WorldWideScience

Sample records for stopping car theft

  1. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  2. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    OpenAIRE

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  3. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  4. Car Stopping Distance on a Tabletop

    Science.gov (United States)

    Haugland, Ole Anton

    2013-01-01

    Stopping distances in car braking can be an intriguing topic in physics teaching. It illustrates some basic principles of physics, and sheds valuable light on students' attitude towards aggressive driving. Due to safety considerations, it can be difficult to make experiments with actual car braking. (Contains 2 figures.)

  5. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  6. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  7. The tariff for fire and theft car insurance: analysis with a Cox model

    OpenAIRE

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  8. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  9. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    OpenAIRE

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  10. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  11. DETERMINATION OF THE DELAY DEPARTURE TIME OF THE BUS FROM STOPPING POINT INTO THE CAR FLOW

    Directory of Open Access Journals (Sweden)

    P. Gorbachov

    2014-10-01

    Full Text Available An analytical model for estimation of the bus departure delax from the bus stopping point after passenger loading is presented. The model allows to take into account the traffic density on a particular road section of the transport network, as well as the bus parameters.

  12. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  13. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  14. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  15. Cars, Cars, Cars

    Science.gov (United States)

    McIntosh, Phyllis

    2013-01-01

    Cars are the focus of this feature article, which explores such topics as the history of cars in the United States, the national highway system, safety and pollution concerns, mobility and freedom for women, classic car shows, and the road trip in American literature and film. Also included are links to the websites of Automobile in American Life…

  16. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  17. Brake response time is significantly impaired after total knee arthroplasty: investigation of performing an emergency stop while driving a car.

    Science.gov (United States)

    Jordan, Maurice; Hofmann, Ulf-Krister; Rondak, Ina; Götze, Marco; Kluba, Torsten; Ipach, Ingmar

    2015-09-01

    The objective of this study was to investigate whether total knee arthroplasty (TKA) impairs the ability to perform an emergency stop. An automatic transmission brake simulator was developed to evaluate total brake response time. A prospective repeated-measures design was used. Forty patients (20 left/20 right) were measured 8 days and 6, 12, and 52 wks after surgery. Eight days postoperative total brake response time increased significantly by 30% in right TKA and insignificantly by 2% in left TKA. Brake force significantly decreased by 35% in right TKA and by 25% in left TKA during this period. Baseline values were reached at week 12 in right TKA; the impairment of outcome measures, however, was no longer significant at week 6 compared with preoperative values. Total brake response time and brake force in left TKA fell below baseline values at weeks 6 and 12. Brake force in left TKA was the only outcome measure significantly impaired 8 days postoperatively. This study highlights that categorical statements cannot be provided. This study's findings on automatic transmission driving suggest that right TKA patients may resume driving 6 wks postoperatively. Fitness to drive in left TKA is not fully recovered 8 days postoperatively. If testing is not available, patients should refrain from driving until they return from rehabilitation.

  18. Gun Theft and Crime.

    Science.gov (United States)

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  19. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  20. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  1. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  2. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  3. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  4. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  5. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    OpenAIRE

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  6. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  7. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  8. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  9. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    OpenAIRE

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  10. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  11. Car stickers for 2011

    CERN Multimedia

    GS Department

    2010-01-01

    The 2011 car stickers are now available. Holders of blue car stickers will receive their 2011 car stickers by internal mail as of 15 December.   Holders of red car stickers are kindly requested to come to the Registration Service (Building 55,1st floor) to renew their 2011 stickers. This service is open from Monday to Friday from 7.30 am to 5.30 pm non-stop. Documents for the vehicles concerned must be presented. Reception and Access Control Service – GS/ISG/SIS General Infrastructure Services Department

  12. Car stickers for 2012

    CERN Multimedia

    GS Department

    2011-01-01

    The 2012 car stickers are now available. Holders of blue car stickers will receive by internal mail their 2012 car stickers as of 5 December. Holders of red car stickers are kindly requested to come to the Registration Service (Building 55,1st floor) to renew their 2011 stickers. This service is open from Monday to Friday from 7.30 am to 5.30 pm non-stop. Documents related to the vehicles concerned are mandatory. Reception and Access Control Service – GS/IS/SIS General Infrastructure Services Department

  13. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  14. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  15. 25 CFR 11.412 - Theft.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  16. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  17. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  18. Deterring and remedying employee theft.

    Science.gov (United States)

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  19. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  20. Design of an intelligent car

    Science.gov (United States)

    Na, Yongyi

    2017-03-01

    The design of simple intelligent car, using AT89S52 single chip microcomputer as the car detection and control core; The metal sensor TL - Q5MC induction to iron, to detect the way to send feedback to the signal of single chip microcomputer, make SCM according to the scheduled work mode to control the car in the area according to the predetermined speed, and the operation mode of the microcontroller choose different also can control the car driving along s-shaped iron; Use A44E hall element to detect the car speeds; Adopts 1602 LCD display time of car driving, driving the car to stop, take turns to show the car driving time, distance, average speed and the speed of time. This design has simple structure and is easy to implement, but are highly intelligent, humane, to a certain extent reflects the intelligence.

  1. Prototipe Critting Badot (Car Security System Monitoring Based On STNK)

    OpenAIRE

    Nasruloh, Agan; Kurniawan, Deny; Subekti, Massus

    2017-01-01

    The crime of burglary vehicle accompanied also by forgery vehicle registration certificate of vehicle number.For it, needed CRITING BADOT (Car Security System Monitoring Based On Stnk), an apparatus capable of preventing motor vehicle theft by means of technology RFID and SMS Gateway, blends the ignition and vehicle registration into a single entity, change the key of the car being contact id card, capable of being on the monitoring of the position the car.This tool requires the driver to be ...

  2. Brake to the theft of fuels

    International Nuclear Information System (INIS)

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  3. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  4. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  5. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  6. Current trends in copper theft prevention

    Energy Technology Data Exchange (ETDEWEB)

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  7. Overt theft and the peculiarities of the qualification

    OpenAIRE

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  8. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    OpenAIRE

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  9. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  10. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  11. CERN car stickers 2005

    CERN Multimedia

    Reception and Access Control Service - TS Department

    2004-01-01

    Please note that the car stickers for 2005 are now available. If you have not received the new one by internal mail, you should go along in person to the Registration Service (bldg. 55 - 1st floor), open non-stop from 7:30 to 16:30, taking with you your 2004 sticker and the log-book of your vehicle. Thank you for your collaboration. Reception and Access Control Service - TS Department.

  12. Combating employee theft in the healthcare industry.

    Science.gov (United States)

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  13. Car Sickness

    Science.gov (United States)

    ... Preventable Diseases Healthy Children > Health Issues > Conditions > Head Neck & Nervous System > Car Sickness Health Issues Listen Español Text Size Email Print Share Car Sickness Page Content ...

  14. Car stickers for 2009

    CERN Multimedia

    TS Department

    2008-01-01

    All members of the personnel holding a valid contract (except owners of cars with green or CD plates) can come to the Registration Service (Building 55, 1st floor) to obtain their 2009 car sticker, Mondays to Fridays from 7.30 a.m. to 4.00 p.m. non-stop. Please ensure you bring with you the documents relating to the vehicles(s) concerned. If you only wish to register one vehicle, you can obtain the 2009 sticker using the request form on the Web (via internet Explorer only). NB: This notice only applies to members of the personnel who obtained one or several blue car stickers for 2008. Reception and Access Control Service – TS/FM

  15. The Engine Immobilizer : a Non-Starter For Car Thieves

    NARCIS (Netherlands)

    van Ours, J.C.; Vollaard, B.A.

    2013-01-01

    We provide evidence for a beneficial welfare impact of a crime policy that is targeted at strenghtening victim precaution. Regulation made application of the electronic engine immobilizer, a simple and low-cost anti-theft device, mandatory for all new cars sold within the European Union as of 1998.

  16. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  17. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  18. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  19. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  20. 26 CFR 1.165-8 - Theft losses.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  1. 14 CFR 1214.609 - Loss or theft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  2. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  3. 27 CFR 24.265 - Losses by theft.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  4. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  5. 30 CFR 56.14215 - Coupling or uncoupling cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Coupling or uncoupling cars. 56.14215 Section... Equipment Safety Practices and Operational Procedures § 56.14215 Coupling or uncoupling cars. Prior to coupling or uncoupling cars manually, trains shall be brought to a complete stop, and then moved at minimum...

  6. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  7. Electrical injuries due to theft of copper.

    Science.gov (United States)

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  8. Car stickers for 2010

    CERN Multimedia

    GS Department

    The 2010 car stickers are now available. Holders of blue stickers will receive their 2010 stickers through the internal mail from 1st December onwards. Holders of red stickers are required to go to the Registration Service (Building 55, first floor), which is open non-stop from 7.30 a.m. to 4.00 p.m. Mondays to Fridays, in order to obtain their new stickers. They will be asked to present documents relating to the vehicles concerned. Owners of vehicles registered on green and CD plates should disregard this message. Reception and Access Control Service – GS/SEM/LS

  9. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  10. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  11. Money and Credit With Limited Commitment and Theft

    OpenAIRE

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  12. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Science.gov (United States)

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  13. Car sick.

    Science.gov (United States)

    Renner, M G

    1988-01-01

    The automobile is currently seen as the most desirable mode of transportation. However, this view needs to be changed since the proliferation of the automobile worldwide is leading to the poisoning of the environment and people. In the US the number of passenger cars grew 51% between 1971-86 and in the noncommunist industrialized community that figure is 71%. The gasoline and diesel fuel used to power the overwhelming majority of cars creates a variety of problems. The pollution is estimated to have a hidden cost of US $.80/gallon. Others estimate that the pollution causes 30,000 premature deaths annually just in the US. 75% of the carbon monoxide (CO), 48% of nitrogen oxides (NO2), 13% of particulates (P), and 3% of sulfur (S) emissions come from cars in the countries of the Organization for Economic Cooperation and Development (OECD), which includes the US, Canada, Western Europe, Japan, Australia, and New Zealand. 17% of all worldwide carbon dioxide (CO2) emission comes from the production and use of fossil fuels for cars. The single biggest problem associated with cars is the photochemical smog they create in urban areas. In 1986 75 million Americans lived in areas that failed to meet national air quality standards for CO, P, and ozone (03). The only area of major improvement has been the removal of lead from gasoline. It was known to cause problems from the beginning of its use in the 1920s, but remained for 50 years because of auto and oil company pressure. Ground 03 is estimated by the US government to cost US $4 billion in annual losses, just for corn, wheat, soybeans, and peanuts. Acid rain is the other major problem associated with cars, and its damage is estimated at US $5 billion annually. Both these problems are shortterm, their effects occur immediately; the longterm disadvantage is the build up of CO2 and its contribution to the greenhouse effect. While the US is at the forefront of regulation and many other countries are modeling their emission

  14. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  15. Clean cars

    Energy Technology Data Exchange (ETDEWEB)

    Piffaretti, M.

    2008-07-01

    This well-illustrated presentation made at the Swiss 2008 research conference on traffic by the Protoscar company takes a look at research, design, engineering and communication topics in the area of 'clean cars'. The present situation with electrically driven and hybrid-drive cars is reviewed and the chances and problems of the present-day vehicles are examined. New developments and a number of vehicles that should be on the market in the period from 2012 to 2015 are presented. Also, 'clean' specialist vehicles such as trucks and buses are reviewed. Battery systems and associated problems and new developments are looked at. The promotion scheme in Mendrisio, Switzerland is reviewed. Bottom-up and top-down approaches are discussed and future market developments are looked at, as are promotional activities in various countries.

  16. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  17. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  18. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  19. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  20. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  1. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  2. Fighting the scourge of metal theft.

    Science.gov (United States)

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  3. Dog Theft: A Case for Tougher Sentencing Legislation.

    Science.gov (United States)

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  4. Will Brazil's cars go on the wagon?

    International Nuclear Information System (INIS)

    Homewood, B.

    1993-01-01

    The use of ethanol as an alternative fuel for cars in Brazil, may shortly be reduced. Falling world oil prices have meant that ethanol, derived from sugar cane, following a fourteen year research program, has ceased to be a financially viable replacement for petrol. Although about a third of Brazil's cars are at present powered by ethanol, only substantial government subsidies could reinstate this fuel despite its reduced pollutant status. Government officials now predict that ethanol will become merely a petrol additive and production of ethanol cars will have stopped by the year 2000. (UK)

  5. Stop smoking support programs

    Science.gov (United States)

    Smokeless tobacco - stop smoking programs; Stop smoking techniques; Smoking cessation programs; Smoking cessation techniques ... You can find out about smoking cessation programs from: Your ... Your employer Your local health department The National Cancer ...

  6. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  7. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  8. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  9. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  10. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  11. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  12. 7 CFR 331.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  13. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  14. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  15. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  16. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  17. CAR STICKERS

    CERN Multimedia

    Access and Control Service

    2004-01-01

    Following to the operational circular No2 title III. Conditions of access, paragraph 21 . Except in the case of exemptions authorized by the Director-General, all drivers must facilitate the identification of their vehicle. For CERN car stickers to be valid in 2004, they must have the numbers 04 printed on them. As of Monday, March 15th, the security agents on duty at the various access points will have no alternative but to refuse entry to vehicles which do not have a valid sticker. Anyone in this situation is requested to follow the regularization procedure either by logging on to the web site, or by going in person to the registration service in bldg. 55, first floor, between 07h30 et 16h30, Monday through Friday. Access and Control Service - FM Group, TS Department

  18. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  19. Car Seat Safety

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español Car Seat Safety KidsHealth / For Parents / Car Seat Safety ... certified child passenger safety technician.) Guidelines for Choosing Car Seats Choose a seat with a label that ...

  20. Jet Car Track Site

    Data.gov (United States)

    Federal Laboratory Consortium — Located in Lakehurst, New Jersey, the Jet Car Track Site supports jet cars with J57 engines and has a maximum jet car thrust of 42,000 pounds with a maximum speed of...

  1. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Science.gov (United States)

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  2. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  3. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  4. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    OpenAIRE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  5. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  6. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Science.gov (United States)

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  7. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  8. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  9. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  10. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  11. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  12. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  13. Car Club

    CERN Multimedia

    Automobile Club

    2012-01-01

    The Car Club wishes all its members Good road and Happy New Year 2012. It is time to think about renewing your subscription for this year, at a cost of 50 CHF, unchanged since several years. For those of you who are regular users of our equipment and who know all the advantages that the club is in a position to offer, it seems pointless to going to more details, as we are sure that many of you have made use of them and are satisfied. Therefore don’t forget to fill in the payment slip to continue to be a part of our large family. We remind you that everyone who works on the CERN site can be members of our club, this includes industrial support personnel and the personnel of companies which have a contract with CERN. If you are not yet a member, come and visit us! We will be happy to welcome you and show you the installations, alternatively you can visit our web site: http://club-acc.web.cern.ch/club-acc/ The use of the club’s installations is strictly reserved for members. Pour t...

  14. Agutaynen Glottal Stop.

    Science.gov (United States)

    Quakenbush, J. Stephen

    A study investigated the phonemic and morphophonemic patterning of the glottal stop in Agutaynen, a Meso-Philippine language, and some comparison with two northern Philippine languages. Agutaynen glottal stop has as its sole origin a neutralization of contrast rule, the operation of which can be noted in three different linguistic environments.…

  15. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  16. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  17. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  18. Developmental Trajectories of Male Physical Violence and Theft

    Science.gov (United States)

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  19. On the electricity shortage, price and electricity theft nexus

    International Nuclear Information System (INIS)

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  20. Luminescent beam stop

    Energy Technology Data Exchange (ETDEWEB)

    Bryant, Diane; Morton, Simon A.

    2017-10-25

    This disclosure provides systems, methods, and apparatus related to beam stops. In one aspect, a device comprises a luminescent material, a beam stop plate, and an optical fiber. The luminescent material is a parallelepiped having a first side and a second side that are squares and having a third side that is a rectangle or a square. The first side and the second side are perpendicular to the third side. The beam stop plate is attached to the first side of the luminescent material. The optical fiber has a first end and a second end, with the first end of the optical fiber attached to the third side of the luminescent material.

  1. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  2. "Stop Diabetes Now!"

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Diabetes "Stop Diabetes Now!" Past Issues / Fall 2009 Table of Contents ... Tips for Seniors at Risk for Type 2 Diabetes Lifestyle changes that lead to weight loss—such ...

  3. Depression - stopping your medicines

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000570.htm Depression - stopping your medicines To use the sharing features ... prescription medicines you may take to help with depression, anxiety, or pain. Like any medicine, there are ...

  4. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  5. Sim-based detection tools to minimize motorcycle theft

    Science.gov (United States)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  6. Dog Theft: A Case for Tougher Sentencing Legislation

    Science.gov (United States)

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  7. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  8. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  9. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  10. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  11. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  12. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  13. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  14. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  15. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  16. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  17. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  18. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  19. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  20. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  1. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  2. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  3. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  4. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  5. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  6. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  7. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  8. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    Science.gov (United States)

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  9. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  10. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  11. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  12. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  13. 42 CFR 73.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  14. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  15. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  16. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  17. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  18. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  19. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  20. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Science.gov (United States)

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  1. Creating a One-Stop-Shop for Automobile Solutions in Kolkata, India.

    OpenAIRE

    Kanoria, Shrivardhan

    2009-01-01

    This is a research lead business plan concerning making a one-stop-shop for automobile solutions in Kolkata, India, containing three elements of business. Firstly, it would involve restoration, buying and selling of vintage and classic cars. Secondly, it would contain modern car customisation. Thirdly, it would contain modern car servicing, buying and selling. These would be the core activities, having associates non core businesses as well.

  2. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  3. The Socialist Car

    DEFF Research Database (Denmark)

    Christensen, Lars K.

    2013-01-01

    Review of L.H. Siegelbaum (ed.) The Socialist Car. Automobility in the Eastern Block. Cornell University Press, 2011.......Review of L.H. Siegelbaum (ed.) The Socialist Car. Automobility in the Eastern Block. Cornell University Press, 2011....

  4. Cars, Cycles, and Consumers.

    Science.gov (United States)

    Idleman, Hillis K. Ed.

    The purpose of this consumer education module is to provide information and skills, and the ability to raise questions and find answers, while seeking the best automobile or motorcycle buy available for the money. The module may be used for a full or part semester course. The five sections (cars and the consumer, renting and leasing cars, cars and…

  5. Slow, stopped and stored light

    International Nuclear Information System (INIS)

    Welch, G.; Scully, M.

    2005-01-01

    Light that can been slowed to walking pace could have applications in telecommunications, optical storage and quantum computing. Whether we use it to estimate how far away a thunderstorm is, or simply take it for granted that we can have a conversation with someone on the other side of the world, we all know that light travels extremely fast. Indeed, special relativity teaches us that nothing in the universe can ever move faster than the speed of light in a vacuum: 299 792 458 ms sup - sup 1. However, there is no such limitation on how slowly light can travel. For the last few years, researchers have been routinely slowing light to just a few metres per second, and have recently even stopped it dead in its tracks so that it can be stored for future use. Slow-light has considerable popular appeal, deriving perhaps from the importance of the speed of light in relativity and cosmology. If everyday objects such as cars or people can travel faster than 'slow' light, for example, then it might appear that relativistic effects could be observed at very low speeds. Although this is not the case, slow light nonetheless promises to play an important role in optical technology because it allows light to be delayed for any period of time desired. This could lead to all-optical routers that would increase the bandwidth of the Internet, and applications in optical data storage, quantum information and even radar. (U.K.)

  6. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  7. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  8. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  9. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  10. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  11. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  12. New consumer load prototype for electricity theft monitoring

    International Nuclear Information System (INIS)

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  13. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  14. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  15. Reducing theft and embezzlement by encouraging ethical behavior.

    Science.gov (United States)

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  16. New consumer load prototype for electricity theft monitoring

    Science.gov (United States)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  17. Towards creating believable decoy project folders for detecting data theft

    NARCIS (Netherlands)

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  18. Tank car leaks gasoline

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    On January 27, 1994, a Canadian National (CN) tank car loaded with gasoline began to leak from a crack in the tank shell on the end of the car near the stub sill. The tank car had been damaged from impact switching. A part of the tank car was sent for laboratory analysis which concluded that: (1) the fracture originated in two locations in welds, (2) the cracks propagated in a symmetrical manner and progressed into the tank plate, (3) the fracture surface revealed inadequate weld fusion. A stress analysis of the tank car was conducted to determine the coupling force necessary to cause the crack. It was noted that over the last decade several problems have occurred pertaining to stub sill areas of tank cars that have resulted in hazardous material spills. An advisory was sent to Transport Canada outlining many examples where tank cars containing serious defects had passed CN inspections that were specifically designed to identify such defects. 4 figs

  19. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  20. Optimal Locations of Bus Stops Connecting Subways near Urban Intersections

    Directory of Open Access Journals (Sweden)

    Yuan Cui

    2015-01-01

    Full Text Available Unsuitable locations of bus stops which provide feeder transportation connecting subways near urban intersections usually lead to the low efficiency of public transport and level of passenger service. A multiobjective optimization model to distribute such stop locations is proposed to attain the shortest total walk distance of passengers and minimum delay time of cars through intersections and travel time of buses. The Pareto frontier and optimal solutions for the proposed model are given by the distance-based and enumerative methods. The Xizhimen bus stop is selected to implement case studies for verifying the validity of the proposed model. The analysis of sensitivity on possible solutions is also carried out in the case studies. The results show that the proposed model is capable of optimizing the locations of bus stops connecting subways near intersections and helpful to improve the level of passengers service and operational efficiency of public transportation.

