (SFOE) presents the results of a study made on the possible ways of declaring product information on cars. The basic elements of such a declaration are discussed and a recommendation for an energy label for cars is presented. The report discusses the fundamental questions posed such as how long a label should be valid, if comparisons should be made and if it is to be based on CO 2 -emissions or on fuel consumption. Also, the criteria to be used for comparisons - such as vehicle weight, size or power - are looked at and methods of classification are examined along with data fundamentals. Further, the expectations placed on the product declarations with respect to their energetic and economic impact are discussed. The design of the label and the legislature on which it is based are discussed and initial reactions of the automobile industry are noted. The report is rounded off by a discussion of the effects of the declaration in relation to other instruments that have been proposed

  14. Battery Test Manual For 12 Volt Start/Stop Hybrid Electric Vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Belt, Jeffrey R. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-05-01

    This manual was prepared by and for the United Stated Advanced Battery Consortium (USABC) Electrochemical Energy Storage Team. It is based on the targets established for 12 Volt Start/Stop energy storage development and is similar (with some important changes) to an earlier manual for the former FreedomCAR program. The specific procedures were developed primarily to characterize the performance of energy storage devices relative to the USABC requirements. However, it is anticipated that these procedures will have some utility for characterizing 12 Volt Start/Stop hybrid energy storage device behavior in general.

  15. Proton - Malaysia's national car project

    DEFF Research Database (Denmark)

    Fleming, Daniel; Søborg, Henrik

    2017-01-01

    The rise and development of the Malaysian national car project. How this project has become an esential part of the industrial development in Malaysia and how it has underpinned a growing middle class consumption culture with house and car as it pivotal goods.......The rise and development of the Malaysian national car project. How this project has become an esential part of the industrial development in Malaysia and how it has underpinned a growing middle class consumption culture with house and car as it pivotal goods....

  16. enviroCar - citizen science for sustainable traffic

    Science.gov (United States)

    Stasch, Christoph; Remke, Albert; Jirka, Simon; Nuest, Daniel

    2015-04-01

    Optimizing traffic flow is a challenging task, affecting both the mobility of people and the environment. Up to now, traffic monitoring is based on small samples using GPS devices or remote sensors such as cameras. Citizens are usually not actively involved in the process of collecting or analyzing traffic data. The enviroCar project (www.envirocar.org) aims at addressing this situation by providing an open platform that can be used by everyone to collect and analyze traffic-related data and thus to achieve sustainable traffic management by answering questions such as: How is the average speed on a certain route? Where are exceptionally long waiting times in front of traffic lights? At which crossings do more cars stop than drive through? Where are hotspots of fuel consumption and air pollutant emission during a certain time interval? In this presentation, an overview on the enviroCar project is given and current research challenges addressed in the context of the project are presented. Citizens are able to participate by registering at the enviroCar portal and downloading the enviroCar Android app. Once installed, the Android app allows citizens to collect car sensor data, e.g. speed, mass air flow, or intake temperature via an On-Board Diagnosis 2 (OBD-II) Adapter. After finishing a car ride, the data can be uploaded to the central enviroCar server where the data is anonymized and published as open data. Each enviroCar member has a profile page giving control on his own data and providing statistics on personal driving behavior. The portal also allows comparing personal statistics with the statistics of other members. It thus facilitates analysis whether, for example, a member is driving in a more fuel saving manner than other users. Besides only acting as a data collector, citizens can also explore the enviroCar data in online maps or download the data in standard formats for certain spatial areas and/or time intervals allowing them to conduct spatio

  17. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  18. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... ignition status and the correct key is verified by the ECU. The device's security indicator will provide... device to be placed on the line as standard equipment is likely to be as effective in reducing and... Theft Prevention Standard, based on the installation of an antitheft device as standard equipment for...

  19. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... antitheft device include an engine immobilizer, security controller, gateway function, drive inverter and a... Prevention Standard. This petition is granted, because the agency has determined that the antitheft device to..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  20. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... system malfunction and/or the SKIS device becomes inoperative, the security indicator will stay on... Standard. This petition is granted because the agency has determined that the antitheft device to be placed..., Exemption From Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  1. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... Cooper) respectively. Using an average of 3 MYs data (2006-2008), theft rates for those lines are: 0.0841... device. To ensure reliability and durability of the device, BMW conducted tests based on its own... specified requirements for each test. BMW provided a detailed list of the tests conducted. Based on the...

  2. Identity theft: when bad things happen to your patients' and employees' good name.

    Science.gov (United States)

    Costello, J

    2001-01-01

    What should healthcare facility security directors and administrators do when patients or employees are the victims of identity theft? Taking the right steps to safeguard personal data won't insulate your facility from ever having to deal with this growing crime but, says the author, it will reduce the opportunity and desire for a criminal to steal the data.

  3. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  4. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  5. Environmental risk factors influencing bicycle theft: A spatial analysis in London, UK

    NARCIS (Netherlands)

    Mburu, L; Helbich, M

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific

  6. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ..., casualty, or act of God. 25.282 Section 25.282 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO... From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by... by fire, casualty, or act of God. The tax liability on excessive losses of beer from transfer between...

  7. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ...: This document grants in full the Ford Motor Company's (Ford) petition for an exemption of the Fusion... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... Standard (49 CFR Part 541) for the MY 2012 Ford Fusion vehicle line. The petition requested an exemption...

  8. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... on the line as standard equipment is likely to be as effective in reducing and deterring motor...

  9. The Cultural Phenomenon of Identity Theft and the Domestication of the World Wide Web

    Science.gov (United States)

    Caeton, Daniel A.

    2007-01-01

    Through a critique of the rhetorical configurations of identity theft, this article contributes to the emerging body of theory contending with the social effects of digital information technologies (DIT). It demonstrates how the politics of fear manipulate technosocial matrices in order to derive consent for radical changes such as the…

  10. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  11. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  12. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... Red Flags (a) Risk Factors. A financial institution or creditor should consider the following factors... financial institution or creditor should consider aggravating factors that may heighten the risk of identity... procedures of the financial institution or creditor in addressing the risk of identity theft in connection...

  13. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... risks to customers or to the safety and soundness of the financial institution or creditor from identity theft. II. Identifying Relevant Red Flags (a) Risk Factors. A financial institution or creditor should... financial institution or creditor should consider aggravating factors that may heighten the risk of identity...

  14. 77 FR 72712 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Science.gov (United States)

    2012-12-06

    ... creditor that offers or maintains accounts that are subject to a reasonably foreseeable risk of identity... foreseeable risk to customers or to the safety and soundness of the creditor from identity theft, including... Clarification Act of 2010 (Clarification Act or Act). The interim final rule amends the definition of ``creditor...

  15. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... risks to customers or to the safety and soundness of the financial institution or creditor from identity theft. II. Identifying Relevant Red Flags (a) Risk Factors. A financial institution or creditor should... financial institution or creditor should consider aggravating factors that may heighten the risk of identity...

  16. Car sharing means more travel with less pollution : Eco-efficient services: Stop selling cars; sell kilometres instead

    NARCIS (Netherlands)

    Meijkamp, R.; Van Kasteren, J.

    2000-01-01

    The product, or hardware if you will, still lies at the heart of the production and consumption chain, resulting in a significant environmental impact. Basing design on applied value instead of the product itself can offer substantial ecological advantages. Ir. Rens Meijkamp tested the eco-efficient

  17. Light Stops at Exceptional Points

    Science.gov (United States)

    Goldzak, Tamar; Mailybaev, Alexei A.; Moiseyev, Nimrod

    2018-01-01

    Almost twenty years ago, light was slowed down to less than 10-7 of its vacuum speed in a cloud of ultracold atoms of sodium. Upon a sudden turn-off of the coupling laser, a slow light pulse can be imprinted on cold atoms such that it can be read out and converted into a photon again. In this process, the light is stopped by absorbing it and storing its shape within the atomic ensemble. Alternatively, the light can be stopped at the band edge in photonic-crystal waveguides, where the group speed vanishes. Here, we extend the phenomenon of stopped light to the new field of parity-time (P T ) symmetric systems. We show that zero group speed in P T symmetric optical waveguides can be achieved if the system is prepared at an exceptional point, where two optical modes coalesce. This effect can be tuned for optical pulses in a wide range of frequencies and bandwidths, as we demonstrate in a system of coupled waveguides with gain and loss.

  18. Background free CARS imaging by phase sensitive heterodyne CARS

    NARCIS (Netherlands)

    Jurna, M.; Korterik, Jeroen P.; Otto, Cornelis; Herek, Jennifer Lynn; Offerhaus, Herman L.

    2008-01-01

    In this article we show that heterodyne CARS, based on a controlled and stable phase-preserving chain, can be used to measure amplitude and phase information of molecular vibration modes. The technique is validated by a comparison of the imaginary part of the heterodyne CARS spectrum to the

  19. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... re inclined to bite may help solve the problem. Try to gradually stop biting your nails: Some doctors recommend taking a gradual approach to break the habit. Try to stop biting ...

  20. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... your fingers and from your nails to your face and mouth. To help you stop biting your ... re inclined to bite may help solve the problem. Try to gradually stop biting your nails: Some ...

  1. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Directory of Open Access Journals (Sweden)

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  2. Stopping of Ships Equipped with Azipods

    Directory of Open Access Journals (Sweden)

    Jacek Nowicki

    2014-09-01

    Full Text Available The paper contains a description of different possibilities of stopping a large ship equipped with azipods. The model tests were carried out to compare the effectiveness of stopping the ship using the different methods. The ship model used in stopping tests reproduces a large LNG carrier of capacity ~150 000 m3

  3. Shekgalagari stops and theories of phonological representation ...

    African Journals Online (AJOL)

    The aim of this paper is to present some aspects of stop consonants, e.g. voice onset time (VOT) and F0 perturbation, and also to present phonological theories of stop representation in order to examine matters of Shekgalagari stop production and phonological representation. Of the phonological representation theories ...

  4. Substitution between cars within the household

    NARCIS (Netherlands)

    de Borger, B.; Mulalic, I.; Rouwendal, J.

    2016-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars of different fuel efficiency in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate - for each car owned by the household

  5. Vibrational phase contrast CARS microscopy

    NARCIS (Netherlands)

    Jurna, M.

    2010-01-01

    This thesis describes a new technique that improves specificity, selectivity and sensitivity in coherent anti-Stokes Raman scattering (CARS) microscopy. CARS microscopy is a nonlinear optical technique that utilizes specific bonds of molecules, sometimes referred to as the `fingerprint' of a

  6. Shopping for a safer car

    Science.gov (United States)

    2010-01-01

    This brochure provides some helpful tips on what to look for when shopping for a safer car. Automakers are increasingly advertising the safety features of their cars. The problem is sorting out their claims and zeroing in on the safety features that ...

  7. Energy Use of Passenger Cars

    DEFF Research Database (Denmark)

    Jørgensen, Kaj

    1998-01-01

    Analysis of the Danish sale and stock of passenger cars, focusing particularly on aspects influencing energy use. The project has tracked the development of vehicle weight, power and fuel economy for both the sale of new cars (from 1980 to 1997)and the stock. In addition, the energy use...

  8. Initial heating in cold cars

    NARCIS (Netherlands)

    Daanen, H.A.M.; Teunissen, L.P.J.; Hoogh, I.M. de

    2012-01-01

    During the initial minutes after entering a cold car, people feel uncomfortably cold. Six different warming systems were investigated in a small car in order to find out how to improve the feeling of comfort using 16 volunteers. The methods were: no additional warming next to a standard heating

  9. Panorama 2014 - Car-sharing

    International Nuclear Information System (INIS)

    Vinot, Simon

    2013-10-01

    Car-sharing is a new mode of transportation that consists of multiple users sharing the same vehicle. This type of service is expanding with the arrival of larger players, such as traditional car rental companies, automotive manufacturers, and large firms specializing in transportation. This new mode of transportation offers real potential and is currently finding its users, in France and worldwide. (author)

  10. The attractiveness of car use

    NARCIS (Netherlands)

    Bleijenberg, A.N.

    2012-01-01

    Understanding the driving forces behind car use is necessary for the development of effective transport policies. The high door-to-door speed of the car in comparison with other travel modes forms its main attractiveness. And speed is the main engine for mobility growth, which is not easy to curb.

  11. FUEL PRICES AND CAR SALES

    OpenAIRE

    Vlad Cârstea

    2008-01-01

    Automotive industry is a very important economic sector that is highly responsive to changes in the world economy. The fuel price is the biggest enemy of car manufacturers. This is a compared analysis between Europe and Romania regarding new car registrations.

  12. Reparametrizations with given stop data

    DEFF Research Database (Denmark)

    Raussen, Martin

    that the proof of Proposition 3.7 in [1] iswrong. Fortunately, the statment of that Proposition and the results depending on it stay correct. It is the purpose of this note to provide correct proofs.  [1] U. Fahrenberg and M. Raussen, Reparametrizations of continuous paths, J. Homotopy Relat. Struct. 2 (2007......In [1], we performed a systematic investigation of reparametrizations of continuous paths in a Hausdorff space that relies crucially on a proper understanding of stop data of a (weakly increasing) reparametrization of the unit interval. I am indebted to Marco Grandis (Genova) for pointing out tome...

  13. Reparametrizations with given stop data

    DEFF Research Database (Denmark)

    Raussen, Martin

    2009-01-01

    that the proof of Proposition 3.7 in [1] is wrong. Fortunately, the statement of that proposition and the results depending on it stay correct. It is the purpose of this note to provide correct proofs. [1] U. Fahrenberg and M. Raussen. Reparametrizations of continuous paths. J. Homotopy Relat. Struc. 2 (2007......In [1] we performed a systematic investigation of reparametrizations of continuous paths in a Hausdorff space that relies crucially on a proper understanding of stop data of a (weakly increasing) reprametrizations of the unit interval. I am grateful to Marco Grandis (Genova) for pointing out to me...

  14. 49 CFR 172.330 - Tank cars and multi-unit tank car tanks.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Tank cars and multi-unit tank car tanks. 172.330..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.330 Tank cars and multi-unit tank car tanks. (a... material— (1) In a tank car unless the following conditions are met: (i) The tank car must be marked on...

  15. 49 CFR 1247.1 - Annual Report of Cars Loaded and Cars Terminated.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Annual Report of Cars Loaded and Cars Terminated... TRANSPORTATION BOARD, DEPARTMENT OF TRANSPORTATION (CONTINUED) ACCOUNTS, RECORDS AND REPORTS REPORT OF CARS LOADED AND CARS TERMINATED § 1247.1 Annual Report of Cars Loaded and Cars Terminated. Beginning with the...

  16. MODEL CAR TRANSPORT SYSTEM - MODERN ITS EDUCATION TOOL

    Directory of Open Access Journals (Sweden)

    Karel Bouchner

    2017-12-01

    Full Text Available The model car transport system is a laboratory intended for a practical development in the area of the motor traffic. It is also an important education tool for students’ hands-on training, enabling students to test the results of their own studies. The main part of the model car transportation network is a model in a ratio 1:87 (HO, based on component units of FALLER Car system, e.g. cars, traffic lights, carriage way, parking spaces, stop sections, branch-off junctions, sensors and control sections. The model enables to simulate real traffic situations. It includes a motor traffic in a city, in a small village, on a carriageway between a city and a village including a railway crossing. The traffic infrastructure includes different kinds of intersections, such as T-junctions, a classic four-way crossroad and four-way traffic circle, with and without traffic lights control. Another important part of the model is a segment of a highway which includes an elevated crossing with highway approaches and exits.

  17. AAP Updates Recommendations on Car Seats

    Science.gov (United States)

    ... Size Email Print Share AAP Updates Recommendations on Car Seats Page Content Article Body Children should ride ... of approved car safety seats. Healthy Children Radio: Car Seat Safety Dennis Durbin, MD, FAAP, lead author ...

