WorldWideScience

Sample records for stopping car theft

  1. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  2. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    OpenAIRE

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  3. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  4. The tariff for fire and theft car insurance: analysis with a Cox model

    OpenAIRE

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  5. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  6. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  7. Car Stopping Distance on a Tabletop

    Science.gov (United States)

    Haugland, Ole Anton

    2013-01-01

    Stopping distances in car braking can be an intriguing topic in physics teaching. It illustrates some basic principles of physics, and sheds valuable light on students' attitude towards aggressive driving. Due to safety considerations, it can be difficult to make experiments with actual car braking. (Contains 2 figures.)

  8. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    OpenAIRE

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  9. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  10. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  11. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  12. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    OpenAIRE

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  13. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    OpenAIRE

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  14. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  15. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  16. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  17. Prototipe Critting Badot (Car Security System Monitoring Based On STNK)

    OpenAIRE

    Nasruloh, Agan; Kurniawan, Deny; Subekti, Massus

    2017-01-01

    The crime of burglary vehicle accompanied also by forgery vehicle registration certificate of vehicle number.For it, needed CRITING BADOT (Car Security System Monitoring Based On Stnk), an apparatus capable of preventing motor vehicle theft by means of technology RFID and SMS Gateway, blends the ignition and vehicle registration into a single entity, change the key of the car being contact id card, capable of being on the monitoring of the position the car.This tool requires the driver to be ...

  18. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  19. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  20. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  1. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  2. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  3. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  4. The Engine Immobilizer : a Non-Starter For Car Thieves

    NARCIS (Netherlands)

    van Ours, J.C.; Vollaard, B.A.

    2013-01-01

    We provide evidence for a beneficial welfare impact of a crime policy that is targeted at strenghtening victim precaution. Regulation made application of the electronic engine immobilizer, a simple and low-cost anti-theft device, mandatory for all new cars sold within the European Union as of 1998.

  5. 25 CFR 11.412 - Theft.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  6. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  7. SMART SECURITY SYSTEM FOR CARS

    OpenAIRE

    Akshay V. Balki*, Ankit A. Ramteke, Akshay Dhankar, Prof. Nilesh S. Panchbudhe

    2017-01-01

    This propose work is an attempt to model design an smart advance vehicle security system that uses biometric scanner and RFID card reader to give ignition pulse using two main module and to prevent theft. The system contains biometric scanner, RFID card reader, alcohol sensor, vibration sensor, GSM module, microcontroller (8051), relay switch, high voltage mesh..The safety of car is exceptionally essential. It provides pulse to ignition system by synchronizing driver’s data from license and t...

  8. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  9. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  10. Car stickers for 2012

    CERN Multimedia

    GS Department

    2011-01-01

    The 2012 car stickers are now available. Holders of blue car stickers will receive by internal mail their 2012 car stickers as of 5 December. Holders of red car stickers are kindly requested to come to the Registration Service (Building 55,1st floor) to renew their 2011 stickers. This service is open from Monday to Friday from 7.30 am to 5.30 pm non-stop. Documents related to the vehicles concerned are mandatory. Reception and Access Control Service – GS/IS/SIS General Infrastructure Services Department

  11. Car stickers for 2011

    CERN Multimedia

    GS Department

    2010-01-01

    The 2011 car stickers are now available. Holders of blue car stickers will receive their 2011 car stickers by internal mail as of 15 December.   Holders of red car stickers are kindly requested to come to the Registration Service (Building 55,1st floor) to renew their 2011 stickers. This service is open from Monday to Friday from 7.30 am to 5.30 pm non-stop. Documents for the vehicles concerned must be presented. Reception and Access Control Service – GS/ISG/SIS General Infrastructure Services Department

  12. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  13. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  14. Gun Theft and Crime.

    Science.gov (United States)

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  15. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  16. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    OpenAIRE

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  17. Current trends in copper theft prevention

    Energy Technology Data Exchange (ETDEWEB)

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  18. 30 CFR 56.14215 - Coupling or uncoupling cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Coupling or uncoupling cars. 56.14215 Section... Equipment Safety Practices and Operational Procedures § 56.14215 Coupling or uncoupling cars. Prior to coupling or uncoupling cars manually, trains shall be brought to a complete stop, and then moved at minimum...

  19. Overt theft and the peculiarities of the qualification

    OpenAIRE

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  20. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  1. Design of an intelligent car

    Science.gov (United States)

    Na, Yongyi

    2017-03-01

    The design of simple intelligent car, using AT89S52 single chip microcomputer as the car detection and control core; The metal sensor TL - Q5MC induction to iron, to detect the way to send feedback to the signal of single chip microcomputer, make SCM according to the scheduled work mode to control the car in the area according to the predetermined speed, and the operation mode of the microcontroller choose different also can control the car driving along s-shaped iron; Use A44E hall element to detect the car speeds; Adopts 1602 LCD display time of car driving, driving the car to stop, take turns to show the car driving time, distance, average speed and the speed of time. This design has simple structure and is easy to implement, but are highly intelligent, humane, to a certain extent reflects the intelligence.

  2. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  3. 14 CFR 1214.609 - Loss or theft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  4. 26 CFR 1.165-8 - Theft losses.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  5. 27 CFR 24.265 - Losses by theft.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  6. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  7. Brake to the theft of fuels

    International Nuclear Information System (INIS)

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  8. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  9. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  10. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  11. Car stickers for 2009

    CERN Multimedia

    TS Department

    2008-01-01

    All members of the personnel holding a valid contract (except owners of cars with green or CD plates) can come to the Registration Service (Building 55, 1st floor) to obtain their 2009 car sticker, Mondays to Fridays from 7.30 a.m. to 4.00 p.m. non-stop. Please ensure you bring with you the documents relating to the vehicles(s) concerned. If you only wish to register one vehicle, you can obtain the 2009 sticker using the request form on the Web (via internet Explorer only). NB: This notice only applies to members of the personnel who obtained one or several blue car stickers for 2008. Reception and Access Control Service – TS/FM

  12. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  13. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  14. Dog Theft: A Case for Tougher Sentencing Legislation.