  1. CAR2 - Czech Database of Car Speech

    Directory of Open Access Journals (Sweden)

    P. Sovka

    1999-12-01

    Full Text Available This paper presents new Czech language two-channel (stereo speech database recorded in car environment. The created database was designed for experiments with speech enhancement for communication purposes and for the study and the design of a robust speech recognition systems. Tools for automated phoneme labelling based on Baum-Welch re-estimation were realised. The noise analysis of the car background environment was done.

  2. CAR2 - Czech Database of Car Speech

    OpenAIRE

    Pollak, P.; Vopicka, J.; Hanzl, V.; Sovka, Pavel

    1999-01-01

    This paper presents new Czech language two-channel (stereo) speech database recorded in car environment. The created database was designed for experiments with speech enhancement for communication purposes and for the study and the design of a robust speech recognition systems. Tools for automated phoneme labelling based on Baum-Welch re-estimation were realised. The noise analysis of the car background environment was done.

  3. Stopping the unstoppable

    CERN Multimedia

    2002-01-01

    How do you stop two very high energy proton beams circulating in opposite directions around a 27-kilometre ring? The answer is the beam dumps. Two tunnels, pointing in opposite directions, are being constructed at point 6 of the LHC. These will allow the beams to be directed into two large beam dumps housed at the ends of the tunnels.

  4. Ready to stop

    DEFF Research Database (Denmark)

    Molitoris, Joseph; Dribe, Martin

    2016-01-01

    the Roteman Database for Stockholm, Sweden between 1878 and 1926 to examine the association of socioeconomic status and fertility and the adoption of stopping behaviour during the city's transition. Using piecewise constant hazard models and logistic regression, we find that a clear class pattern arises...

  5. The old-new car sticker

    CERN Multimedia

    2000-01-01

    You have had the same car sticker for ten years and have been driving in and out of CERN every day. Suddenly one morning the guard stops you and tells you need a new one. Hmmm ?! “There were 60 000 stickers in circulation in Geneva and we could not control wether the sticker had been distributed to the right person”, saysa Claude Ducastel, responsible for Entrance Security. “So to solve this problem, last year DSU decided to change Operational Circular N°2 and introduce new car stickers that will be changed every year.” Three types of car stickers were introduced: blue, green and red. The blue one is for staff members whose contract is for one year or more. It indicates the plate number of the car. The green one is for staff members whose contract is for less than one year. It indicates the plate number of the car and the date the contract of the employee terminates. It also has a big L for "Limited". The red one is for enterprise subcontractors whose contracts finish at the end of the year. If ...

  6. University of Calgary solar car set for American solar challenge

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This article described a solar car designed by a team from the University of Calgary for the 2010 American Solar Challenge, a 1100 mile race that starts in Tulsa, Oklahoma and ends 5 days later in Chicago, Illinois. The Shulich Axiom car is comprised of 2000 solar cells with batteries that can store enough power to drive the car for a 4-hour period. The car has a top speed of 140 km per hour and is totally powered by solar energy. The team has taken the car on a 5-day tour of Alberta, stopping in 7 communities across the province before heading back to Calgary. The team is one of only 2 Canadian teams competing in the challenge this year. 1 fig.

  7. Electric Car Special

    Energy Technology Data Exchange (ETDEWEB)

    Zoethout, T.; Belin, H.; Verwijs, H.; Nicola, S.; De Saint Jacob, Y.; Gatermann, R.

    2009-09-15

    In six articles, two columns and two interviews a part of this issue is dedicated to electric car developments: about winners and losers in the electric car race; a unique business model to rolling out the electric car by the electric battery company Better Place and the automobile industry Renault Nissan; interview with entrepreneur Shai Agassi of the Indian company Better Place; the development of electric cars in Germany; interview with Jean-Jacques Chanaron, an economist specialising in innovation management and a firm believer in electric cars; start of mass production of electric vehicles at the Japanese Nissan automobile industry; the constraints in Sweden in developing fuel-efficient automobiles; plans for 1 million electric or hybrid cars by 2025 in the Netherlands.

  8. Breaking car use habits

    DEFF Research Database (Denmark)

    Thøgersen, John; Møller, Berit Thorup

    2008-01-01

    Based on calls for innovative ways of reducing car traffic and research indicating that car driving is often the result of habitual decision-making and choice processes, this paper reports on a field experiment designed to test a tool aimed to entice drivers to skip the habitual choice of the car...... and consider using-or at least trying-public transport instead. About 1,000 car drivers participated in the experiment either as experimental subjects, receiving a free one-month travelcard, or as control subjects. As predicted, the intervention had a significant impact on drivers' use of public transport...... and it also neutralized the impact of car driving habits on mode choice. However, in the longer run (i.e., four months after the experiment) experimental subjects did not use public transport more than control subjects. Hence, it seems that although many car drivers choose travel mode habitually, their final...

  9. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-10-24

    ......... S-CLASS 22 10,189 2.1592 34 GENERAL MOTORS..... CHEVROLET HHR...... 172 80,781 2.1292 35 TOYOTA... MOTOR CO...... LINCOLN TOWN CAR... 24 11,596 2.0697 39 TOYOTA AVALON 45 22,030 2.0427 40 NISSAN 350Z 1....7552 50 TOYOTA CAMRY/SOLARA....... 781 447,882 1.7438 51 TOYOTA COROLLA 632 363,515 1.7386 52 HYUNDAI...

  10. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ... 10,189 2.1592 33 GENERAL MOTORS......... CHEVROLET HHR 172 80,781 2.1292 34 TOYOTA SCION TC 57 27,179... LINCOLN TOWN CAR....... 24 11,596 2.0697 38 TOYOTA AVALON 45 22,030 2.0427 39 NISSAN 350Z 1 503 1.9881 40....7898 48 GENERAL MOTORS......... CADILLAC CTS 91 50,926 1.7869 49 VOLVO S60 12 6,837 1.7552 50 TOYOTA...

  11. Investigation of RADTRAN Stop Model input parameters for truck stops

    International Nuclear Information System (INIS)

    Griego, N.R.; Smith, J.D.; Neuhauser, K.S.

    1996-01-01

    RADTRAN is a computer code for estimating the risks and consequences as transport of radioactive materials (RAM). RADTRAN was developed and is maintained by Sandia National Laboratories for the US Department of Energy (DOE). For incident-free transportation, the dose to persons exposed while the shipment is stopped is frequently a major percentage of the overall dose. This dose is referred to as Stop Dose and is calculated by the Stop Model. Because stop dose is a significant portion of the overall dose associated with RAM transport, the values used as input for the Stop Model are important. Therefore, an investigation of typical values for RADTRAN Stop Parameters for truck stops was performed. The resulting data from these investigations were analyzed to provide mean values, standard deviations, and histograms. Hence, the mean values can be used when an analyst does not have a basis for selecting other input values for the Stop Model. In addition, the histograms and their characteristics can be used to guide statistical sampling techniques to measure sensitivity of the RADTRAN calculated Stop Dose to the uncertainties in the stop model input parameters. This paper discusses the details and presents the results of the investigation of stop model input parameters at truck stops

  12. Optimally Stopped Optimization

    Science.gov (United States)

    Vinci, Walter; Lidar, Daniel

    We combine the fields of heuristic optimization and optimal stopping. We propose a strategy for benchmarking randomized optimization algorithms that minimizes the expected total cost for obtaining a good solution with an optimal number of calls to the solver. To do so, rather than letting the objective function alone define a cost to be minimized, we introduce a further cost-per-call of the algorithm. We show that this problem can be formulated using optimal stopping theory. The expected cost is a flexible figure of merit for benchmarking probabilistic solvers that can be computed when the optimal solution is not known, and that avoids the biases and arbitrariness that affect other measures. The optimal stopping formulation of benchmarking directly leads to a real-time, optimal-utilization strategy for probabilistic optimizers with practical impact. We apply our formulation to benchmark the performance of a D-Wave 2X quantum annealer and the HFS solver, a specialized classical heuristic algorithm designed for low tree-width graphs. On a set of frustrated-loop instances with planted solutions defined on up to N = 1098 variables, the D-Wave device is between one to two orders of magnitude faster than the HFS solver.

  13. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  14. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  15. How Can I Stop Cutting?

    Science.gov (United States)

    ... Educators Search English Español How Can I Stop Cutting? KidsHealth / For Teens / How Can I Stop Cutting? ... in a soft, cozy blanket Substitutes for the Cutting Sensation You'll notice that all the tips ...

  16. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  17. Copper wire theft and high voltage electrical burns.

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  18. Copper wire theft and high voltage electrical burns

    OpenAIRE

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  19. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  20. UV exposure in cars.

    Science.gov (United States)

    Moehrle, Matthias; Soballa, Martin; Korn, Manfred

    2003-08-01

    There is increasing knowledge about the hazards of solar and ultraviolet (UV) radiation to humans. Although people spend a significant time in cars, data on UV exposure during traveling are lacking. The aim of this study was to obtain basic information on personal UV exposure in cars. UV transmission of car glass samples, windscreen, side and back windows and sunroof, was determined. UV exposure of passengers was evaluated in seven German middle-class cars, fitted with three different types of car windows. UV doses were measured with open or closed windows/sunroof of Mercedes-Benz E 220 T, E 320, and S 500, and in an open convertible car (Mercedes-Benz CLK). Bacillus subtilis spore film dosimeters (Viospor) were attached to the front, vertex, cheeks, upper arms, forearms and thighs of 'adult' and 'child' dummies. UV wavelengths longer than >335 nm were transmitted through car windows, and UV irradiation >380 nm was transmitted through compound glass windscreens. There was some variation in the spectral transmission of side windows according to the type of glass. On the arms, UV exposure was 3-4% of ambient radiation when the car windows were shut, and 25-31% of ambient radiation when the windows were open. In the open convertible car, the relative personal doses reached 62% of ambient radiation. The car glass types examined offer substantial protection against short-wave UV radiation. Professional drivers should keep car windows closed on sunny days to reduce occupational UV exposure. In individuals with polymorphic light eruption, produced by long-wave UVA, additional protection by plastic films, clothes or sunscreens appears necessary.

  1. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  2. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  3. Kleptomania or common theft - diagnostic and judicial difficulties.

    Science.gov (United States)

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  4. Retroactive Stop Loss Special Pay

    Science.gov (United States)

    Pay (RSLSP), providing $500 for each month/partial month served in stop loss status. Service members served under stop loss must submit a claim for the special pay. Throughout the year, the services have or extension of service, became ineligible to receive retroactive stop loss special pay. There may be

  5. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  6. The Electric Cars Challenge

    Science.gov (United States)

    Roman, Harry T.

    2011-01-01

    Over 100 years ago, the great inventor Thomas Edison warned that gasoline cars would pollute the environment and lead to gasoline shortages. He preferred the use of clean electric vehicles. He also put his money where his mouth was and developed an entirely new alkaline storage battery system for his beloved cars, the nickel-iron storage battery.…

  7. Collaborative Car Pooling System

    OpenAIRE

    João Ferreira; Paulo Trigo; Porfírio Filipe

    2009-01-01

    This paper describes the architecture for a collaborative Car Pooling System based on a credits mechanism to motivate the cooperation among users. Users can spend the accumulated credits on parking facilities. For this, we propose a business model to support the collaboration between a car pooling system and parking facilities. The Portuguese Lisbon-s Metropolitan area is used as application scenario.

  8. City Car = The City Car / Andres Sevtshuk

    Index Scriptorium Estoniae

    Sevtshuk, Andres, 1981-

    2008-01-01

    Massachusettsi Tehnoloogiainstituudi (MIT) meedialaboratooriumi juures tegutseva Targa Linna Grupi (Smart City Group) ja General Motorsi koostööna sündinud kaheistmelisest linnasõbralikust elektriautost City Car. Nimetatud töögrupi liikmed (juht William J. Mitchell, töögruppi kuulus A. Sevtshuk Eestist)

  9. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  10. GMSB with light stops

    Energy Technology Data Exchange (ETDEWEB)

    Delgado, Antonio [Department of Physics, University of Notre Dame,225 Nieuwland Science Hall, IN 46556, Notre Dame (United States); Theory Division, Physics Department CERN,CH-1211 Geneva 23 (Switzerland); Garcia-Pepin, Mateo [Institut de Física d’Altes Energies, Universitat Autònoma de Barcelona,08193 Bellaterra, Barcelona (Spain); Quiros, Mariano [ICREA at Institut de Física d’Altes Energies, Universitat Autònoma de Barcelona,08193 Bellaterra, Barcelona (Spain)

    2015-08-31

    Gauge mediated supersymmetry breaking (GMSB) is an elegant mechanism to transmit supersymmetry breaking from the hidden to the MSSM observable sector, which solves the supersymmetric flavor problem. However, the smallness of the generated stop mixing requires superheavy stops to reproduce the experimental value of the Higgs mass. A possible way out is to extend the MSSM Higgs sector with singlets and/or triplets providing extra tree-level corrections to the Higgs mass. Singlets will not get any soft mass from GMSB and triplets will contribute to the ρ parameter which could be an issue. In this paper we explore the second possibility by introducing extra supersymmetric triplets with hypercharges Y=(0,±1), with a tree-level custodial SU(2){sub L}⊗SU(2){sub R} global symmetry in the Higgs sector protecting the ρ parameter: a supersymmetric generalization of the Georgi-Machacek model, dubbed as supersymmetric custodial triplet model (SCTM). The renormalization group running from the messenger to the electroweak scale mildly breaks the custodial symmetry. We will present realistic low-scale scenarios (with the NLSP being a Bino-like neutralino or the right-handed stau) based on general (non-minimal) gauge mediation and consistent with all present experimental data. Their main features are: i) Light (∼1 TeV) stops; ii) Exotic couplings (H{sup ±}W{sup ∓}Z and H{sup ±±}W{sup ∓}W{sup ∓}) absent in the MSSM and proportional to the triplets VEV, v{sub Δ}; and, iii) A possible (measurable) universality breaking of the Higgs couplings λ{sub WZ}=r{sub WW}/r{sub ZZ}≠1.

  11. Car Covers | Outdoor Covers Canada

    OpenAIRE

    Covers, Outdoor

    2018-01-01

    Protect your car from the elements with Ultimate Touch Car Cover. The multi-layer non-woven fabric is soft on the finish and offers 4 seasons all weather protection.https://outdoorcovers.ca/car-covers/

  12. Book Review: Stop, Write!

    Directory of Open Access Journals (Sweden)

    Hans Thulesius

    2013-06-01

    Full Text Available This book on writing grounded theory is intended for the empirical GT researcher who wants to pursue his/her research until publication. It is the first book devoted entirely to such a crucial issue as writing grounded theory. Thus, Stop, Write: Writing Grounded Theory, is a practical book that fills a gap in GT methodology. In the first chapter of the book, Dr. Glaser says, “Stop unending conceptualization, unending data coverage, and unending listening to others who would egg you on with additional data, ideas and/or requirements or simply wait too long”. The book teaches the reader how to actually write a grounded theory by “simply” writing up the sorted memos. This requires efficient sorting that is dealt with in chapter two on Sorting Memos, which includes precious repetition from Theoretical Sensitivity (1978. How writing can be done effectively is outlined in chapter three The Working Paper. Then follows chapter four on how to rework the first draft with the different tasks of editing for language and professionalism. Thereafter Dr. Glaser discusses Writing Problems in chapter five where he gives useful guidance on how to overcome writing blocks and problems with supervisors and dissertation committees. The book also deals with publishing and with collaboration as experienced between Barney Glaser and the cofounder of grounded theory, Anselm Strauss.

  13. GMSB with Light Stops

    CERN Document Server

    Delgado, Antonio; Quiros, Mariano

    2015-01-01

    Gauge mediated supersymmetry breaking (GMSB) is an elegant mechanism to transmit supersymmetry breaking from the hidden to the MSSM observable sector, which solves the supersymmetric flavor problem. However the smallness of the generated stop mixing requires superheavy stops to reproduce the experimental value of the Higgs mass. Two possible ways out are: i) To extend GMSB by direct superpotential messenger-MSSM Yukawa couplings to generate sizeable mixing, thus reintroducing the flavor problem; ii) To extend the MSSM Higgs sector with singlets and/or triplets providing extra tree-level corrections to the Higgs mass. Singlets will not get any soft mass from GMSB and triplets will contribute to the $\\rho$ parameter which could be an issue. In this paper we explore the second way by introducing extra supersymmetric triplets with hypercharges $Y=(0,\\pm 1)$, with a tree-level custodial $SU(2)_L\\otimes SU(2)_R$ global symmetry in the Higgs sector protecting the $\\rho$ parameter: a supersymmetric generalization of ...

  14. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  15. Distortionary company car taxation: deadweight losses through increased car ownership

    NARCIS (Netherlands)

    van Ommeren, J.N.; Gutierrez Puigarnau, E.

    2013-01-01

    We analyse the effects of distortionary company car taxation through increased household car consumption for the Netherlands. We use several identification strategies and demonstrate that for about 20 % of households company car possession increases car ownership. The annual welfare loss of

  16. One-Stop Dispensing

    DEFF Research Database (Denmark)

    Houlind, Morten Baltzer; McNulty, Helle Bach Ølgaard; Treldal, Charlotte

    2018-01-01

    (1) Objective: To assess hospital medication costs and staff time between One-Stop Dispensing (OSD) and the Traditional Medication System (TMS), and to evaluate patient perspectives on OSD. (2) Methods: The study was conducted at Hvidovre Hospital, University of Copenhagen, Denmark in an elective...... gastric surgery and acute orthopedic surgery department. This study consists of three sub-studies including adult patients able to self-manage medication. In Sub-study 1, staff time used to dispense and administer medication in TMS was assessed. Medication cost and OSD staff time were collected in Sub......-study 2, while patient perspectives were assessed in Sub-study 3. Medication costs with two days of discharge medication were compared between measured OSD cost and simulated TMS cost for the same patients. Measured staff time in OSD was compared to simulated staff time in TMS for the same patients...

  17. Current stopping power analyses

    International Nuclear Information System (INIS)

    Porter, L.E.

    1983-01-01

    Modified Bethe-Bloch stopping power theory permits fairly accurate calculation of energy losses over a broad interval of projectile velocity v = νc insofar as several parameters appearing in the revised Bethe-Bloch formula have been corectly evaluated. Since the parameters cannot in general be ascertained by calculation from first principles, fits of theory to measurement remain the best method of evaluation. The parameters alluded to are: the target mean excitation energy; the shell correction scaling parameters; the composite single free parameter of the Barkas (projectile-z 3 ) effect correction formalism, and the strength of the correction term; the high velocity density effect correction parameter; and the low velocity charge state parameter. These parameters are discussed

  18. CAR: no longer forgotten?

    Directory of Open Access Journals (Sweden)

    Toby Lanzer

    2007-07-01

    Full Text Available The international community is waking up to the strategic importance of the Central African Republic (CAR in the crisis over Darfur. Will current interest endure long enough to help the people of CARCAR beyond the immediate future?

  19. The Electric Car Challenge.

    Science.gov (United States)

    Diehl, Brian E.

    1997-01-01

    Describes the Electric Car Challenge during which students applied methods of construction to build lightweight, strong vehicles that were powered by electricity. The activity required problem solving, sheet metal work, electricity, design, and construction skills. (JOW)

  20. Car-use habits

    DEFF Research Database (Denmark)

    Møller, Berit Thorup; Thøgersen, John

    2008-01-01

    It is often claimed that many drivers use their private car rather habitually. The claim gains credibility from the fact that travelling to many everyday destinations fulfils all the prerequisites for habit formation: it is recurring, performed under stable circumstances and produces rewarding...... consequences. Since the decision is made quite automatically and only one choice alternative is considered (the habitually chosen one), behaviour guided by habit is difficult to change. The implications of car use habits for converting drivers to commuters using public transportation is analysed based...... to do so, car use habit, and the interaction between the two, confirms the theory-derived hypothesis that car use habits act as an obstacle to the transformation of intentions to commute by public transportation into action....