  18. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  19. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  20. Advanced Infant Car Seat Would Increase Highway Safety

    Science.gov (United States)

    Dabney, Richard; Elrod, Susan

    2004-01-01

    An advanced infant car seat has been proposed to increase highway safety by reducing the incidence of crying, fussy behavior, and other child-related distractions that divert an adult driver s attention from driving. In addition to a conventional infant car seat with safety restraints, the proposed advanced infant car seat would include a number of components and subsystems that would function together as a comprehensive infant-care system that would keep its occupant safe, comfortable, and entertained, and would enable the driver to monitor the baby without having to either stop the car or turn around to face the infant during driving. The system would include a vibrator with bulb switch to operate; the switch would double as a squeeze toy that would make its own specific sound. A music subsystem would include loudspeakers built into the seat plus digital and analog circuitry that would utilize plug-in memory modules to synthesize music or a variety of other sounds. The music subsystem would include a built-in sound generator that could synthesize white noise or a human heartbeat to calm the baby to sleep. A second bulb switch could be used to control the music subsystem and would double as a squeeze toy that would make a distinct sound. An anti-noise sound-suppression system would isolate the baby from potentially disturbing ambient external noises. This subsystem would include small microphones, placed near the baby s ears, to detect ambient noise. The outputs of the microphone would be amplified and fed to the loudspeakers at appropriate amplitude and in a phase opposite that of the detected ambient noise, such that the net ambient sound arriving at the baby s ears would be almost completely cancelled. A video-camera subsystem would enable the driver to monitor the baby visually while continuing to face forward. One or more portable miniature video cameras could be embedded in the side of the infant car seat (see figure) or in a flip-down handle. The outputs of

  1. Nanobody Based Dual Specific CARs

    Directory of Open Access Journals (Sweden)

    Stijn De Munter

    2018-01-01

    Full Text Available Recent clinical trials have shown that adoptive chimeric antigen receptor (CAR T cell therapy is a very potent and possibly curative option in the treatment of B cell leukemias and lymphomas. However, targeting a single antigen may not be sufficient, and relapse due to the emergence of antigen negative leukemic cells may occur. A potential strategy to counter the outgrowth of antigen escape variants is to broaden the specificity of the CAR by incorporation of multiple antigen recognition domains in tandem. As a proof of concept, we here describe a bispecific CAR in which the single chain variable fragment (scFv is replaced by a tandem of two single-antibody domains or nanobodies (nanoCAR. High membrane nanoCAR expression levels are observed in retrovirally transduced T cells. NanoCARs specific for CD20 and HER2 induce T cell activation, cytokine production and tumor lysis upon incubation with transgenic Jurkat cells expressing either antigen or both antigens simultaneously. The use of nanobody technology allows for the production of compact CARs with dual specificity and predefined affinity.

  2. Nanobody Based Dual Specific CARs.

    Science.gov (United States)

    De Munter, Stijn; Ingels, Joline; Goetgeluk, Glenn; Bonte, Sarah; Pille, Melissa; Weening, Karin; Kerre, Tessa; Abken, Hinrich; Vandekerckhove, Bart

    2018-01-30

    Recent clinical trials have shown that adoptive chimeric antigen receptor (CAR) T cell therapy is a very potent and possibly curative option in the treatment of B cell leukemias and lymphomas. However, targeting a single antigen may not be sufficient, and relapse due to the emergence of antigen negative leukemic cells may occur. A potential strategy to counter the outgrowth of antigen escape variants is to broaden the specificity of the CAR by incorporation of multiple antigen recognition domains in tandem. As a proof of concept, we here describe a bispecific CAR in which the single chain variable fragment (scFv) is replaced by a tandem of two single-antibody domains or nanobodies (nanoCAR). High membrane nanoCAR expression levels are observed in retrovirally transduced T cells. NanoCARs specific for CD20 and HER2 induce T cell activation, cytokine production and tumor lysis upon incubation with transgenic Jurkat cells expressing either antigen or both antigens simultaneously. The use of nanobody technology allows for the production of compact CARs with dual specificity and predefined affinity.

  3. CERN CAR STICKERS

    CERN Multimedia

    Service Accueil et Controle d'Accès; ST Division

    1999-01-01

    In accordance with Operational Circular n¡ 2, paragraph 21, CERN car stickers are to be renewed. The new stickers are now available and will be valid for a year.Youare therefore requested:either to obtain them from the distribution points for new stickers (see below); or to send us the application form below, duly completed, via the internal mail; or to complete the application form directly via the Web at the address: http://cern.ch/registration-stickers. Each vehicle has to carry a sticker and needs a separate application form.Vehicles bearing CERN diplomatic plates (CD07, 431K and CD series) do not need a sticker for access to the CERN areas.Thank you.List of distribution points:Registration Service (bldg 55 1st floor), open from 07h30 to 16h30. Building 33 (entrance hall), open from 08h00 to 18h00. Building 120 (ground floor), outside working hours.Name Surname CERN identification number Vehicle registration plates Country issuing the plates Vehicle ma...

  4. CERN CAR CLUB

    CERN Multimedia

    Automobile club

    2009-01-01

    You are cordially invited to the next General Assembly of the CERN Car Club Tuesday 12 January 2010 at 5:45pm Bldg. 593 / room 11 As the end of 2009 is approaching, it is time to think about renewing your subscription. Therefore next time you are on the CERN-Meyrin site or at the Post Office counter don’t forget to fill in the payment slip to continue to be a part of our large family. The fee remains unchanged: 50 CHF. For those of you who are regular users of our equipment and who know of all the advantages that the club is in a position to offer, it seems pointless to give details, we are sure that many of you have made use of them and are satisfied. We remind you everyone working on CERN site is entitled to become a member of our club, this includes industrial support personnel and staff of companies which have a contract with CERN. If you are not yet a member, come and visit us! We will be happy to welcome you and show you the facilities, or you can visit our web site. The use of the club&...

  5. IMPROVEMENT OF THE SUPPORTING STRUCTURE OF PLATFORM CAR FOR HIGHER EFFICIENCY OF CONTAINER TRANSPORTATIONS

    Directory of Open Access Journals (Sweden)

    A. O. Lovska

    2017-02-01

    Full Text Available Purpose. The article is aimed to improve supporting structures of the platform car to increase the efficiency of container transportations. Methodology. In order to achieve the objective, the strength investigations of the universal platform car of the model 13-401 were conducted, strength reserves of the supporting elements were defined, and more optimal profiles of basic longitudinal beams of the frame in terms of the minimum material capacity were proposed. Decision correctness was confirmed by the strength calculation of the platform car supporting structure at basic loading operational modes and fatigue taking into account the research database of 107 cycles. It has been proposed to equip a platform car with swing fitting stops for fastening containers on the frame, which allows transportation of 20ft and 40ft containers. In order to improve container transportation efficiency along international transport corridors running through Ukraine, a platform car of articulated type has been designed on the base of the improved platform car structure. The mathematical simulation of dynamic loads of the platform car with containers (two 1CC containers at operational loading modes has been carried out, the maximum accelerations influencing the support structure have been defined, and their multiple values have been considered in computer simulation of the strength of the platform car of articulated type. Findings. The support structure of the platform car of articulated type on the basis of the standard platform car has been developed. Refined values of dynamic loads influencing supporting structure the platform car of articulated type with containers at operational loading modes have been obtained; the maximum equivalent stresses in the platform car support structure have been defined. Originality and practical value. A mathematical model of displacements for a platform car of articulated type with containers at operational loading modes of

  6. Dwelling on Everyday Car Journeys

    DEFF Research Database (Denmark)

    Tølbøll, Lene; Jensen, Hanne Louise

    different traffic conditions as well as the emotional states related to the drivers’ thoughts about work and family issues, the materiality of the car and the recreational activities inside the car. Analyses are based on a web-based questionnaire, sent to 373 participating drivers in the Big Data research...... experiences related to commuting. The findings will be discussed using theoretical inspiration from Sheller (2004), Bull (2003) and Thrift (2004) and we will suggest that the various emotional experiences of the commuters are of great importance for their ability to use of the car as a dwelling place....

  7. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  8. GameStop-kanta-asiakkuus

    OpenAIRE

    Arefi, Shahriar; Lehikoinen, Jami

    2012-01-01

    Tämän opinnäytetyön tarkoituksena oli kartoittaa ja kehittää GameStop Finland yhtiön uutta Euroopassa vuoden 2011 lopussa lanseerattua kanta-asiakaskorttia nimeltään PowerTrade. Työssä kerrotaan hieman taustaa GameStopista yhtiönä, kuinka se on saavuttanut pelialan isoimman jälleenmyyjän nimikkeen ja kuinka GameStopin PowerTrade-kortti eroaa Yhdysvaltojen GameStopin kanta-asiakkuuskortista PowerUp:sta. Työssä myös verrataan korttia Suomen isoimpien kauppojen bonuskortteihin. Työssä kerrot...

  9. Engineering CAR-T cells.

    Science.gov (United States)

    Zhang, Cheng; Liu, Jun; Zhong, Jiang F; Zhang, Xi

    2017-01-01

    Chimeric antigen receptor redirected T cells (CAR-T cells) have achieved inspiring outcomes in patients with B cell malignancies, and are now being investigated in other hematologic malignancies and solid tumors. CAR-T cells are generated by the T cells from patients' or donors' blood. After the T cells are expanded and genetically modified, they are reinfused into the patients. However, many challenges still need to be resolved in order for this technology to gain widespread adoption. In this review, we first discuss the structure and evolution of chimeric antigen receptors. We then report on the tools used for production of CAR-T cells. Finally, we address the challenges posed by CAR-T cells.

  10. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  11. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  12. Light stop squarks and b-tagging

    CERN Document Server

    Ferretti, Gabriele; Petersson, Christoffer; Torre, Riccardo

    2015-01-01

    A significant part of the parameter space for light stop squarks still remains unconstrained by collider searches. For both R-Parity Conserving (RPC) and R-Parity Violating (RPV) scenarios there are regions in which the stop mass is around or below the top quark mass that are particularly challenging experimentally. Here we review the status of light stop searches, both in RPC and RPV scenarios. We also propose strategies, generally based on exploiting b-tagging, to cover the unconstrained regions.

  13. 49 CFR 1037.2 - Cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Cars. 1037.2 Section 1037.2 Transportation Other... GENERAL RULES AND REGULATIONS BULK GRAIN AND GRAIN PRODUCTS-LOSS AND DAMAGE CLAIMS § 1037.2 Cars. A car is... railroad-leased cars. [57 FR 54334, Nov. 18, 1992] ...

  14. 49 CFR 231.6 - Flat cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Flat cars. 231.6 Section 231.6 Transportation... TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.6 Flat cars. (Cars with sides 12 inches or less above the floor may be equipped the same as flat cars.) (a) Hand brakes—(1) Number. Same as specified for...

  15. 49 CFR 174.615 - Cleaning cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cleaning cars. 174.615 Section 174.615... Requirements for Division 6.1 (Poisonous) Materials § 174.615 Cleaning cars. (a) [Reserved] (b) After Division 6.1 (poisonous) materials are unloaded from a rail car, that car must be thoroughly cleaned unless...

  16. 49 CFR 215.203 - Restricted cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Restricted cars. 215.203 Section 215.203..., DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Restricted Equipment § 215.203 Restricted cars. (a) This section restricts the operation of any railroad freight car that is— (1) More than 50...

  17. Art Cars: Transformations of the Mundane

    Science.gov (United States)

    Stienecker, Dawn

    2010-01-01

    The automobile itself is often understood as an extension of oneself, where individuals may manipulate the interior and exterior of cars and trucks, decorating them through detailing, stickers, custom colors, and so on. Others go further and change their cars into unique works of art called art cars. Such cars break away from the banality of mass…

  18. Stop cars: “Recuperación de un derecho ciudadano”

    OpenAIRE

    Vélez Ganda, Nuria

    2016-01-01

    Durante el siglo XX, hemos pasado de ser una sociedad activa que disfrutaba de la ciudad a medida que recorría sus calles, a ser una sociedad motorizada cuyo interés principal es transportarse de un punto A a un punto B en el menor tiempo posible. En este siglo XXI, la concepción del espacio urbano y de la vida cotidiana se encuentra en un movimiento de rechazo de esta ideología anterior. Ya no nos interesan esas ciudades funcionales diseñadas solamente para los vehículos y un movimiento d...

  19. The Thief With a Thousand Faces and the Victim With None: Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory.

    Science.gov (United States)

    Reyns, Bradford W; Henson, Billy

    2016-08-01

    Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims' online routine activities and their online identity theft victimization. It was found that certain routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed. © The Author(s) 2015.

  20. Reducing the threat of nuclear theft and sabotage

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    of the stockpiles of such materials (through measures such as using these materials as fuel, blending down highly enriched uranium, or immobilizing plutonium); Reconsider the design basis threat used in designing and analyzing security systems, in the light of the magnitude of the threat demonstrated on September II; Provide greatly increased international training in security for nuclear materials and facilities - including emphasizing the crucial role of such security in preventing the spread of nuclear weapons and stopping nuclear terrorism. This paper analyzes each of these areas and provides recommendations for specific steps that should be taken toward the goal of a world in which all weapons-usable nuclear material is secure and accounted for, and all nuclear facilities secured from sabotage, with sufficient transparency that the international community can have confidence that this is the case. Over the long term, the paper concludes, the goal should be to attempt to come as close as possible to the 'stored weapon standard' proposed by a committee of the U.S. National Academy of Sciences in 1994 - that is to say, to protect and account for weapons-usable nuclear materials as rigorously as the nuclear weapon states protect and account for nuclear weapons themselves. The road to that objective is a long one, however

  1. Stopping atoms with diode lasers

    International Nuclear Information System (INIS)

    Watts, R.N.; Wieman, C.E.

    1986-01-01

    The use of light pressure to cool and stop neutral atoms has been an area of considerable interest recently. Cooled neutral atoms are needed for a variety of interesting experiments involving neutral atom traps and ultrahigh-resolution spectroscopy. Laser cooling of sodium has previously been demonstrated using elegant but quite elaborate apparatus. These techniques employed stabilized dye lasers and a variety of additional sophisticated hardware. The authors have demonstrated that a frequency chirp technique can be implemented using inexpensive diode lasers and simple electronics. In this technique the atoms in an atomic beam scatter resonant photons from a counterpropagating laser beam. The momentum transfer from the photons slows the atoms. The primary difficulty is that as the atoms slow their Doppler shift changes, and so they are no longer in resonance with the incident photons. In the frequency chirp technique this is solved by rapidly changing the laser frequency so that the atoms remain in resonance. To achieve the necessary frequency sweep with a dye laser one must use an extremely sophisticated high-speed electrooptic modulator. With a diode laser, however, the frequency can be smoothly and rapidly varied over many gigahertz simply by changing the injection current

  2. Design review of gondola car

    Directory of Open Access Journals (Sweden)

    S. V. Myamlin

    2014-12-01

    Full Text Available Purpose. To ensure the constantly growing volume of freight transportations it is necessary to introduce the innovation rolling stock. It should have the best technical and economic parameters in comparison with the existing fleet. Gondola car is the most popular type of railway freight car. Designs of the modern gondolas are based on many years of operating experience and numerous tests carried out by design and research organizations in the field of car building. To improve the body structure of gondolas it is necessary to perform a review of the existing structures and to identify the trends in their improvement. Methodology. The works on improvement the designs of produced gondolas are held by many engineering organizations in almost all industrialized countries. Analysis of the existing body designs of gondola cars is possible by analyzing the research in the field of transport engineering, namely patents, scientific articles, producers catalogues and so on. Findings. When analyzing it was determined that there are gondolas of different designs, but the most common are the gondolas with a solid floor and unloading hatches, the covers of which form the floor of gondola design. An effective method for reducing the gondola empty weight and increasing the body volume is also the use of aluminum alloy instead of steel. Results of the improvement analysis of the gondola bodies` designs showed that the creation of the modern gondola car requires from designers and scientists the implementation of scientific and technical solutions providing the increase of carrying capacity and the body volume, reduction of the gondolas empty weight, increase in repair intervals while improving the strength and dynamic qualities at the same time. Originality. For the first time the gondolas designs were analyzed, their advantages and disadvantages were considered and the trends in improvement of the given structures of gondola cars were determined. Practical value

  3. Addressing production stops in the food industry

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Herbert, Luke Thomas; Jacobsen, Peter

    2014-01-01

    This paper investigates the challenges in the food industry which causes the production lines to stop, illustrated by a case study of an SME size company in the baked goods sector in Denmark. The paper proposes key elements this sector needs to be aware of to effectively address production stops......, and gives examples of the unique challenges faced by the SME food industry....

  4. Stop the Violence: Overcoming Self-Destruction.

    Science.gov (United States)

    George, Nelson, Ed.

    The story of the Stop the Violence movement among rap music artists and music industry colleagues is told, along with the story of a video that was produced as part of this initiative. The Stop the Violence project grew out of the reaction to violence among concert goers at a 1987 rap concert on Long Island (New York). Rap musicians have joined…

  5. Seatbelts in CAR therapy: How Safe Are CARS?

    Directory of Open Access Journals (Sweden)

    Kentaro Minagawa

    2015-05-01

    Full Text Available T-cells genetically redirected with a chimeric antigen receptor (CAR to recognize tumor antigens and kill tumor cells have been infused in several phase 1 clinical trials with success. Due to safety concerns related to on-target/off-tumor effects or cytokine release syndrome, however, strategies to prevent or abate serious adverse events are required. Pharmacologic therapies; suicide genes; or novel strategies to limit the cytotoxic effect only to malignant cells are under active investigations. In this review, we summarize results and toxicities of investigations employing CAR redirected T-cells, with a focus on published strategies to grant safety of this promising cellular application.

  6. Seatbelts in CAR therapy: How Safe Are CARS?

    Science.gov (United States)

    Minagawa, Kentaro; Zhou, Xiaoou; Mineishi, Shin; Di Stasi, Antonio

    2015-05-08

    T-cells genetically redirected with a chimeric antigen receptor (CAR) to recognize tumor antigens and kill tumor cells have been infused in several phase 1 clinical trials with success. Due to safety concerns related to on-target/off-tumor effects or cytokine release syndrome, however, strategies to prevent or abate serious adverse events are required. Pharmacologic therapies; suicide genes; or novel strategies to limit the cytotoxic effect only to malignant cells are under active investigations. In this review, we summarize results and toxicities of investigations employing CAR redirected T-cells, with a focus on published strategies to grant safety of this promising cellular application.