    Science.gov (United States)

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  15. 7 CFR 331.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  16. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  17. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Science.gov (United States)

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  18. Creating a One-Stop-Shop for Automobile Solutions in Kolkata, India.

    OpenAIRE

    Kanoria, Shrivardhan

    2009-01-01

    This is a research lead business plan concerning making a one-stop-shop for automobile solutions in Kolkata, India, containing three elements of business. Firstly, it would involve restoration, buying and selling of vintage and classic cars. Secondly, it would contain modern car customisation. Thirdly, it would contain modern car servicing, buying and selling. These would be the core activities, having associates non core businesses as well.

  19. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  20. Money and Credit With Limited Commitment and Theft

    OpenAIRE

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  1. Will Brazil's cars go on the wagon?

    International Nuclear Information System (INIS)

    Homewood, B.

    1993-01-01

    The use of ethanol as an alternative fuel for cars in Brazil, may shortly be reduced. Falling world oil prices have meant that ethanol, derived from sugar cane, following a fourteen year research program, has ceased to be a financially viable replacement for petrol. Although about a third of Brazil's cars are at present powered by ethanol, only substantial government subsidies could reinstate this fuel despite its reduced pollutant status. Government officials now predict that ethanol will become merely a petrol additive and production of ethanol cars will have stopped by the year 2000. (UK)

  2. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  3. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  4. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  5. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  6. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  7. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  8. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  9. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  10. 42 CFR 73.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  11. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  12. Dog Theft: A Case for Tougher Sentencing Legislation

    Science.gov (United States)

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  13. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  14. Developmental Trajectories of Male Physical Violence and Theft

    Science.gov (United States)

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  15. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  16. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  17. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  18. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  19. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  20. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  1. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  2. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  3. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  4. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  5. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  6. Pilot survey of subway and bus stop noise levels.

    Science.gov (United States)

    Gershon, Robyn R M; Neitzel, Richard; Barrera, Marissa A; Akram, Muhammad

    2006-09-01

    Excessive noise exposure is a serious global urban health problem, adversely affecting millions of people. One often cited source of urban noise is mass transit, particularly subway systems. As a first step in determining risk within this context, we recently conducted an environmental survey of noise levels of the New York City transit system. Over 90 noise measurements were made using a sound level meter. Average and maximum noise levels were measured on subway platforms, and maximum levels were measured inside subway cars and at several bus stops for comparison purposes. The average noise level measured on the subway platforms was 86 +/- 4 dBA (decibel-A weighting). Maximum levels of 106, 112, and 89 dBA were measured on subway platforms, inside subway cars, and at bus stops, respectively. These results indicate that noise levels in subway and bus stop environments have the potential to exceed recommended exposure guidelines from the World Health Organization (WHO) and U.S. Environmental Protection Agency (EPA), given sufficient exposure duration. Risk reduction strategies following the standard hierarchy of control measures should be applied, where feasible, to reduce subway noise exposure.

  7. The old-new car sticker

    CERN Multimedia

    2000-01-01

    You have had the same car sticker for ten years and have been driving in and out of CERN every day. Suddenly one morning the guard stops you and tells you need a new one. Hmmm ?! “There were 60 000 stickers in circulation in Geneva and we could not control wether the sticker had been distributed to the right person”, saysa Claude Ducastel, responsible for Entrance Security. “So to solve this problem, last year DSU decided to change Operational Circular N°2 and introduce new car stickers that will be changed every year.” Three types of car stickers were introduced: blue, green and red. The blue one is for staff members whose contract is for one year or more. It indicates the plate number of the car. The green one is for staff members whose contract is for less than one year. It indicates the plate number of the car and the date the contract of the employee terminates. It also has a big L for "Limited". The red one is for enterprise subcontractors whose contracts finish at the end of the year. If ...

  8. CERN car stickers 2005

    CERN Multimedia

    Reception and Access Control Service - TS Department

    2004-01-01

    Please note that the car stickers for 2005 are now available. If you have not received the new one by internal mail, you should go along in person to the Registration Service (bldg. 55 - 1st floor), open non-stop from 7:30 to 16:30, taking with you your 2004 sticker and the log-book of your vehicle. Thank you for your collaboration. Reception and Access Control Service - TS Department.

  9. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  10. Combating employee theft in the healthcare industry.

    Science.gov (United States)

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  11. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  12. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  13. On the electricity shortage, price and electricity theft nexus

    International Nuclear Information System (INIS)

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  14. Tricks of the trade: Mechanism of brood theft in an ant.

    Science.gov (United States)

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  15. University of Calgary solar car set for American solar challenge

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This article described a solar car designed by a team from the University of Calgary for the 2010 American Solar Challenge, a 1100 mile race that starts in Tulsa, Oklahoma and ends 5 days later in Chicago, Illinois. The Shulich Axiom car is comprised of 2000 solar cells with batteries that can store enough power to drive the car for a 4-hour period. The car has a top speed of 140 km per hour and is totally powered by solar energy. The team has taken the car on a 5-day tour of Alberta, stopping in 7 communities across the province before heading back to Calgary. The team is one of only 2 Canadian teams competing in the challenge this year. 1 fig.

  16. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  17. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  18. Electrical injuries due to theft of copper.

    Science.gov (United States)

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  19. Deterring and remedying employee theft.