  1. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  2. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  3. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  4. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  5. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  6. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  7. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  8. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  9. Copper wire theft and high voltage electrical burns

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  10. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  11. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  12. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  13. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  14. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  15. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  16. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  17. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  18. NREL Model Car Competitions | NREL

    Science.gov (United States)

    work together building cars with guidance from a parent, teacher, or coach to compete in race and Solar and Lithium Ion model car races in Colorado. Building solar- and battery-powered cars requires listPDF for Junior Solar Sprint and Lithium-Ion Battery model cars. Junior Solar Sprint Solar Made Pitsco

  19. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  20. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  1. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  2. Has Human Evolution Stopped?

    Directory of Open Access Journals (Sweden)

    Alan R. Templeton

    2010-07-01

    Full Text Available It has been argued that human evolution has stopped because humans now adapt to their environment via cultural evolution and not biological evolution. However, all organisms adapt to their environment, and humans are no exception. Culture defines much of the human environment, so cultural evolution has actually led to adaptive evolution in humans. Examples are given to illustrate the rapid pace of adaptive evolution in response to cultural innovations. These adaptive responses have important implications for infectious diseases, Mendelian genetic diseases, and systemic diseases in current human populations. Moreover, evolution proceeds by mechanisms other than natural selection. The recent growth in human population size has greatly increased the reservoir of mutational variants in the human gene pool, thereby enhancing the potential for human evolution. The increase in human population size coupled with our increased capacity to move across the globe has induced a rapid and ongoing evolutionary shift in how genetic variation is distributed within and among local human populations. In particular, genetic differences between human populations are rapidly diminishing and individual heterozygosity is increasing, with beneficial health effects. Finally, even when cultural evolution eliminates selection on a trait, the trait can still evolve due to natural selection on other traits. Our traits are not isolated, independent units, but rather are integrated into a functional whole, so selection on one trait can cause evolution to occur on another trait, sometimes with mildly maladaptive consequences.

  3. UDI STOP Femminicidio

    Directory of Open Access Journals (Sweden)

    Giovanna Crivelli

    2014-04-01

    Full Text Available L'UDI, Unione Donne in Italia, ha collaborato con l'Osservatorio dei Processi Comunicativi a un numero monografico della rivista scientifica M@gm@ dal titolo "Violenza maschile e femminicidio". Il numero monografico vuole mettere a disposizione le analisi, l’esperienza e la storia nostra e delle nostre interlocutrici, come contributo al nostro comune lavoro di sensibilizzazione, contrasto alla violenza maschile sulle donne – femminicidio. “UDI STOP femminicidio” è da anni la nostra campagna contro la violenza di genere, la collaborazione con l’Osservatorio dei Processi Comunicativi è parte integrante di questo sforzo. Il primo e dichiarato dei nostri progetti politici è il contrasto alla cultura e al potere ideologico che consente il femminicidio, la subordinazione culturale e sociale, la percezione della donna come oggetto di dominio, la riduzione in schiavitù di tante donne, comprese molte donne prostitute... Sappiamo di non voler tradire una “responsabilità di genere” che deve necessariamente concretizzarsi in tanti “gesti responsabili”, nella lunga pazienza quotidiana che consente la sedimentazione di un cambiamento radicale nelle coscienze. Vogliamo continuare ad essere l’associazione che coniuga insieme la soggettività personale e l'assunzione diretta di responsabilità, della progettualità a lungo termine che non trova “contraddittorio” misurarsi con la solidarietà concreta e quotidiana con le altre donne, nel tentativo di far nascere le nuove maniere di pensare.

  4. Aerodynamics of Race Cars

    Science.gov (United States)

    Katz, Joseph

    2006-01-01

    Race car performance depends on elements such as the engine, tires, suspension, road, aerodynamics, and of course the driver. In recent years, however, vehicle aerodynamics gained increased attention, mainly due to the utilization of the negative lift (downforce) principle, yielding several important performance improvements. This review briefly explains the significance of the aerodynamic downforce and how it improves race car performance. After this short introduction various methods to generate downforce such as inverted wings, diffusers, and vortex generators are discussed. Due to the complex geometry of these vehicles, the aerodynamic interaction between the various body components is significant, resulting in vortex flows and lifting surface shapes unlike traditional airplane wings. Typical design tools such as wind tunnel testing, computational fluid dynamics, and track testing, and their relevance to race car development, are discussed as well. In spite of the tremendous progress of these design tools (due to better instrumentation, communication, and computational power), the fluid dynamic phenomenon is still highly nonlinear, and predicting the effect of a particular modification is not always trouble free. Several examples covering a wide range of vehicle shapes (e.g., from stock cars to open-wheel race cars) are presented to demonstrate this nonlinear nature of the flow field.

  5. Connected Car: Quantified Self becomes Quantified Car

    Directory of Open Access Journals (Sweden)

    Melanie Swan

    2015-02-01

    Full Text Available The automotive industry could be facing a situation of profound change and opportunity in the coming decades. There are a number of influencing factors such as increasing urban and aging populations, self-driving cars, 3D parts printing, energy innovation, and new models of transportation service delivery (Zipcar, Uber. The connected car means that vehicles are now part of the connected world, continuously Internet-connected, generating and transmitting data, which on the one hand can be helpfully integrated into applications, like real-time traffic alerts broadcast to smartwatches, but also raises security and privacy concerns. This paper explores the automotive connected world, and describes five killer QS (Quantified Self-auto sensor applications that link quantified-self sensors (sensors that measure the personal biometrics of individuals like heart rate and automotive sensors (sensors that measure driver and passenger biometrics or quantitative automotive performance metrics like speed and braking activity. The applications are fatigue detection, real-time assistance for parking and accidents, anger management and stress reduction, keyless authentication and digital identity verification, and DIY diagnostics. These kinds of applications help to demonstrate the benefit of connected world data streams in the automotive industry and beyond where, more fundamentally for human progress, the automation of both physical and now cognitive tasks is underway.

  6. Nitrogen Research Programme STOP

    International Nuclear Information System (INIS)

    Erisman, J.W.; Van der Eerden, L.

    2000-01-01

    Nitrogen pollution is one of the main threats to the environment now in the Netherlands as well as other parts of Europe. In order to address the main gaps on the issues of nitrogen pollution related to the local scale, the Ministries of Housing, Physical Planning and Environment (VROM) and of Agriculture, Nature Management and Fisheries (LNV) have initiated a research programme, the Dutch Nitrogen Research Programme (STOP), which aims to provide a scientific basis to develop and implement policy on a local scale for the realisation and conservation of the EHS ('Dutch Mainframe of Natural Landscapes'). The results of the programme show that the description of emissions from manure in the field is difficult to describe and show large uncertainties. On the contrary, emissions from housings could be modelled well, if local actual data were available. The OPS model to describe the dispersion and deposition was evaluated with the measurements and the limitations were quantified. It appears that the model works well on the long term, whereas on the short term (hours) and short distance (tenths of meters) there is large uncertainty, especially in complex terrain. Critical loads for nitrogen for ecosystems were evaluated. Furthermore, the effect of management options was quantified. A method to determine critical loads as a function of soil conditions, such as acidification and water availability was derived. This resulted in a combination of the soil model SMART and the so-called 'nature planner' (Natuurplanner). It was concluded that the combination of SMART, the nature planner and OPS provide a good tool to develop and support policy on the local scale. 4 refs

  7. Car use within the household

    DEFF Research Database (Denmark)

    de Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    2013-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate—for each car owned by the household—own and cross-price effects...... of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, we estimate fuel price elasticities of –0.81 and -0.65 for the primary and secondary cars...... efficient car, finding partial support for the underlying hypothesis. More importantly, the results of this extended model emphasize the importance of behavioural differences related to the position of the most fuel efficient car in the household, suggesting that households’ fuel efficiency choices...

  8. Pilot survey of subway and bus stop noise levels.

    Science.gov (United States)

    Gershon, Robyn R M; Neitzel, Richard; Barrera, Marissa A; Akram, Muhammad

    2006-09-01

    Excessive noise exposure is a serious global urban health problem, adversely affecting millions of people. One often cited source of urban noise is mass transit, particularly subway systems. As a first step in determining risk within this context, we recently conducted an environmental survey of noise levels of the New York City transit system. Over 90 noise measurements were made using a sound level meter. Average and maximum noise levels were measured on subway platforms, and maximum levels were measured inside subway cars and at several bus stops for comparison purposes. The average noise level measured on the subway platforms was 86 +/- 4 dBA (decibel-A weighting). Maximum levels of 106, 112, and 89 dBA were measured on subway platforms, inside subway cars, and at bus stops, respectively. These results indicate that noise levels in subway and bus stop environments have the potential to exceed recommended exposure guidelines from the World Health Organization (WHO) and U.S. Environmental Protection Agency (EPA), given sufficient exposure duration. Risk reduction strategies following the standard hierarchy of control measures should be applied, where feasible, to reduce subway noise exposure.

  9. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  10. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Science.gov (United States)

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  11. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  12. LHC Availability 2017: Technical Stop 1 to Technical Stop 2

    CERN Document Server

    Todd, Benjamin; Apollonio, Andrea; Walsh, David John; CERN. Geneva. ATS Department

    2017-01-01

    This document summarises the LHC machine availability for the period of Technical Stop 1 (TS1) to Technical Stop 2 (TS2) in 2017. This period was dedicated to proton physics with a bunch spacing of 25ns. This note has been produced and ratified by the Availability Working Group which has complied fault information for the period in question using the Accelerator Fault Tracker.

  13. The market for gasoline cars and diesel cars

    International Nuclear Information System (INIS)

    Verboven, F.

    1999-01-01

    In Europe the tax tariff is much lower for diesel fuel than for gasoline. This benefit is used by manufacturers to increase the price of diesel-fueled cars, which limits the possibility to control the use of diesel cars by means of a fiscal policy (tax incidence). Attention is paid to the impact of fiscal advantages for diesel cars on the purchasing behavior of the consumer and the pricing policy (price discrimination) of the car manufacturers. 1 ref

  14. Gas Tank for Cars

    Directory of Open Access Journals (Sweden)

    Peter Lorenz

    2011-09-01

    Full Text Available In this work the development of a highly efficient pressure vessel for liquid petroleum gas (LPG in integral design is described. The pressure vessel can be customized in an optimal available installation space and thus means that the suitable for everyday use of existing modified cars or trucks can be increased.

  15. Modeling the Mousetrap Car

    Science.gov (United States)

    Jumper, William D.

    2012-01-01

    Many high school and introductory college physics courses make use of mousetrap car projects and competitions as a way of providing an engaging hands-on learning experience incorporating Newton's laws, conversion of potential to kinetic energy, dissipative forces, and rotational mechanics. Presented here is a simple analytical and finite element…

  16. Race Car Rally.

    Science.gov (United States)

    Anthony, Joan L.

    1994-01-01

    Describes an activity where teams of parents and children work together to solve problems involving matchbox-sized race cars. The teams collect, record, and analyze data; measure distances in metric; and explore concepts related to mass, friction, and force. (PR)

  17. Lego Car Race

    Science.gov (United States)

    Preston, Christine

    2017-01-01

    Familiar toys can be used to scaffold young children's learning about basic physics as well as guide scientific inquiry. Teachers looking for resources to engage young children and develop science inquiry skills need look no further than the toy box. In this two-part activity, children first construct a Lego® car and use it to explore the effects…

  18. Motor car driving; Kraftfahrzeugfuehrung

    Energy Technology Data Exchange (ETDEWEB)

    Juergensohn, T. [Technische Univ. Berlin (Germany). ISS-Fahrzeugtechnik; Timpe, K.P. (eds.) [Technische Univ. Berlin (DE). Zentrum Mensch-Maschine-Systeme (ZMMS)

    2001-07-01

    This is the first comprehensive book on motor car driving, i.e. all aspects of motor car technology that cannot be looked at separately from the needs, characteristics and limitations of the human driver. This includes ergonomics as well as the design of the driver interface in consideration of the findings of cognitive science, problems of driving simulation in the context of simulation of technical systems, problems relating to optimal car automation up to traffic psychology. The book is in honour of Prof. Dr. Willumeit who died in summer 2000. Prof. Willumeit was one of the few scientists in Germany who had been an expert on all aspects of motor car driving for many years. [German] Erstmalig wird das Thema der Fahrzeugfuehrung geschlossen dargestellt. Die Thematik der 'Kraftfahrzeugfuehrung' umfasst in diesem Zusammenhang alle Aspekte der Kraftfahrzeugtechnik, die nicht isoliert von den Erfordernissen, Eigenschaften und Grenzen des menschlichen Fahrers betrachtet werden koennen. Dies beinhaltet u.a. Probleme der Ergonomie, aber auch Fragen nach einer kognitionswissenschaftlich unterstuetzten Schnittstellengestaltung, Fragen der Simulation des Fahrverhalten im Kontext der Simulation technischer Systeme oder Fragen einer optimalen Fahrzeugautomatisierung bis hin zu verkehrspsychologischen Aspekten. Das Buch ist als Gedenkband fuer Prof. Dr. Willumeit konzipiert, der im Sommer 2000 verstarb. Prof. Willumeit war einer der wenigen Wissenschaftler in Deutschland, der ueber viele Jahre diese Thematik der Kraftfahrzeugfuehrung in ihrer vollen Breite verfolgte. (orig.)

  19. Divorce your car: ending the love affair with the automobile

    Energy Technology Data Exchange (ETDEWEB)

    Alvord, K.

    2000-07-01

    This book is a guide for people wishing to liberate themselves from their addiction to cars and the automobile culture. It is a repository of examples and actions that individuals and communities can take to reduce dependence on the automobile. The range of possibilities run from using cars less to not owning one at all. The book provides a humorous yet clear-headed approach to a greener world and maps out the road to how people can live happily ever after by breaking free of 'auto-cracy', without insisting on people in car-dependent countries quit their automotive addiction instantly. Nevertheless, it clearly articulates the connection between automobiles, their arteries (i.e. highways) and effluents (i.e. greenhouse gases and particulate emissions), and the increasing number and severity of natural disasters between the urban renewal and freeway construction that, in the author's view, helped ignite the riots in Watts, Newark and Detroit. The disastrous societal and geophysical effects of the automobile are demonstrated in great abundance, and the mountain of evidence of the systematic abuse of the planet that the book provides is a stunning refutation of the notion that technology is neutral. The automobile is accused of being not only the linchpin of Western and primarily American industrialism and resource extraction, it is also accused of being the chief suspect in a century-long theft of time, conviviality and beauty. How to bring about a change in people's love affair with their cars is difficult to comprehend but this author has a multitude of useful suggestions which seem to suggest that it is possible. There is a list of 104 'selected references' and an extensive list of 'other resources'.

  20. Investigation of natural gas theft by magnetic remanence mapping.

    Science.gov (United States)

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  1. Misuse of car safety seats.

    Science.gov (United States)

    Bull, M J; Stroup, K B; Gerhart, S

    1988-01-01

    Correct use of car seats for small children is essential to prevent serious injuries and death from automotive accidents. Failure to use a car seat properly can contribute to serious injury or death of a child. A case study in which misuse of a car seat occurred is reported. The infant died of hemorrhage and shock secondary to liver laceration which resulted from excessive pressure over the abdomen sustained on impact. Surveys of car seat use for small children prior to and following a child restraint law are also reported. Observers noted types of car seats and specific forms of misuse. Survey results suggest that parents are more likely to misuse car seats for infants than toddlers. Medical professionals can reinforce the importance of proper car seat use by incorporating specific car seat use questions into the patient interview and by providing educational materials.

  2. IMPACTS OF BUS STOP IMPROVEMENTS

    Science.gov (United States)

    2018-03-23

    Improving bus stops by providing shelters, seating, signage, and sidewalks is relatively inexpensive and popular among riders and local officials. Making such improvements, however, is not often a priority for U.S. transit providers because of compet...

  3. A whistle-stop tour of statistics

    National Research Council Canada - National Science Library

    Everitt, Brian

    2012-01-01

    "Preface according to my Penguin English dictionary, whistle-stop, used before a noun means 'consisting of brief stops in several places' and this whistle-stop tour of statistics does just that, with...

  4. Sweet Spots and Door Stops

    Science.gov (United States)

    Thompson, Michael; Tsui, Stella; Leung, Chi Fan

    2011-01-01

    A sweet spot is referred to in sport as the perfect place to strike a ball with a racquet or bat. It is the point of contact between bat and ball where maximum results can be produced with minimal effort from the hand of the player. Similar physics can be applied to the less inspiring examples of door stops; the perfect position of a door stop is…

  5. The CERN car stickers for 2008 are now available

    CERN Multimedia

    2007-01-01

    All members of the personnel holding a valid contract (except owners of cars with green or CD plates) can come to the Registration Service (building 55, 1st floor) to obtain their 2008 car sticker, Mondays to Fridays from 7.30 a.m. to 4.00 p.m. non-stop. Please ensure you bring with you the following documents: the 2007 sticker for the vehicle in question, the "carte grise" registration paper of the vehicle in question (photocopies accepted). If you only wish to register one vehicle, you can obtain the 2008 sticker using the request form on the Web.NB: This notice only applies to members of the personnel who obtained one or several blue car stickers for 2007. Reception and Access Control Service – TS/FM

  6. Voltage Sag Compensator for CAR and SOR of HANARO

    International Nuclear Information System (INIS)

    Kim, Hyung-Kyoo; Jung, Hoan-Sung; Wu, Jong-Sup

    2007-01-01

    HANARO is designed so as to be tripped automatically by insertion of control absorber rods(CAR) and shut-off rods(SOR) and the process systems, such as primary cooling system, secondary cooling system and reflector cooling system, etc., stop whenever the off-site power failure occurs, the reactor trips automatically. When voltage sag or momentary interruption occurs, the process systems are in operation but the reactor has an unwanted trip by insertion of CARs and SORs. We installed the voltage sag compensator on the power supply for CARs and SORs so as to prevent a nuisance trip. The compensated time is decided not to exceed 1 sec in consideration of reactor safety. This paper is concerned with the impact of the momentary interruption on the reactor and the effect of the voltage sag compensator

  7. Probing Light Stops with Stoponium

    CERN Document Server

    Batell, Brian

    2015-01-01

    We derive new limits on light stops from diboson resonance searches in the $\\gamma\\gamma$, $Z \\gamma$, $ZZ$, $WW$ and $hh$ channels from the first run of the LHC. If the two-body decays of the light stop are mildly suppressed or kinematically forbidden, stoponium bound states will form in $pp$ collisions and subsequently decay via the pair annihilation of the constituent stops to diboson final states, yielding striking resonance signatures. Remarkably, we find that stoponium searches are highly complementary to direct collider searches and indirect probes of light stops such as Higgs coupling measurements. Using an empirical quarkonia potential model and including the first two $S$-wave stoponium states, we find that in the decoupling limit $m_{\\widetilde t_1} \\lesssim 130$ GeV is excluded for any value of the stop mixing angle and heavy stop mass by the combination of the latest resonance searches and the indirect constraints. The $\\gamma \\gamma$ searches are the most complementary to the indirect constraint...

  8. Our Car as Power Plant

    NARCIS (Netherlands)

    Van Wijk, A.J.M.; Verhoef, L.

    2014-01-01

    Fuel cell cars can provide more efficient and cleaner transportation. However, we use our cars for transportation only 5% of the time. When parked, the fuel cell in the car can produce electricity from hydrogen, which is cleaner and more efficient than the current electricity system, generating

  9. DOES ELECTRIC CAR PRODUCE EMISSIONS?

    Directory of Open Access Journals (Sweden)

    Vladimír RIEVAJ

    2017-03-01

    Full Text Available This article focuses on the comparison of the amount of emissions produced by vehicles with a combustion engine and electric cars. The comparison, which is based on the LCA factor results, indicates that an electric car produces more emissions than a vehicle with combustion engine. The implementation of electric cars will lead to an increase in the production of greenhouse gases.

  10. R744 air conditioner with stop/start air conditioning, parking air conditioning and heat pump function in the ''COMET'' test car; R744-Klimaanlage mit Stopp/Start- und Standklimatisierung sowie Waermepumpenfunktion im Versuchstraeger ''COMET''

    Energy Technology Data Exchange (ETDEWEB)

    Brandes, H.; Horstmann, P.; Kneifel, M.; Hohl, R. [Robert Bosch GmbH, Schwieberdingen (Germany)

    2006-07-01

    Within a several years development project Robert Bosch GmbH has setup a test vehicle to investigate an integral energy management concept (COMET - Control of Mechanical, Electrical and Thermal Power). Key feature of the COMET vehicle concept is the hybrid drive train comprising the standard combustion engine and two electrical motors - each with 8 kW - being integrated in the power splitting Dual-E gearbox. Directly via the gearbox the compressor of the CO{sub 2} A/C system is driven so that an electrically parking and start-stop air condition and heating function using a CO{sub 2} heat pump can be realized. System setup, Cool down and heating up tests are shown and discussed. (orig.)