  7. Car sharing à la carte

    CERN Document Server

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  8. Substitution between Cars within the Household

    DEFF Research Database (Denmark)

    de Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate—for each car owned by the household—own and cross-price effects...... of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, we estimate fuel price elasticities of –0.81 and -0.65 for the primary and secondary cars...... efficient car, finding partial support for the underlying hypothesis. More importantly, the results of this extended model emphasize the importance of behavioural differences related to the position of the most fuel efficient car in the household, suggesting that households’ fuel efficiency choices...

  9. Positive and negative spillover effects from electric car purchase to car use

    OpenAIRE

    Kløckner, Christian; Nayum, Alim; Mehmetoglu, Mehmet

    2013-01-01

    This study reports the results of two online surveys conducted on buyers of conventional combustion engine cars compared to those of electric vehicles in Norway. The results show that electric cars are generally purchased as additional cars, do not contribute to a decrease in annual mileage if the old car is not substituted, and that electric car buyers use the car more often for their everyday mobility. Psychological determinants derived from the theory of planned behavior and the norm-activ...

  10. A light sneutrino rescues the light stop

    Energy Technology Data Exchange (ETDEWEB)

    Chala, M. [Departament de Física Tèorica, Universitat de València and IFIC, Universitat de València-CSIC,Dr. Moliner 50, E-46100 Burjassot (València) (Spain); Delgado, A. [Department of Physics, University of Notre Dame, 225 Nieuwland Science Hall, Notre Dame, IN 46556 (United States); Nardini, G. [Albert Einstein Center (AEC), Institute for Theoretical Physics (ITP), University of Bern,Sidlerstrasse 5, CH-3012 Bern (Switzerland); Quirós, M. [Institut de Física d’Altes Energies (IFAE), The Barcelona Institute of Science and Technology (BIST),Institució Catalana de Recerca i Estudis Avançats - ICREA, Campus UAB, 08193 Bellaterra, Barcelona (Spain)

    2017-04-18

    Stop searches in supersymmetric frameworks with R-parity conservation usually assume the lightest neutralino to be the lightest supersymmetric particle. In this paper we consider an alternative scenario in which the left-handed tau sneutrino is lighter than neutralinos and stable at collider scales, but possibly unstable at cosmological scales. Moreover the (mostly right-handed) stop t̃ is lighter than all electroweakinos, and heavier than the scalars of the third generation lepton doublet, whose charged component, τ̃, is heavier than the neutral one, ν̃. The remaining supersymmetric particles are decoupled from the stop phenomenology. In most of the parameter space, the relevant stop decays are only into tτ̃τ, tν̃ν and bν̃τ via off-shell electroweakinos. We constrain the branching ratios of these decays by recasting the most sensitive stop searches. Due to the “double invisible” kinematics of the t̃→tν̃ν process, and the low efficiency in tagging the tτ̃τ decay products, light stops are generically allowed. In the minimal supersymmetric standard model with ∼ 100 GeV sneutrinos, stops with masses as small as ∼ 350 GeV turn out to be allowed at 95% CL.

  11. Application of the radtran 5 stop model

    International Nuclear Information System (INIS)

    Neuhauser, K.S.; Kanipe, R.L.; Weiner, R.F.

    1998-01-01

    A number of environmental impact analyzes with the RADTRAN computer code have shown that dose to persons at stops is one of the largest components of incident-free dose during overland carriage of spent fuel and other radioactive materials. The input data used in these analyses were taken from a 1983 study that reports actual observations of spent fuel shipments by truck. Early RADTRAN stop models, however, were insufficiently flexible to take advantage of the detailed information in the study. A more recent study of gasoline service stations that specialize in servicing large trucks, which are the most likely stop locations for shipments of Type B packages in the United States, has provided additional, detailed data on refueling/meal stops. The RADTRAN 5 computer code for transportation risk analysis allows exposures at stops to be more fully modelled than have previous releases of the code and is able to take advantage of detailed data. It is the intent of this paper first to compare results from RADTRAN 4 and RADTRAN 5 for the old, low-resolution form of input data, and then to demonstrate what effect the new data and input format have on stop-dose estimates for an individual stop and for a hypothetical shipment route. Finally, these estimated public doses will be contrasted with doses calculated for a special population group-inspectors. (authors)

  12. Application of the RADTRAN 5 stop model

    International Nuclear Information System (INIS)

    Neuhauser, K.S.; Kanipe, R.L.; Weiner, R.F.

    1997-01-01

    A number of environmental impact analyses with the RADTRAN computer code have shown that dose to persons at stops is one of the largest components of incident-free dose during overland carriage of spent fuel and other radioactive materials (e.g., USDOE, 1994). The input data used in these analyses were taken from a 1983 study that reports actual observations of spent fuel shipments by truck. Early RADTRAN stop models, however, were insufficiently flexible to take advantage of the detailed information in the study. A more recent study of gasoline service stations that specialize in servicing large trucks, which are the most likely stop locations for shipments of Type B packages in the United States, has provided additional, detailed data on refueling/meal stops. The RADTRAN 5 computer code for transportation risk analysis allows exposures at stops to be more fully modeled than have previous releases of the code and is able to take advantage of detailed data. It is the intent of this paper first to compare results from RADTRAN and RADTRAN 5 for the old, low-resolution form of input data, and then to demonstrate what effect the new data and input format have on stop-dose estimates for an individual stop and for a hypothetical shipment route. Finally, these estimated public doses will be contrasted with doses calculated for a special population group -- inspectors

  13. Substitution between cars within the household

    DEFF Research Database (Denmark)

    De Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    The purpose of this paper is to study to what extent two-car households substitute the use of their less fuel efficient car by the use of their more fuel efficient car after an increase in fuel prices. Based on a simple theoretical framework we use a large sample of detailed Danish data on two-car...... households to estimate, for each car owned by the household, own and cross-price effects of increases in fuel costs per kilometer. The empirical results point at important substitution effects, so that models that estimate responses to fuel prices on the implicit or explicit assumption of one car per...

  14. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  15. Electronic stopping in oxides beyond Bragg additivity

    Science.gov (United States)

    Sigmund, P.; Schinner, A.

    2018-01-01

    We present stopping cross sections calculated by our PASS code for several ions in metal oxides and SiO2 over a wide energy range. Input takes into account changes in the valence structure by assigning two additional electrons to the 2p shell of oxygen and removing the appropriate number of electrons from the outer shells of the metal atom. Results are compared with tabulated experimental values and with two versions of Bragg's additivity rule. Calculated stopping cross sections are applied in testing a recently-proposed scaling rule, which relates the stopping cross section to the number of oxygen atoms per molecule.

  16. Relationships of Ownership: Art and Theft in Bob Dylan’s 1960s Trilogy

    Directory of Open Access Journals (Sweden)

    Michael Rodgers

    2012-05-01

    Full Text Available Bob Dylan’s corpus is one continually engaged with appropriation and pilfering. This paper will look, predominantly, at three songs from his 1960s’ trilogy – ‘She Dylan problematizes the interrelationship between art, theft, and ownership. I argue that, similar to the urban artist Banksy, Dylan challenges, toys with, and appropriates cultural images in order to continually question the concept of proprietorship whilst rescuing cultural images from esoterica and attempting to put them back into the public domain.

  17. Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks

    OpenAIRE

    Wang, Cheng; Yang, Bo

    2018-01-01

    In this work, we aim at building a bridge from poor behavioral data to an effective, quick-response, and robust behavior model for online identity theft detection. We concentrate on this issue in online social networks (OSNs) where users usually have composite behavioral records, consisting of multi-dimensional low-quality data, e.g., offline check-ins and online user generated content (UGC). As an insightful result, we find that there is a complementary effect among different dimensions of r...

  18. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  19. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  20. The Speeding Car Design Challenge

    Science.gov (United States)

    Roman, Harry T.

    2009-01-01

    All too often, one reads about high-speed police chases in pursuit of stolen cars that result in death and injury to people and innocent bystanders. Isn't there another way to accomplish the apprehension of the thieves that does not put people at such great risk? This article presents a classroom challenge to use technology to remotely shutdown…

  1. Automated Car Park Management System

    Science.gov (United States)

    Fabros, J. P.; Tabañag, D.; Espra, A.; Gerasta, O. J.

    2015-06-01

    This study aims to develop a prototype for an Automated Car Park Management System that will increase the quality of service of parking lots through the integration of a smart system that assists motorist in finding vacant parking lot. The research was based on implementing an operating system and a monitoring system for parking system without the use of manpower. This will include Parking Guidance and Information System concept which will efficiently assist motorists and ensures the safety of the vehicles and the valuables inside the vehicle. For monitoring, Optical Character Recognition was employed to monitor and put into list all the cars entering the parking area. All parking events in this system are visible via MATLAB GUI which contain time-in, time-out, time consumed information and also the lot number where the car parks. To put into reality, this system has a payment method, and it comes via a coin slot operation to control the exit gate. The Automated Car Park Management System was successfully built by utilizing microcontrollers specifically one PIC18f4550 and two PIC16F84s and one PIC16F628A.

  2. Restoring a Classic Electric Car

    Science.gov (United States)

    Kraft, Thomas E.

    2012-01-01

    One hundred years ago, automobiles were powered by steam, electricity, or internal combustion. Female drivers favored electric cars because, unlike early internal-combustion vehicles, they did not require a crank for starting. Nonetheless, internal-combustion vehicles came to dominate the industry and it's only in recent years that the electrics…

  3. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  4. Transit Car Performance Comparison, State-of-the-Art Car vs. PATCO Transit Car, NYCTA R-46, MBTA Silverbirds

    Science.gov (United States)

    1978-02-01

    The first phase of this contract authorized the design, development, and demonstration of two State-Of-The-Art Cars (SOAC). This document reports on the gathering of comparative test data on existing in-service transit cars. The three transit cars se...

  5. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  6. The quantitative analysis of the temporal and spatial distribution in cases of motor vehicle theft in Belgrade

    OpenAIRE

    Mijalković, Saša

    2013-01-01

    This paper presents the results of the quantitative analysis of the temporal and spatial distribution in cases of motor vehicle theft in the City of Belgrade in two observed periods: from 1995 to 2012 and from 2001 to 2011. The results were achieved using the method of content analysis, comparative methods, and statistical analysis of large-scale data on motor vehicle thefts in the Republic of Serbia and in the City of Belgrade, contained in the documents of the Ministry of Internal Affairs o...

  7. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... biting your nails Nail biting typically begins in childhood and can continue through adulthood, and the side ... re inclined to bite may help solve the problem. Try to gradually stop biting your nails: Some ...

  8. Port Authority of Allegheny County Transit Stops

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — All transit stops within the Port Authority of Allegheny County's service area for the November 20, 2016 - March (TBD) 2017 schedule period.

  9. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... figure out how to avoid these situations and develop a plan to stop. Just knowing when you’ ... a doctor. If you bite your nails and develop a skin or nail infection, consult a board- ...

  10. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Spending money to keep your nails looking attractive may make you less likely to bite them. Alternatively, ... Just knowing when you’re inclined to bite may help solve the problem. Try to gradually stop ...

  11. Next Stop Adulthood: Tips for Parents

    Science.gov (United States)

    ... Email Print Share Next Stop Adulthood: Tips For Parents Page Content Article Body Becoming a young adult is exciting, difficult, and scary for both parents and teens. It is a time of increasing ...

  12. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Part 2: Origin Part 3: Function Textbook Study notes Image library 3-D animated image library Board ... gradually stop biting your nails: Some doctors recommend taking a gradual approach to break the habit. Try ...

  13. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Alternative payment models Fee schedule State policy State policy and ... recommend taking a gradual approach to break the habit. Try to stop biting one set of nails, such as your thumb nails, ...

  14. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... public", "mcat1=de12", ]; for (var c = 0; c How to stop biting your nails Nail biting typically ... to bite your nails, you can figure out how to avoid these situations and develop a plan ...

  15. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Mohs AUC MyDermPath+ Psoriasis Patient education resources Practice Management Center Coding and reimbursement Coding MACRA Fee schedule ... your nails: Some doctors recommend taking a gradual approach to break the habit. Try to stop biting ...

  16. Imagine stopping the progression of Alzheimer's

    Science.gov (United States)

    ... Issue Past Issues Imagine stopping the progression of Alzheimer's Past Issues / Fall 2006 Table of Contents For ... I have friends and loved ones suffering from Alzheimer's. But I can imagine… and hope for… a ...

  17. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... motion. S3. Application. This standard applies to all passenger cars, and to trucks and multipurpose... key to activate the engine or motor. Vehicle type, as used in S5.1.2, refers to passenger car, truck... pounds) or less with an automatic transmission that includes a “park” position shall be equipped with a...

  18. Panel discussion on stopping of heavy ions

    International Nuclear Information System (INIS)

    Baurichter, A.; Sigmund, P.; Soerensen, A.H.

    2002-01-01

    This is a condensed transscript of 90 minutes' discussion session marking the end of the International Symposium on Stopping of Heavy Ions (STOP01) held in Odense, Denmark, 5-8 August 2001. The time was divided up about equally between introductory and concluding remarks by the panel, and a general discussion involving most of the participants. The session was moderated by A.H. Soerensen. We have kept the contributions in the chronological order

  19. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  20. Consumer Behavior towards Safer Car Purchasing Decisions

    OpenAIRE

    Khairil Anwar Abu Kassim; Mohd Hafzi Md Isa; Yahaya Ahmad; Intan Osman; Lawrence Arokiasamy

    2016-01-01

    In Malaysia, the car safety level has been elevated through regulations and a consumer-based approach, i.e. the New Car Assessment Program in Southeast Asian Countries (ASEAN NCAP). Nevertheless, the availability of information on consumers' car purchasing decisions towards safety is still limited in Malaysia. Thus, this study was aimed at evaluating consumers' purchasing decisions of their present cars and investigating their awareness of ASEAN NCAP. Self-administered questionnaires were dis...

  1. 75 FR 10567 - Commerce Acquisition Regulation (CAR)

    Science.gov (United States)

    2010-03-08

    ... Part II Department of Commerce 48 CFR Chapter 13 Commerce Acquisition Regulation (CAR); Final Rule... Acquisition Regulation (CAR) AGENCY: Department of Commerce (DOC). ACTION: Final rule. SUMMARY: We, the... updates the entire CAR through FAC 2005- 21. DATES: This rule is effective April 7, 2010. ADDRESSES: The...

  2. Active deceleration support in car following

    NARCIS (Netherlands)

    Mulder, M.; Pauwelussen, J.J.A.; Paassen, M.M. van; Mulder, M.; Abbink, D.A.

    2010-01-01

    A haptic gas pedal feedback system is developed that provides car-following information via haptic cues from the gas pedal. During normal car-following situations, the haptic feedback (HF) cues were sufficient to reduce control activity and improve car-following performance. However, in more

  3. 49 CFR 174.57 - Cleaning cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cleaning cars. 174.57 Section 174.57... and Loading Requirements § 174.57 Cleaning cars. All hazardous material which has leaked from a package in any rail car or on other railroad property must be carefully removed. ...

  4. Trial products of solar cars; Solar car no shisaku

    Energy Technology Data Exchange (ETDEWEB)

    Shimizu, A.; Hatakeyama, S.; Sugiura, S.; Shinoda, S.; Daigo, Y.; Fujihara, Y.; Yano, K.; Kasuga, M. [Yamanashi University, Yamanashi (Japan). Faculty of Engineering

    1997-11-25

    A solar car was trially manufactured installing solar panels on a motor-wheelchair for the old (senior car). It is a car for one person with maximum speed of 6km/h, motor of 360w, two of storage battery of 12Vtimes29AH, and two of solar cell of 20Vtimes3A. The output of solar cell is about 100W, which may not be enough to drive a 360W motor. However, if action time per day is about 2 hours, the required power 700WH, and the sunshine duration 7 hours per day, solar cells of 100W can generate 700WH. This is stored in battery, and when it is short, it is supplemented by nighttime power. Product prices are 200,000-250,000 yen. A solar go-cart was trially manufactured remodeling the gasoline-run go-cart. It is a solar go-cart for one person with maximum speed of 30km/h, a motor of 600W, four of storage battery of 12Vtimes29AH, and four of solar cell of 20Vtimes3A. The output of solar battery at 200W is a third of the motor power, with battery charged three times the travel time. More than 1000 persons trially rode the go-cart. 2 figs.

  5. The New Cloud Absorption Radiometer (CAR) Software: One Model for NASA Remote Sensing Virtual Instruments

    Science.gov (United States)

    Roth, Don J.; Rapchun, David A.; Jones, Hollis H.