    Science.gov (United States)

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  20. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Science.gov (United States)

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  1. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  2. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  3. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Science.gov (United States)

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  4. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  5. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  6. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    Science.gov (United States)

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  7. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  8. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  9. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  10. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  11. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Science.gov (United States)

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  12. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  13. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  14. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  15. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  16. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  17. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  18. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  19. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  20. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  1. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  2. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  3. Sim-based detection tools to minimize motorcycle theft

    Science.gov (United States)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  4. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  5. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  6. enviroCar - citizen science for sustainable traffic

    Science.gov (United States)

    Stasch, Christoph; Remke, Albert; Jirka, Simon; Nuest, Daniel

    2015-04-01

    Optimizing traffic flow is a challenging task, affecting both the mobility of people and the environment. Up to now, traffic monitoring is based on small samples using GPS devices or remote sensors such as cameras. Citizens are usually not actively involved in the process of collecting or analyzing traffic data. The enviroCar project (www.envirocar.org) aims at addressing this situation by providing an open platform that can be used by everyone to collect and analyze traffic-related data and thus to achieve sustainable traffic management by answering questions such as: How is the average speed on a certain route? Where are exceptionally long waiting times in front of traffic lights? At which crossings do more cars stop than drive through? Where are hotspots of fuel consumption and air pollutant emission during a certain time interval? In this presentation, an overview on the enviroCar project is given and current research challenges addressed in the context of the project are presented. Citizens are able to participate by registering at the enviroCar portal and downloading the enviroCar Android app. Once installed, the Android app allows citizens to collect car sensor data, e.g. speed, mass air flow, or intake temperature via an On-Board Diagnosis 2 (OBD-II) Adapter. After finishing a car ride, the data can be uploaded to the central enviroCar server where the data is anonymized and published as open data. Each enviroCar member has a profile page giving control on his own data and providing statistics on personal driving behavior. The portal also allows comparing personal statistics with the statistics of other members. It thus facilitates analysis whether, for example, a member is driving in a more fuel saving manner than other users. Besides only acting as a data collector, citizens can also explore the enviroCar data in online maps or download the data in standard formats for certain spatial areas and/or time intervals allowing them to conduct spatio

  7. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  8. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  9. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  10. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  11. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  12. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  13. Optimal Locations of Bus Stops Connecting Subways near Urban Intersections

    Directory of Open Access Journals (Sweden)

    Yuan Cui

    2015-01-01

    Full Text Available Unsuitable locations of bus stops which provide feeder transportation connecting subways near urban intersections usually lead to the low efficiency of public transport and level of passenger service. A multiobjective optimization model to distribute such stop locations is proposed to attain the shortest total walk distance of passengers and minimum delay time of cars through intersections and travel time of buses. The Pareto frontier and optimal solutions for the proposed model are given by the distance-based and enumerative methods. The Xizhimen bus stop is selected to implement case studies for verifying the validity of the proposed model. The analysis of sensitivity on possible solutions is also carried out in the case studies. The results show that the proposed model is capable of optimizing the locations of bus stops connecting subways near intersections and helpful to improve the level of passengers service and operational efficiency of public transportation.

  14. 76 FR 57103 - Reports, Forms and Recordkeeping Requirements Agency Information Collection Activity Under OMB...

    Science.gov (United States)

    2011-09-15

    ... Federal Motor Vehicle Theft Prevention Standard was extended to include all passenger cars and... Vehicle Theft Prevention Standard (Part 541), all passenger cars, and multipurpose passenger vehicles with..., 565 and 567. Part 541 The Motor Vehicle Information and Cost Savings Act was amended by the Anti-Car...

  15. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  16. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  17. New consumer load prototype for electricity theft monitoring

    International Nuclear Information System (INIS)

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  18. New consumer load prototype for electricity theft monitoring

    Science.gov (United States)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  19. Hydrogen battery car developed in Matsuda; Matsuda suiso nenryo denchisha wo kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-06-01

    Matsuda announced that the hydrogen battery car 'Demio FCEV' was developed by the company. This new type car not only does not need an air humidifying machine, but also supplies the necessary electricity with an ultra capacitor of a large scale condenser. Its maximum output is 40 kw, the highest speed is 90 km per hour, and the accelerating time from the stop state to 40 m is about 5 seconds, the same level as a gasoline car. One time of hydrogen charging serves for 170 km running. As a hydrogen battery car, it is the third one in the world, following the DAIMURA in Germany and TOYOTA. (translated by NEDO)

  20. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  1. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  2. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  3. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  4. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    OpenAIRE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  5. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    International Nuclear Information System (INIS)

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  6. Kleptomania or common theft - diagnostic and judicial difficulties.

    Science.gov (United States)

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  7. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  8. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  9. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  10. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  11. Cars, Cars, Cars

    Science.gov (United States)

    McIntosh, Phyllis

    2013-01-01

    Cars are the focus of this feature article, which explores such topics as the history of cars in the United States, the national highway system, safety and pollution concerns, mobility and freedom for women, classic car shows, and the road trip in American literature and film. Also included are links to the websites of Automobile in American Life…

  12. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  13. The CERN car stickers for 2008 are now available

    CERN Multimedia

    2007-01-01

    All members of the personnel holding a valid contract (except owners of cars with green or CD plates) can come to the Registration Service (building 55, 1st floor) to obtain their 2008 car sticker, Mondays to Fridays from 7.30 a.m. to 4.00 p.m. non-stop. Please ensure you bring with you the following documents: the 2007 sticker for the vehicle in question, the "carte grise" registration paper of the vehicle in question (photocopies accepted). If you only wish to register one vehicle, you can obtain the 2008 sticker using the request form on the Web.NB: This notice only applies to members of the personnel who obtained one or several blue car stickers for 2007. Reception and Access Control Service – TS/FM

  14. Voltage Sag Compensator for CAR and SOR of HANARO

    International Nuclear Information System (INIS)

    Kim, Hyung-Kyoo; Jung, Hoan-Sung; Wu, Jong-Sup

    2007-01-01

    HANARO is designed so as to be tripped automatically by insertion of control absorber rods(CAR) and shut-off rods(SOR) and the process systems, such as primary cooling system, secondary cooling system and reflector cooling system, etc., stop whenever the off-site power failure occurs, the reactor trips automatically. When voltage sag or momentary interruption occurs, the process systems are in operation but the reactor has an unwanted trip by insertion of CARs and SORs. We installed the voltage sag compensator on the power supply for CARs and SORs so as to prevent a nuisance trip. The compensated time is decided not to exceed 1 sec in consideration of reactor safety. This paper is concerned with the impact of the momentary interruption on the reactor and the effect of the voltage sag compensator

  15. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  16. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  17. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  18. MODEL CAR TRANSPORT SYSTEM - MODERN ITS EDUCATION TOOL

    Directory of Open Access Journals (Sweden)

    Karel Bouchner

    2017-12-01

    Full Text Available The model car transport system is a laboratory intended for a practical development in the area of the motor traffic. It is also an important education tool for students’ hands-on training, enabling students to test the results of their own studies. The main part of the model car transportation network is a model in a ratio 1:87 (HO, based on component units of FALLER Car system, e.g. cars, traffic lights, carriage way, parking spaces, stop sections, branch-off junctions, sensors and control sections. The model enables to simulate real traffic situations. It includes a motor traffic in a city, in a small village, on a carriageway between a city and a village including a railway crossing. The traffic infrastructure includes different kinds of intersections, such as T-junctions, a classic four-way crossroad and four-way traffic circle, with and without traffic lights control. Another important part of the model is a segment of a highway which includes an elevated crossing with highway approaches and exits.