  11. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  12. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  13. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  14. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  15. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  16. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  17. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  18. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  19. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    National Research Council Canada - National Science Library

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  20. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  1. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  2. Second stop and sbottom searches with a stealth stop

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Hsin-Chia; Li, Lingfeng; Qin, Qin [Department of Physics, University of California,Davis, California 95616 (United States)

    2016-11-29

    The top squarks (stops) may be the most wanted particles after the Higgs boson discovery. The searches for the lightest stop have put strong constraints on its mass. However, there is still a search gap in the low mass region if the spectrum of the stop and the lightest neutralino is compressed. In that case, it may be easier to look for the second stop since naturalness requires both stops to be close to the weak scale. The current experimental searches for the second stop are based on the simplified model approach with the decay modes t̃{sub 2}→t̃{sub 1}Z and t̃{sub 2}→t̃{sub 1}h. However, in a realistic supersymmetric spectrum there is always a sbottom lighter than the second stop, hence the decay patterns are usually more complicated than the simplified model assumptions. In particular, there are often large branching ratios of the decays t̃{sub 2}→b̃{sub 1}W and b̃{sub 1}→t̃{sub 1}W as long as they are open. The decay chains can be even more complex if there are intermediate states of additional charginos and neutralinos in the decays. By studying several MSSM benchmark models at the 14 TeV LHC, we point out the importance of the multi-W final states in the second stop and the sbottom searches, such as the same-sign dilepton and multilepton signals, aside from the traditional search modes. The observed same-sign dilepton excesses at LHC Run 1 and Run 2 may be explained by some of our benchmark models. We also suggest that the vector boson tagging and a new kinematic variable may help to suppress the backgrounds and increase the signal significance for some search channels. Due to the complex decay patterns and lack of the dominant decay channels, the best reaches likely require a combination of various search channels at the LHC for the second stop and the lightest sbottom.

  3. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Science.gov (United States)

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  4. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Directory of Open Access Journals (Sweden)

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  5. CuseCar--community car-sharing program : car sharing lessons learned.

    Science.gov (United States)

    2011-08-01

    CuseCar of Syracuse launched services in December 2008 with 3 Toyota Prius Hybrids. CuseCar initially, due to : concerns about availability, limited membership to Origination Sponsor Locations, which in turn developed few : members. In 2009 CuseCar o...

  6. Tricks of the trade: Mechanism of brood theft in an ant.

    Science.gov (United States)

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  7. Tickover speed controller for car engines

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, R L

    1980-05-22

    In general, the tickover speed of a car engine is made sufficiently high, in order to permit an assumed maximum load to be taken from the engine at tickover. This setting of the tickover speed is usually done by stops in the fuel supply. Matching the actual load would lead to lower fuel consumption, without any danger of the engine stalling. The purpose of the invention is to provide a tickover speed controller, so that the tickover speed is adjusted by electronic control equipment, independently of the machine load. The fuel consumption on tickover is reduced and the emission of noxious substances is decreased. The electro-magnetic control of the throttle valve tickover setting is explained by extensive section drawings of the system. This process dispenses with the special tickover cams for a cold start.

  8. A theoretical and practical test of geographical profiling with serial vehicle theft in a U.K. context.

    Science.gov (United States)

    Tonkin, Matthew; Woodhams, Jessica; Bond, John W; Loe, Trudy

    2010-01-01

    Geographical profiling is an investigative methodology sometimes employed by the police to predict the residence of an unknown offender from the locations of his/her crimes. The validity of geographical profiling, however, has not been fully explored for certain crime types. This study, therefore, presents a preliminary test of the potential for geographical profiling with a sample of 145 serial vehicle thieves from the U.K. The behavioural assumptions underlying geographical profiling (distance decay and domocentricity) are tested and a simple practical test of profiling using the spatial mean is presented. There is evidence for distance decay but not domocentricity among the spatial behaviour of car thieves from the U.K. A degree of success was achieved when applying the spatial mean on a case-by-case basis. The level of success varied, however, and neither series length in days nor number of crimes could account for the variation. The findings question previously held assumptions regarding geographical profiling and have potential theoretical and practical implications for the study and investigation of vehicle theft in the U.K. 2009 John Wiley & Sons, Ltd.

  9. Stop. Write! Writing Grounded Theory

    Directory of Open Access Journals (Sweden)

    Barney G. Glaser, PhD, Hon. PhD

    2012-06-01

    Full Text Available The message in this book, the dictum in this book, is to stop and write when the Grounded Theory (GT methodology puts you in that ready position. Stop unending conceptualization, unending data coverage, and unending listening to others who would egg you on with additional data, ideas and/or requirements or simply wait too long. I will discuss these ideas in detail. My experience with PhD candidates is that for the few who write when ready, many do not and SHOULD. Simply put, many write-up, but many more should.

  10. Could stops lighten the top?

    International Nuclear Information System (INIS)

    Bilal, A.; Ellis, J.; Fogli, G.L.

    1990-01-01

    The analysis of the presently available electroweak data including radiative corrections in the standard model suggests that the top quark weighs more than the Z 0 . We examine whether squark loops in the minimal supersymmetric model, particularly those involving stops (partners of the top quark), could reduce substantially the preferred range of top quark masses. Given the present lower bounds on squark masses, we find that stop effects can reduce the central value of m t by at most a few GeV, although they do make a very heavy top quark increasingly unlikely. (orig.)

  11. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Science.gov (United States)

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  12. Car monitoring information systems

    Directory of Open Access Journals (Sweden)

    Alica KALAŠOVÁ

    2008-01-01

    Full Text Available The objective of this contribution is to characterize alternatives of information systems used for managing, processing and evaluation of information related to company vehicles. Especially we focus on logging, transferring and processing of on-road vehicle movement information in inland and international transportation. This segment of company information system has to monitor the car movement – actively or passively – according to demand of the company and after the processing it has to evaluate and give the complex monitoring of a situation of all the company vehicles to the controller.

  13. Space and crime in Dutch built environments : Macro and micro scale spatial conditions for residential burglaries and thefts from cars

    NARCIS (Netherlands)

    Lopez, M.J.J.; Van Nes, A.

    2007-01-01

    At this moment, more knowledge is available on the physical characteristics of the built environment and their relationship to criminal opportunity rather than the spatial characteristics of potential targets and the public and private space between them. To improve this situation, a research

  14. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  15. Nuclear stopping in transmission experiments

    International Nuclear Information System (INIS)

    Glazov, Lev G.; Sigmund, Peter

    2003-01-01

    Energy-loss spectra, mean and peak energy loss, and straggling due to elastic nuclear scattering have been studied theoretically as a function of target thickness and deflection angle of an initially monochromatic and well-collimated ion beam. The goal of this work has been to provide a generally valid scheme for nuclear-stopping corrections, allowing to determine electronic-stopping forces from energy-loss spectra measured in transmission geometry. Calculations have been based on the generalized Bothe-Landau theory of energy loss and multiple scattering. Our peak energy losses at zero emergence angle show close (∼10%) agreement with predictions of Fastrup et al. on the basis of the Bohr-Williams theory. However, predicted mean and peak energy losses are found to more sensitively depend on the underlying interatomic potential than unrestricted, i.e. angle-integrated mean or peak energy losses. Both elastic energy loss and multiple scattering are known to obey scaling laws involving only two combinations of the pertinent variables and atomic parameters. The dependence on deflection angle and foil thickness of mean and peak energy loss obeys a simple combination of these scaling laws. Comments are made on potential errors due to uncertainties in the nuclear-stopping correction applied in the literature with specific reference to central papers in low-velocity stopping

  16. Stop searches in flavourful supersymmetry

    CERN Document Server

    Crivellin, Andreas; Tunstall, Lewis C.

    2016-01-01

    Natural realisations of supersymmetry require light stops ${\\tilde t}_1$, making them a prime target of LHC searches for physics beyond the Standard Model. Depending on the kinematic region, the main search channels are ${\\tilde t_1}\\to t \\tilde \\chi^0_1$, ${\\tilde t_1}\\to W b \\tilde \\chi^0_1$ and ${\\tilde t_1}\\to c \\tilde \\chi^0_1$. We first examine the interplay of these decay modes with ${\\tilde c_1}\\to c \\tilde \\chi^0_1$ in a model-independent fashion, revealing the existence of large regions in parameter space which are excluded for any ${\\tilde t_1}\\to c \\tilde \\chi^0_1$ branching ratio. This effect is then illustrated for scenarios with stop-scharm mixing in the right-handed sector, where it has previously been observed that the stop mass limits can be significantly weakened for large mixing. Our analysis shows that once the LHC bounds from ${\\tilde c_1}\\to c \\tilde \\chi^0_1$ searches are taken into account, non-zero stop-scharm mixing leads only to a modest increase in the allowed regions of parameter...

  17. Correlated ion stopping in plasmas

    International Nuclear Information System (INIS)

    Zwicknagel, G.; Deutsch, C.

    1997-01-01

    The basic features of correlated ion stopping in plasmas are demonstrated by employing two opposite extremes of cluster structures, a statistical model with a spatial ion distribution of Gaussian shape and the highly regular configuration of N-ion chains and cubic boxes. In the case of the ion chains the resonant character of correlated stopping due to the interference of the excited wake fields is discussed in detail. The general behavior of correlation effects is summarized and its dependence on the ratio of cluster size and interion spacing to the screening length in the plasma, as well as the ratio of the cluster velocity to the mean electron velocity in the target, is stressed out. The validity and applicability of the dielectric response formalism used for describing correlated stopping is critically reviewed. A scheme is presented to extend the linear formalism to weak nonlinear situations that occur, in particular, for small highly charged clusters at moderate or low velocities. For the Gaussian cluster a fit formula is given, which allows a fast and accurate calculation of the enhancement of stopping due to correlation effects and applies for all degrees of degeneracy of the electrons and arbitrary cluster velocities. copyright 1997 The American Physical Society

  18. Remote Shutoff Stops Runaway Lawnmower

    Science.gov (United States)

    Grambo, Alan A.

    2007-01-01

    In this article, the author describes how electronics students at Central Nine Career Center designed a kill switch circuit to stop a runaway lawnmower. This project is ideal for a career center since the electronics/robotics, small engines and horticulture classes can all work together on their respective parts of the modification, installation…

  19. Reparametrizations with given stop data

    DEFF Research Database (Denmark)

    Raussen, Martin

    2009-01-01

    In [1] we performed a systematic investigation of reparametrizations of continuous paths in a Hausdorff space that relies crucially on a proper understanding of stop data of a (weakly increasing) reprametrizations of the unit interval. I am grateful to Marco Grandis (Genova) for pointing out to me...

  20. Reparametrizations with given stop data

    DEFF Research Database (Denmark)

    Raussen, Martin

    In [1], we performed a systematic investigation of reparametrizations of continuous paths in a Hausdorff space that relies crucially on a proper understanding of stop data of a (weakly increasing) reparametrization of the unit interval. I am indebted to Marco Grandis (Genova) for pointing out tome...

  1. Stopping Power for Degenerate Electrons

    Energy Technology Data Exchange (ETDEWEB)

    Singleton, Jr., Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-16

    This is a first attempt at calculating the BPS stopping power with electron degeneracy corrections. Section I establishes some notation and basic facts. Section II outlines the basics of the calculation, and in Section III contains some brief notes on how to proceed with the details of the calculation. The remaining work for the calculation starts with Section III.

  2. Plagiarism: Can It Be Stopped?

    Science.gov (United States)

    Christensen, G. Jay

    2011-01-01

    Plagiarism can be controlled, not stopped. The more appropriate question to ask is: What can be done to encourage students to "cheat" correctly by doing the assignment the way it was intended? Cheating by college students continues to reach epidemic proportions on selected campuses, as witnessed by the recent episode at Central Florida University,…

  3. Stop researching transformational leadership! Now!

    NARCIS (Netherlands)

    L.G. Tummers (Lars)

    2013-01-01

    markdownabstract__Intro__ Researchers all over the world, stop with your research on transformational leadership! Now! This could be the provocative conclusion after reading the recent article of Profs. Daan van Knippenberg and Sim Sitkin in The Academy of Management Annals (2013). These

  4. Stop researching transformational leadership! Now!

    OpenAIRE

    Tummers, Lars

    2013-01-01

    markdownabstract__Intro__ Researchers all over the world, stop with your research on transformational leadership! Now! This could be the provocative conclusion after reading the recent article of Profs. Daan van Knippenberg and Sim Sitkin in The Academy of Management Annals (2013). These leadership professors write about the problems surrounding transformational leadership.

  5. Persisting roughness when deposition stops.

    Science.gov (United States)

    Schwartz, Moshe; Edwards, S F

    2004-12-01

    Useful theories for growth of surfaces under random deposition of material have been developed by several authors. The simplest theory is that introduced by Edwards and Wilkinson (EW), which is linear and soluble. Its nonlinear generalization by Kardar, Parisi, and Zhang (KPZ) resulted in many subsequent studies. Yet both EW and KPZ theories contain an unphysical feature. When deposition of material is stopped, both theories predict that as time tends to infinity, the surface becomes flat. In fact, of course, the final surface is not flat, but simply has no gradients larger than the gradient related to the angle of repose. We modify the EW and KPZ theories to accommodate this feature and study the consequences for the simpler system which is a modification of the EW equation. In spite of the fact that the equation describing the evolution of the surface is not linear, we find that the steady state in the presence of noise is not very different in the long-wavelength limit from that of the linear EW equation. The situation is quite different from that of EW when deposition stops. Initially there is still some rearrangement of the surface, but that stops as everywhere on the surface the gradient is less than that related to the angle of repose. The most interesting feature observed after deposition stops is the emergence of history-dependent steady-state distributions.

  6. Tourette Syndrome: Help Stop Bullying

    Science.gov (United States)

    ... work on Tourette Syndrome Tourette Association information on bullying What it’s like to have Tourette – Mary tells her story What children wish people knew about Tourette Syndrome CDC Children’s Mental Health StopBullying.gov Features Media Sign up for Features ...

  7. Flying car design and testing

    OpenAIRE

    Klein, S.; Smrcek, L.

    2009-01-01

    This paper is primarily concerned with the inverted design process and manufacture of a flying car prototype which can overcome the problem of traffic management in the world today. A possible solution to the problem of overcrowded roads would be to design a flying or hovering car. Given technological advances in aircraft construction, navigation and operation, flying cars or personal aircraft are now a feasible proposition. The viability of such a concept was investigated in terms of produci...

  8. Electric Cars and Oil Prices

    OpenAIRE

    Azar, Jose

    2009-01-01

    This paper studies the joint dynamics of oil prices and interest in electric cars, measured as the volume of Google searches for related phrases. Not surprisingly, I find that oil price shocks predict increases in Google searches for electric cars. Much more surprisingly, I also find that an increase in Google searches predicts declines in oil prices. The high level of public interest in electric cars between April and August of 2008 can explain approximately half of the decline in oil prices...

  9. Product declaration for cars

    International Nuclear Information System (INIS)

    Gruetter, J.M.

    2000-01-01

    This reports for the Swiss Federal Office of Energy (SFOE) presents the results of a study made on the possible ways of declaring product information on cars. The basic elements of such a declaration are discussed and a recommendation for an energy label for cars is presented. The report discusses the fundamental questions posed such as how long a label should be valid, if comparisons should be made and if it is to be based on CO 2 -emissions or on fuel consumption. Also, the criteria to be used for comparisons - such as vehicle weight, size or power - are looked at and methods of classification are examined along with data fundamentals. Further, the expectations placed on the product declarations with respect to their energetic and economic impact are discussed. The design of the label and the legislature on which it is based are discussed and initial reactions of the automobile industry are noted. The report is rounded off by a discussion of the effects of the declaration in relation to other instruments that have been proposed

  10. Proton - Malaysia's national car project

    DEFF Research Database (Denmark)

    Fleming, Daniel; Søborg, Henrik

    2017-01-01

    The rise and development of the Malaysian national car project. How this project has become an esential part of the industrial development in Malaysia and how it has underpinned a growing middle class consumption culture with house and car as it pivotal goods.......The rise and development of the Malaysian national car project. How this project has become an esential part of the industrial development in Malaysia and how it has underpinned a growing middle class consumption culture with house and car as it pivotal goods....

  11. enviroCar - citizen science for sustainable traffic

    Science.gov (United States)

    Stasch, Christoph; Remke, Albert; Jirka, Simon; Nuest, Daniel

    2015-04-01

    Optimizing traffic flow is a challenging task, affecting both the mobility of people and the environment. Up to now, traffic monitoring is based on small samples using GPS devices or remote sensors such as cameras. Citizens are usually not actively involved in the process of collecting or analyzing traffic data. The enviroCar project (www.envirocar.org) aims at addressing this situation by providing an open platform that can be used by everyone to collect and analyze traffic-related data and thus to achieve sustainable traffic management by answering questions such as: How is the average speed on a certain route? Where are exceptionally long waiting times in front of traffic lights? At which crossings do more cars stop than drive through? Where are hotspots of fuel consumption and air pollutant emission during a certain time interval? In this presentation, an overview on the enviroCar project is given and current research challenges addressed in the context of the project are presented. Citizens are able to participate by registering at the enviroCar portal and downloading the enviroCar Android app. Once installed, the Android app allows citizens to collect car sensor data, e.g. speed, mass air flow, or intake temperature via an On-Board Diagnosis 2 (OBD-II) Adapter. After finishing a car ride, the data can be uploaded to the central enviroCar server where the data is anonymized and published as open data. Each enviroCar member has a profile page giving control on his own data and providing statistics on personal driving behavior. The portal also allows comparing personal statistics with the statistics of other members. It thus facilitates analysis whether, for example, a member is driving in a more fuel saving manner than other users. Besides only acting as a data collector, citizens can also explore the enviroCar data in online maps or download the data in standard formats for certain spatial areas and/or time intervals allowing them to conduct spatio

  12. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  13. Background free CARS imaging by phase sensitive heterodyne CARS

    NARCIS (Netherlands)

    Jurna, M.; Korterik, Jeroen P.; Otto, Cornelis; Herek, Jennifer Lynn; Offerhaus, Herman L.

    2008-01-01

    In this article we show that heterodyne CARS, based on a controlled and stable phase-preserving chain, can be used to measure amplitude and phase information of molecular vibration modes. The technique is validated by a comparison of the imaginary part of the heterodyne CARS spectrum to the

  14. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    International Nuclear Information System (INIS)

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  15. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  16. Car sharing means more travel with less pollution : Eco-efficient services: Stop selling cars; sell kilometres instead

    NARCIS (Netherlands)

    Meijkamp, R.; Van Kasteren, J.

    2000-01-01

    The product, or hardware if you will, still lies at the heart of the production and consumption chain, resulting in a significant environmental impact. Basing design on applied value instead of the product itself can offer substantial ecological advantages. Ir. Rens Meijkamp tested the eco-efficient

  17. Progress in understanding heavy-ion stopping

    Energy Technology Data Exchange (ETDEWEB)

    Sigmund, P., E-mail: sigmund@sdu.dk [Department of Physics, Chemistry and Pharmacy, University of Southern Denmark, DK-5230 Odense M (Denmark); Schinner, A. [Institut für Experimentalphysik, Johannes Kepler Universität, A-4040 Linz (Austria)

    2016-09-01

    We report some highlights of our work with heavy-ion stopping in the energy range where Bethe stopping theory breaks down. Main tools are our binary stopping theory (PASS code), the reciprocity principle, and Paul’s data base. Comparisons are made between PASS and three alternative theoretical schemes (CasP, HISTOP and SLPA). In addition to equilibrium stopping we discuss frozen-charge stopping, deviations from linear velocity dependence below the Bragg peak, application of the reciprocity principle in low-velocity stopping, modeling of equilibrium charges, and the significance of the so-called effective charge.

  18. Progress in understanding heavy-ion stopping

    International Nuclear Information System (INIS)

    Sigmund, P.; Schinner, A.

    2016-01-01

    We report some highlights of our work with heavy-ion stopping in the energy range where Bethe stopping theory breaks down. Main tools are our binary stopping theory (PASS code), the reciprocity principle, and Paul’s data base. Comparisons are made between PASS and three alternative theoretical schemes (CasP, HISTOP and SLPA). In addition to equilibrium stopping we discuss frozen-charge stopping, deviations from linear velocity dependence below the Bragg peak, application of the reciprocity principle in low-velocity stopping, modeling of equilibrium charges, and the significance of the so-called effective charge.