    2001-01-01

    The Cloud Absorption Radiometer (CAR) instrument has been the most frequently used airborne instrument built in-house at NASA Goddard Space Flight Center, having flown scientific research missions on-board various aircraft to many locations in the United States, Azores, Brazil, and Kuwait since 1983. The CAR instrument is capable of measuring scattered light by clouds in fourteen spectral bands in UV, visible and near-infrared region. This document describes the control, data acquisition, display, and file storage software for the new version of CAR. This software completely replaces the prior CAR Data System and Control Panel with a compact and robust virtual instrument computer interface. Additionally, the instrument is now usable for the first time for taking data in an off-aircraft mode. The new instrument is controlled via a LabVIEW v5. 1.1-developed software interface that utilizes, (1) serial port writes to write commands to the controller module of the instrument, and (2) serial port reads to acquire data from the controller module of the instrument. Step-by-step operational procedures are provided in this document. A suite of other software programs has been developed to complement the actual CAR virtual instrument. These programs include: (1) a simulator mode that allows pretesting of new features that might be added in the future, as well as demonstrations to CAR customers, and development at times when the instrument/hardware is off-location, and (2) a post-experiment data viewer that can be used to view all segments of individual data cycles and to locate positions where 'start' and stop' byte sequences were incorrectly formulated by the instrument controller. The CAR software described here is expected to be the basis for CAR operation for many missions and many years to come.

  6. An improved car-following model accounting for the preceding car's taillight

    Science.gov (United States)

    Zhang, Jian; Tang, Tie-Qiao; Yu, Shao-Wei

    2018-02-01

    During the deceleration process, the preceding car's taillight may have influences on its following car's driving behavior. In this paper, we propose an extended car-following model with consideration of the preceding car's taillight. Two typical situations are used to simulate each car's movement and study the effects of the preceding car's taillight on the driving behavior. Meanwhile, sensitivity analysis of the model parameter is in detail discussed. The numerical results show that the proposed model can improve the stability of traffic flow and the traffic safety can be enhanced without a decrease of efficiency especially when cars pass through a signalized intersection.

  7. Stopping, goal-conflict, trait anxiety and frontal rhythmic power in the stop-signal task.

    Science.gov (United States)

    Neo, Phoebe S-H; Thurlow, Jane K; McNaughton, Neil

    2011-12-01

    The medial right frontal cortex is implicated in fast stopping of an initiated motor action in the stop-signal task (SST). To assess whether this region is also involved in the slower behavioural inhibition induced by goal conflict, we tested for effects of goal conflict (when stop and go tendencies are balanced) on low-frequency rhythms in the SST. Stop trials were divided, according to the delays at which the stop signal occurred, into short-, intermediate-, and long-delay trials. Consistent with goal-conflict processing, intermediate-delay trials were associated with greater 7-8 Hz EEG power than short- or long-delay trials at medial right frontal sites (Fz, F4, and F8). At F8, 7-8 Hz power was linked to high trait anxiety and neuroticism. A separate 4-7 Hz power increase was also seen in stop, relative to go, trials, but this was independent of delay, was maximal at the central midline site Cz, and predicted faster stopping. Together with previous data on the SST, these results suggest that the right frontal region could be involved in multiple inhibition mechanisms. We propose a hierarchical model of the control of stopping that integrates the literature on the neural control of fast motor stopping with that on slower, motive-directed behavioural inhibition.

  8. Perceptual Surprise Improves Action Stopping by Nonselectively Suppressing Motor Activity via a Neural Mechanism for Motor Inhibition.

    Science.gov (United States)

    Dutra, Isabella C; Waller, Darcy A; Wessel, Jan R

    2018-02-07

    important in daily life (e.g., stopping to cross the street when a car approaches) and is severely impaired in many neuropsychiatric disorders. Therefore, finding ways to improve action stopping could aid adaptive behaviors in health and disease. Our current study shows that presenting unexpected sounds in stopping situations facilitates successful stopping. This improvement is specifically due to a surprise-related increase in a neural mechanism for motor inhibition, which rapidly suppresses the excitability of the motor system after unexpected events. These findings suggest a tight interaction between the neural systems for surprise processing and motor inhibition and yield a promising avenue for future research. Copyright © 2018 the authors 0270-6474/18/381482-11$15.00/0.

  9. Car insurance information management system

    OpenAIRE

    Sun, Yu

    2015-01-01

    A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...

  10. Solar Powered Heat Control System for Cars

    OpenAIRE

    Abin John; Jithin Thomas

    2014-01-01

    It takes times for an air-conditioner to effectively start cooling the passenger compartment in the car. So the passenger of the car will feel the heat in the car extremely before the air-conditioner fully cooling the interior of the car. Excessive heat can also damage an automobile's interior as well as personal property kept in the passenger compartment. So, a system to reduce this excessive heat by pumping out hot air and allowing cooler ambient air to enter the car by mean...

  11. Processing of global and selective stop signals: application of Donders' subtraction method to stop-signal task performance.

    Science.gov (United States)

    van de Laar, Maria C; van den Wildenberg, Wery P M; van Boxtel, Geert J M; van der Molen, Maurits W

    2010-01-01

    This paper applied Donders' subtraction method to examine the processing of global and selective stop signals in the stop-signal paradigm. Participants performed on three different versions of the stop task: a global task and two selective tasks. A global task required participants to inhibit their response to a go signal whenever a stop signal was presented (Stop-a task). A selective stop task required participants to inhibit to one stop signal but not to the other (Stop-c task). Another selective stop task required them to inhibit when the response indicated by go and stop signals was the same but not when they were different (Stop-b task). Stop-signal reaction time (SSRT) was shortest for Stop-a and longest for Stop-b, with intermediate values for the Stop-c task. Additional control experiments that manipulated stop probability confirmed the robustness of global and selective stopping latencies even when the stop-signal probability varied. The current findings contribute to the conclusion that Donders' subtraction method provides a useful tool for estimating the durations of subprocesses that together comprise SSRT.

  12. Consumer Behavior towards Safer Car Purchasing Decisions

    Directory of Open Access Journals (Sweden)

    Khairil Anwar Abu Kassim

    2016-08-01

    Full Text Available In Malaysia, the car safety level has been elevated through regulations and a consumer-based approach, i.e. the New Car Assessment Program in Southeast Asian Countries (ASEAN NCAP. Nevertheless, the availability of information on consumers’ car purchasing decisions towards safety is still limited in Malaysia. Thus, this study was aimed at evaluating consumers’ purchasing decisions of their present cars and investigating their awareness of ASEAN NCAP. Self-administered questionnaires were distributed among consumers visiting different car showrooms and dealer shops. The findings suggest that safety was considered as one of the top three factors by the respondents when purchasing their present cars. Awareness of ASEAN NCAP has increased as compared to a previous study. This information is essential for policy makers, manufacturers and other stakeholders to assist in setting priorities with regard to the promotion of car safety in the country.

  13. Substitution between cars within the household

    DEFF Research Database (Denmark)

    De Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    2016-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars of different fuel efficiency in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate – for each car owned by the household...... – own and cross-price effects of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, the basic model yielded fuel price elasticities of 0.......98 and 1.41 for the primary and secondary cars, respectively. Accounting for substitution effects, these figures reduce to, respectively, 0.32 and 0.45. Consistent with substitution behaviour, we find that the fuel price elasticity of fuel demand exceeds the elasticity of kilometre demands with respect...

  14. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... the benefit of any candidate or any political party, by means of the denial or deprivation, or the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and... Section 632.124 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR INDIAN AND...

  15. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE (CONTINUED) WATER AND WASTE DISPOSAL PROGRAMS GUARANTEED LOANS § 1779.73 Replacement of loss... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation...

  16. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  17. Preferences for Alternative Fuel Vehicles of Company Car Drivers

    NARCIS (Netherlands)

    Koetse, M.J.; Hoen, A.

    2014-01-01

    Costs of car ownership for company cars drivers and private car owners are very different. Car use, car choice decisions and preferences for car characteristics may therefore differ substantially between these two markets. In this paper, we present results of a study on the preferences of company

  18. 49 CFR 215.121 - Defective car body.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Defective car body. 215.121 Section 215.121..., DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Freight Car Components Car Bodies § 215.121 Defective car body. A railroad may not place or continue in service a car, if: (a) Any portion of...

  19. The extent of the stop coannihilation strip

    Energy Technology Data Exchange (ETDEWEB)

    Ellis, John [King' s College London, Theoretical Particle Physics and Cosmology Group, Department of Physics, London (United Kingdom); CERN, Theory Division, Geneva 23 (Switzerland); Olive, Keith A. [University of Minnesota, School of Physics and Astronomy, Minneapolis, MN (United States); University of Minnesota, William I. Fine Theoretical Physics Institute, School of Physics and Astronomy, Minneapolis, MN (United States); Zheng, Jiaming [University of Minnesota, School of Physics and Astronomy, Minneapolis, MN (United States)

    2014-07-15

    Many supersymmetric models such as the constrained minimal supersymmetric extension of the Standard Model (CMSSM) feature a strip in parameter space where the lightest neutralino χ is identified as the lightest supersymmetric particle, the lighter stop squark t{sub 1} is the next-to-lightest supersymmetric particle (NLSP), and the relic χ cold darkmatter density is brought into the range allowed by astrophysics and cosmology by coannihilation with the lighter stop squark t{sub 1} NLSP. We calculate the stop coannihilation strip in the CMSSM, incorporating Sommerfeld enhancement effects, and we explore the relevant phenomenological constraints and phenomenological signatures. In particular, we show that the t{sub 1} may weigh several TeV, and its lifetime may be in the nanosecond range, features that are more general than the specific CMSSM scenarios that we study in this paper. (orig.)

  20. StopWatcher: A Mobile Application to Improve Stop Sign Awareness for Driving Safety

    Directory of Open Access Journals (Sweden)

    Carl Tucker

    2012-01-01

    Full Text Available Stop signs are the primary form of traffic control in the United States. However, they have a tendency to be much less effective than other forms of traffic control like traffic lights. This is due to their smaller size, lack of lighting, and the fact that they may become visually obscured from the road. In this paper, we offer a solution to this problem in the form of a mobile application implemented in the Android platform: StopWatcher. It is designed to alert a driver when they are approaching a stop sign using a voice notification system (VNS. A field test was performed in a snowy environment. The test results demonstrate that the application can detect all of the stop signs correctly, even when some of them were obstructed by the snow, which in turn greatly improves the user awareness of stop signs.

  1. 49 CFR 231.8 - Tank cars without side sills and tank cars with short side sills and end platforms.

    Science.gov (United States)

    2010-10-01

    ... clearance, within 30 inches of side of car, until car is shopped for work amounting to practically... 49 Transportation 4 2010-10-01 2010-10-01 false Tank cars without side sills and tank cars with... APPLIANCE STANDARDS § 231.8 Tank cars without side sills and tank cars with short side sills and end...

  2. Stopping Rules for Linear Stochastic Approximation

    Science.gov (United States)

    Wada, Takayuki; Itani, Takamitsu; Fujisaki, Yasumasa

    Stopping rules are developed for stochastic approximation which is an iterative method for solving an unknown equation based on its consecutive residuals corrupted by additive random noise. It is assumed that the equation is linear and the noise is independent and identically distributed random vectors with zero mean and a bounded covariance. Then, the number of iterations for achieving a given probabilistic accuracy of the resultant solution is derived, which gives a rigorous stopping rule for the stochastic approximation. This number is polynomial of the problem size.

  3. Security Requirements for One Stop Government

    Science.gov (United States)

    Schäfer, Georg E.

    The highest ranking e-government solutions are based on one-window, one-click or one stop government concepts. For Europe, the EU services directive sets new requirements for e-government, that have to be met till December 2009. Simple, easy to understand and complete information is one requirement. The other requirements are, that the services covered by this directive shall be available electronically and at a distance (which means mostly “by Internet”). Acceptable solutions are digitally signed mails and, as an alternative or supplement, transaction oriented online services. To implement this, a one stop government with document safe is best practice.

  4. Lean Gasoline System Development for Fuel Efficient Small Cars

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Stuart R. [General Motors LLC, Pontiac, MI (United States)

    2013-11-25

    The General Motors and DOE cooperative agreement program DE-EE0003379 is completed. The program has integrated and demonstrated a lean-stratified gasoline engine, a lean aftertreatment system, a 12V Stop/Start system and an Active Thermal Management system along with the necessary controls that significantly improves fuel efficiency for small cars. The fuel economy objective of an increase of 25% over a 2010 Chevrolet Malibu and the emission objective of EPA T2B2 compliance have been accomplished. A brief review of the program, summarized from the narrative is: The program accelerates development and synergistic integration of four cost competitive technologies to improve fuel economy of a light-duty vehicle by at least 25% while meeting Tier 2 Bin 2 emissions standards. These technologies can be broadly implemented across the U.S. light-duty vehicle product line between 2015 and 2025 and are compatible with future and renewable biofuels. The technologies in this program are: lean combustion, innovative passive selective catalyst reduction lean aftertreatment, 12V stop/start and active thermal management. The technologies will be calibrated in a 2010 Chevrolet Malibu mid-size sedan for final fuel economy demonstration.

  5. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    CERN Document Server

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  6. Attractiveness to theft or diversion as a consideration in the physical protection of SNM

    International Nuclear Information System (INIS)

    Cardwell, R.G.; Williams, J.D.; Erkkila, B.H.; Heidel, G.M.; Carlson, R.L.

    1986-01-01

    There is a growing consensus among personnel responsible for the handling and protection of nuclear materials that certain types and forms of Special Nuclear Materials (SNM) in Department of Energy (DOE) Category I can be moved to a lower category because of their relative unattractiveness for theft or diversion. A collective effort by the authors to create a model based on such an ''attractiveness factor'' resulted in a ''decision tree'' that will determine a suitable category of protection for each particular group or batch of material. The tree considers (in addition to quantity) such factors as type and condition, selfprotecting radiation level, piece size, dispersion or dilution, spacing in storage, and ease of recoverability

  7. A case control study: White-collar defendants compared with defendants charged with other nonviolent theft.

    Science.gov (United States)

    Poortinga, Ernest; Lemmen, Craig; Jibson, Michael D

    2006-01-01

    We examined the clinical, criminal, and sociodemographic characteristics of all white-collar crime defendants referred to the evaluation unit of a state center for forensic psychiatry. With 29,310 evaluations in a 12-year period, we found 70 defendants charged with embezzlement, 3 with health care fraud, and no other white-collar defendants (based on the eight crimes widely accepted as white-collar offenses). In a case-control study design, the 70 embezzlement cases were compared with 73 defendants charged with other forms of nonviolent theft. White-collar defendants were found to have a higher likelihood of white race (adjusted odds ratio (adj. OR) = 4.51), more years of education (adj. OR = 3471), and a lower likelihood of substance abuse (adj. OR = .28) than control defendants. Logistic regression modeling showed that the variance in the relationship between unipolar depression and white-collar crime was more economically accounted for by education, race, and substance abuse.

  8. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    CERN Multimedia

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  9. Parallel risks of automobile collisions and thefts: a potential means of separating driver and vehicle factors.

    Science.gov (United States)

    Field, S; Clarke, R V

    1993-06-01

    This paper examines the value of data published by the Highway Loss Data Institute (HLDI) on the collision frequency of different automobile models as a potential guide to vehicle safety. It is argued that these data fail to control for factors other than design, including vehicle usage and driving quality. An alternative measure of collision risk, controlled for some of these factors, is constructed employing the fact that theft risk is determined by many of the same usage characteristics as collision risk. This alternative measure is validated by demonstrating that it is a more effective predictor of injury risk than collision frequency. In conclusion it is argued that if HLDI collision data are to provide a more useful guide to the relative design safety of different automobile models, the data need to be controlled for a wider range of potentially confounding factors.

  10. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Science.gov (United States)

    Paul, Manabi; Bhadra, Anindita

    2017-01-01

    Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  11. Physiology of safety deep stops and their importance during diving

    OpenAIRE

    Moravcová, Petra

    2008-01-01

    Title: Physiology ofdeep safety stops and their importance during diving Objective: Explanation of physiology of deep safety stops and their importance during diving. Presentation of the physiologically optima! method of accomplishing the deep stops. Methods: Summary of the available information concerning the physiology of deep safety stops and also the physic and physiology of diving connected with the subject. Follow-up clearing the importance ofthese stops for divers. Results: Inclusion o...

  12. Driving CAR T-cells forward

    Science.gov (United States)

    Jackson, Hollie J.; Rafiq, Sarwish; Brentjens, Renier J.