  19. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  20. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  1. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  2. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  3. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  4. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  5. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  6. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  7. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  8. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  9. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  10. Car stickers for 2010

    CERN Multimedia

    GS Department

    The 2010 car stickers are now available. Holders of blue stickers will receive their 2010 stickers through the internal mail from 1st December onwards. Holders of red stickers are required to go to the Registration Service (Building 55, first floor), which is open non-stop from 7.30 a.m. to 4.00 p.m. Mondays to Fridays, in order to obtain their new stickers. They will be asked to present documents relating to the vehicles concerned. Owners of vehicles registered on green and CD plates should disregard this message. Reception and Access Control Service – GS/SEM/LS

  11. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  12. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Science.gov (United States)

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  13. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  14. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  15. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  16. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Science.gov (United States)

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  17. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  18. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  19. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  20. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  1. 76 FR 6512 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-02-04

    ... of Respondents: 7. In 1984, Congress enacted the Motor Vehicle Theft Law Enforcement Act (the 1984 Theft Act). As a means to prevent the theft of motor vehicles for their parts, the 1984 Theft Act required vehicle manufacturers to mark the major parts of ``high-theft'' passenger cars and the major...

  2. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  3. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  4. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  5. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  6. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  7. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Directory of Open Access Journals (Sweden)

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  8. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  9. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  10. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  11. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  12. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  13. Study of Car Acceleration and Deceleration Characteristics at Dangerous Route FT050

    Science.gov (United States)

    Omar, N.; Prasetijo, J.; Daniel, B. D.; Abdullah, M. A. E.; Ismail, I.

    2018-04-01

    Individual vehicle acceleration and deceleration are important to generate vehicles speed profile. This study covered acceleration and deceleration characteristics of passenger car in Federal Route FT050 Jalan Batu Pahat-Ayer Hitam that was the top ranking dangerous road. Global Positioning System was used to record 10 cars speed to develop speed profile with clustering zone. At the acceleration manoeuver, the acceleration rate becomes lower as the drivers get near to desired speed. While, at deceleration manoeuver, vehicles with high speed needs more time to stop compare to low speed vehicle. This is because, the drivers need to accelerate more from zero speed to achieve desired speed and drivers need more distance and time to stop their vehicles. However, it was found out that 30% to 50% are driving in dangerous condition that was proven in clustering acceleration and deceleration speed profile. As conclusion, this excessive drivers are the factor that creating high risk in rear-end collision that inline FT050 as dangerous road in Malaysia

  14. 76 FR 35270 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-06-16

    ... respond, including the use of appropriate automated, electronic, mechanical, or other technological... the Anti-Car Theft Act of 1992 (Pub. L. 102-519). The enacted Theft Act requires specified parts of... cars and multipurpose passenger vehicles with a gross vehicle weight rating of 6,000 pounds or less...

  15. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  16. Divorce your car: ending the love affair with the automobile

    Energy Technology Data Exchange (ETDEWEB)

    Alvord, K.

    2000-07-01

    This book is a guide for people wishing to liberate themselves from their addiction to cars and the automobile culture. It is a repository of examples and actions that individuals and communities can take to reduce dependence on the automobile. The range of possibilities run from using cars less to not owning one at all. The book provides a humorous yet clear-headed approach to a greener world and maps out the road to how people can live happily ever after by breaking free of 'auto-cracy', without insisting on people in car-dependent countries quit their automotive addiction instantly. Nevertheless, it clearly articulates the connection between automobiles, their arteries (i.e. highways) and effluents (i.e. greenhouse gases and particulate emissions), and the increasing number and severity of natural disasters between the urban renewal and freeway construction that, in the author's view, helped ignite the riots in Watts, Newark and Detroit. The disastrous societal and geophysical effects of the automobile are demonstrated in great abundance, and the mountain of evidence of the systematic abuse of the planet that the book provides is a stunning refutation of the notion that technology is neutral. The automobile is accused of being not only the linchpin of Western and primarily American industrialism and resource extraction, it is also accused of being the chief suspect in a century-long theft of time, conviviality and beauty. How to bring about a change in people's love affair with their cars is difficult to comprehend but this author has a multitude of useful suggestions which seem to suggest that it is possible. There is a list of 104 'selected references' and an extensive list of 'other resources'.

  17. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  18. An extended car-following model at un-signalized intersections under V2V communication environment

    Science.gov (United States)

    Wang, Tao; Li, Peng

    2018-01-01

    An extended car-following model is proposed in this paper to analyze the impacts of V2V (vehicle to vehicle) communication on the micro driving behavior at the un-signalized intersection. A four-leg un-signalized intersection with twelve streams (left-turn, through movement, and right turn from each leg) is used. The effect of the guidance strategy on the reduction of the rate of stops and total delay is explored by comparing the proposed model and the traditional FVD car-following model. The numerical results illustrate that potential conflicts between vehicles can be predicted and some stops can be avoided by decelerating in advance. The driving comfort and traffic efficiency can be improved accordingly. More benefits could be obtained under the long communication range, low to medium traffic density, and simple traffic pattern conditions. PMID:29425243

  19. Toward brain-actuated car applications: Self-paced control with a motor imagery-based brain-computer interface.

    Science.gov (United States)

    Yu, Yang; Zhou, Zongtan; Yin, Erwei; Jiang, Jun; Tang, Jingsheng; Liu, Yadong; Hu, Dewen