  19. Initial heating in cold cars

    NARCIS (Netherlands)

    Daanen, H.A.M.; Teunissen, L.P.J.; Hoogh, I.M. de

    2012-01-01

    During the initial minutes after entering a cold car, people feel uncomfortably cold. Six different warming systems were investigated in a small car in order to find out how to improve the feeling of comfort using 16 volunteers. The methods were: no additional warming next to a standard heating

  20. Energy Use of Passenger Cars

    DEFF Research Database (Denmark)

    Jørgensen, Kaj

    1998-01-01

    Analysis of the Danish sale and stock of passenger cars, focusing particularly on aspects influencing energy use. The project has tracked the development of vehicle weight, power and fuel economy for both the sale of new cars (from 1980 to 1997)and the stock. In addition, the energy use...

  1. Shopping for a safer car

    Science.gov (United States)

    2010-01-01

    This brochure provides some helpful tips on what to look for when shopping for a safer car. Automakers are increasingly advertising the safety features of their cars. The problem is sorting out their claims and zeroing in on the safety features that ...

  2. FUEL PRICES AND CAR SALES

    OpenAIRE

    Vlad Cârstea

    2008-01-01

    Automotive industry is a very important economic sector that is highly responsive to changes in the world economy. The fuel price is the biggest enemy of car manufacturers. This is a compared analysis between Europe and Romania regarding new car registrations.

  3. Panorama 2014 - Car-sharing

    International Nuclear Information System (INIS)

    Vinot, Simon

    2013-10-01

    Car-sharing is a new mode of transportation that consists of multiple users sharing the same vehicle. This type of service is expanding with the arrival of larger players, such as traditional car rental companies, automotive manufacturers, and large firms specializing in transportation. This new mode of transportation offers real potential and is currently finding its users, in France and worldwide. (author)

  4. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  5. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  6. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  7. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  8. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  9. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  10. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  11. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    Science.gov (United States)

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  12. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  13. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... your fingers and from your nails to your face and mouth. To help you stop biting your ... re inclined to bite may help solve the problem. Try to gradually stop biting your nails: Some ...

  14. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Mohs AUC MyDermPath+ Psoriasis Patient education resources ... Try to gradually stop biting your nails: Some doctors recommend taking a gradual approach to break the habit. Try to stop biting ...

  15. 49 CFR 172.330 - Tank cars and multi-unit tank car tanks.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Tank cars and multi-unit tank car tanks. 172.330..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.330 Tank cars and multi-unit tank car tanks. (a... material— (1) In a tank car unless the following conditions are met: (i) The tank car must be marked on...

  16. 49 CFR 1247.1 - Annual Report of Cars Loaded and Cars Terminated.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Annual Report of Cars Loaded and Cars Terminated... TRANSPORTATION BOARD, DEPARTMENT OF TRANSPORTATION (CONTINUED) ACCOUNTS, RECORDS AND REPORTS REPORT OF CARS LOADED AND CARS TERMINATED § 1247.1 Annual Report of Cars Loaded and Cars Terminated. Beginning with the...

  17. AAP Updates Recommendations on Car Seats

    Science.gov (United States)

    ... Size Email Print Share AAP Updates Recommendations on Car Seats Page Content Article Body Children should ride ... of approved car safety seats. Healthy Children Radio: Car Seat Safety Dennis Durbin, MD, FAAP, lead author ...

  18. MODEL CAR TRANSPORT SYSTEM - MODERN ITS EDUCATION TOOL

    Directory of Open Access Journals (Sweden)

    Karel Bouchner

    2017-12-01

    Full Text Available The model car transport system is a laboratory intended for a practical development in the area of the motor traffic. It is also an important education tool for students’ hands-on training, enabling students to test the results of their own studies. The main part of the model car transportation network is a model in a ratio 1:87 (HO, based on component units of FALLER Car system, e.g. cars, traffic lights, carriage way, parking spaces, stop sections, branch-off junctions, sensors and control sections. The model enables to simulate real traffic situations. It includes a motor traffic in a city, in a small village, on a carriageway between a city and a village including a railway crossing. The traffic infrastructure includes different kinds of intersections, such as T-junctions, a classic four-way crossroad and four-way traffic circle, with and without traffic lights control. Another important part of the model is a segment of a highway which includes an elevated crossing with highway approaches and exits.

  19. Advanced Infant Car Seat Would Increase Highway Safety

    Science.gov (United States)

    Dabney, Richard; Elrod, Susan

    2004-01-01

    An advanced infant car seat has been proposed to increase highway safety by reducing the incidence of crying, fussy behavior, and other child-related distractions that divert an adult driver s attention from driving. In addition to a conventional infant car seat with safety restraints, the proposed advanced infant car seat would include a number of components and subsystems that would function together as a comprehensive infant-care system that would keep its occupant safe, comfortable, and entertained, and would enable the driver to monitor the baby without having to either stop the car or turn around to face the infant during driving. The system would include a vibrator with bulb switch to operate; the switch would double as a squeeze toy that would make its own specific sound. A music subsystem would include loudspeakers built into the seat plus digital and analog circuitry that would utilize plug-in memory modules to synthesize music or a variety of other sounds. The music subsystem would include a built-in sound generator that could synthesize white noise or a human heartbeat to calm the baby to sleep. A second bulb switch could be used to control the music subsystem and would double as a squeeze toy that would make a distinct sound. An anti-noise sound-suppression system would isolate the baby from potentially disturbing ambient external noises. This subsystem would include small microphones, placed near the baby s ears, to detect ambient noise. The outputs of the microphone would be amplified and fed to the loudspeakers at appropriate amplitude and in a phase opposite that of the detected ambient noise, such that the net ambient sound arriving at the baby s ears would be almost completely cancelled. A video-camera subsystem would enable the driver to monitor the baby visually while continuing to face forward. One or more portable miniature video cameras could be embedded in the side of the infant car seat (see figure) or in a flip-down handle. The outputs of

  20. Nanobody Based Dual Specific CARs

    Directory of Open Access Journals (Sweden)

    Stijn De Munter

    2018-01-01

    Full Text Available Recent clinical trials have shown that adoptive chimeric antigen receptor (CAR T cell therapy is a very potent and possibly curative option in the treatment of B cell leukemias and lymphomas. However, targeting a single antigen may not be sufficient, and relapse due to the emergence of antigen negative leukemic cells may occur. A potential strategy to counter the outgrowth of antigen escape variants is to broaden the specificity of the CAR by incorporation of multiple antigen recognition domains in tandem. As a proof of concept, we here describe a bispecific CAR in which the single chain variable fragment (scFv is replaced by a tandem of two single-antibody domains or nanobodies (nanoCAR. High membrane nanoCAR expression levels are observed in retrovirally transduced T cells. NanoCARs specific for CD20 and HER2 induce T cell activation, cytokine production and tumor lysis upon incubation with transgenic Jurkat cells expressing either antigen or both antigens simultaneously. The use of nanobody technology allows for the production of compact CARs with dual specificity and predefined affinity.

  1. Nanobody Based Dual Specific CARs.

    Science.gov (United States)

    De Munter, Stijn; Ingels, Joline; Goetgeluk, Glenn; Bonte, Sarah; Pille, Melissa; Weening, Karin; Kerre, Tessa; Abken, Hinrich; Vandekerckhove, Bart

    2018-01-30

    Recent clinical trials have shown that adoptive chimeric antigen receptor (CAR) T cell therapy is a very potent and possibly curative option in the treatment of B cell leukemias and lymphomas. However, targeting a single antigen may not be sufficient, and relapse due to the emergence of antigen negative leukemic cells may occur. A potential strategy to counter the outgrowth of antigen escape variants is to broaden the specificity of the CAR by incorporation of multiple antigen recognition domains in tandem. As a proof of concept, we here describe a bispecific CAR in which the single chain variable fragment (scFv) is replaced by a tandem of two single-antibody domains or nanobodies (nanoCAR). High membrane nanoCAR expression levels are observed in retrovirally transduced T cells. NanoCARs specific for CD20 and HER2 induce T cell activation, cytokine production and tumor lysis upon incubation with transgenic Jurkat cells expressing either antigen or both antigens simultaneously. The use of nanobody technology allows for the production of compact CARs with dual specificity and predefined affinity.

  2. IMPROVEMENT OF THE SUPPORTING STRUCTURE OF PLATFORM CAR FOR HIGHER EFFICIENCY OF CONTAINER TRANSPORTATIONS

    Directory of Open Access Journals (Sweden)

    A. O. Lovska

    2017-02-01

    Full Text Available Purpose. The article is aimed to improve supporting structures of the platform car to increase the efficiency of container transportations. Methodology. In order to achieve the objective, the strength investigations of the universal platform car of the model 13-401 were conducted, strength reserves of the supporting elements were defined, and more optimal profiles of basic longitudinal beams of the frame in terms of the minimum material capacity were proposed. Decision correctness was confirmed by the strength calculation of the platform car supporting structure at basic loading operational modes and fatigue taking into account the research database of 107 cycles. It has been proposed to equip a platform car with swing fitting stops for fastening containers on the frame, which allows transportation of 20ft and 40ft containers. In order to improve container transportation efficiency along international transport corridors running through Ukraine, a platform car of articulated type has been designed on the base of the improved platform car structure. The mathematical simulation of dynamic loads of the platform car with containers (two 1CC containers at operational loading modes has been carried out, the maximum accelerations influencing the support structure have been defined, and their multiple values have been considered in computer simulation of the strength of the platform car of articulated type. Findings. The support structure of the platform car of articulated type on the basis of the standard platform car has been developed. Refined values of dynamic loads influencing supporting structure the platform car of articulated type with containers at operational loading modes have been obtained; the maximum equivalent stresses in the platform car support structure have been defined. Originality and practical value. A mathematical model of displacements for a platform car of articulated type with containers at operational loading modes of

  3. CERN CAR CLUB

    CERN Multimedia

    Automobile club

    2009-01-01

    You are cordially invited to the next General Assembly of the CERN Car Club Tuesday 12 January 2010 at 5:45pm Bldg. 593 / room 11 As the end of 2009 is approaching, it is time to think about renewing your subscription. Therefore next time you are on the CERN-Meyrin site or at the Post Office counter don’t forget to fill in the payment slip to continue to be a part of our large family. The fee remains unchanged: 50 CHF. For those of you who are regular users of our equipment and who know of all the advantages that the club is in a position to offer, it seems pointless to give details, we are sure that many of you have made use of them and are satisfied. We remind you everyone working on CERN site is entitled to become a member of our club, this includes industrial support personnel and staff of companies which have a contract with CERN. If you are not yet a member, come and visit us! We will be happy to welcome you and show you the facilities, or you can visit our web site. The use of the club&...

  4. CERN CAR STICKERS

    CERN Multimedia

    Service Accueil et Controle d'Accès; ST Division

    1999-01-01

    In accordance with Operational Circular n¡ 2, paragraph 21, CERN car stickers are to be renewed. The new stickers are now available and will be valid for a year.Youare therefore requested:either to obtain them from the distribution points for new stickers (see below); or to send us the application form below, duly completed, via the internal mail; or to complete the application form directly via the Web at the address: http://cern.ch/registration-stickers. Each vehicle has to carry a sticker and needs a separate application form.Vehicles bearing CERN diplomatic plates (CD07, 431K and CD series) do not need a sticker for access to the CERN areas.Thank you.List of distribution points:Registration Service (bldg 55 1st floor), open from 07h30 to 16h30. Building 33 (entrance hall), open from 08h00 to 18h00. Building 120 (ground floor), outside working hours.Name Surname CERN identification number Vehicle registration plates Country issuing the plates Vehicle ma...

  5. Why does sleep stop migraine?

    Science.gov (United States)

    Bigal, Marcelo E; Hargreaves, Richard J

    2013-10-01

    The relationship between sleep and migraine headaches is complex. Changes in sleep patterns can trigger migraine attacks, and sleep disorders may be associated with increased migraine frequency. Furthermore, migraine patients and their doctors very consistently report that sleep relieves already established migraine attacks. Herein we will try to answer the question, "Why does sleep stop migraine?" Since evidence for this relationship is largely based on empirical clinical observation, we will not provide a clinical review of the association. Instead, we will focus on the pathophysiology of migraine attacks and its intersections with sleep biology.

  6. Hydrogen battery car developed in Matsuda; Matsuda suiso nenryo denchisha wo kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-06-01

    Matsuda announced that the hydrogen battery car 'Demio FCEV' was developed by the company. This new type car not only does not need an air humidifying machine, but also supplies the necessary electricity with an ultra capacitor of a large scale condenser. Its maximum output is 40 kw, the highest speed is 90 km per hour, and the accelerating time from the stop state to 40 m is about 5 seconds, the same level as a gasoline car. One time of hydrogen charging serves for 170 km running. As a hydrogen battery car, it is the third one in the world, following the DAIMURA in Germany and TOYOTA. (translated by NEDO)

  7. Engineering CAR-T cells.

    Science.gov (United States)

    Zhang, Cheng; Liu, Jun; Zhong, Jiang F; Zhang, Xi

    2017-01-01

    Chimeric antigen receptor redirected T cells (CAR-T cells) have achieved inspiring outcomes in patients with B cell malignancies, and are now being investigated in other hematologic malignancies and solid tumors. CAR-T cells are generated by the T cells from patients' or donors' blood. After the T cells are expanded and genetically modified, they are reinfused into the patients. However, many challenges still need to be resolved in order for this technology to gain widespread adoption. In this review, we first discuss the structure and evolution of chimeric antigen receptors. We then report on the tools used for production of CAR-T cells. Finally, we address the challenges posed by CAR-T cells.

  8. Dwelling on Everyday Car Journeys

    DEFF Research Database (Denmark)

    Tølbøll, Lene; Jensen, Hanne Louise

    different traffic conditions as well as the emotional states related to the drivers’ thoughts about work and family issues, the materiality of the car and the recreational activities inside the car. Analyses are based on a web-based questionnaire, sent to 373 participating drivers in the Big Data research...... project Intelligent Transportation System Platform North Denmark (Lahrmann 2012). In that project data on e.g. position and speed was collected via an On Board Unit from more than 400 cars in 2012-2014 (Tøfting et. al. 2014). The full dataset includes a driven distance of approximately 14 million km...... experiences related to commuting. The findings will be discussed using theoretical inspiration from Sheller (2004), Bull (2003) and Thrift (2004) and we will suggest that the various emotional experiences of the commuters are of great importance for their ability to use of the car as a dwelling place....

  9. CHINA ACCOUNTING REVIEW(CAR)

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    China Accounting Review(CAR)is a new accounting journal in Chinese,spon- sored by Peking University,Tsinghua University,Beijing National Accounting Insti- tute and ten more universities,and published by the Peking University Press.

  10. Optimal Stopping with Information Constraint

    International Nuclear Information System (INIS)

    Lempa, Jukka

    2012-01-01

    We study the optimal stopping problem proposed by Dupuis and Wang (Adv. Appl. Probab. 34:141–157, 2002). In this maximization problem of the expected present value of the exercise payoff, the underlying dynamics follow a linear diffusion. The decision maker is not allowed to stop at any time she chooses but rather on the jump times of an independent Poisson process. Dupuis and Wang (Adv. Appl. Probab. 34:141–157, 2002), solve this problem in the case where the underlying is a geometric Brownian motion and the payoff function is of American call option type. In the current study, we propose a mild set of conditions (covering the setup of Dupuis and Wang in Adv. Appl. Probab. 34:141–157, 2002) on both the underlying and the payoff and build and use a Markovian apparatus based on the Bellman principle of optimality to solve the problem under these conditions. We also discuss the interpretation of this model as optimal timing of an irreversible investment decision under an exogenous information constraint.

  11. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  12. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  13. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  14. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  15. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  16. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  17. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  18. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  19. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  20. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  1. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  2. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  3. Theft detection and smart metering practices and expectations in the Netherlands

    NARCIS (Netherlands)

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  4. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  5. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Science.gov (United States)

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  6. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  7. Adaptation Model for Corporate Car Sharing in the Car Rental Industry

    OpenAIRE

    Matthes, Martin

    2016-01-01

    The focus of this thesis was on developing an adaption model for implementing a corporate car sharing service within the existing infrastructure of a car rental company. The investigated case companies were a leading Finnish car rental franchisee and an international car sharing subsidiary, largely owned by the car rental franchisor, which offers corporate car sharing solutions in major European countries. Adapting this new service in Finland will help the car rental franchisee to assert its ...

  8. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  9. Passenger car fuel consumption survey

    Energy Technology Data Exchange (ETDEWEB)

    1984-03-01

    This survey originated from a proposal to monitor the fuel consumption and fuel economy of personal use passenger cars operated in Canada. Its purpose is to establish a data base which would contain information on total distance travelled, total amount of fuel consumed, average distance obtained per unit of fuel, total expenditures on fuel, and seasonal fluctuations in fuel consumption and in distance travelled. Among the needs served by this data base are the monitoring of passenger car fuel economy standards and the estimation of pasenger car fuel requirements in conditions involving fuel shortages. Survey methodology is by telephone interview to trace selected vehicles to the registered owners, at which time a fuel purchase diary is then mailed to the principal driver of the car. The results are tabulated on a quarterly basis and to be released as they become available in bulletins similar to this. Data are presented for each province and the total for Canada is given. During the fourth quarter of 1982, it is estimated that there were 7.3 million personal use passenger cars operated in Canada. These cars were driven 28 billion kilometers and consumed 4.3 billion litres of fuel. Their average litres/100 kilometres and the average fuel consumption was 590 litres. 8 tabs.

  10. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Directory of Open Access Journals (Sweden)

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  11. Engineering an Affordable Self-Driving Car

    KAUST Repository

    Budisteanu, Alexandru Ionut

    2018-01-01

    for affordable self-driving cars and he designed a low-cost self-driving car. The car's roof has cameras and low-resolution 3D LiDAR equipment to detect traffic lanes, other cars, curbs and obstacles, such as people crossing by. To process this dizzying amount

  12. 49 CFR 174.615 - Cleaning cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cleaning cars. 174.615 Section 174.615... Requirements for Division 6.1 (Poisonous) Materials § 174.615 Cleaning cars. (a) [Reserved] (b) After Division 6.1 (poisonous) materials are unloaded from a rail car, that car must be thoroughly cleaned unless...

  13. 49 CFR 231.6 - Flat cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Flat cars. 231.6 Section 231.6 Transportation... TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.6 Flat cars. (Cars with sides 12 inches or less above the floor may be equipped the same as flat cars.) (a) Hand brakes—(1) Number. Same as specified for...

  14. Art Cars: Transformations of the Mundane

    Science.gov (United States)

    Stienecker, Dawn

    2010-01-01

    The automobile itself is often understood as an extension of oneself, where individuals may manipulate the interior and exterior of cars and trucks, decorating them through detailing, stickers, custom colors, and so on. Others go further and change their cars into unique works of art called art cars. Such cars break away from the banality of mass…

  15. 49 CFR 215.203 - Restricted cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Restricted cars. 215.203 Section 215.203..., DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Restricted Equipment § 215.203 Restricted cars. (a) This section restricts the operation of any railroad freight car that is— (1) More than 50...

  16. 49 CFR 1037.2 - Cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Cars. 1037.2 Section 1037.2 Transportation Other... GENERAL RULES AND REGULATIONS BULK GRAIN AND GRAIN PRODUCTS-LOSS AND DAMAGE CLAIMS § 1037.2 Cars. A car is... railroad-leased cars. [57 FR 54334, Nov. 18, 1992] ...

  17. Optimally stopped variational quantum algorithms

    Science.gov (United States)

    Vinci, Walter; Shabani, Alireza

    2018-04-01

    Quantum processors promise a paradigm shift in high-performance computing which needs to be assessed by accurate benchmarking measures. In this article, we introduce a benchmark for the variational quantum algorithm (VQA), recently proposed as a heuristic algorithm for small-scale quantum processors. In VQA, a classical optimization algorithm guides the processor's quantum dynamics to yield the best solution for a given problem. A complete assessment of the scalability and competitiveness of VQA should take into account both the quality and the time of dynamics optimization. The method of optimal stopping, employed here, provides such an assessment by explicitly including time as a cost factor. Here, we showcase this measure for benchmarking VQA as a solver for some quadratic unconstrained binary optimization. Moreover, we show that a better choice for the cost function of the classical routine can significantly improve the performance of the VQA algorithm and even improve its scaling properties.

  18. How to stop global warming

    International Nuclear Information System (INIS)

    Goldenberg, J.