    2017-01-01

    The engineered expression of chimeric antigen receptors (CARs) on the surface of T cells enables the redirection of T-cell specificity. Early clinical trials using CAR T cells for the treatment of patients with cancer showed modest results, but the impressive outcomes of several trials of CD19-targeted CAR T cells in the treatment of patients with B-cell malignancies have generated an increased enthusiasm for this approach. Important lessons have been derived from clinical trials of CD19-specific CAR T cells, and ongoing clinical trials are testing CAR designs directed at novel targets involved in haematological and solid malignancies. In this Review, we discuss these trials and present strategies that can increase the antitumour efficacy and safety of CAR T-cell therapy. Given the fast-moving nature of this field, we only discuss studies with direct translational application currently or soon-to-be tested in the clinical setting. PMID:27000958

  13. MODERN ELECTRIC CARS OF TESLA MOTORS COMPANY

    Directory of Open Access Journals (Sweden)

    O. F. Vynakov

    2016-08-01

    Full Text Available This overview article shows the advantages of a modern electric car as compared with internal combustion cars by the example of the electric vehicles of Tesla Motors Company. It (в смысле- статья describes the history of this firm, provides technical and tactical characteristics of three modifications of electric vehicles produced by Tesla Motors. Modern electric cars are not less powerful than cars with combustion engines both in speed and acceleration amount. They are reliable, economical and safe in operation. With every year the maximum range of an electric car is increasing and its battery charging time is decreasing.Solving the problem of environmental safety, the governments of most countries are trying to encourage people to switch to electric cars by creating subsidy programs, lending and abolition of taxation. Therefore, the advent of an electric vehicle in all major cities of the world is inevitable.

  14. Slower, smaller and lighter urban cars

    Energy Technology Data Exchange (ETDEWEB)

    Moriarty, P.; Honnery, D. [Monash Univ., Dept. of Mechanical Engineering, Caulfield East (Australia)

    1999-01-01

    Rising global car ownership levels generate a variety of problems, including traffic congestion, oil depletion, air pollution and traffic accidents. These problems are usually most severe in urban areas. This paper examines the potential for large reductions in maximum speed, size and mass of urban cars to ameliorate these problems. It is found that cutting maximum speed would significantly lower the frequency and severity of traffic accidents, especially in the third world, where fatality rates per vehicle are very high. If cars carried a maximum of two to four persons, car length and width could be reduced. Such cars would require smaller lane widths and less parking space, thus helping to ease traffic congestion. The combination of smaller and slower vehicles means that car mass can also be greatly reduced, which in turn reduces fuel use and, with it, urban air pollution and carbon dioxide emissions. (Author)

  15. Prediction of future car forms based on historical trends

    Directory of Open Access Journals (Sweden)

    Bijendra Kumar

    2016-09-01

    Full Text Available Cars are one of the most important products that affects our daily life. Manufacturers of cars are inclined to know factors that affect the sales of cars and how to influence them. Car is a very competitive product whose technology is already matured. Thus, purchase decisions of a car depend on factors such as, aesthetics, ergonomics, features available and price. Exterior form and colour of a car are the most important factors that influence likeness of the car. We did a case study on car aesthetics (form, colour, shape, and user focus with more than 500 car advertisements over the past 70 years, appearing in various car magazines. Results show that form of cars has changed from sharp to smooth over the years, and white colour cars are becoming more popular. Additionally, car size is becoming smaller and increasingly focused towards family. Thus, manufacturers are recommended to develop compact, efficient and hybrid cars.

  16. Comparison of respiratory physiologic features when infants are placed in car safety seats or car beds.

    Science.gov (United States)

    Kinane, T Bernard; Murphy, Joan; Bass, Joel L; Corwin, Michael J

    2006-08-01

    The objective of this study was to compare the respiratory physiologic features of healthy term infants placed in either a car bed or a car safety seat. Within the first 1 week of life, 67 healthy term infants were recruited and assigned randomly to be monitored in either a car bed (33 infants) or a car safety seat (34 infants). Physiologic data, including oxygen saturation and frequency and type of apnea, were obtained and analyzed in a blinded manner. The groups spent similar amounts of time in the devices (car bed: 71.6 minutes; car seat: 74.2 minutes). The mean oxygen saturation values were not different between the groups (car bed: 97.1%; car seat: 97.3%). The percentages of time with oxygen saturation of car bed: 11.8[corrected]%; car seat: 18.3[corrected]%). In both groups, a number of infants spent high percentages of study time with oxygen saturation of car safety seat group (54%-63% of study time). Values for the 6 infants in the car bed group with the most time at this level were lower (20%-42%). This difference in the duration of oxygen saturation of features of infants in the 2 car safety devices were observed to be similar. Of note, substantial periods of time with oxygen saturation of < 95% were surprisingly common in both groups.

  17. Are Stopped Strings Preferred in Sad Music?

    Directory of Open Access Journals (Sweden)

    David Huron

    2017-01-01

    Full Text Available String instruments may be played either with open strings (where the string vibrates between the bridge and a hard wooden nut or with stopped strings (where the string vibrates between the bridge and a performer's finger pressed against the fingerboard. Compared with open strings, stopped strings permit the use of vibrato and exhibit a darker timbre. Inspired by research on the timbre of sad speech, we test whether there is a tendency to use stopped strings in nominally sad music. Specifically, we compare the proportion of potentially open-to-stopped strings in a sample of slow, minor-mode movements with matched major-mode movements. By way of illustration, a preliminary analysis of Samuel Barber's famous Adagio from his Opus 11 string quartet shows that the selected key (B-flat minor provides the optimum key for minimizing open string tones. However, examination of a broader controlled sample of quartet movements by Haydn, Mozart and Beethoven failed to exhibit the conjectured relationship. Instead, major-mode movements were found to avoid possible open strings more than slow minor-mode movements.

  18. Bystanders Are the Key to Stopping Bullying

    Science.gov (United States)

    Padgett, Sharon; Notar, Charles E.

    2013-01-01

    Bullying is the dominance over another. Bullying occurs when there is an audience. Peer bystanders provide an audience 85% of instances of bullying. If you remove the audience bullying should stop. The article is a review of literature (2002-2013) on the role of bystanders; importance of bystanders; why bystanders behave as they do; resources to…

  19. Stop! Look! Listen! for Effective Band Rehearsals.

    Science.gov (United States)

    Townsend, Alfred S.

    2003-01-01

    Discusses how band conductors can develop student skills in three areas: (1) when the conductor stops the band; (2) teaching the students to pay attention and watch the conductor; and (3) improving the student listening skills. Includes information on instructing students to play chorales. (CMK)

  20. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... for (var c = 0; c How to stop biting your nails Nail biting typically begins in childhood and can continue through ... effects can be more than cosmetic. Repeated nail biting can make the skin around your nails feel ...

  1. Should Diesel cars in Europe be discouraged?

    OpenAIRE

    Mayeres, Inge; Proost, Stef

    2001-01-01

    This paper examines the rationale for the different tax treatment of gasoline and diesel cars currently observed in Europe. First, we analyse possible justifications for a different tax treatment: pure tax revenue considerations, externality cons0iderations and constraints on the tax instruments used for cars and trucks. Next, an applied general equilibrium model is used to assess the welfare effects of revenue neutral changes in the vehicle and fuel taxes on diesel and gasoline cars. The mod...

  2. Driving an improved CAR for cancer immunotherapy

    OpenAIRE

    Huang, Xiaopei; Yang, Yiping

    2016-01-01

    The recent clinical success of chimeric antigen receptor (CAR) T cell therapy for B cell malignancies represents a paradigm shift in cancer immunotherapy. Unfortunately, application of CAR T cell–mediated therapy for solid tumors has so far been disappointing, and the reasons for this poor response in solid tumors remain unknown. In this issue of the JCI, Cherkassky and colleagues report on their use of a murine model of human pleural mesothelioma to explore potential factors that limit CAR T...

  3. DARTS: Deceiving Autonomous Cars with Toxic Signs

    OpenAIRE

    Sitawarin, Chawin; Bhagoji, Arjun Nitin; Mosenia, Arsalan; Chiang, Mung; Mittal, Prateek

    2018-01-01

    Sign recognition is an integral part of autonomous cars. Any misclassification of traffic signs can potentially lead to a multitude of disastrous consequences, ranging from a life-threatening accident to a large-scale interruption of transportation services relying on autonomous cars. In this paper, we propose and examine realistic security attacks against sign recognition systems for Deceiving Autonomous caRs with Toxic Signs (we call the proposed attacks DARTS). Leveraging the concept of ad...

  4. Modeling human learning involved in car driving

    OpenAIRE

    Wewerinke, P.H.

    1994-01-01

    In this paper, car driving is considered at the level of human tracking and maneuvering in the context of other traffic. A model analysis revealed the most salient features determining driving performance and safety. Learning car driving is modelled based on a system theoretical approach and based on a neural network approach. The aim of this research is to assess the relative merit of both approaches to describe human learning behavior in car driving specifically and in operating dynamic sys...

  5. Alcohol Fuel in Passenger Car

    Directory of Open Access Journals (Sweden)

    Adam Polcar

    2016-01-01

    Full Text Available The present article studies the effects of combustion of high-percentage mixture of bioethanol and gasoline on the output parameters of a passenger car engine. The car engine has not been structurally modified for the combustion of fuels with higher ethanol content. The mixture used consisted of E85 summer blend and Natural 95 gasoline in a ratio of 50:50. The parameters monitored during the experiment included the air-fuel ratio in exhaust gasses, the power output and torque of the engine and also the specific energy consumption and efficiency of the engine. As is apparent from the results, E85+N95 (50:50 mixture combustion results in lean-burn (λ > 1 due to the presence of oxygen in bioethanol. The lean-burn led to a slight decrease in torque and power output of the engine. However, due to the positive physicochemical properties of bioethanol, the decrease has not been as significant as would normally be expected from the measured air-fuel ratio. These findings are further confirmed by the calculated energy required to produce 1 kWh of energy, and by the higher efficiency of the engine during the combustion of a 50% bioethanol mixture.

  6. Ab initio electronic stopping power in materials

    International Nuclear Information System (INIS)

    Shukri, Abdullah-Atef

    2015-01-01

    The average energy loss of an ion per unit path length when it is moving through the matter is named the stopping power. The knowledge of the stopping power is essential for a variety of contemporary applications which depend on the transport of ions in matter, especially ion beam analysis techniques and ion implantation. Most noticeably, the use of proton or heavier ion beams in radiotherapy requires the knowledge of the stopping power. Whereas experimental data are readily available for elemental solids, the data are much more scarce for compounds. The linear response dielectric formalism has been widely used in the past to study the electronic stopping power. In particular, the famous pioneering calculations due to Lindhard evaluate the electronic stopping power of a free electron gas. In this thesis, we develop a fully ab initio scheme based on linear response time-dependent density functional theory to predict the impact parameter averaged quantity named the random electronic stopping power (RESP) of materials without any empirical fitting. The purpose is to be capable of predicting the outcome of experiments without any knowledge of target material besides its crystallographic structure. Our developments have been done within the open source ab initio code named ABINIT, where two approximations are now available: the Random-Phase Approximation (RPA) and the Adiabatic Local Density Approximation (ALDA). Furthermore, a new method named 'extrapolation scheme' have been introduced to overcome the stringent convergence issues we have encountered. These convergence issues have prevented the previous studies in literature from offering a direct comparison to experiment. First of all, we demonstrate the importance of describing the realistic ab initio electronic structure by comparing with the historical Lindhard stopping power evaluation. Whereas the Lindhard stopping power provides a first order description that captures the general features of the

  7. Pollutants Characterization of Car Wash Wastewater

    OpenAIRE

    Hashim Nor Haslina; Zayadi Nadzirah

    2016-01-01

    The huge quantity of water consumed per car during washing cars yields the untreated effluents discharged to the stormwater system. Wastewater samples from snow car wash and two full hand service car wash station were analyzed for pH and the presence of PO43-,TP, O&G, alkalinity, TSS, NO3-, NO2-, COD and surfactant in accordance Standard Method of Water and Wastewater 2012. Two full hand wash service stations and one station of snow foam service were investigated in this study. Amongst the st...

  8. MODERN ELECTRIC CARS OF TESLA MOTORS COMPANY

    OpenAIRE

    O. F. Vynakov; E. V. Savolova; A. I. Skrynnyk

    2016-01-01

    This overview article shows the advantages of a modern electric car as compared with internal combustion cars by the example of the electric vehicles of Tesla Motors Company. It (в смысле- статья) describes the history of this firm, provides technical and tactical characteristics of three modifications of electric vehicles produced by Tesla Motors. Modern electric cars are not less powerful than cars with combustion engines both in speed and acceleration amount. They are reliable, economical ...

  9. An extended car-following model at un-signalized intersections under V2V communication environment

    Science.gov (United States)

    Wang, Tao; Li, Peng

    2018-01-01

    An extended car-following model is proposed in this paper to analyze the impacts of V2V (vehicle to vehicle) communication on the micro driving behavior at the un-signalized intersection. A four-leg un-signalized intersection with twelve streams (left-turn, through movement, and right turn from each leg) is used. The effect of the guidance strategy on the reduction of the rate of stops and total delay is explored by comparing the proposed model and the traditional FVD car-following model. The numerical results illustrate that potential conflicts between vehicles can be predicted and some stops can be avoided by decelerating in advance. The driving comfort and traffic efficiency can be improved accordingly. More benefits could be obtained under the long communication range, low to medium traffic density, and simple traffic pattern conditions. PMID:29425243

  10. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making t...... measures aimed at detecting such actions. The discussed technical issues can prove useful in designing increasingly refined security measures and ways to detect electricity theft....

  11. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  12. CERN car stickers for 2014

    CERN Multimedia

    2013-01-01

    The stickers on your vehicles will cease to be valid at the end of 2013. We kindly request that you inform us as soon as possible if you no longer own a vehicle that is in our records. In particular, please inform the CERN Registration Service (Building 55, first floor) if you receive a sticker for a vehicle that you no longer own.   Stickers for 2014 are valid immediately and can be displayed as soon as you receive them. The Guards Service will continue to allow cars displaying a 2013 sticker into the CERN site until no later than 31 January 2014. After that date, the Guards Service will be obliged to deny access to any vehicles not displaying a valid sticker. Please see Operational Circular No. 2 for more details. We wish you a pleasant day and happy holidays, GS/DI security and access control service

  13. 49 CFR 238.311 - Single car test.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Single car test. 238.311 Section 238.311... Requirements for Tier I Passenger Equipment § 238.311 Single car test. (a) Except for self-propelled passenger cars, single car tests of all passenger cars and all unpowered vehicles used in passenger trains shall...

  14. 49 CFR 180.507 - Qualification of tank cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Qualification of tank cars. 180.507 Section 180... QUALIFICATION AND MAINTENANCE OF PACKAGINGS Qualification and Maintenance of Tank Cars § 180.507 Qualification of tank cars. (a) Each tank car marked as meeting a “DOT” specification or any other tank car used...

  15. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Multimedia

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  16. Cars diagnostics for combustion and plasma processes

    International Nuclear Information System (INIS)

    Eckbreth, A.C.; Stufflebeam, J.H.

    1988-01-01

    Coherent anti-Stokes Raman spectroscopy (CARS) is an analysis approach for nonintrusive temperature and species measurements in hostile environments. Widely utilized in combustion, it may be able to significantly impact materials processing research. CARS is described. Its applications to combustion and plasma process environments are reviewed and contrasted

  17. Rear-facing car seat (image)

    Science.gov (United States)

    A rear-facing car seat position is recommended for a child who is very young. Extreme injury can occur in an accident because ... child. In a frontal crash a rear-facing car seat is best, because it cradles the head, ...

  18. Modeling human learning involved in car driving

    NARCIS (Netherlands)

    Wewerinke, P.H.

    1994-01-01

    In this paper, car driving is considered at the level of human tracking and maneuvering in the context of other traffic. A model analysis revealed the most salient features determining driving performance and safety. Learning car driving is modelled based on a system theoretical approach and based

  19. The Hungarian car insurance cartel saga

    NARCIS (Netherlands)

    Cseres, K.J.; Szilágyi, P.; Rodger, B.

    2013-01-01

    his chapter discusses the landmark Hungarian case relating to the car insurance and repair markets, which involved both vertical and horizontal agreements. The case concerned the horizontal relationship between Hungary’s two largest insurance companies and their vertical relationships with car

  20. Gates Auto Door Car With Lights Modulated

    OpenAIRE

    Lina Carolina; Luyung Dinani, Skom, MMSi

    2002-01-01

    In scientific writing wi ll be explained about automatic gates with modulated headlights, where to find the car lights were adjusted by the relative frequency darker because of this background that the author alleviate human task in performing daily activities by using an automatic gate with the car lights modulated.

  1. Automated Coal-Mine Shuttle Car

    Science.gov (United States)

    Collins, E. R., Jr.

    1984-01-01

    Cable-guided car increases efficiency in underground coal mines. Unmanned vehicle contains storage batteries in side panels for driving traction motors located in wheels. Batteries recharged during inactive periods or slid out as unit and replaced by fresh battery bank. Onboard generator charges batteries as car operates.