    2016-10-01

    This study presented a paradigm for controlling a car using an asynchronous electroencephalogram (EEG)-based brain-computer interface (BCI) and presented the experimental results of a simulation performed in an experimental environment outside the laboratory. This paradigm uses two distinct MI tasks, imaginary left- and right-hand movements, to generate a multi-task car control strategy consisting of starting the engine, moving forward, turning left, turning right, moving backward, and stopping the engine. Five healthy subjects participated in the online car control experiment, and all successfully controlled the car by following a previously outlined route. Subject S1 exhibited the most satisfactory BCI-based performance, which was comparable to the manual control-based performance. We hypothesize that the proposed self-paced car control paradigm based on EEG signals could potentially be used in car control applications, and we provide a complementary or alternative way for individuals with locked-in disorders to achieve more mobility in the future, as well as providing a supplementary car-driving strategy to assist healthy people in driving a car. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  1. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  2. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  3. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  4. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  5. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  6. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  7. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    Science.gov (United States)

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  8. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Science.gov (United States)

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  9. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  10. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  11. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  12. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Science.gov (United States)

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  13. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  14. CuseCar--community car-sharing program : car sharing lessons learned.

    Science.gov (United States)

    2011-08-01

    CuseCar of Syracuse launched services in December 2008 with 3 Toyota Prius Hybrids. CuseCar initially, due to : concerns about availability, limited membership to Origination Sponsor Locations, which in turn developed few : members. In 2009 CuseCar o...

  15. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Directory of Open Access Journals (Sweden)

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  16. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  17. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  18. Reducing theft and embezzlement by encouraging ethical behavior.

    Science.gov (United States)

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  19. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  20. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  1. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  2. Ultrasonic intrusion sensor using the Doppler effect; Choonpa Doppler hoshiki shinnyu sensor

    Energy Technology Data Exchange (ETDEWEB)

    Kani, H; Iwasaki, N; Goto, M [Nippon Soken, Inc., Tokyo (Japan); Tsuzuki, T; Nakamura, T [Denso Corp., Aichi (Japan)

    1997-10-01

    For vehicle anti-theft alarm systems which cope with vehicle and car component theft, EU initiated vehicle security regulations from Jan 1997. Also, the insurance industry has instituted the insurance certification of vehicle anti-theft alarm systems. We have developed an ultrasonic intrusion sensor using the doppler effect for vehicle anti-theft alarm systems specifically for these EU regulations and insurance certification. 2 refs., 7 figs., 1 tab.

  3. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  4. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Science.gov (United States)

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  5. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  6. A theoretical and practical test of geographical profiling with serial vehicle theft in a U.K. context.

    Science.gov (United States)

    Tonkin, Matthew; Woodhams, Jessica; Bond, John W; Loe, Trudy

    2010-01-01

    Geographical profiling is an investigative methodology sometimes employed by the police to predict the residence of an unknown offender from the locations of his/her crimes. The validity of geographical profiling, however, has not been fully explored for certain crime types. This study, therefore, presents a preliminary test of the potential for geographical profiling with a sample of 145 serial vehicle thieves from the U.K. The behavioural assumptions underlying geographical profiling (distance decay and domocentricity) are tested and a simple practical test of profiling using the spatial mean is presented. There is evidence for distance decay but not domocentricity among the spatial behaviour of car thieves from the U.K. A degree of success was achieved when applying the spatial mean on a case-by-case basis. The level of success varied, however, and neither series length in days nor number of crimes could account for the variation. The findings question previously held assumptions regarding geographical profiling and have potential theoretical and practical implications for the study and investigation of vehicle theft in the U.K. 2009 John Wiley & Sons, Ltd.

  7. Fighting the scourge of metal theft.

    Science.gov (United States)

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  8. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  9. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  10. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  11. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  12. Investigation of RADTRAN Stop Model input parameters for truck stops

    International Nuclear Information System (INIS)

    Griego, N.R.; Smith, J.D.; Neuhauser, K.S.

    1996-01-01

    RADTRAN is a computer code for estimating the risks and consequences as transport of radioactive materials (RAM). RADTRAN was developed and is maintained by Sandia National Laboratories for the US Department of Energy (DOE). For incident-free transportation, the dose to persons exposed while the shipment is stopped is frequently a major percentage of the overall dose. This dose is referred to as Stop Dose and is calculated by the Stop Model. Because stop dose is a significant portion of the overall dose associated with RAM transport, the values used as input for the Stop Model are important. Therefore, an investigation of typical values for RADTRAN Stop Parameters for truck stops was performed. The resulting data from these investigations were analyzed to provide mean values, standard deviations, and histograms. Hence, the mean values can be used when an analyst does not have a basis for selecting other input values for the Stop Model. In addition, the histograms and their characteristics can be used to guide statistical sampling techniques to measure sensitivity of the RADTRAN calculated Stop Dose to the uncertainties in the stop model input parameters. This paper discusses the details and presents the results of the investigation of stop model input parameters at truck stops

  13. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  14. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  15. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  16. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  17. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  18. IMPROVEMENT OF THE SUPPORTING STRUCTURE OF PLATFORM CAR FOR HIGHER EFFICIENCY OF CONTAINER TRANSPORTATIONS

    Directory of Open Access Journals (Sweden)

    A. O. Lovska

    2017-02-01

    Full Text Available Purpose. The article is aimed to improve supporting structures of the platform car to increase the efficiency of container transportations. Methodology. In order to achieve the objective, the strength investigations of the universal platform car of the model 13-401 were conducted, strength reserves of the supporting elements were defined, and more optimal profiles of basic longitudinal beams of the frame in terms of the minimum material capacity were proposed. Decision correctness was confirmed by the strength calculation of the platform car supporting structure at basic loading operational modes and fatigue taking into account the research database of 107 cycles. It has been proposed to equip a platform car with swing fitting stops for fastening containers on the frame, which allows transportation of 20ft and 40ft containers. In order to improve container transportation efficiency along international transport corridors running through Ukraine, a platform car of articulated type has been designed on the base of the improved platform car structure. The mathematical simulation of dynamic loads of the platform car with containers (two 1CC containers at operational loading modes has been carried out, the maximum accelerations influencing the support structure have been defined, and their multiple values have been considered in computer simulation of the strength of the platform car of articulated type. Findings. The support structure of the platform car of articulated type on the basis of the standard platform car has been developed. Refined values of dynamic loads influencing supporting structure the platform car of articulated type with containers at operational loading modes have been obtained; the maximum equivalent stresses in the platform car support structure have been defined. Originality and practical value. A mathematical model of displacements for a platform car of articulated type with containers at operational loading modes of