    1990-01-01

    This paper reports on how to stop global warming. At the Toronto Conference on Climate Change in 1988, the world's industrialized nations agreed on a goal of cutting greenhouse gas emissions 20 percent by the year 2005. This would not stabilize atmospheric levels of greenhouse gases but would at least slow their accumulation. Although difficult to achieve, the Toronto goal is certainly reachable. Newer, more efficient technologies can lower energy consumption without effecting economic output. CFC- substitutes can provide refrigeration. In fact, an international carbon tax of just $1 per barrel of oil, or $6 per ton of coal, would generate more than enough revenue to pay for the necessary fuel-saving measures. This tax could result from an international agreement similar to the 1987 Montreal Protocol, which obliges its signatories to cut down on production of CFCs

  19. Stop Negative Thinking Effects for Drug Dependence

    OpenAIRE

    Windiarti, Sri Endang; Indriati, Indriati; Surachmi, Fajar

    2013-01-01

    The purpose of this study was to determine the effect of therapy stop thinking negatively against drug addiction in Rehabilitation Orphanage Rumah Damai Gunung Pati Semarang. This research is quasy experiment with pretest - posttes without the control group design. Thirty respondents were taken to the reseach sujects. Stop thinking negative therapy before and after thebehavior of drug addiction there are differences (t = 0.00), so it can be stated that the therapy stop thinking negatively inf...

  20. Are Stopped Strings Preferred in Sad Music?

    OpenAIRE

    David Huron; Caitlyn Trevor

    2017-01-01

    String instruments may be played either with open strings (where the string vibrates between the bridge and a hard wooden nut) or with stopped strings (where the string vibrates between the bridge and a performer's finger pressed against the fingerboard). Compared with open strings, stopped strings permit the use of vibrato and exhibit a darker timbre. Inspired by research on the timbre of sad speech, we test whether there is a tendency to use stopped strings in nominally sad music. Specifica...

  1. Stop cars: “Recuperación de un derecho ciudadano”

    OpenAIRE

    Vélez Ganda, Nuria

    2016-01-01

    Durante el siglo XX, hemos pasado de ser una sociedad activa que disfrutaba de la ciudad a medida que recorría sus calles, a ser una sociedad motorizada cuyo interés principal es transportarse de un punto A a un punto B en el menor tiempo posible. En este siglo XXI, la concepción del espacio urbano y de la vida cotidiana se encuentra en un movimiento de rechazo de esta ideología anterior. Ya no nos interesan esas ciudades funcionales diseñadas solamente para los vehículos y un movimiento d...

  2. Measurement of stopping power of heavy ions

    International Nuclear Information System (INIS)

    Kitahara, Tetsuo

    1981-01-01

    The stopping power of heavy ions is discussed. In the low energy region, heavy ions keep some of their orbital electrons, and have equilibrium electron charge. The stopping power of penetrating particles depends on this effective charge. At present, it is hard to estimate this effective charge theoretically, accordingly, the estimation is made experimentally. Another difficulty in this estimation is that the Born approximation is not effective for heavy ions. In the low energy region, electronic stopping and nuclear stopping contribute to the stopping power. For the electronic stopping, a formula for the stopping power was given by Lindhard et al. The experimental values were obtained at GSI, and are inconsistent with the estimation by the Lindhard's formula. In the high energy region, where the Born approximation can be used, the Bethe's formula is applied, but the experimental data are scarce. Oscillations are seen in the Z dependence graph of the experimental stopping cross sections. Experimental works on the stopping power have been done. The differential and the integral methods were carried out. (Kato, T.)

  3. Car sharing à la carte

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  4. Seatbelts in CAR therapy: How Safe Are CARS?

    Directory of Open Access Journals (Sweden)

    Kentaro Minagawa

    2015-05-01

    Full Text Available T-cells genetically redirected with a chimeric antigen receptor (CAR to recognize tumor antigens and kill tumor cells have been infused in several phase 1 clinical trials with success. Due to safety concerns related to on-target/off-tumor effects or cytokine release syndrome, however, strategies to prevent or abate serious adverse events are required. Pharmacologic therapies; suicide genes; or novel strategies to limit the cytotoxic effect only to malignant cells are under active investigations. In this review, we summarize results and toxicities of investigations employing CAR redirected T-cells, with a focus on published strategies to grant safety of this promising cellular application.

  5. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  6. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  7. Substitution between Cars within the Household

    DEFF Research Database (Denmark)

    de Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate—for each car owned by the household—own and cross-price effects...... of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, we estimate fuel price elasticities of –0.81 and -0.65 for the primary and secondary cars...... efficient car, finding partial support for the underlying hypothesis. More importantly, the results of this extended model emphasize the importance of behavioural differences related to the position of the most fuel efficient car in the household, suggesting that households’ fuel efficiency choices...

  8. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  9. Positive and negative spillover effects from electric car purchase to car use

    OpenAIRE

    Kløckner, Christian; Nayum, Alim; Mehmetoglu, Mehmet

    2013-01-01

    This study reports the results of two online surveys conducted on buyers of conventional combustion engine cars compared to those of electric vehicles in Norway. The results show that electric cars are generally purchased as additional cars, do not contribute to a decrease in annual mileage if the old car is not substituted, and that electric car buyers use the car more often for their everyday mobility. Psychological determinants derived from the theory of planned behavior and the norm-activ...

  10. Stopping atoms with diode lasers

    International Nuclear Information System (INIS)

    Watts, R.N.; Wieman, C.E.

    1986-01-01

    The use of light pressure to cool and stop neutral atoms has been an area of considerable interest recently. Cooled neutral atoms are needed for a variety of interesting experiments involving neutral atom traps and ultrahigh-resolution spectroscopy. Laser cooling of sodium has previously been demonstrated using elegant but quite elaborate apparatus. These techniques employed stabilized dye lasers and a variety of additional sophisticated hardware. The authors have demonstrated that a frequency chirp technique can be implemented using inexpensive diode lasers and simple electronics. In this technique the atoms in an atomic beam scatter resonant photons from a counterpropagating laser beam. The momentum transfer from the photons slows the atoms. The primary difficulty is that as the atoms slow their Doppler shift changes, and so they are no longer in resonance with the incident photons. In the frequency chirp technique this is solved by rapidly changing the laser frequency so that the atoms remain in resonance. To achieve the necessary frequency sweep with a dye laser one must use an extremely sophisticated high-speed electrooptic modulator. With a diode laser, however, the frequency can be smoothly and rapidly varied over many gigahertz simply by changing the injection current

  11. Electron and Positron Stopping Powers of Materials

    Science.gov (United States)

    SRD 7 NIST Electron and Positron Stopping Powers of Materials (PC database for purchase)   The EPSTAR database provides rapid calculations of stopping powers (collisional, radiative, and total), CSDA ranges, radiation yields and density effect corrections for incident electrons or positrons with kinetic energies from 1 keV to 10 GeV, and for any chemically defined target material.

  12. Addressing production stops in the food industry

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Herbert, Luke Thomas; Jacobsen, Peter

    2014-01-01

    This paper investigates the challenges in the food industry which causes the production lines to stop, illustrated by a case study of an SME size company in the baked goods sector in Denmark. The paper proposes key elements this sector needs to be aware of to effectively address production stops......, and gives examples of the unique challenges faced by the SME food industry....

  13. Perceptual assessment of fricative--stop coarticulation.

    Science.gov (United States)

    Repp, B H; Mann, V A

    1981-04-01

    The perceptual dependence of stop consonants on preceding fricatives [Mann and Repp, J. Acoust. Soc. Am. 69, 548--558 (1981)] was further investigated in two experiments employing both natural and synthetic speech. These experiments consistently replicated our original finding that listeners, report velar stops following [s]. In addition, our data confirmed earlier reports that natural fricative noises (excerpted from utterances of [st alpha], [sk alpha], [(formula: see text)k alpha]) contain cues to the following stop consonants; this was revealed in subjects' identifications of stops from isolated fricative noises and from stimuli consisting of these noises followed by synthetic CV portions drawn from a [t alpha]--[k alpha] continuum. However, these cues in the noise portion could not account for the contextual effect of fricative identity ([formula: see text] versus [sp) on stop perception (more "k" responses following [s]). Rather, this effect seems to be related to a coarticulatory influence of a preceding fricative on stop production; Subjects' responses to excised natural CV portions (with bursts and aspiration removed) were biased towards a relatively more forward place of stop articulation when the CVs had originally been preceded by [s]; and the identification of a preceding ambiguous fricative was biased in the direction of the original fricative context in which a given CV portion had been produced. These findings support an articulatory explanation for the effect of preceding fricatives on stop consonant perception.

  14. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... of hangnails, or other triggers, such as boredom, stress, or anxiety. By figuring out what causes you to bite your nails, you can figure out how to avoid these situations and develop a plan to stop. Just knowing when you’re inclined to bite may help solve the problem. Try to gradually stop biting ...

  15. All in One Stop? The Accessibility of Work Support Programs at One-Stop Centers.

    Science.gov (United States)

    Richer, Elise; Kubo, Hitomi; Frank, Abbey

    The accessibility of work support programs at one-stop centers was examined in a study during which 33 telephone directors or managers of one-stop centers in 22 states were interviewed by telephone. The interviews established the existence of extensive differences between one-stop centers from the standpoint of all aspects of their operation,…

  16. Substitution between cars within the household

    DEFF Research Database (Denmark)

    De Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    The purpose of this paper is to study to what extent two-car households substitute the use of their less fuel efficient car by the use of their more fuel efficient car after an increase in fuel prices. Based on a simple theoretical framework we use a large sample of detailed Danish data on two-car...... households to estimate, for each car owned by the household, own and cross-price effects of increases in fuel costs per kilometer. The empirical results point at important substitution effects, so that models that estimate responses to fuel prices on the implicit or explicit assumption of one car per...

  17. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  18. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Directory of Open Access Journals (Sweden)

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  19. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  20. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  1. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  2. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    OpenAIRE

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  3. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  4. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  5. The Speeding Car Design Challenge

    Science.gov (United States)

    Roman, Harry T.

    2009-01-01

    All too often, one reads about high-speed police chases in pursuit of stolen cars that result in death and injury to people and innocent bystanders. Isn't there another way to accomplish the apprehension of the thieves that does not put people at such great risk? This article presents a classroom challenge to use technology to remotely shutdown…

  6. Automated Car Park Management System

    Science.gov (United States)

    Fabros, J. P.; Tabañag, D.; Espra, A.; Gerasta, O. J.

    2015-06-01

    This study aims to develop a prototype for an Automated Car Park Management System that will increase the quality of service of parking lots through the integration of a smart system that assists motorist in finding vacant parking lot. The research was based on implementing an operating system and a monitoring system for parking system without the use of manpower. This will include Parking Guidance and Information System concept which will efficiently assist motorists and ensures the safety of the vehicles and the valuables inside the vehicle. For monitoring, Optical Character Recognition was employed to monitor and put into list all the cars entering the parking area. All parking events in this system are visible via MATLAB GUI which contain time-in, time-out, time consumed information and also the lot number where the car parks. To put into reality, this system has a payment method, and it comes via a coin slot operation to control the exit gate. The Automated Car Park Management System was successfully built by utilizing microcontrollers specifically one PIC18f4550 and two PIC16F84s and one PIC16F628A.

  7. Restoring a Classic Electric Car

    Science.gov (United States)

    Kraft, Thomas E.

    2012-01-01

    One hundred years ago, automobiles were powered by steam, electricity, or internal combustion. Female drivers favored electric cars because, unlike early internal-combustion vehicles, they did not require a crank for starting. Nonetheless, internal-combustion vehicles came to dominate the industry and it's only in recent years that the electrics…

  8. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  9. Transit Car Performance Comparison, State-of-the-Art Car vs. PATCO Transit Car, NYCTA R-46, MBTA Silverbirds

    Science.gov (United States)

    1978-02-01

    The first phase of this contract authorized the design, development, and demonstration of two State-Of-The-Art Cars (SOAC). This document reports on the gathering of comparative test data on existing in-service transit cars. The three transit cars se...

  10. Toward brain-actuated car applications: Self-paced control with a motor imagery-based brain-computer interface.

    Science.gov (United States)

    Yu, Yang; Zhou, Zongtan; Yin, Erwei; Jiang, Jun; Tang, Jingsheng; Liu, Yadong; Hu, Dewen

    2016-10-01

    This study presented a paradigm for controlling a car using an asynchronous electroencephalogram (EEG)-based brain-computer interface (BCI) and presented the experimental results of a simulation performed in an experimental environment outside the laboratory. This paradigm uses two distinct MI tasks, imaginary left- and right-hand movements, to generate a multi-task car control strategy consisting of starting the engine, moving forward, turning left, turning right, moving backward, and stopping the engine. Five healthy subjects participated in the online car control experiment, and all successfully controlled the car by following a previously outlined route. Subject S1 exhibited the most satisfactory BCI-based performance, which was comparable to the manual control-based performance. We hypothesize that the proposed self-paced car control paradigm based on EEG signals could potentially be used in car control applications, and we provide a complementary or alternative way for individuals with locked-in disorders to achieve more mobility in the future, as well as providing a supplementary car-driving strategy to assist healthy people in driving a car. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Stopping of hypervelocity clusters in solids

    International Nuclear Information System (INIS)

    Anders, Christian; Ziegenhain, Gerolf; Urbassek, Herbert M; Bringa, Eduardo M

    2011-01-01

    Using molecular-dynamics simulations, we study the processes underlying the stopping of energetic clusters upon impact in matter. We investigate self-bombardment of both a metallic (Cu) and a van-der-Waals bonded (frozen Ar) target. Clusters with sizes up to N = 10 4 atoms and with energies per atom of E/N = 0.1-1600 eV atom -1 were studied. We find that the stopping force exerted on a cluster follows an N 2/3 -dependence with cluster size N; thus large clusters experience less stopping than equi-velocity atoms. In the course of being stopped, the cluster is strongly deformed and attains a roughly pancake shape. Due to the cluster inertia, maximum deformation occurs later than the maximum stopping force. The time scale of projectile stopping is set by t 0 , the time the cluster needs to cover its own diameter before impacting the target; it thus depends on both cluster size and velocity. The time when the cluster experiences its maximum stopping force is around (0.7-0.8)t 0 . We find that the cluster is deformed with huge strain rates of around 1/2t 0 ; this amounts to 10 11 -10 13 s -1 for the cases studied here. (paper)

  12. A light sneutrino rescues the light stop

    Energy Technology Data Exchange (ETDEWEB)

    Chala, M. [Departament de Física Tèorica, Universitat de València and IFIC, Universitat de València-CSIC,Dr. Moliner 50, E-46100 Burjassot (València) (Spain); Delgado, A. [Department of Physics, University of Notre Dame, 225 Nieuwland Science Hall, Notre Dame, IN 46556 (United States); Nardini, G. [Albert Einstein Center (AEC), Institute for Theoretical Physics (ITP), University of Bern,Sidlerstrasse 5, CH-3012 Bern (Switzerland); Quirós, M. [Institut de Física d’Altes Energies (IFAE), The Barcelona Institute of Science and Technology (BIST),Institució Catalana de Recerca i Estudis Avançats - ICREA, Campus UAB, 08193 Bellaterra, Barcelona (Spain)

    2017-04-18

    Stop searches in supersymmetric frameworks with R-parity conservation usually assume the lightest neutralino to be the lightest supersymmetric particle. In this paper we consider an alternative scenario in which the left-handed tau sneutrino is lighter than neutralinos and stable at collider scales, but possibly unstable at cosmological scales. Moreover the (mostly right-handed) stop t̃ is lighter than all electroweakinos, and heavier than the scalars of the third generation lepton doublet, whose charged component, τ̃, is heavier than the neutral one, ν̃. The remaining supersymmetric particles are decoupled from the stop phenomenology. In most of the parameter space, the relevant stop decays are only into tτ̃τ, tν̃ν and bν̃τ via off-shell electroweakinos. We constrain the branching ratios of these decays by recasting the most sensitive stop searches. Due to the “double invisible” kinematics of the t̃→tν̃ν process, and the low efficiency in tagging the tτ̃τ decay products, light stops are generically allowed. In the minimal supersymmetric standard model with ∼ 100 GeV sneutrinos, stops with masses as small as ∼ 350 GeV turn out to be allowed at 95% CL.

  13. Application of the RADTRAN 5 stop model

    International Nuclear Information System (INIS)

    Neuhauser, K.S.; Kanipe, R.L.; Weiner, R.F.

    1997-01-01

    A number of environmental impact analyses with the RADTRAN computer code have shown that dose to persons at stops is one of the largest components of incident-free dose during overland carriage of spent fuel and other radioactive materials (e.g., USDOE, 1994). The input data used in these analyses were taken from a 1983 study that reports actual observations of spent fuel shipments by truck. Early RADTRAN stop models, however, were insufficiently flexible to take advantage of the detailed information in the study. A more recent study of gasoline service stations that specialize in servicing large trucks, which are the most likely stop locations for shipments of Type B packages in the United States, has provided additional, detailed data on refueling/meal stops. The RADTRAN 5 computer code for transportation risk analysis allows exposures at stops to be more fully modeled than have previous releases of the code and is able to take advantage of detailed data. It is the intent of this paper first to compare results from RADTRAN and RADTRAN 5 for the old, low-resolution form of input data, and then to demonstrate what effect the new data and input format have on stop-dose estimates for an individual stop and for a hypothetical shipment route. Finally, these estimated public doses will be contrasted with doses calculated for a special population group -- inspectors

  14. Application of the radtran 5 stop model

    International Nuclear Information System (INIS)

    Neuhauser, K.S.; Kanipe, R.L.; Weiner, R.F.

    1998-01-01

    A number of environmental impact analyzes with the RADTRAN computer code have shown that dose to persons at stops is one of the largest components of incident-free dose during overland carriage of spent fuel and other radioactive materials. The input data used in these analyses were taken from a 1983 study that reports actual observations of spent fuel shipments by truck. Early RADTRAN stop models, however, were insufficiently flexible to take advantage of the detailed information in the study. A more recent study of gasoline service stations that specialize in servicing large trucks, which are the most likely stop locations for shipments of Type B packages in the United States, has provided additional, detailed data on refueling/meal stops. The RADTRAN 5 computer code for transportation risk analysis allows exposures at stops to be more fully modelled than have previous releases of the code and is able to take advantage of detailed data. It is the intent of this paper first to compare results from RADTRAN 4 and RADTRAN 5 for the old, low-resolution form of input data, and then to demonstrate what effect the new data and input format have on stop-dose estimates for an individual stop and for a hypothetical shipment route. Finally, these estimated public doses will be contrasted with doses calculated for a special population group-inspectors. (authors)

  15. Consumer Behavior towards Safer Car Purchasing Decisions

    OpenAIRE

    Khairil Anwar Abu Kassim; Mohd Hafzi Md Isa; Yahaya Ahmad; Intan Osman; Lawrence Arokiasamy

    2016-01-01

    In Malaysia, the car safety level has been elevated through regulations and a consumer-based approach, i.e. the New Car Assessment Program in Southeast Asian Countries (ASEAN NCAP). Nevertheless, the availability of information on consumers' car purchasing decisions towards safety is still limited in Malaysia. Thus, this study was aimed at evaluating consumers' purchasing decisions of their present cars and investigating their awareness of ASEAN NCAP. Self-administered questionnaires were dis...

  16. Ground effect aerodynamics of racing cars

    OpenAIRE

    Zhang, Xin; Toet, Willem; Zerihan, Jonathan

    2006-01-01

    We review the progress made during the last thirty years on ground effect aerodynamics associated with race cars, in particular open wheel race cars. Ground effect aerodynamics of race cars is concerned with generating downforce, principally via low pressure on the surfaces nearest to the ground. The “ground effected” parts of an open wheeled car's aerodynamics are the most aerodynamically efficient and contribute less drag than that associated with, for example, an upper rear wing. Whilst dr...

  17. Active deceleration support in car following

    NARCIS (Netherlands)

    Mulder, M.; Pauwelussen, J.J.A.; Paassen, M.M. van; Mulder, M.; Abbink, D.A.

    2010-01-01

    A haptic gas pedal feedback system is developed that provides car-following information via haptic cues from the gas pedal. During normal car-following situations, the haptic feedback (HF) cues were sufficient to reduce control activity and improve car-following performance. However, in more

  18. 49 CFR 174.57 - Cleaning cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cleaning cars. 174.57 Section 174.57... and Loading Requirements § 174.57 Cleaning cars. All hazardous material which has leaked from a package in any rail car or on other railroad property must be carefully removed. ...

  19. Trial products of solar cars; Solar car no shisaku

    Energy Technology Data Exchange (ETDEWEB)

    Shimizu, A; Hatakeyama, S; Sugiura, S; Shinoda, S; Daigo, Y; Fujihara, Y; Yano, K; Kasuga, M [Yamanashi University, Yamanashi (Japan). Faculty of Engineering

    1997-11-25

    A solar car was trially manufactured installing solar panels on a motor-wheelchair for the old (senior car). It is a car for one person with maximum speed of 6km/h, motor of 360w, two of storage battery of 12Vtimes29AH, and two of solar cell of 20Vtimes3A. The output of solar cell is about 100W, which may not be enough to drive a 360W motor. However, if action time per day is about 2 hours, the required power 700WH, and the sunshine duration 7 hours per day, solar cells of 100W can generate 700WH. This is stored in battery, and when it is short, it is supplemented by nighttime power. Product prices are 200,000-250,000 yen. A solar go-cart was trially manufactured remodeling the gasoline-run go-cart. It is a solar go-cart for one person with maximum speed of 30km/h, a motor of 600W, four of storage battery of 12Vtimes29AH, and four of solar cell of 20Vtimes3A. The output of solar battery at 200W is a third of the motor power, with battery charged three times the travel time. More than 1000 persons trially rode the go-cart. 2 figs.