  2. Driving an improved CAR for cancer immunotherapy.

    Science.gov (United States)

    Huang, Xiaopei; Yang, Yiping

    2016-08-01

    The recent clinical success of chimeric antigen receptor (CAR) T cell therapy for B cell malignancies represents a paradigm shift in cancer immunotherapy. Unfortunately, application of CAR T cell-mediated therapy for solid tumors has so far been disappointing, and the reasons for this poor response in solid tumors remain unknown. In this issue of the JCI, Cherkassky and colleagues report on their use of a murine model of human pleural mesothelioma to explore potential factors that limit CAR T cell efficacy. Their studies have uncovered the importance of the tumor microenvironment in the inhibition of CAR T cell functions, revealed a critical role for the programmed death-1 (PD-1) pathway in CAR T cell exhaustion within the tumor microenvironment, and demonstrated improved antitumor effects with a CAR T cell-intrinsic PD-1 blockade strategy using a dominant negative form of PD-1. Together, the results of this study lay the groundwork for further evaluation of mechanisms underlying CAR T cell immune evasion within the tumor microenvironment for the improvement of CAR T cell-mediated therapy for solid tumors.

  3. A Radio-Controlled Car Challenge

    Science.gov (United States)

    Roman, Harry T.

    2010-01-01

    Watching a radio-controlled car zip along a sidewalk or street has become a common sight. Within this toy are the basic ingredients of a mobile robot, used by industry for a variety of important and potentially dangerous tasks. In this challenge, students consider modifying an of-the-shelf, radio-controlled car, adapting it for a robotic task.

  4. Engineering an Affordable Self-Driving Car

    KAUST Repository

    Budisteanu, Alexandru Ionut

    2018-01-17

    "More than a million people die in car accidents each year, and most of those accidents are the result of human errorヤ Alexandru Budisteanu is 23 years old and owns a group of startups including Autonomix, an Artificial Intelligence software for affordable self-driving cars and he designed a low-cost self-driving car. The car\\'s roof has cameras and low-resolution 3D LiDAR equipment to detect traffic lanes, other cars, curbs and obstacles, such as people crossing by. To process this dizzying amount of data, Alexandru employed Artificial Intelligence algorithms to extract information from the visual data and plot a safe route for the car. Then, he built a manufacturing facility in his garage from Romania to assembly affordable VisionBot Pick and Place robots that are used to produce electronics. During this lecture, Alexandru will talk about this autonomous self-driving car prototype, for which he received the grand prize of the Intel International Science and Engineering Fair, and was nominated by TIME magazine as one of the worldメs most influential teens of 2013.

  5. Environmental impact of scrapping old cars

    NARCIS (Netherlands)

    Wee, Bert van; Moll, Henri C.; Dirks, Jessica

    Many countries introduced scrapping programs in the 90s, partly legitimated by environmental impact reductions. However, reducing the age of the current car fleet may result in an increase of life-cycle CO2 emissions. This will probably also be true for cars to be produced in future unless fuel

  6. 49 CFR 174.110 - Car magazine.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Car magazine. 174.110 Section 174.110...) Materials § 174.110 Car magazine. When specially authorized by the carrier, Division 1.1 or 1.2 (explosive... packages of Class 1 (explosive) materials are placed in a “magazine” box made of sound lumber not less than...

  7. Nuclear stopping power at high energies

    International Nuclear Information System (INIS)

    Date, S.; Gyulassy, M.; Sumiyoshi, H.

    1985-03-01

    Recent p + A → p + X data are analyzed within the context of the multi-chain and additive quark models. We deduce the average energy loss of a baryon as a function of distance traversed in nuclear matter. Consistency of the multi-chain model is checked by comparing the predictions for p + A → π +- + X with data. We discuss the space-time development of baryon stopping and show how longitudinal growth limits the energy deposition per unit length. Predictions are made for the proton spectra to be measured in nucleus-nucleus collisions at CERN and BNL. Finally, we conclude that the stopping domain for central collisions of heavy ions extends up to center of mass kinetic energies KEsub(em) asymptotically equals 3 +- 1 AGev. (author)

  8. The TRIUMF stopped π-μ channel

    International Nuclear Information System (INIS)

    Al-Qazzaz, N.M.M.; Beer, G.A.; Mason, G.R.

    1980-01-01

    The TRIUMF π-μ channel (M9) is described and the measured optical paramters are compared with design values. Measured beam characteristics of pions and muons for several different momenta are reported for protons incident on Be and Cu production targets. A beam of cloud muons at the channel momentum, from π decays near the production target, has been obtained having a high stopping density and small spot size. (auth)

  9. Finite Optimal Stopping Problems: The Seller's Perspective

    Science.gov (United States)

    Hemmati, Mehdi; Smith, J. Cole

    2011-01-01

    We consider a version of an optimal stopping problem, in which a customer is presented with a finite set of items, one by one. The customer is aware of the number of items in the finite set and the minimum and maximum possible value of each item, and must purchase exactly one item. When an item is presented to the customer, she or he observes its…

  10. Electron mass stopping power in H2

    Science.gov (United States)

    Fursa, Dmitry V.; Zammit, Mark C.; Threlfall, Robert L.; Savage, Jeremy S.; Bray, Igor

    2017-08-01

    Calculations of electron mass stopping power (SP) of electrons in H2 have been performed using the convergent close-coupling method for incident electron energies up to 2000 eV. Convergence of the calculated SP has been established by increasing the size of the close-coupling expansion from 9 to 491 states. Good agreement was found with the SP measurements of Munoz et al. [Chem. Phys. Lett. 433, 253 (2007), 10.1016/j.cplett.2006.10.114].

  11. The Green City Car. A holistic approach for NVH abatement of city cars

    OpenAIRE

    Bein, Thilo; Mayer, Dirk; Elliott, Steve; Ferrali, Leonardo; Casella, Mauro; Saemann, Ernst-Ulrich; Kropp, Wolfgang; Nielsen, Finn Kryger; Meschke, Jens; Pisano, Emanuel

    2014-01-01

    Pursuing the different passive and active concepts in a holistic approach, the FP7 project Green City Car demonstrates the feasibility of applying active systems to NVH-related problems light city cars from a system point-of view. During the project, a city car equipped with a small engine has been considered equipped with the latest technology in terms of safety aspects related to pedestrian’s impact and car-to-car compatibility, which are of major importance in an urban environment. The noi...

  12. The kinematic advantage of electric cars

    Science.gov (United States)

    Meyn, Jan-Peter

    2015-11-01

    Acceleration of a common car with with a turbocharged diesel engine is compared to the same type with an electric motor in terms of kinematics. Starting from a state of rest, the electric car reaches a distant spot earlier than the diesel car, even though the latter has a better specification for engine power and average acceleration from 0 to 100 km h-1. A three phase model of acceleration as a function of time fits the data of the electric car accurately. The first phase is a quadratic growth of acceleration in time. It is shown that the tenfold higher coefficient for the first phase accounts for most of the kinematic advantage of the electric car.

  13. Flex cars and the alcohol price

    International Nuclear Information System (INIS)

    Ferreira, Alex Luiz; Da Silveira, Jaylson Jair; De Almeida Prado, Fernando Pigeard

    2009-01-01

    We build a model that incorporates the effect of the innovative 'flex' car, an automobile that is able to run with either gasoline or alcohol, on the dynamics of fuel prices in Brazil. Our model shows that differences regarding fuel prices will now depend on the proportions of alcohol, gasoline and flex cars in the total stock. Conversely, the demand for each type of car will also depend on the expected future prices of alcohol and gasoline (in addition to the car prices). The model reflects our findings that energy prices are tied in the long run and that causality runs stronger from gasoline to alcohol. The estimated error correction parameter is stable, implying that the speed of adjustment towards equilibrium remains unchanged. The latter result is probably due to a still small fraction of flex cars in the total stock (approx. 5%), despite the fact that its sales nearly reached 100% in 2006. (author)

  14. 49 CFR 180.519 - Periodic retest and inspection of tank cars other than single-unit tank car tanks.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Periodic retest and inspection of tank cars other than single-unit tank car tanks. 180.519 Section 180.519 Transportation Other Regulations Relating to... of Tank Cars § 180.519 Periodic retest and inspection of tank cars other than single-unit tank car...

  15. Modelling and optimization of car-to-car compatibility - Modellierung und optimierung von pkw-pkw-kompatibilität

    NARCIS (Netherlands)

    Mooi, H.G.; Nastic, T.; Huibers, J.H.A.M.

    1999-01-01

    In this paper simple and more detailed MADYMO multibody models were used to simulate the car structure for improving the car-to-car compatibility of the whole car fleet. As a first step, survey studies were performed to develop a method for the optimization of car design with respect to frontal and

  16. An extended car-following model considering the acceleration derivative in some typical traffic environments

    Science.gov (United States)

    Zhou, Tong; Chen, Dong; Liu, Weining

    2018-03-01

    Based on the full velocity difference and acceleration car-following model, an extended car-following model is proposed by considering the vehicle’s acceleration derivative. The stability condition is given by applying the control theory. Considering some typical traffic environments, the results of theoretical analysis and numerical simulation show the extended model has a more actual acceleration of string vehicles than that of the previous models in starting process, stopping process and sudden brake. Meanwhile, the traffic jams more easily occur when the coefficient of vehicle’s acceleration derivative increases, which is presented by space-time evolution. The results confirm that the vehicle’s acceleration derivative plays an important role in the traffic jamming transition and the evolution of traffic congestion.

  17. Accidental strangulation in children by the automatic closing of a car window

    Science.gov (United States)

    Serena, Kailene; Piva, Jefferson Pedro; Andreolio, Cinara; Carvalho, Paulo Roberto Antonacci; da Rocha, Tais Sica

    2018-01-01

    Among the main causes of death in our country are car accidents, drowning and accidental burns. Strangulation is a potentially fatal injury and an important cause of homicide and suicide among adults and adolescents. In children, its occurrence is usually accidental. However, in recent years, several cases of accidental strangulation in children around the world have been reported. A 2-year-old male patient was strangled in a car window. The patient was admitted to the pediatric intensive care unit with a Glasgow Coma Scale score of 8 and presented with progressive worsening of respiratory dysfunction and torpor. The patient also presented acute respiratory distress syndrome, acute pulmonary edema and shock. He was managed with protective mechanical ventilation, vasoactive drugs and antibiotic therapy. He was discharged from the intensive care unit without neurological or pulmonary sequelae. After 12 days of hospitalization, he was discharged from the hospital, and his state was very good. The incidence of automobile window strangulation is rare but of high morbidity and mortality due to the resulting choking mechanism. Fortunately, newer cars have devices that stop the automatic closing of the windows if resistance is encountered. However, considering the severity of complications strangulated patients experience, the intensive neuro-ventilatory and hemodynamic management of the pathologies involved is important to reduce morbidity and mortality, as is the need to implement new campaigns for the education of parents and caregivers of children, aiming to avoid easily preventable accidents and to optimize safety mechanisms in cars with electric windows.

  18. Modeling the Turning Speed and Car Following Behaviors of Autonomous Vehicles in a Virtual World

    Directory of Open Access Journals (Sweden)

    Carrillo-González José Gerardo

    2015-07-01

    Full Text Available This article deals with mathematical models for controlling vehicles behavior in a virtual world, where two behaviors are considered: 1 curve turning and 2 car following situations, in this last is essential to provide a safety distance between the leader and the follower and at the same time keep the follower not delayed with respect to the leader, and in a curve turning the complexity is to provide a safety speed inside the curve and keep the car inside the lane. Using basic information as vehicles position, mathematical models can be developed for explaining the heading angle and the autonomous vehicles speed on curves, i.e. the controlled by the models. A model that predicts the autonomous vehicle speed on curves is developed considering previous data in other curves. Two models that control the acceleration/deceleration behavior of autonomous vehicles in a car following situation are proposed. In the first model, the parameters are calibrated with a proposed algorithm which enables accuracy in order to imitate the human behavior for accelerating and braking, and the second model provides a safety distance between the follower and the leader at sudden stops of the latter and employs the acceleration/deceleration top capabilities to follow the leader car similar to the human behavior.

  19. Clinical trials of CAR-T cells in China

    Directory of Open Access Journals (Sweden)

    Bingshan Liu

    2017-10-01

    Full Text Available Abstract Novel immunotherapeutic agents targeting tumor-site microenvironment are revolutionizing cancer therapy. Chimeric antigen receptor (CAR-engineered T cells are widely studied for cancer immunotherapy. CD19-specific CAR-T cells, tisagenlecleucel, have been recently approved for clinical application. Ongoing clinical trials are testing CAR designs directed at novel targets involved in hematological and solid malignancies. In addition to trials of single-target CAR-T cells, simultaneous and sequential CAR-T cells are being studied for clinical applications. Multi-target CAR-engineered T cells are also entering clinical trials. T cell receptor-engineered CAR-T and universal CAR-T cells represent new frontiers in CAR-T cell development. In this study, we analyzed the characteristics of CAR constructs and registered clinical trials of CAR-T cells in China and provided a quick glimpse of the landscape of CAR-T studies in China.

  20. Clinical trials of CAR-T cells in China.

    Science.gov (United States)

    Liu, Bingshan; Song, Yongping; Liu, Delong

    2017-10-23

    Novel immunotherapeutic agents targeting tumor-site microenvironment are revolutionizing cancer therapy. Chimeric antigen receptor (CAR)-engineered T cells are widely studied for cancer immunotherapy. CD19-specific CAR-T cells, tisagenlecleucel, have been recently approved for clinical application. Ongoing clinical trials are testing CAR designs directed at novel targets involved in hematological and solid malignancies. In addition to trials of single-target CAR-T cells, simultaneous and sequential CAR-T cells are being studied for clinical applications. Multi-target CAR-engineered T cells are also entering clinical trials. T cell receptor-engineered CAR-T and universal CAR-T cells represent new frontiers in CAR-T cell development. In this study, we analyzed the characteristics of CAR constructs and registered clinical trials of CAR-T cells in China and provided a quick glimpse of the landscape of CAR-T studies in China.

  1. Intelligent Bus Stops in the Flexible Bus Systems

    OpenAIRE

    Razi Iqbal; Muhammad Usman Ghani

    2014-01-01

    The purpose of this paper is to discuss Intelligent Bus Stops in a special Demand Responsive Transit (DRT), the Flexible Bus System. These Intelligent Bus Stops are more efficient and information rich than Traditional Bus Stops. The real time synchronization of the Flexible Bus System makes it unique as compared to Traditional Bus Systems. The Main concern is to make Bus Stops intelligent and information rich. Buses are informed about the no. of passengers waiting at the upcoming ...

  2. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ..., electronic ignition lock, adapted ignition key, engine control unit, electronic steering column lock and an automatic transmission gear box (if available). VW stated that its vehicle line will also include an... from the car, or when the mechanical ignition key is switched to the OFF position causing lock out of...

  3. First results from car-to-car and car-to-infrastructure radio channel measurements at 5.2GHZ

    OpenAIRE

    Paier, Alexander; Kåredal, Johan; Czink, Nicolai; Hofstetter, Helmut; Dumard, Charlotte; Zemen, Thomas; Tufvesson, Fredrik; Mecklenbräuker, Christoph; Molisch, Andreas

    2007-01-01

    Car-to-car and car-to-infrastructure (henceforth called C2X) communications are constantly gaining importance for road-safety and other applications. In order to design efficient C2X systems, an understanding of realistic C2X propagation channels is required, but currently, only few measurements have been published. This paper presents a description of an extensive measurement campaign recently conducted in an urban scenario, a rural scenario, and on a highway. We focused on 4 ÿ 4 multiple-in...

  4. A speed guidance strategy for multiple signalized intersections based on car-following model

    Science.gov (United States)

    Tang, Tie-Qiao; Yi, Zhi-Yan; Zhang, Jian; Wang, Tao; Leng, Jun-Qiang

    2018-04-01

    Signalized intersection has great roles in urban traffic system. The signal infrastructure and the driving behavior near the intersection are paramount factors that have significant impacts on traffic flow and energy consumption. In this paper, a speed guidance strategy is introduced into a car-following model to study the driving behavior and the fuel consumption in a single-lane road with multiple signalized intersections. The numerical results indicate that the proposed model can reduce the fuel consumption and the average stop times. The findings provide insightful guidance for the eco-driving strategies near the signalized intersections.

  5. Moments of random sums and Robbins' problem of optimal stopping

    NARCIS (Netherlands)

    Gnedin, A.V.; Iksanov, A.

    2011-01-01

    Robbins' problem of optimal stopping is that of minimising the expected rank of an observation chosen by some nonanticipating stopping rule. We settle a conjecture regarding the value of the stopped variable under the rule that yields the minimal expected rank, by embedding the problem in a much

  6. Start-Stop Test Procedures on the PEMFC Stack Level

    DEFF Research Database (Denmark)

    Mitzel, Jens; Nygaard, Frederik; Veltzé, Sune

    The test is addressed to investigate the influence on stack durability of a long stop followed by a restart of a stack. Long stop should be defined as a stop in which the anodic compartment is fully filled by air due to stack leakages. In systems, leakage level of the stack is low and time to fil...