  19. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  20. Towards creating believable decoy project folders for detecting data theft

    NARCIS (Netherlands)

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  1. DETERMINATION OF THE DELAY DEPARTURE TIME OF THE BUS FROM STOPPING POINT INTO THE CAR FLOW

    Directory of Open Access Journals (Sweden)

    P. Gorbachov

    2014-10-01

    Full Text Available An analytical model for estimation of the bus departure delax from the bus stopping point after passenger loading is presented. The model allows to take into account the traffic density on a particular road section of the transport network, as well as the bus parameters.

  2. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  3. An extended car-following model considering the acceleration derivative in some typical traffic environments

    Science.gov (United States)

    Zhou, Tong; Chen, Dong; Liu, Weining

    2018-03-01

    Based on the full velocity difference and acceleration car-following model, an extended car-following model is proposed by considering the vehicle’s acceleration derivative. The stability condition is given by applying the control theory. Considering some typical traffic environments, the results of theoretical analysis and numerical simulation show the extended model has a more actual acceleration of string vehicles than that of the previous models in starting process, stopping process and sudden brake. Meanwhile, the traffic jams more easily occur when the coefficient of vehicle’s acceleration derivative increases, which is presented by space-time evolution. The results confirm that the vehicle’s acceleration derivative plays an important role in the traffic jamming transition and the evolution of traffic congestion.

  4. Tickover speed controller for car engines

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, R L

    1980-05-22

    In general, the tickover speed of a car engine is made sufficiently high, in order to permit an assumed maximum load to be taken from the engine at tickover. This setting of the tickover speed is usually done by stops in the fuel supply. Matching the actual load would lead to lower fuel consumption, without any danger of the engine stalling. The purpose of the invention is to provide a tickover speed controller, so that the tickover speed is adjusted by electronic control equipment, independently of the machine load. The fuel consumption on tickover is reduced and the emission of noxious substances is decreased. The electro-magnetic control of the throttle valve tickover setting is explained by extensive section drawings of the system. This process dispenses with the special tickover cams for a cold start.

  5. Advanced Infant Car Seat Would Increase Highway Safety

    Science.gov (United States)

    Dabney, Richard; Elrod, Susan

    2004-01-01

    An advanced infant car seat has been proposed to increase highway safety by reducing the incidence of crying, fussy behavior, and other child-related distractions that divert an adult driver s attention from driving. In addition to a conventional infant car seat with safety restraints, the proposed advanced infant car seat would include a number of components and subsystems that would function together as a comprehensive infant-care system that would keep its occupant safe, comfortable, and entertained, and would enable the driver to monitor the baby without having to either stop the car or turn around to face the infant during driving. The system would include a vibrator with bulb switch to operate; the switch would double as a squeeze toy that would make its own specific sound. A music subsystem would include loudspeakers built into the seat plus digital and analog circuitry that would utilize plug-in memory modules to synthesize music or a variety of other sounds. The music subsystem would include a built-in sound generator that could synthesize white noise or a human heartbeat to calm the baby to sleep. A second bulb switch could be used to control the music subsystem and would double as a squeeze toy that would make a distinct sound. An anti-noise sound-suppression system would isolate the baby from potentially disturbing ambient external noises. This subsystem would include small microphones, placed near the baby s ears, to detect ambient noise. The outputs of the microphone would be amplified and fed to the loudspeakers at appropriate amplitude and in a phase opposite that of the detected ambient noise, such that the net ambient sound arriving at the baby s ears would be almost completely cancelled. A video-camera subsystem would enable the driver to monitor the baby visually while continuing to face forward. One or more portable miniature video cameras could be embedded in the side of the infant car seat (see figure) or in a flip-down handle. The outputs of

  6. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  7. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  8. The market for gasoline cars and diesel cars

    International Nuclear Information System (INIS)

    Verboven, F.

    1999-01-01

    In Europe the tax tariff is much lower for diesel fuel than for gasoline. This benefit is used by manufacturers to increase the price of diesel-fueled cars, which limits the possibility to control the use of diesel cars by means of a fiscal policy (tax incidence). Attention is paid to the impact of fiscal advantages for diesel cars on the purchasing behavior of the consumer and the pricing policy (price discrimination) of the car manufacturers. 1 ref

  9. Adaptation Model for Corporate Car Sharing in the Car Rental Industry

    OpenAIRE

    Matthes, Martin

    2016-01-01

    The focus of this thesis was on developing an adaption model for implementing a corporate car sharing service within the existing infrastructure of a car rental company. The investigated case companies were a leading Finnish car rental franchisee and an international car sharing subsidiary, largely owned by the car rental franchisor, which offers corporate car sharing solutions in major European countries. Adapting this new service in Finland will help the car rental franchisee to assert its ...

  10. Theft detection and smart metering practices and expectations in the Netherlands

    NARCIS (Netherlands)

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  11. Copper wire theft and high voltage electrical burns

    OpenAIRE

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  12. Distortionary company car taxation: deadweight losses through increased car ownership

    NARCIS (Netherlands)

    van Ommeren, J.N.; Gutierrez Puigarnau, E.

    2013-01-01

    We analyse the effects of distortionary company car taxation through increased household car consumption for the Netherlands. We use several identification strategies and demonstrate that for about 20 % of households company car possession increases car ownership. The annual welfare loss of

  13. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  14. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  15. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  16. RxPATROL: a Web-based tool for combating pharmacy theft.