  20. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Science.gov (United States)

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  1. Reducing the threat of nuclear theft and sabotage

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    of the stockpiles of such materials (through measures such as using these materials as fuel, blending down highly enriched uranium, or immobilizing plutonium); Reconsider the design basis threat used in designing and analyzing security systems, in the light of the magnitude of the threat demonstrated on September II; Provide greatly increased international training in security for nuclear materials and facilities - including emphasizing the crucial role of such security in preventing the spread of nuclear weapons and stopping nuclear terrorism. This paper analyzes each of these areas and provides recommendations for specific steps that should be taken toward the goal of a world in which all weapons-usable nuclear material is secure and accounted for, and all nuclear facilities secured from sabotage, with sufficient transparency that the international community can have confidence that this is the case. Over the long term, the paper concludes, the goal should be to attempt to come as close as possible to the 'stored weapon standard' proposed by a committee of the U.S. National Academy of Sciences in 1994 - that is to say, to protect and account for weapons-usable nuclear materials as rigorously as the nuclear weapon states protect and account for nuclear weapons themselves. The road to that objective is a long one, however

  2. An improved car-following model accounting for the preceding car's taillight

    Science.gov (United States)

    Zhang, Jian; Tang, Tie-Qiao; Yu, Shao-Wei

    2018-02-01

    During the deceleration process, the preceding car's taillight may have influences on its following car's driving behavior. In this paper, we propose an extended car-following model with consideration of the preceding car's taillight. Two typical situations are used to simulate each car's movement and study the effects of the preceding car's taillight on the driving behavior. Meanwhile, sensitivity analysis of the model parameter is in detail discussed. The numerical results show that the proposed model can improve the stability of traffic flow and the traffic safety can be enhanced without a decrease of efficiency especially when cars pass through a signalized intersection.

  3. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... figure out how to avoid these situations and develop a plan to stop. Just knowing when you’ ... a doctor. If you bite your nails and develop a skin or nail infection, consult a board- ...

  4. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... your nails to your face and mouth. To help you stop biting your nails, dermatologists recommend the ... stress ball or silly putty instead. This will help keep your hands busy and away from your ...

  5. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... and away from your mouth. Identify your triggers: These could be physical triggers, such as the presence ... nails, you can figure out how to avoid these situations and develop a plan to stop. Just ...

  6. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Skin dictionary Camp Discovery Good Skin Knowledge lesson plans and activities Video library Find a dermatologist Why ... how to avoid these situations and develop a plan to stop. Just knowing when you’re inclined ...

  7. Port Authority of Allegheny County Transit Stops

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — All transit stops within the Port Authority of Allegheny County's service area for the November 20, 2016 - March (TBD) 2017 schedule period.

  8. Imagine stopping the progression of Alzheimer's

    Science.gov (United States)

    ... Issue Past Issues Imagine stopping the progression of Alzheimer's Past Issues / Fall 2006 Table of Contents For ... I have friends and loved ones suffering from Alzheimer's. But I can imagine… and hope for… a ...

  9. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Part 2: Origin Part 3: Function Textbook Study notes Image library 3-D animated image library Board ... gradually stop biting your nails: Some doctors recommend taking a gradual approach to break the habit. Try ...

  10. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Mohs AUC MyDermPath+ Psoriasis Patient education resources Practice Management Center Coding and reimbursement Coding MACRA Fee schedule ... your nails: Some doctors recommend taking a gradual approach to break the habit. Try to stop biting ...

  11. Car insurance information management system

    OpenAIRE

    Sun, Yu

    2015-01-01

    A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...

  12. Solar Powered Heat Control System for Cars

    OpenAIRE

    Abin John; Jithin Thomas

    2014-01-01

    It takes times for an air-conditioner to effectively start cooling the passenger compartment in the car. So the passenger of the car will feel the heat in the car extremely before the air-conditioner fully cooling the interior of the car. Excessive heat can also damage an automobile's interior as well as personal property kept in the passenger compartment. So, a system to reduce this excessive heat by pumping out hot air and allowing cooler ambient air to enter the car by mean...

  13. CAR-T cells are serial killers.

    Science.gov (United States)

    Davenport, Alexander J; Jenkins, Misty R; Ritchie, David S; Prince, H Miles; Trapani, Joseph A; Kershaw, Michael H; Darcy, Phillip K; Neeson, Paul J

    2015-12-01

    Chimeric antigen receptor (CAR) T cells have enjoyed unprecedented clinical success against haematological malignancies in recent years. However, several aspects of CAR T cell biology remain unknown. We recently compared CAR and T cell receptor (TCR)-based killing in the same effector cell and showed that CAR T cells can not only efficiently kill single tumor targets, they can also kill multiple tumor targets in a sequential manner. Single and serial killing events were not sustained long term due to CAR down-regulation after 20 hours.

  14. Empirical stopping powers for ions in solids

    International Nuclear Information System (INIS)

    Ziegler, J.F.; Biersack, J.P.; Littmark, U.

    1983-01-01

    The work of Brandt and collaborators on low energy ion stopping powers has been extended to create an empirical formulation for the stopping of ions in solids. The result is a simple computer program (about 60 lines of code) which calculates stopping powers from zero to 100 MeV/amu for all ions in all elemental solids. This code has been compared to the data in about 2000 papers, and has a standard error of 9% for energies above keV/amu. This approach includes high energy relativistic effects and shell-corrections. In the medium energy range it uses stopping theory based on the local-density approximation and Lindhard stopping in a free electron gas. This is applied to realistic Hartree-Fock charge distributions for crystalline solids. In the low energy range it uses the Brandt concepts of ion stripping relative to the Fermi velocity of solids, and also his formalism for the relation of projectile ionization to its effective charge. The details of the calculation are presented, and a broad comparison is shown with experiment. Special comparative examples are shown of both the low energy stopping power oscillations which depend on the atomic number of the ion, and also of the target

  15. Consumer Behavior towards Safer Car Purchasing Decisions

    Directory of Open Access Journals (Sweden)

    Khairil Anwar Abu Kassim

    2016-08-01

    Full Text Available In Malaysia, the car safety level has been elevated through regulations and a consumer-based approach, i.e. the New Car Assessment Program in Southeast Asian Countries (ASEAN NCAP. Nevertheless, the availability of information on consumers’ car purchasing decisions towards safety is still limited in Malaysia. Thus, this study was aimed at evaluating consumers’ purchasing decisions of their present cars and investigating their awareness of ASEAN NCAP. Self-administered questionnaires were distributed among consumers visiting different car showrooms and dealer shops. The findings suggest that safety was considered as one of the top three factors by the respondents when purchasing their present cars. Awareness of ASEAN NCAP has increased as compared to a previous study. This information is essential for policy makers, manufacturers and other stakeholders to assist in setting priorities with regard to the promotion of car safety in the country.

  16. Substitution between cars within the household

    DEFF Research Database (Denmark)

    De Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    2016-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars of different fuel efficiency in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate – for each car owned by the household...... – own and cross-price effects of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, the basic model yielded fuel price elasticities of 0.......98 and 1.41 for the primary and secondary cars, respectively. Accounting for substitution effects, these figures reduce to, respectively, 0.32 and 0.45. Consistent with substitution behaviour, we find that the fuel price elasticity of fuel demand exceeds the elasticity of kilometre demands with respect...

  17. Preferences for Alternative Fuel Vehicles of Company Car Drivers

    NARCIS (Netherlands)

    Koetse, M.J.; Hoen, A.

    2014-01-01

    Costs of car ownership for company cars drivers and private car owners are very different. Car use, car choice decisions and preferences for car characteristics may therefore differ substantially between these two markets. In this paper, we present results of a study on the preferences of company

  18. 49 CFR 215.121 - Defective car body.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Defective car body. 215.121 Section 215.121..., DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Freight Car Components Car Bodies § 215.121 Defective car body. A railroad may not place or continue in service a car, if: (a) Any portion of...

  19. Inseparability of Go and Stop in Inhibitory Control: Go Stimulus Discriminability Affects Stopping Behavior.

    Science.gov (United States)

    Ma, Ning; Yu, Angela J

    2016-01-01

    Inhibitory control, the ability to stop or modify preplanned actions under changing task conditions, is an important component of cognitive functions. Two lines of models of inhibitory control have previously been proposed for human response in the classical stop-signal task, in which subjects must inhibit a default go response upon presentation of an infrequent stop signal: (1) the race model, which posits two independent go and stop processes that race to determine the behavioral outcome, go or stop; and (2) an optimal decision-making model, which posits that observers decides whether and when to go based on continually (Bayesian) updated information about both the go and stop stimuli. In this work, we probe the relationship between go and stop processing by explicitly manipulating the discrimination difficulty of the go stimulus. While the race model assumes the go and stop processes are independent, and therefore go stimulus discriminability should not affect the stop stimulus processing, we simulate the optimal model to show that it predicts harder go discrimination should result in longer go reaction time (RT), lower stop error rate, as well as faster stop-signal RT. We then present novel behavioral data that validate these model predictions. The results thus favor a fundamentally inseparable account of go and stop processing, in a manner consistent with the optimal model, and contradicting the independence assumption of the race model. More broadly, our findings contribute to the growing evidence that the computations underlying inhibitory control are systematically modulated by cognitive influences in a Bayes-optimal manner, thus opening new avenues for interpreting neural responses underlying inhibitory control.

  20. Inseparability of Go and Stop in Inhibitory Control: Go Stimulus Discriminability Affects Stopping Behavior

    Directory of Open Access Journals (Sweden)

    Ning eMa

    2016-03-01

    Full Text Available Inhibitory control, the ability to stop or modify preplanned actions under changing task conditions, is an important component of cognitive functions. Two lines of models of inhibitory control have previously been proposed for human response in the classical stop-signal task, in which subjects must inhibit a default go response upon presentation of an infrequent stop signal: (1 the race model, which posits two independent go and stop processes that race to determine the behavioral outcome, go or stop; and (2 an optimal decision-making model, which posits that observers decides whether and when to go based on continually (Bayesian updated information about both the go and stop stimuli. In this work, we probe the relationship between go and stop processing by explicitly manipulating the discrimination difficulty of the go stimulus. While the race model assumes the go and stop processes are independent, and therefore go stimulus discriminability should not affect the stop stimulus processing, we simulate the optimal model to show that it predicts harder go discrimination results in a longer go reaction time (RT, a lower stop error rate, as well as a faster stop-signal RT. We then present novel behavioral data that validate these model predictions. The results thus favor a fundamentally inseparable account of go and stop processing, in a manner consistent with the optimal model, and contradicting the independence assumption of the race model. More broadly, our findings contribute to the growing evidence that the computations underlying inhibitory control are systematically modulated by cognitive influences in a Bayes-optimal manner, thus opening new avenues for interpreting neural responses underlying inhibitory control.

  1. Stopping, goal-conflict, trait anxiety and frontal rhythmic power in the stop-signal task.

    Science.gov (United States)

    Neo, Phoebe S-H; Thurlow, Jane K; McNaughton, Neil

    2011-12-01

    The medial right frontal cortex is implicated in fast stopping of an initiated motor action in the stop-signal task (SST). To assess whether this region is also involved in the slower behavioural inhibition induced by goal conflict, we tested for effects of goal conflict (when stop and go tendencies are balanced) on low-frequency rhythms in the SST. Stop trials were divided, according to the delays at which the stop signal occurred, into short-, intermediate-, and long-delay trials. Consistent with goal-conflict processing, intermediate-delay trials were associated with greater 7-8 Hz EEG power than short- or long-delay trials at medial right frontal sites (Fz, F4, and F8). At F8, 7-8 Hz power was linked to high trait anxiety and neuroticism. A separate 4-7 Hz power increase was also seen in stop, relative to go, trials, but this was independent of delay, was maximal at the central midline site Cz, and predicted faster stopping. Together with previous data on the SST, these results suggest that the right frontal region could be involved in multiple inhibition mechanisms. We propose a hierarchical model of the control of stopping that integrates the literature on the neural control of fast motor stopping with that on slower, motive-directed behavioural inhibition.

  2. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  3. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  4. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  5. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    OpenAIRE

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  6. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  7. Lean Gasoline System Development for Fuel Efficient Small Cars

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Stuart R. [General Motors LLC, Pontiac, MI (United States)

    2013-11-25

    The General Motors and DOE cooperative agreement program DE-EE0003379 is completed. The program has integrated and demonstrated a lean-stratified gasoline engine, a lean aftertreatment system, a 12V Stop/Start system and an Active Thermal Management system along with the necessary controls that significantly improves fuel efficiency for small cars. The fuel economy objective of an increase of 25% over a 2010 Chevrolet Malibu and the emission objective of EPA T2B2 compliance have been accomplished. A brief review of the program, summarized from the narrative is: The program accelerates development and synergistic integration of four cost competitive technologies to improve fuel economy of a light-duty vehicle by at least 25% while meeting Tier 2 Bin 2 emissions standards. These technologies can be broadly implemented across the U.S. light-duty vehicle product line between 2015 and 2025 and are compatible with future and renewable biofuels. The technologies in this program are: lean combustion, innovative passive selective catalyst reduction lean aftertreatment, 12V stop/start and active thermal management. The technologies will be calibrated in a 2010 Chevrolet Malibu mid-size sedan for final fuel economy demonstration.

  8. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  9. Bubble formation after a 20-m dive: deep-stop vs. shallow-stop decompression profiles

    NARCIS (Netherlands)

    Schellart, Nico A. M.; Corstius, Jan-Jaap Brandt; Germonpré, Peter; Sterk, Wouter

    2008-01-01

    OBJECTIVES: It is claimed that performing a "deep stop," a stop at about half of maximal diving depth (MDD), can reduce the amount of detectable precordial bubbles after the dive and may thus diminish the risk of decompression sickness. In order to ascertain whether this reduction is caused by the

  10. Prediction of future car forms based on historical trends

    Directory of Open Access Journals (Sweden)

    Bijendra Kumar

    2016-09-01

    Full Text Available Cars are one of the most important products that affects our daily life. Manufacturers of cars are inclined to know factors that affect the sales of cars and how to influence them. Car is a very competitive product whose technology is already matured. Thus, purchase decisions of a car depend on factors such as, aesthetics, ergonomics, features available and price. Exterior form and colour of a car are the most important factors that influence likeness of the car. We did a case study on car aesthetics (form, colour, shape, and user focus with more than 500 car advertisements over the past 70 years, appearing in various car magazines. Results show that form of cars has changed from sharp to smooth over the years, and white colour cars are becoming more popular. Additionally, car size is becoming smaller and increasingly focused towards family. Thus, manufacturers are recommended to develop compact, efficient and hybrid cars.

  11. Driving CAR T-cells forward

    Science.gov (United States)

    Jackson, Hollie J.; Rafiq, Sarwish; Brentjens, Renier J.

    2017-01-01

    The engineered expression of chimeric antigen receptors (CARs) on the surface of T cells enables the redirection of T-cell specificity. Early clinical trials using CAR T cells for the treatment of patients with cancer showed modest results, but the impressive outcomes of several trials of CD19-targeted CAR T cells in the treatment of patients with B-cell malignancies have generated an increased enthusiasm for this approach. Important lessons have been derived from clinical trials of CD19-specific CAR T cells, and ongoing clinical trials are testing CAR designs directed at novel targets involved in haematological and solid malignancies. In this Review, we discuss these trials and present strategies that can increase the antitumour efficacy and safety of CAR T-cell therapy. Given the fast-moving nature of this field, we only discuss studies with direct translational application currently or soon-to-be tested in the clinical setting. PMID:27000958

  12. Research of braking peculiarities of used cars

    Directory of Open Access Journals (Sweden)

    V. Mitunevičius

    2002-06-01

    Full Text Available This paper briefly describes some analysis of a car braking process - the peculiarities of car wheel-to-road adhesion, the influence of distribution of braking forces on car stability between front and rear axles. The requirements of EU Directive 71/320/EEC to braking force coefficients of car front and rear axles are exposed. Structural designs of braking systems are analyzed with respect to their meeting the EU standards. Experimental measurements of braking force coefficients for some models of cars which are used in Lithuania, are presented with the analysis how these coefficients meet the EU standards. The analysis of test results, suggestions for the ratio of braking forces of car front and rear axles are presented.

  13. MODERN ELECTRIC CARS OF TESLA MOTORS COMPANY

    Directory of Open Access Journals (Sweden)

    O. F. Vynakov

    2016-08-01

    Full Text Available This overview article shows the advantages of a modern electric car as compared with internal combustion cars by the example of the electric vehicles of Tesla Motors Company. It (в смысле- статья describes the history of this firm, provides technical and tactical characteristics of three modifications of electric vehicles produced by Tesla Motors. Modern electric cars are not less powerful than cars with combustion engines both in speed and acceleration amount. They are reliable, economical and safe in operation. With every year the maximum range of an electric car is increasing and its battery charging time is decreasing.Solving the problem of environmental safety, the governments of most countries are trying to encourage people to switch to electric cars by creating subsidy programs, lending and abolition of taxation. Therefore, the advent of an electric vehicle in all major cities of the world is inevitable.

  14. Benefits of magnesium wheels for consumer cars

    Science.gov (United States)

    Frishfelds, Vilnis; Timuhins, Andrejs; Bethers, Uldis

    2018-05-01

    Advantages and disadvantages of magnesium wheels are considered based on a mechanical model of a car. Magnesium wheels are usually applied to racing cars as they provide slightly better strength/weight ratio than aluminum alloys. Do they provide notable benefits also for the everyday user when the car speeds do not exceed allowed speed limit? Distinct properties of magnesium rims are discussed. Apart from lighter weight of magnesium alloys, they are also good in dissipating the energy of vibrations. The role of energy dissipation in the rim of a wheel is estimated by a quarter car model. Improvements to safety by using the magnesium wheels are considered. Braking distance and responsiveness of the car is studied both with and without using an Anti Blocking System (ABS). Influence of rim weight on various handling parameters of the car is quantitatively tested.

  15. The extent of the stop coannihilation strip

    Energy Technology Data Exchange (ETDEWEB)

    Ellis, John [King' s College London, Theoretical Particle Physics and Cosmology Group, Department of Physics, London (United Kingdom); CERN, Theory Division, Geneva 23 (Switzerland); Olive, Keith A. [University of Minnesota, School of Physics and Astronomy, Minneapolis, MN (United States); University of Minnesota, William I. Fine Theoretical Physics Institute, School of Physics and Astronomy, Minneapolis, MN (United States); Zheng, Jiaming [University of Minnesota, School of Physics and Astronomy, Minneapolis, MN (United States)

    2014-07-15

    Many supersymmetric models such as the constrained minimal supersymmetric extension of the Standard Model (CMSSM) feature a strip in parameter space where the lightest neutralino χ is identified as the lightest supersymmetric particle, the lighter stop squark t{sub 1} is the next-to-lightest supersymmetric particle (NLSP), and the relic χ cold darkmatter density is brought into the range allowed by astrophysics and cosmology by coannihilation with the lighter stop squark t{sub 1} NLSP. We calculate the stop coannihilation strip in the CMSSM, incorporating Sommerfeld enhancement effects, and we explore the relevant phenomenological constraints and phenomenological signatures. In particular, we show that the t{sub 1} may weigh several TeV, and its lifetime may be in the nanosecond range, features that are more general than the specific CMSSM scenarios that we study in this paper. (orig.)

  16. The stopping rules for winsorized tree

    Science.gov (United States)

    Ch'ng, Chee Keong; Mahat, Nor Idayu

    2017-11-01

    Winsorized tree is a modified tree-based classifier that is able to investigate and to handle all outliers in all nodes along the process of constructing the tree. It overcomes the tedious process of constructing a classical tree where the splitting of branches and pruning go concurrently so that the constructed tree would not grow bushy. This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier. If outlier is detected, the value is neutralized using winsorize approach. Both outlier identification and value neutralization are executed recursively in every node until predetermined stopping criterion is met. The aim of this paper is to search for significant stopping criterion to stop the tree from further splitting before overfitting. The result obtained from the conducted experiment on pima indian dataset proved that the node could produce the final successor nodes (leaves) when it has achieved the range of 70% in information gain.