  7. Biobjective Optimization and Evaluation for Transit Signal Priority Strategies at Bus Stop-to-Stop Segment

    Directory of Open Access Journals (Sweden)

    Rui Li

    2016-01-01

    Full Text Available This paper proposes a new optimization framework for the transit signal priority strategies in terms of green extension, red truncation, and phase insertion at the stop-to-stop segment of bus lines. The optimization objective is to minimize both passenger delay and the deviation from bus schedule simultaneously. The objective functions are defined with respect to the segment between bus stops, which can include the adjacent signalized intersections and downstream bus stops. The transit priority signal timing is optimized by using a biobjective optimization framework considering both the total delay at a segment and the delay deviation from the arrival schedules at bus stops. The proposed framework is evaluated using a VISSIM model calibrated with field traffic volume and traffic signal data of Caochangmen Boulevard in Nanjing, China. The optimized TSP-based phasing plans result in the reduced delay and improved reliability, compared with the non-TSP scenario under the different traffic flow conditions in the morning peak hour. The evaluation results indicate the promising performance of the proposed optimization framework in reducing the passenger delay and improving the bus schedule adherence for the urban transit system.

  8. Boxer crabs induce asexual reproduction of their associated sea anemones by splitting and intraspecific theft.

    Science.gov (United States)

    Schnytzer, Yisrael; Giman, Yaniv; Karplus, Ilan; Achituv, Yair

    2017-01-01

    Crabs of the genus Lybia have the remarkable habit of holding a sea anemone in each of their claws. This partnership appears to be obligate, at least on the part of the crab. The present study focuses on Lybia leptochelis from the Red Sea holding anemones of the genus Alicia (family Aliciidae). These anemones have not been found free living, only in association with L. leptochelis . In an attempt to understand how the crabs acquire them, we conducted a series of behavioral experiments and molecular analyses. Laboratory observations showed that the removal of one anemone from a crab induces a "splitting" behavior, whereby the crab tears the remaining anemone into two similar parts, resulting in a complete anemone in each claw after regeneration. Furthermore, when two crabs, one holding anemones and one lacking them, are confronted, the crabs fight, almost always leading to the "theft" of a complete anemone or anemone fragment by the crab without them. Following this, crabs "split" their lone anemone into two. Individuals of Alicia sp. removed from freshly collected L. leptochelis were used for DNA analysis. By employing AFLP (Fluorescence Amplified Fragments Length Polymorphism) it was shown that each pair of anemones from a given crab is genetically identical. Furthermore, there is genetic identity between most pairs of anemone held by different crabs, with the others showing slight genetic differences. This is a unique case in which one animal induces asexual reproduction of another, consequently also affecting its genetic diversity.

  9. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    CERN Multimedia

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  10. The attractiveness of materials in advanced nuclear fuel cycles for various proliferation and theft scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Bathke, Charles G [Los Alamos National Laboratory; Wallace, Richard K [Los Alamos National Laboratory; Ireland, John R [Los Alamos National Laboratory; Johnson, M W [Los Alamos National Laboratory; Hase, Kevin R [Los Alamos National Laboratory; Jarvinen, Gordon D [Los Alamos National Laboratory; Ebbinghaus, Bartley B [LLNL; Sleaford, Brad A [LLNL; Bradley, Keith S [LLNL; Collins, Brian W [PNNL; Smith, Brian W [PNNL; Prichard, Andrew W [PNNL

    2009-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  11. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Directory of Open Access Journals (Sweden)

    Manabi Paul

    Full Text Available Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  12. Anti-theft device staining on banknotes detected by mass spectrometry imaging.

    Science.gov (United States)

    Correa, Deleon Nascimento; Zacca, Jorge Jardim; Rocha, Werickson Fortunato de Carvalho; Borges, Rodrigo; de Souza, Wanderley; Augusti, Rodinei; Eberlin, Marcos Nogueira; Vendramini, Pedro Henrique

    2016-03-01

    We describe the identification and limits of detection of ink staining by mass spectrometry imaging (MSI), as used in anti-theft devices (ATDs). Such ink staining is applied to banknotes during automated teller machine (ATM) explosions. Desorption electrospray ionization (DESI) coupled with high-resolution and high-accuracy orbitrap mass spectrometry (MS) and a moving stage device were applied to obtain 2D molecular images of the major dyes used for staining, that is, 1-methylaminoanthraquinone (MAAQ), rhodamine B (RB) and rhodamine 6G (R6G). MAAQ could not be detected because of its inefficient desorption by DESI from the banknote cellulose surface. By contrast, ATD staining on banknotes is perceptible by the human naked eye only at concentrations higher than 0.2 μg cm(-2), whereas both RB and R6G at concentrations 200 times lower (as low as 0.001 μg cm(-2)) could be easily detected and imaged by DESI-MSI, with selective and specific identification of each analyte and their spatial distribution on samples from suspects. This technique is non-destructive, and no sample preparation is required, which ensures sample preservation for further forensic investigations. Copyright © 2016. Published by Elsevier Ireland Ltd.

  13. The Attractiveness Of Materials In Advanced Nuclear Fuel Cycles For Various Proliferation And Theft Scenarios

    International Nuclear Information System (INIS)

    Bathke, C.G.; Ebbinghaus, Bartley B.; Collins, Brian A.; Sleaford, Brad W.; Hase, Kevin R.; Robel, Martin; Wallace, R.K.; Bradley, Keith S.; Ireland, J.R.; Jarvinen, G.D.; Johnson, M.W.; Prichard, Andrew W.; Smith, Brian W.

    2012-01-01

    We must anticipate that the day is approaching when details of nuclear weapons design and fabrication will become common knowledge. On that day we must be particularly certain that all special nuclear materials (SNM) are adequately accounted for and protected and that we have a clear understanding of the utility of nuclear materials to potential adversaries. To this end, this paper examines the attractiveness of materials mixtures containing SNM and alternate nuclear materials associated with the plutonium-uranium reduction extraction (Purex), uranium extraction (UREX), coextraction (COEX), thorium extraction (THOREX), and PYROX (an electrochemical refining method) reprocessing schemes. This paper provides a set of figures of merit for evaluating material attractiveness that covers a broad range of proliferant state and subnational group capabilities. The primary conclusion of this paper is that all fissile material must be rigorously safeguarded to detect diversion by a state and must be provided the highest levels of physical protection to prevent theft by subnational groups; no 'silver bullet' fuel cycle has been found that will permit the relaxation of current international safeguards or national physical security protection levels. The work reported herein has been performed at the request of the U.S. Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for, the nuclear materials in DOE nuclear facilities. The methodology and findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security is discussed.

  14. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    Directory of Open Access Journals (Sweden)

    Clara Victoria Meza-Maya

    2017-01-01

    Full Text Available Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V. Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes de un colegio de Bogotá. Resultados y conclusiones: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  15. Emergency information systems for cars

    Science.gov (United States)

    Thirunavukkarasu, M.; Vani Manasa, N.; Kumar, K. Rajesh; Sundar, S.

    2017-11-01

    The main objective of this work is to create a Health Care monitoring and Guidance system for persons who are travelling in outdoor environments like cars. GSM (Global System for Mobile Communications) and GPS (Global Positioning System) technologies are separately and combined today in many applications in our day to day life. The GSM module will send a message along with the GPS location to the end user through text, and a call is initiated to the user for further instructions. The Global Positioning System (GPS) will give the location of the interested vehicle. This system helps the doctor or anyone to monitor the accident who is outdoor and has less help. This will help the hospital to monitor the accident as well as guide the injured through difficult situations. Using a buzzer, the persons nearby will come to know that the person is in danger or in poor health conditions. This project provides a good two-way communication with the injured and the hospital to assist them to give first aid before an ambulance arrives. So, this paper devices a novel technique to assist the people who just met with accident through GPS and GSM.

  16. REPAIR TECHNOLOGY IMPROVEMENT OF SPECIALIZED FREIGHT CARS

    Directory of Open Access Journals (Sweden)

    V. M. Bubnov

    2016-02-01

    Full Text Available Purpose. The volume of cargo transportation demands the introduction of a new generation of cars that would be able to provide all the needs of carriers. But this is impossible without the implementation of renovation repair facilities with the introduction of new technologies and modernization of the repair process. Repair of rolling stock is a key factor that must proceed with the establishment of new cars, as not all of the inventions may be repaired in car-repair depots, most of which are obsolete. The purpose is to analyze the possibility of increasing the efficiency of the repair process by introducing new repair technologies or improving the existing ones. It will improve not only the quality of the repair, but also its rate. Methodology. Works on improving the designs of freight cars are held by many design organizations in almost all industrialized countries. It makes repair organizations (depots and car-repair plants to upgrade the repair process. Achievements of-this goal is possible by improving the technology renovation and reorganization through the use of flexible flow technologies, which to date are the most effective in the repair of rolling stock. Findings. When performing the analysis it was determined that there are different designs of cars. More of cars are all-purpose and their repair does not cause difficulties for car-repair business. However, the number of specialized cars is also significant, and the technology of their repair should be improved. One of the reasons is that many models, such as tank wagons for the carriage of sulfur, are intended for the carriage of dangerous goods and their failure at the time of motion is not permitted. Originality. Firstly the authors have defined direction at improving technologies of repair specialized cars. Practical value. Actual improvement in the construction of cars is to improve the existing repair facilities. In addition, the repair technology using nowadays when repairing

  17. Charging electric cars from solar energy

    OpenAIRE

    Liang, Xusheng; Tanyi, Elvis; Zou, Xin

    2016-01-01

    Before vehicles were heavily relied on coal, fossil fuels and wind for power.  Now, they are rapidly being replaced by electric vehicles and or plug-in hybrid electric cars. But these electric cars are still faced with the problem of energy availability because they rely on energy from biomass, hydro power and wind turbines for power generation. The abundance of solar radiation and its use as solar energy as a power source in driving these rapidly increasing electric cars is not only an impor...

  18. Electric cars as mobile power storage systems

    International Nuclear Information System (INIS)

    Herzog, B.

    2010-01-01

    This article discusses the use of electric cars as a means of optimising the use of renewable energy sources. Charging the cars' batteries during periods when cheap electricity prices prevail and then using excess capacity to supply the mains with electricity during periods of peak demand is discussed. The possible use of wind for power generation is discussed and a system proposed by a leading supplier of electrical apparatus and systems is examined. Two examples of electric cars and associated power chains are looked at and tests in everyday practice are described

  19. THEORETICAL BASIS OF MOTOR CAR QUALITY EVALUTION

    Directory of Open Access Journals (Sweden)

    T. Bazhinova

    2016-12-01

    Full Text Available Comprehensive assessment of the quality of cars, which is based on the integral parameters of comfort, reliability, safety, environmental and technical solutions are considered and defined. The amount of parameters that define the quality level of the car use throughout the country is defined. Mathematical formulas and quality indicators of the integral index are developed. The integral quality index of vehicles allows comparing the vehicles of different classes based on external operating conditions. The numerical values of the integral index determines the quality of the car.

  20. Processing of global and selective stop signals: application of Donders’ subtraction method to stop-signal task performance

    NARCIS (Netherlands)

    van de Laar, M.C.; van den Wildenberg, W.P.M.; van Boxtel, G.J.M.; van der Molen, M.W.

    2010-01-01

    This paper applied Donders’ subtraction method to examine the processing of global and selective stop signals in the stop-signal paradigm. Participants performed on three different versions of the stop task: a global task and two selective tasks. A global task required participants to inhibit their

  1. Minimization of bus stop number on a bus station

    OpenAIRE

    Stanislav PALÚCH

    2013-01-01

    A bus station contains several bus stops. Only one bus can occupy a singlebus stop at a time. Buses of many trips arrive to the bus station during the day (or duringanother considered period) and every bus occupies a bus stop for a certain time interval.The set of available bus stops is limited. This paper studies a problem how to assign a busstop to every bus trip in order to minimize the number of assigned bus stops and in orderto comply several additional conditions. Several approaches to ...

  2. Early Stop Criterion from the Bootstrap Ensemble

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Larsen, Jan; Fog, Torben L.

    1997-01-01

    This paper addresses the problem of generalization error estimation in neural networks. A new early stop criterion based on a Bootstrap estimate of the generalization error is suggested. The estimate does not require the network to be trained to the minimum of the cost function, as required...... by other methods based on asymptotic theory. Moreover, in contrast to methods based on cross-validation which require data left out for testing, and thus biasing the estimate, the Bootstrap technique does not have this disadvantage. The potential of the suggested technique is demonstrated on various time...

  3. Jojoba could stop the desert creep

    Energy Technology Data Exchange (ETDEWEB)

    1982-03-25

    The Sahara desert is estimated to be expanding at a rate of 5km a year. The Sudanese government is experimenting with jojoba in six different regions as the bush has the potential to stop this ''desert creep''. The plant, a native to Mexico, is long known for its resistance to drought and for the versatile liquid wax that can be extracted from its seeds. It is estimated that one hectare of mature plants could produce 3000 kg of oil, currently selling at $50 per litre, and so earn valuable foreign currency.

  4. [Abbreviations in daily language: stop it].

    Science.gov (United States)

    Girbes, A C; Girbes, A R J

    2017-01-01

    Abbreviations are used more and more in physician common parlance and it seems they are on the way to becoming a new jargon. However, identical abbreviations may have different meanings, especially in different medical specialties. Moreover, many physicians do not know the meaning of specific abbreviations or are attributing the wrong meaning to the abbreviation. This will lead to misunderstanding and therefore danger to the patient. The authors are calling for a stop on the use of spoken abbreviations and for minimising the use of abbreviations in clinical notes and medical prescriptions.

  5. End-Stop Exemplar Based Recognition

    DEFF Research Database (Denmark)

    Olsen, Søren I.

    2003-01-01

    An approach to exemplar based recognition of visual shapes is presented. The shape information is described by attributed interest points (keys) detected by an end-stop operator. The attributes describe the statistics of lines and edges local to the interest point, the position of neighboring int...... interest points, and (in the training phase) a list of recognition names. Recognition is made by a simple voting procedure. Preliminary experiments indicate that the recognition is robust to noise, small deformations, background clutter and partial occlusion....

  6. Frame by frame stop motion non-traditional approaches to stop motion animation

    CERN Document Server

    Gasek, Tom

    2011-01-01

    In a world that is dominated by computer images, alternative stop motion techniques like pixilation, time-lapse photography and down-shooting techniques combined with new technologies offer a new, tangible and exciting approach to animation. With over 25 years professional experience, industry veteran, Tom Gasek presents a comprehensive guide to stop motion animation without the focus on puppetry or model animation. With tips, tricks and hands-on exercises, Frame by Frame will help both experienced and novice filmmakers get the most effective results from this underutilized branch of animation

  7. CAR models: next-generation CAR modifications for enhanced T-cell function

    Directory of Open Access Journals (Sweden)

    Daniel Abate-Daga

    2016-01-01

    Full Text Available T cells genetically targeted with a chimeric antigen receptor (CAR to B-cell malignancies have demonstrated tremendous clinical outcomes. With the proof in principle for CAR T cells as a therapy for B-cell malignancies being established, current and future research is being focused on adapting CAR technology to other cancers, as well as enhancing its efficacy and/or safety. The modular nature of the CAR, extracellular antigen-binding domain fused to a transmembrane domain and intracellular T-cell signaling domains, allows for optimization by replacement of the various components. These modifications are creating a whole new class of therapeutic CARs. In this review, we discuss the recent major advances in CAR design and how these modifications will impact its clinical application.

  8. Comments on ``CARS probe of RDX decomposition''

    Science.gov (United States)

    Stufflebeam, J. H.; Eckbreth, A. C.

    1984-08-01

    Recent CARS data from a solid propellant flame that purported to show resonances from the bending modes of HCN are analyzed to demonstrate that the spectral features in question are vibrational transitions of CO 2.

  9. Design of two wheel self balancing car

    Science.gov (United States)

    He, Chun-hong; Ren, Bin

    2018-02-01

    This paper proposes a design scheme of the two-wheel self-balancing dolly, the integration of the gyroscope and accelerometer MPU6050 constitutes the car position detection device.System selects 32-bit MCU stmicroelectronics company as the control core, completed the processing of sensor signals, the realization of the filtering algorithm, motion control and human-computer interaction. Produced and debugging in the whole system is completed, the car can realize the independent balance under the condition of no intervention. The introduction of a suitable amount of interference, the car can adjust quickly to recover and steady state. Through remote control car bluetooth module complete forward, backward, turn left and other basic action..

  10. Papers on vehicle size : cars and trucks

    Science.gov (United States)

    1988-06-01

    The four papers in this volume describe analyses of car size : trends and truck occupant injuries and fatalities. All four were : written between June 1985 and December 1987. The topics : addressed include where heavy truck accidents occur, injury an...

  11. How to Buy a Car 101

    Science.gov (United States)

    Flores, Charity A.

    2006-01-01

    This article elaborates on the basics of problem-based learning units and tips for implementation. The problem-based learning unit described focuses on the course of action involved in purchasing a new car. (Contains 2 figures.)

  12. Computer Security: your car, my control

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    We have discussed the Internet of Things (IoT) and its security implications already in past issues of the CERN Bulletin, for example in “Today’s paranoia, tomorrow’s reality” (see here). Unfortunately, tomorrow has come. At this years's Black Hat conference researchers presented their findings on how easily your car can be hacked and controlled remotely. Sigh.   While these researchers have just shown that they can wirelessly hijack a Jeep Cherokee, others have performed similar studies with SmartCars, Fords, a Tesla, a Corvette, BMWs, Chryslers and Mercedes! With the increasing computerisation of cars, the engine management system, air conditioning, anti-lock braking system, electronic stability programme, etc. are linked to the infotainment, navigation and communication systems, opening the door for these vehicles to be hacked remotely. The now prevalent Bluetooth connection with smartphones is one entry vector to attack your car remotely...