    Science.gov (United States)

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  17. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  18. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  19. An improved car-following model accounting for the preceding car's taillight

    Science.gov (United States)

    Zhang, Jian; Tang, Tie-Qiao; Yu, Shao-Wei

    2018-02-01

    During the deceleration process, the preceding car's taillight may have influences on its following car's driving behavior. In this paper, we propose an extended car-following model with consideration of the preceding car's taillight. Two typical situations are used to simulate each car's movement and study the effects of the preceding car's taillight on the driving behavior. Meanwhile, sensitivity analysis of the model parameter is in detail discussed. The numerical results show that the proposed model can improve the stability of traffic flow and the traffic safety can be enhanced without a decrease of efficiency especially when cars pass through a signalized intersection.

  20. 49 CFR 1247.1 - Annual Report of Cars Loaded and Cars Terminated.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Annual Report of Cars Loaded and Cars Terminated... TRANSPORTATION BOARD, DEPARTMENT OF TRANSPORTATION (CONTINUED) ACCOUNTS, RECORDS AND REPORTS REPORT OF CARS LOADED AND CARS TERMINATED § 1247.1 Annual Report of Cars Loaded and Cars Terminated. Beginning with the...

  1. Copper wire theft and high voltage electrical burns.

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  2. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  3. Second stop and sbottom searches with a stealth stop

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Hsin-Chia; Li, Lingfeng; Qin, Qin [Department of Physics, University of California,Davis, California 95616 (United States)

    2016-11-29

    The top squarks (stops) may be the most wanted particles after the Higgs boson discovery. The searches for the lightest stop have put strong constraints on its mass. However, there is still a search gap in the low mass region if the spectrum of the stop and the lightest neutralino is compressed. In that case, it may be easier to look for the second stop since naturalness requires both stops to be close to the weak scale. The current experimental searches for the second stop are based on the simplified model approach with the decay modes t̃{sub 2}→t̃{sub 1}Z and t̃{sub 2}→t̃{sub 1}h. However, in a realistic supersymmetric spectrum there is always a sbottom lighter than the second stop, hence the decay patterns are usually more complicated than the simplified model assumptions. In particular, there are often large branching ratios of the decays t̃{sub 2}→b̃{sub 1}W and b̃{sub 1}→t̃{sub 1}W as long as they are open. The decay chains can be even more complex if there are intermediate states of additional charginos and neutralinos in the decays. By studying several MSSM benchmark models at the 14 TeV LHC, we point out the importance of the multi-W final states in the second stop and the sbottom searches, such as the same-sign dilepton and multilepton signals, aside from the traditional search modes. The observed same-sign dilepton excesses at LHC Run 1 and Run 2 may be explained by some of our benchmark models. We also suggest that the vector boson tagging and a new kinematic variable may help to suppress the backgrounds and increase the signal significance for some search channels. Due to the complex decay patterns and lack of the dominant decay channels, the best reaches likely require a combination of various search channels at the LHC for the second stop and the lightest sbottom.

  4. 49 CFR 172.330 - Tank cars and multi-unit tank car tanks.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Tank cars and multi-unit tank car tanks. 172.330..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.330 Tank cars and multi-unit tank car tanks. (a... material— (1) In a tank car unless the following conditions are met: (i) The tank car must be marked on...

  5. Copper wire theft and high voltage electrical burns

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  6. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  7. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  8. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    OpenAIRE

    Samuel Andrew Hardy

    2015-01-01

    Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hire...

  9. 新型盗窃行为探析%An Analysis of the New types of Act of Theft

    Institute of Scientific and Technical Information of China (English)

    韩梅

    2013-01-01

    The 8th Amendment of the Criminal Law has added three new types act of theft, which makes the objective essentials of constituting crimes tend to be specific relatively. To study and discuss the new types of act of theft will be helpful for grasping the essence of theft and preventing such crimes more precisely. Indoor theft refers to an act entering relatively isolated residences of others’ living illegally to steal their properties. Theft with weapons refers to an act that the actor carrying the portable weapons banned in the country or other weapons to steal. Pick-pocketing refers to an act that the actor steals others’ properties in public places.%  《刑法修正案(八)》增加了三种新的盗窃行为类型,使盗窃罪的客观构成要件相对趋向于具体化。入户盗窃,是指非法进入他人生活的与外界相对隔离的住所窃取他人财物;携带凶器盗窃,是指行为人随身携带国家禁止个人携带的器械或其他器械进行盗窃的行为;扒窃是指行为人在公共场所盗窃别人随身的财物。对三种新类型盗窃行为方式的研究和探讨,有助于更准确地把握盗窃罪的实质和预防此类犯罪。

  10. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  11. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  12. Modeling the Turning Speed and Car Following Behaviors of Autonomous Vehicles in a Virtual World

    Directory of Open Access Journals (Sweden)

    Carrillo-González José Gerardo

    2015-07-01

    Full Text Available This article deals with mathematical models for controlling vehicles behavior in a virtual world, where two behaviors are considered: 1 curve turning and 2 car following situations, in this last is essential to provide a safety distance between the leader and the follower and at the same time keep the follower not delayed with respect to the leader, and in a curve turning the complexity is to provide a safety speed inside the curve and keep the car inside the lane. Using basic information as vehicles position, mathematical models can be developed for explaining the heading angle and the autonomous vehicles speed on curves, i.e. the controlled by the models. A model that predicts the autonomous vehicle speed on curves is developed considering previous data in other curves. Two models that control the acceleration/deceleration behavior of autonomous vehicles in a car following situation are proposed. In the first model, the parameters are calibrated with a proposed algorithm which enables accuracy in order to imitate the human behavior for accelerating and braking, and the second model provides a safety distance between the follower and the leader at sudden stops of the latter and employs the acceleration/deceleration top capabilities to follow the leader car similar to the human behavior.

  13. Positive and negative spillover effects from electric car purchase to car use

    OpenAIRE

    Kløckner, Christian; Nayum, Alim; Mehmetoglu, Mehmet

    2013-01-01

    This study reports the results of two online surveys conducted on buyers of conventional combustion engine cars compared to those of electric vehicles in Norway. The results show that electric cars are generally purchased as additional cars, do not contribute to a decrease in annual mileage if the old car is not substituted, and that electric car buyers use the car more often for their everyday mobility. Psychological determinants derived from the theory of planned behavior and the norm-activ...