  17. Electron stopping powers for transport calculations

    International Nuclear Information System (INIS)

    Berger, M.J.

    1988-01-01

    The reliability of radiation transport calculations depends on the accuracy of the input cross sections. Therefore, it is essential to review and update the cross sections from time to time. Even though the main interest of the author's group at NBS is in transport calculations and their applications, the group spends almost as much time on the analysis and preparation of cross sections as on the development of transport codes. Stopping powers, photon attenuation coefficients, bremsstrahlung cross sections, and elastic-scattering cross sections in recent years have claimed attention. This chapter deals with electron stopping powers (with emphasis on collision stopping powers), and reviews the state of the art as reflected by Report 37 of the International Commission on Radiation Units and Measurements

  18. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  19. Should Diesel cars in Europe be discouraged?

    OpenAIRE

    Mayeres, Inge; Proost, Stef

    2001-01-01

    This paper examines the rationale for the different tax treatment of gasoline and diesel cars currently observed in Europe. First, we analyse possible justifications for a different tax treatment: pure tax revenue considerations, externality cons0iderations and constraints on the tax instruments used for cars and trucks. Next, an applied general equilibrium model is used to assess the welfare effects of revenue neutral changes in the vehicle and fuel taxes on diesel and gasoline cars. The mod...

  20. PLC Based Automatic Multistoried Car Parking System

    OpenAIRE

    Swanand S .Vaze; Rohan S. Mithari

    2014-01-01

    This project work presents the study and design of PLC based Automatic Multistoried Car Parking System. Multistoried car parking is an arrangement which is used to park a large number of vehicles in least possible place. For making this arrangement in a real plan very high technological instruments are required. In this project a prototype of such a model is made. This prototype model is made for accommodating twelve cars at a time. Availability of the space for parking is detecte...

  1. Alcohol Fuel in Passenger Car

    Directory of Open Access Journals (Sweden)

    Adam Polcar

    2016-01-01

    Full Text Available The present article studies the effects of combustion of high-percentage mixture of bioethanol and gasoline on the output parameters of a passenger car engine. The car engine has not been structurally modified for the combustion of fuels with higher ethanol content. The mixture used consisted of E85 summer blend and Natural 95 gasoline in a ratio of 50:50. The parameters monitored during the experiment included the air-fuel ratio in exhaust gasses, the power output and torque of the engine and also the specific energy consumption and efficiency of the engine. As is apparent from the results, E85+N95 (50:50 mixture combustion results in lean-burn (λ > 1 due to the presence of oxygen in bioethanol. The lean-burn led to a slight decrease in torque and power output of the engine. However, due to the positive physicochemical properties of bioethanol, the decrease has not been as significant as would normally be expected from the measured air-fuel ratio. These findings are further confirmed by the calculated energy required to produce 1 kWh of energy, and by the higher efficiency of the engine during the combustion of a 50% bioethanol mixture.

  2. Air quality inside passenger cars

    Directory of Open Access Journals (Sweden)

    Joanna Faber

    2017-02-01

    Full Text Available Vehicle interior is a specific environment of relatively small volume, with variety of materials placed inside, including hard and soft plastics, adhesives, paints, lubricants and many others. As a result, particularly in case of newly produced vehicles, large amounts and numbers of volatile species, especially volatile organic compounds (VOCs, may be emitted and have influence vehicle interior air quality (VIAQ. Despite the fact that many of these compounds may not be harmful for human health, some of them may be toxic, and this is the reason for increasing concern of vehicle manufacturers and users recently. The level of contamination varies from one vehicle to another and may be influenced by atmospheric conditions, external pollution, user habits, quality of materials used and others. The main aim of this paper was to present current knowledge status on VIAQ, with indication of main air pollutants and their concentrations. Vehicle interior air quality is discussed on the basis of studies on new and used cars in different conditions and locations. Main sources of VOCs presence inside car cabin are discussed in this paper with additional information regarding materials emissions. Differences in sampling and analytical methodologies were not debated, however, since the results differs largely in the scope of both number and amount of VOCs, a need of testing methods harmonization is indicated. Presented data may be helpful for legislative requirements introduction.

  3. Stopping Power Measurements: Implications in Nuclear Astrophysics

    International Nuclear Information System (INIS)

    Carmen Angulo; Thierry Delbar; Jean-Sebastien Graulich; Pierre Leleux

    1999-01-01

    The stopping powers of C, CH 2 , Al, Ni, and polyvinylchloride (PVC) for several light ions ( 9 Be, 11 B, 12 C, 14 N, 16 O, 19 F, 20 Ne) with an incident energy of 1 MeV/amu have been measured at the Louvain-la-Neuve cyclotron facility. Stopping powers are given relative to the one for 5.5 MeV 4 He ions with an uncertainty of less than 1%. We compare our results with two widely used semiempirical models and we discuss some implications in nuclear astrophysics studies

  4. MODERN ELECTRIC CARS OF TESLA MOTORS COMPANY

    OpenAIRE

    O. F. Vynakov; E. V. Savolova; A. I. Skrynnyk

    2016-01-01

    This overview article shows the advantages of a modern electric car as compared with internal combustion cars by the example of the electric vehicles of Tesla Motors Company. It (в смысле- статья) describes the history of this firm, provides technical and tactical characteristics of three modifications of electric vehicles produced by Tesla Motors. Modern electric cars are not less powerful than cars with combustion engines both in speed and acceleration amount. They are reliable, economical ...

  5. Stock-car racing makes intuitive physicists

    Science.gov (United States)

    Gwynne, Peter

    2008-03-01

    Formula One races involve cars festooned with gadgets and complex electronic devices, in which millions of dollars are spent refining a vehicle's aerodynamics and reducing its weight. But in events run by America's National Association of Stock Car Auto Racing (NASCAR), cars hurtle round an oval track at speeds of about 300 km h-1 without the help of the complex sensors that are employed in Formula One cars. To avoid crashing, drivers must make their own adjustments to track conditions, engine problems and the traffic around them.

  6. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Science.gov (United States)

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. RxPATROL: a Web-based tool for combating pharmacy theft.

    Science.gov (United States)

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  8. Evaluating the Effects of Traffic on Driver Stopping and Turn Signal Use at a Stop Sign: A Systematic Replication

    Science.gov (United States)

    Lebbon, Angela R.; Austin, John; Van Houten, Ron; Malenfant, Louis E.

    2007-01-01

    The current analyses of observational data found that oncoming traffic substantially affected driver stopping patterns and turn signal use at the target stop sign. The percentage of legal stops and turn signal use by drivers in the presence and absence of traffic was analyzed using a multi-element design. The results showed that legal stops were…

  9. Car allocation between household heads in car deficient households : A decision model

    NARCIS (Netherlands)

    Anggraini, Renni; Arentze, Theo A.; Timmermans, Harry J P

    2008-01-01

    This paper considers car allocation choice behaviour in car-deficient households explicitly in the context of an activity-scheduling process, focusing on work activities. A decision tree induction method is applied to derive a decision tree for the car allocation decision in automobile deficient

  10. An extended car-following model at un-signalized intersections under V2V communication environment

    Science.gov (United States)

    Wang, Tao; Li, Peng

    2018-01-01

    An extended car-following model is proposed in this paper to analyze the impacts of V2V (vehicle to vehicle) communication on the micro driving behavior at the un-signalized intersection. A four-leg un-signalized intersection with twelve streams (left-turn, through movement, and right turn from each leg) is used. The effect of the guidance strategy on the reduction of the rate of stops and total delay is explored by comparing the proposed model and the traditional FVD car-following model. The numerical results illustrate that potential conflicts between vehicles can be predicted and some stops can be avoided by decelerating in advance. The driving comfort and traffic efficiency can be improved accordingly. More benefits could be obtained under the long communication range, low to medium traffic density, and simple traffic pattern conditions. PMID:29425243

  11. Seismic stops for nuclear power plants

    International Nuclear Information System (INIS)

    Cloud, R.L.; Leung, J.S.M.; Anderson, P.H.

    1989-01-01

    In the regulated world of nuclear power, the need to have analytical proof of performance in hypothetical design-basis events such as earth quakes has placed a premium on design configurations that are mathematically tractable and easily analyzed. This is particularly true for the piping design. Depending on how the piping analyses are organized and on how old the plant is, there may be from 200 to 1000 separate piping runs to be designed, analyzed, and qualified. In this situation, the development of snubbers seemed like the answer to a piping engineer's prayer. At any place where seismic support was required but thermal motion had to be accommodated, a snubber could be specified. But, as experience has now shown, the program was solved only on paper. This article presents an alternative to conventional snubbers. These new devices, termed Seismic Stops are designed to replace snubbers directly and look like snubbers on the outside. But their design is based on a completely different principle. The original concept has adapted from early seismic-resistant pipe support designs used on fossil power plants in California. The fundamental idea is to provide a space envelope in which the pipe can expand freely between the hot and cold positions, but cannot move outside the envelope. Seismic Stops are designed to transmit any possible impact load, as would occur in an earthquake, away from the pipe itself to the Seismic Stop. The Seismic Stop pipe support is shown

  12. Are Stopped Strings Preferred in Sad Music?

    Directory of Open Access Journals (Sweden)

    David Huron

    2017-01-01

    Full Text Available String instruments may be played either with open strings (where the string vibrates between the bridge and a hard wooden nut or with stopped strings (where the string vibrates between the bridge and a performer's finger pressed against the fingerboard. Compared with open strings, stopped strings permit the use of vibrato and exhibit a darker timbre. Inspired by research on the timbre of sad speech, we test whether there is a tendency to use stopped strings in nominally sad music. Specifically, we compare the proportion of potentially open-to-stopped strings in a sample of slow, minor-mode movements with matched major-mode movements. By way of illustration, a preliminary analysis of Samuel Barber's famous Adagio from his Opus 11 string quartet shows that the selected key (B-flat minor provides the optimum key for minimizing open string tones. However, examination of a broader controlled sample of quartet movements by Haydn, Mozart and Beethoven failed to exhibit the conjectured relationship. Instead, major-mode movements were found to avoid possible open strings more than slow minor-mode movements.

  13. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... gloves to prevent biting. Replace the nail-biting habit with a good habit: When you feel like biting your nails, try ... recommend taking a gradual approach to break the habit. Try to stop biting one set of nails, ...

  14. Bystanders Are the Key to Stopping Bullying

    Science.gov (United States)

    Padgett, Sharon; Notar, Charles E.

    2013-01-01

    Bullying is the dominance over another. Bullying occurs when there is an audience. Peer bystanders provide an audience 85% of instances of bullying. If you remove the audience bullying should stop. The article is a review of literature (2002-2013) on the role of bystanders; importance of bystanders; why bystanders behave as they do; resources to…

  15. Brownian Optimal Stopping and Random Walks

    International Nuclear Information System (INIS)

    Lamberton, D.

    2002-01-01

    One way to compute the value function of an optimal stopping problem along Brownian paths consists of approximating Brownian motion by a random walk. We derive error estimates for this type of approximation under various assumptions on the distribution of the approximating random walk

  16. Approximations for stop-loss reinsurance premiums

    NARCIS (Netherlands)

    Reijnen, Rajko; Albers, Willem/Wim; Kallenberg, W.C.M.

    2005-01-01

    Various approximations of stop-loss reinsurance premiums are described in literature. For a wide variety of claim size distributions and retention levels, such approximations are compared in this paper to each other, as well as to a quantitative criterion. For the aggregate claims two models are

  17. Stop-loss premiums under dependence

    NARCIS (Netherlands)

    Albers, Willem/Wim

    1999-01-01

    Stop-loss premiums are typically calculated under the assumption that the insured lives in the underlying portfolio are independent. Here we study the effects of small departures from this assumption. Using Edgeworth expansions, it is made transparent which configurations of dependence parameters

  18. Ab initio electronic stopping power in materials

    International Nuclear Information System (INIS)

    Shukri, Abdullah-Atef

    2015-01-01

    The average energy loss of an ion per unit path length when it is moving through the matter is named the stopping power. The knowledge of the stopping power is essential for a variety of contemporary applications which depend on the transport of ions in matter, especially ion beam analysis techniques and ion implantation. Most noticeably, the use of proton or heavier ion beams in radiotherapy requires the knowledge of the stopping power. Whereas experimental data are readily available for elemental solids, the data are much more scarce for compounds. The linear response dielectric formalism has been widely used in the past to study the electronic stopping power. In particular, the famous pioneering calculations due to Lindhard evaluate the electronic stopping power of a free electron gas. In this thesis, we develop a fully ab initio scheme based on linear response time-dependent density functional theory to predict the impact parameter averaged quantity named the random electronic stopping power (RESP) of materials without any empirical fitting. The purpose is to be capable of predicting the outcome of experiments without any knowledge of target material besides its crystallographic structure. Our developments have been done within the open source ab initio code named ABINIT, where two approximations are now available: the Random-Phase Approximation (RPA) and the Adiabatic Local Density Approximation (ALDA). Furthermore, a new method named 'extrapolation scheme' have been introduced to overcome the stringent convergence issues we have encountered. These convergence issues have prevented the previous studies in literature from offering a direct comparison to experiment. First of all, we demonstrate the importance of describing the realistic ab initio electronic structure by comparing with the historical Lindhard stopping power evaluation. Whereas the Lindhard stopping power provides a first order description that captures the general features of the

  19. 49 CFR 238.311 - Single car test.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Single car test. 238.311 Section 238.311... Requirements for Tier I Passenger Equipment § 238.311 Single car test. (a) Except for self-propelled passenger cars, single car tests of all passenger cars and all unpowered vehicles used in passenger trains shall...

  20. 49 CFR 180.507 - Qualification of tank cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Qualification of tank cars. 180.507 Section 180... QUALIFICATION AND MAINTENANCE OF PACKAGINGS Qualification and Maintenance of Tank Cars § 180.507 Qualification of tank cars. (a) Each tank car marked as meeting a “DOT” specification or any other tank car used...

  1. CERN car stickers for 2014

    CERN Multimedia

    2013-01-01

    The stickers on your vehicles will cease to be valid at the end of 2013. We kindly request that you inform us as soon as possible if you no longer own a vehicle that is in our records. In particular, please inform the CERN Registration Service (Building 55, first floor) if you receive a sticker for a vehicle that you no longer own.   Stickers for 2014 are valid immediately and can be displayed as soon as you receive them. The Guards Service will continue to allow cars displaying a 2013 sticker into the CERN site until no later than 31 January 2014. After that date, the Guards Service will be obliged to deny access to any vehicles not displaying a valid sticker. Please see Operational Circular No. 2 for more details. We wish you a pleasant day and happy holidays, GS/DI security and access control service

  2. Reactions of Met-Cars

    International Nuclear Information System (INIS)

    Castleman, A.W. Jr.; Guo, B.C.

    1993-01-01

    A new class of metal-carbon complexes, termed metallo-carbohedrenes (Met-Cars), have been discovered to form in a plasma reactor in which early transition metals are vaporized into a stream carrying small hydrocarbon molecules. The initial discovery involved the species Ti 8 c 12 + , while subsequent studies revealed the stability of the anion and, most importantly, the neutral species. Subsequent investigations show that similar molecules, predicted to have a pentagonal dodecahedral structure, can also be formed with vanadium, hafnium, and zirconium. In the case of the latter, more recent investigations have displaced an interesting growth pattern. In particular, pentagonal dodecahedrons with dangling carbon atoms can undergo further growth, adding at least a second and third cage. The latest results on the properties and reactivities of these new cage-like molecular clusters will be discussed

  3. Vibration in car repair work.

    Science.gov (United States)

    Hansson, J E; Eklund, L; Kihlberg, S; Ostergren, C E

    1987-03-01

    The main objective of the study was to find efficient hand tools which caused only minor vibration loading. Vibration measurements were carried out under standardised working conditions. The time during which car body repairers in seven companies were exposed to vibration was determined. Chisel hammers, impact wrenches, sanders and saws were the types of tools which generated the highest vibration accelerations. The average daily exposure at the different garages ranged from 22 to 70 min. The risk of vibration injury is currently rated as high. The difference between the highest and lowest levels of vibration was considerable in most tool categories. Therefore the choice of tool has a major impact on the magnitude of vibration exposure. The importance of choosing the right tools and working methods is discussed and a counselling service on vibration is proposed.

  4. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  5. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  6. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  7. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  8. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  9. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  10. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  11. 49 CFR 174.110 - Car magazine.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Car magazine. 174.110 Section 174.110...) Materials § 174.110 Car magazine. When specially authorized by the carrier, Division 1.1 or 1.2 (explosive... packages of Class 1 (explosive) materials are placed in a “magazine” box made of sound lumber not less than...

  12. Gates Auto Door Car With Lights Modulated

    OpenAIRE

    Lina Carolina; Luyung Dinani, Skom, MMSi

    2002-01-01

    In scientific writing wi ll be explained about automatic gates with modulated headlights, where to find the car lights were adjusted by the relative frequency darker because of this background that the author alleviate human task in performing daily activities by using an automatic gate with the car lights modulated.

  13. The Hungarian car insurance cartel saga

    NARCIS (Netherlands)

    Cseres, K.J.; Szilágyi, P.; Rodger, B.

    2013-01-01

    his chapter discusses the landmark Hungarian case relating to the car insurance and repair markets, which involved both vertical and horizontal agreements. The case concerned the horizontal relationship between Hungary’s two largest insurance companies and their vertical relationships with car

  14. Rear-facing car seat (image)

    Science.gov (United States)

    A rear-facing car seat position is recommended for a child who is very young. Extreme injury can occur in an accident because ... child. In a frontal crash a rear-facing car seat is best, because it cradles the head, ...

  15. Modeling human learning involved in car driving

    NARCIS (Netherlands)

    Wewerinke, P.H.

    1994-01-01

    In this paper, car driving is considered at the level of human tracking and maneuvering in the context of other traffic. A model analysis revealed the most salient features determining driving performance and safety. Learning car driving is modelled based on a system theoretical approach and based

  16. Modelling of fire spread in car parks

    NARCIS (Netherlands)

    Noordijk, L.M.; Lemaire, A.D.

    2005-01-01

    Currently, design codes assume that in a car park fire at most 3-4 vehicles are on fire at the same time. Recent incidents in car parks have drawn international attention to such assumptions and have raised questions as to the fire spreading mechanism and the resulting fire load on the structure.

  17. Automated Coal-Mine Shuttle Car

    Science.gov (United States)

    Collins, E. R., Jr.

    1984-01-01

    Cable-guided car increases efficiency in underground coal mines. Unmanned vehicle contains storage batteries in side panels for driving traction motors located in wheels. Batteries recharged during inactive periods or slid out as unit and replaced by fresh battery bank. Onboard generator charges batteries as car operates.

  18. A Radio-Controlled Car Challenge

    Science.gov (United States)

    Roman, Harry T.

    2010-01-01

    Watching a radio-controlled car zip along a sidewalk or street has become a common sight. Within this toy are the basic ingredients of a mobile robot, used by industry for a variety of important and potentially dangerous tasks. In this challenge, students consider modifying an of-the-shelf, radio-controlled car, adapting it for a robotic task.

  19. Engineering an Affordable Self-Driving Car

    KAUST Repository

    Budisteanu, Alexandru Ionut

    2018-01-17

    "More than a million people die in car accidents each year, and most of those accidents are the result of human errorヤ Alexandru Budisteanu is 23 years old and owns a group of startups including Autonomix, an Artificial Intelligence software for affordable self-driving cars and he designed a low-cost self-driving car. The car\\'s roof has cameras and low-resolution 3D LiDAR equipment to detect traffic lanes, other cars, curbs and obstacles, such as people crossing by. To process this dizzying amount of data, Alexandru employed Artificial Intelligence algorithms to extract information from the visual data and plot a safe route for the car. Then, he built a manufacturing facility in his garage from Romania to assembly affordable VisionBot Pick and Place robots that are used to produce electronics. During this lecture, Alexandru will talk about this autonomous self-driving car prototype, for which he received the grand prize of the Intel International Science and Engineering Fair, and was nominated by TIME magazine as one of the worldメs most influential teens of 2013.

  20. The Green City Car. A holistic approach for NVH abatement of city cars

    OpenAIRE

    Bein, Thilo; Mayer, Dirk; Elliott, Steve; Ferrali, Leonardo; Casella, Mauro; Saemann, Ernst-Ulrich; Kropp, Wolfgang; Nielsen, Finn Kryger; Meschke, Jens; Pisano, Emanuel

    2014-01-01

    Pursuing the different passive and active concepts in a holistic approach, the FP7 project Green City Car demonstrates the feasibility of applying active systems to NVH-related problems light city cars from a system point-of view. During the project, a city car equipped with a small engine has been considered equipped with the latest technology in terms of safety aspects related to pedestrian’s impact and car-to-car compatibility, which are of major importance in an urban environment. The noi...