  13. CARs in the Lead Against Multiple Myeloma

    DEFF Research Database (Denmark)

    Ormhøj, Maria; Bedoya, Felipe; Frigault, Matthew J.

    2017-01-01

    The recent clinical success of CD19-directed chimeric antigen receptor (CAR) T cell therapy in chronic and acute leukemia has led to increased interest in broadening this technology to other hematological malignancies and solid tumors. Now, advances are being made using CAR T cell technology...... to target myeloma antigens such as B cell maturation antigen (BCMA), CD138, and kappa-light chain as well as CD19 on putative myeloma stem cells. To date, only a limited number of multiple myeloma patients have received CAR T cell therapy but preliminary results have been encouraging. In this review, we...... summarize the recently reported results of clinical trials conducted utilizing CAR T cell therapy in multiple myeloma (MM)....

  14. CARS diagnostics of high pressure discharges

    International Nuclear Information System (INIS)

    Uhlenbusch, J.

    2001-01-01

    After a short description of the principles of the CARS, RECARS and POLCARS techniques and a discussion of setups for CARS experiments some experimental results are summarized. The results concern mainly plasma under atmospheric pressure, in particular the determination of temperature in a CO 2 laser-induced pyrolysis flame burning in a silane-acetylene gas mixture, the measurements of N 2 vibrational and rotational temperatures as well as the electron density by CARS and of an NO minority by POLCARS in an atmospheric microwave discharge, and finally RECARS experiments on indium iodide, Which is present in metal halide discharge lamps. Guided by these examples some problems and difficulties arising when performing CARS measurements are discussed

  15. Bus Stops Location and Bus Route Planning Using Mean Shift Clustering and Ant Colony in West Jakarta

    Science.gov (United States)

    Supangat, Kenny; Eko Soelistio, Yustinus

    2017-03-01

    Traffic Jam has been a daily problem for people in Jakarta which is one of the busiest city in Indonesia up until now. Even though the official government has tried to reduce the impact of traffic issues by developing a new public transportation which takes up a lot of resources and time, it failed to diminish the problem. The actual concern to this problem actually lies in how people move between places in Jakarta where they always using their own vehicle like cars, and motorcycles that fill most of the street in Jakarta. Among much other public transportations that roams the street of Jakarta, Buses is believed to be an efficient transportation that can move many people at once. However, the location of the bus stop is now have moved to the middle of the main road, and its too far for the nearby residence to access to it. This paper proposes an optimal location of optimal bus stops in West Jakarta that is experimentally proven to have a maximal distance of 350 m. The optimal location is estimated by means of mean shift clustering method while the optimal routes are calculated using Ant Colony algorithm. The bus stops locations rate of error is 0.07% with overall route area of 32 km. Based on our experiments, we believe our proposed bus stop plan can be an interesting alternative to reduce traffic congestion in West Jakarta.

  16. CARS Diagnostics of High Pressure Combustion.

    Science.gov (United States)

    1982-11-01

    e) 8. CONTRACT OR GRANT NUMBER(e) J. H. Stufflebeam t JDAAG29- 79-C-0008J %A,, Shirley R,,. Hall 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10...also the work in N2 at elevated tem- perature up to 30 atmospheres. John H. Stufflebeam continued the high pressure CARS work under the contract...Spectroscopy, Bordeaux, France, September 1982. 12. J. H. Stufflebeam , J. F. Verdieck, and R. J. Hall: CARS Diagnostics of High Pressure and

  17. GLYCAN-DIRECTED CAR-T CELLS.

    Science.gov (United States)

    Steentoft, Catharina; Migliorini, Denis; King, Tiffany R; Mandel, Ulla; June, Carl H; Posey, Avery D

    2018-01-23

    Cancer immunotherapy is rapidly advancing in the treatment of a variety of hematopoietic cancers, including pediatric acute lymphoblastic leukemia and diffuse large B cell lymphoma, with chimeric antigen receptor (CAR)-T cells. CARs are genetically encoded artificial T cell receptors that combine the antigen specificity of an antibody with the machinery of T cell activation. However, implementation of CAR technology in the treatment of solid tumors has been progressing much slower. Solid tumors are characterized by a number of challenges that need to be overcome, including cellular heterogeneity, immunosuppressive tumor microenvironment (TME), and, in particular, few known cancer-specific targets. Post-translational modifications that differentially occur in malignant cells generate valid cell surface, cancer-specific targets for CAR-T cells. We previously demonstrated that CAR-T cells targeting an aberrant O-glycosylation of MUC1, a common cancer marker associated with changes in cell adhesion, tumor growth, and poor prognosis, could control malignant growth in mouse models. Here, we discuss the field of glycan-directed CAR-T cells and review the different classes of antibodies specific for glycan-targeting, including the generation of high affinity O-glycopeptide antibodies. Finally, we discuss historic and recently investigated glycan targets for CAR-T cells and provide our perspective on how targeting the tumor glycoproteome and/or glycome will improve CAR-T immunotherapy. © The Author(s) 2018. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  18. Bluetooth based function control in a car

    Science.gov (United States)

    Karthikeyan, P.; Sumanth, N.; Jude, S.

    2017-11-01

    This paper aims to show the various functions that can be controlled in a Car using the Wireless Bluetooth Technology. Due to the portable and wireless nature of this technology, it is easier for the end user to operate the functions in a car. The functions that are built into the system can be used from a distance of 10 meters. The Passive Keyless System and the Remote Keyless System methodologies are adopted. These are operated by the ATMEGA328P microcontroller.

  19. Situations of car-to-pedestrian contact.

    Science.gov (United States)

    Matsui, Yasuhiro; Hitosugi, Masahito; Takahashi, Kunio; Doi, Tsutomu

    2013-01-01

    To reduce the severity of injuries and the number of pedestrian deaths in traffic accidents, active safety devices providing pedestrian detection are considered effective countermeasures. The features of car-to-pedestrian collisions need to be known in detail to develop such safety devices. Because information on real-world accidents is limited, this study investigated near-miss situations captured by drive recorders installed in passenger cars. We showed similarities of the contact situation between near-miss incidents and real-world fatal pedestrian accidents in Japan. We analyzed the near-miss incident data via video capturing pedestrians crossing the road in front of forward-moving cars. Using a video frame captured by a drive recorder, the time to collision (TTC) was calculated from the car velocity and the distance between the car and pedestrian at the moment that the pedestrian initially appeared. The average TTC in the cases where pedestrians were not using a pedestrian crossing was shorter than that in the cases where pedestrians were using a pedestrian crossing. The average TTC in the cases where pedestrians emerged from behind obstructions was shorter than that in the cases where drivers had unobstructed views of the pedestrians. We propose that the specifications of the safety device for pedestrian detection and automatic braking should reflect the severe approach situation for a pedestrian and car including the TTC observed for near-miss incidents.

  20. PENGALAMAN REMAJA BERUSIA DI BAWAH 18 TAHUN DALAM BERMAIN GRAND THEFT AUTO GAME

    Directory of Open Access Journals (Sweden)

    Fikri Yumna Aqila

    2017-06-01

    Full Text Available GTA (Grand Theft Auto is a video game containing sexual and violent content classified as a mature category (18+. However in Indonesia, this video game is often played by teenegers under 18 years old. This research purposes to describe teeneger’s experience on playing GTA game and the factors influencing them to play the game. The informants of this research are 6 teenegers who have been playing this game with under 18 years old obtained by using snowball sample technique. The method used in this research is qualitative with phenomenological approach. The data were collected through semi-structured interview. The result of this research shows that teenegers who play this game said that they could gain new experiences like being outside of country situation. For teenegers it was exciting because they could perform things that they could not do in the real life like kill, rob, and fight beetwen gang. The factors influencing them to play GTA game come from their playmates, parent’s supervision, and also education level. Playmates are the main cause for teenegers to play GTA game. Teenagers playing GTA game without parent's supervision will tend to get negative impact. While higher level of teeneger education decreases the intensity of playing GTA game. Therefore, in order to minimize negative impact obtained by teenegers in playing GTA game, it requires the parent supervision so that the teenegers know time limit to play and the certain behavior in the game that may or may not be imitated in the real life.

  1. Open literature review of threats including sabotage and theft of fissile material transport in Japan

    International Nuclear Information System (INIS)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-01-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty

  2. Expectations while car following--the consequences for driving behaviour in a simulated driving task.

    Science.gov (United States)

    Muhrer, Elke; Vollrath, Mark

    2010-11-01

    The purpose of this study was to better understand the causes of driver errors in the context of rear-end crashes. When drivers move in traffic they generate an overall assessment of the driving situation and what will happen in the near future. Certain cues in the traffic environment may create an expectation that some specific action is required. The more relevant cues are present, the more the driver will expect that some kind of intervention may be required. In contrary, if hardly any or no relevant cues are present, the driver does not anticipate that an imminent reaction will be necessary. This idea is supported by results from accident analyses which showed that in many cases, rear-end crashes occur in situations which are usually easy to handle (e.g. straight roads, low traffic density). In these situations, drivers may not anticipate that the driver in front will brake and they are thus following too closely to be able to react in time when the front vehicle suddenly brakes or stops. In order to test this hypothesis experimentally, in a driving simulator experiment different expectations were generated by varying the behaviour of a lead car (different braking behaviour, signalling or not before a turn). Driver behaviour was examined after these variations. The analyses partially confirm the influence of different expectations generated by the lead car's behaviour in the first phase of the scenario. Drivers with a respective expectation reacted faster when the car in front suddenly braked and signalled their manoeuvre before turning right at an intersection. However, during a car following phase, drivers did not adapt their speed or distance depending on this expectation. These results can be used to adapt a driver assistance system in car following situations. This should warn and intervene, especially in cases when drivers do not foresee the need for action and therefore cannot react in time. 2010 Elsevier Ltd. All rights reserved.

  3. Modelling strategic responses to car and fuel taxation

    NARCIS (Netherlands)

    Heijnen, P.; Kooreman, P.

    We develop a model to analyse the interactions between actors involved in car and fuel taxation: consumers, car producers, fuel producers and the government. Heterogeneous consumers choose between two versions of a car that differ in engine type (diesel or gasoline). Car manufacturers and fuel

  4. Car User Taxes, Quality Characteristics, and Fuel Efficiency

    NARCIS (Netherlands)

    de Borger, B.; Rouwendal, J.

    2014-01-01

    We study the impact of car user taxes on vehicle quality and demand for kilometres. First, holding car prices fixed, we find that a higher fuel tax leads households to choose cars of better fuel efficiency, provided that the demand for car use is inelastic. Surprisingly, a higher kilometre tax

  5. Car mass and fatality risk: has the relationship changed?

    Science.gov (United States)

    Evans, L; Frick, M C

    1994-01-01

    The finding that the relative safety disadvantage of small compared with large cars is less for post-1980 cars than for pre-1980 cars has stimulated speculation that increasing fuel economy standards would increase fatalities less than previously expected. Fatal crashes between two cars of similar model year were examined to see whether this would be the case. Driver fatality risk in relation to car mass was examined with Fatal Accident Reporting System data for crashes between two cars of a specific model year. The relative risk for driver fatality in the lighter car compared with the other driver's risk in a car 50% heavier was as follows: for 1966 through 1979 cars, the risk was between 3.7 and 5.1; for 1984 cars, 2.6; and for 1990 cars, 4.1. The results suggest that the lesser mass effect observed for mid-1980s cars occurred because improved crashworthiness features appeared in small cars earlier than in large cars. As all cars are redesigned, the relationship between risk and mass can be expected to approach that observed earlier in pre-1980 cars. If so, future fatality increases from fuel economy increases will be greater than estimated on the basis of mid-1980 data.

  6. 49 CFR 231.9 - Tank cars without end sills.

    Science.gov (United States)

    2010-10-01

    ... clearance, within 30 inches of side of car, until car is shopped for work amounting to practically... 49 Transportation 4 2010-10-01 2010-10-01 false Tank cars without end sills. 231.9 Section 231.9..., DEPARTMENT OF TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.9 Tank cars without end sills. (a...

  7. 49 CFR 231.7 - Tank cars with side platforms.

    Science.gov (United States)

    2010-10-01

    ...-ladder clearance, within 30 inches of side of car, until car is shopped for work amounting to practically... 49 Transportation 4 2010-10-01 2010-10-01 false Tank cars with side platforms. 231.7 Section 231.7..., DEPARTMENT OF TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.7 Tank cars with side platforms. (a...

  8. 49 CFR 231.11 - Caboose cars without platforms.

    Science.gov (United States)

    2010-10-01

    ... inches end-ladder clearance, within 30 inches of side of car, until car is shopped for work amounting to... 49 Transportation 4 2010-10-01 2010-10-01 false Caboose cars without platforms. 231.11 Section 231... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.11 Caboose cars without...

  9. 49 CFR 223.15 - Requirements for existing passenger cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Requirements for existing passenger cars. 223.15... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION SAFETY GLAZING STANDARDS-LOCOMOTIVES, PASSENGER CARS AND CABOOSES Specific Requirements § 223.15 Requirements for existing passenger cars. (a) Passenger cars built or...

  10. 49 CFR 215.303 - Stenciling of restricted cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Stenciling of restricted cars. 215.303 Section 215... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Stenciling § 215.303 Stenciling of restricted cars. (a) Each restricted railroad freight car that is described in § 215.205(a) of...

  11. 30 CFR 57.19079 - Blocking mine cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Blocking mine cars. 57.19079 Section 57.19079... Hoisting Procedures § 57.19079 Blocking mine cars. Where mine cars are hoisted by cage or skip, means for blocking cars shall be provided at all landings and also on the cage. ...

  12. 30 CFR 56.19079 - Blocking mine cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Blocking mine cars. 56.19079 Section 56.19079... Hoisting Procedures § 56.19079 Blocking mine cars. Where mine cars are hoisted by cage or skip, means for blocking cars shall be provided at all landings and also on the cage. ...

  13. 49 CFR 173.319 - Cryogenic liquids in tank cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cryogenic liquids in tank cars. 173.319 Section... cars. (a) General requirements. (1) A tank car containing a flammable cryogenic liquid may not be shipped unless it was loaded by, or with the consent of, the owner of the tank car. (2) The amount of...

  14. 49 CFR 218.80 - Movement of occupied camp cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Movement of occupied camp cars. 218.80 Section 218... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD OPERATING PRACTICES Protection of Occupied Camp Cars § 218.80 Movement of occupied camp cars. Occupied cars may not be humped or flat switched unless coupled to...

  15. 19 CFR 151.26 - Molasses in tank cars.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Molasses in tank cars. 151.26 Section 151.26....26 Molasses in tank cars. When molasses is imported in tank cars, the importer shall file with the... sugars or the character of the molasses in the different cars. ...

  16. 49 CFR 215.119 - Defective freight car truck.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Defective freight car truck. 215.119 Section 215... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Freight Car Components Suspension System § 215.119 Defective freight car truck. A railroad may not place or continue in service a...

  17. Intelligent Bus Stops in the Flexible Bus Systems

    Directory of Open Access Journals (Sweden)

    Razi Iqbal

    2014-09-01

    Full Text Available The purpose of this paper is to discuss Intelligent Bus Stops in a special Demand Responsive Transit (DRT, the Flexible Bus System. These Intelligent Bus Stops are more efficient and information rich than Traditional Bus Stops. The real time synchronization of the Flexible Bus System makes it unique as compared to Traditional Bus Systems. The Main concern is to make Bus Stops intelligent and information rich. Buses are informed about the no. of passengers waiting at the upcoming Bus Stops. If there are no passengers to ride or get off on upcoming Bus Stop, the Bus can skip that Bus Stop and head towards the next Bus Stop where passenger is waiting, which will decrease the ride time of the passengers on the Bus and also the wait time of the passengers waiting on the upcoming Bus Stops. Providing more information at Bus Stops about the Destination (Time to Destination, Distance to Destination etc. and Buses (Bus Location, Arrival Time of Bus etc. makes it easier for the passengers to decide whether to ride a particular Bus or not.

  18. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus).

    Science.gov (United States)

    Brandlová, Karolína; Bartoš, Luděk; Haberová, Tamara

    2013-01-01

    Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus) and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves) or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female). Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts) the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  19. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  20. REMOTE CONTROLLED CAR HEATER USING A RASPBERRY PI

    OpenAIRE

    Loukola, Petrik

    2015-01-01

    In this thesis, the goal was to design and implement a technology with which the user can control the car heaters and monitor the car temperature via Wi-Fi network and web browser. The idea for this project came from the Finnish cold climate. Winters in Finland can be very cold and if the car owners want to drive their cars, it is recommended to preheat the car engine and interior before driving the car. This will make driving safer, the car will make less pollution, better for the engines li...