  14. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  15. Lean Gasoline System Development for Fuel Efficient Small Cars

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Stuart R. [General Motors LLC, Pontiac, MI (United States)

    2013-11-25

    The General Motors and DOE cooperative agreement program DE-EE0003379 is completed. The program has integrated and demonstrated a lean-stratified gasoline engine, a lean aftertreatment system, a 12V Stop/Start system and an Active Thermal Management system along with the necessary controls that significantly improves fuel efficiency for small cars. The fuel economy objective of an increase of 25% over a 2010 Chevrolet Malibu and the emission objective of EPA T2B2 compliance have been accomplished. A brief review of the program, summarized from the narrative is: The program accelerates development and synergistic integration of four cost competitive technologies to improve fuel economy of a light-duty vehicle by at least 25% while meeting Tier 2 Bin 2 emissions standards. These technologies can be broadly implemented across the U.S. light-duty vehicle product line between 2015 and 2025 and are compatible with future and renewable biofuels. The technologies in this program are: lean combustion, innovative passive selective catalyst reduction lean aftertreatment, 12V stop/start and active thermal management. The technologies will be calibrated in a 2010 Chevrolet Malibu mid-size sedan for final fuel economy demonstration.

  16. Electric Car Special

    Energy Technology Data Exchange (ETDEWEB)

    Zoethout, T.; Belin, H.; Verwijs, H.; Nicola, S.; De Saint Jacob, Y.; Gatermann, R.

    2009-09-15

    In six articles, two columns and two interviews a part of this issue is dedicated to electric car developments: about winners and losers in the electric car race; a unique business model to rolling out the electric car by the electric battery company Better Place and the automobile industry Renault Nissan; interview with entrepreneur Shai Agassi of the Indian company Better Place; the development of electric cars in Germany; interview with Jean-Jacques Chanaron, an economist specialising in innovation management and a firm believer in electric cars; start of mass production of electric vehicles at the Japanese Nissan automobile industry; the constraints in Sweden in developing fuel-efficient automobiles; plans for 1 million electric or hybrid cars by 2025 in the Netherlands.

  17. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  18. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-10-24

    ......... S-CLASS 22 10,189 2.1592 34 GENERAL MOTORS..... CHEVROLET HHR...... 172 80,781 2.1292 35 TOYOTA... MOTOR CO...... LINCOLN TOWN CAR... 24 11,596 2.0697 39 TOYOTA AVALON 45 22,030 2.0427 40 NISSAN 350Z 1....7552 50 TOYOTA CAMRY/SOLARA....... 781 447,882 1.7438 51 TOYOTA COROLLA 632 363,515 1.7386 52 HYUNDAI...

  19. CAR models: next-generation CAR modifications for enhanced T-cell function

    Directory of Open Access Journals (Sweden)

    Daniel Abate-Daga

    2016-01-01

    Full Text Available T cells genetically targeted with a chimeric antigen receptor (CAR to B-cell malignancies have demonstrated tremendous clinical outcomes. With the proof in principle for CAR T cells as a therapy for B-cell malignancies being established, current and future research is being focused on adapting CAR technology to other cancers, as well as enhancing its efficacy and/or safety. The modular nature of the CAR, extracellular antigen-binding domain fused to a transmembrane domain and intracellular T-cell signaling domains, allows for optimization by replacement of the various components. These modifications are creating a whole new class of therapeutic CARs. In this review, we discuss the recent major advances in CAR design and how these modifications will impact its clinical application.

  20. The development of CAR design for tumor CAR-T cell therapy.

    Science.gov (United States)

    Xu, Dandan; Jin, Guoliang; Chai, Dafei; Zhou, Xiaowan; Gu, Weiyu; Chong, Yanyun; Song, Jingyuan; Zheng, Junnian

    2018-03-02

    In recent years, the chimeric antigen receptor modified T cells (Chimeric antigen receptor T cells, CAR-T) immunotherapy has developed rapidly, which has been considered the most promising therapy. Efforts to enhance the efficacy of CAR-based anti-tumor therapy have been made, such as the improvement of structures of CAR-T cells, including the development of extracellular antigen recognition receptors, intracellular co-stimulatory molecules and the combination application of CARs and synthetic small molecules. In addition, effects on the function of the CAR-T cells that the space distance between the antigen binding domains and tumor targets and the length of the spacer domains have are also being investigated. Given the fast-moving nature of this field, it is necessary to make a summary of the development of CAR-T cells. In this review, we mainly focus on the present design strategies of CAR-T cells with the hope that they can provide insights to increase the anti-tumor efficacy and safety.

  1. Transit Car Performance Comparison, State-of-the-Art Car vs. PATCO Transit Car, NYCTA R-46, MBTA Silverbirds

    Science.gov (United States)

    1978-02-01

    The first phase of this contract authorized the design, development, and demonstration of two State-Of-The-Art Cars (SOAC). This document reports on the gathering of comparative test data on existing in-service transit cars. The three transit cars se...

  2. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  3. Car Seat Safety

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español Car Seat Safety KidsHealth / For Parents / Car Seat Safety ... certified child passenger safety technician.) Guidelines for Choosing Car Seats Choose a seat with a label that ...

  4. Car Sickness

    Science.gov (United States)

    ... Preventable Diseases Healthy Children > Health Issues > Conditions > Head Neck & Nervous System > Car Sickness Health Issues Listen Español Text Size Email Print Share Car Sickness Page Content ...

  5. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  6. Accidental strangulation in children by the automatic closing of a car window.

    Science.gov (United States)

    Serena, Kailene; Piva, Jefferson Pedro; Andreolio, Cinara; Carvalho, Paulo Roberto Antonacci; Rocha, Tais Sica da

    2018-03-01

    Among the main causes of death in our country are car accidents, drowning and accidental burns. Strangulation is a potentially fatal injury and an important cause of homicide and suicide among adults and adolescents. In children, its occurrence is usually accidental. However, in recent years, several cases of accidental strangulation in children around the world have been reported. A 2-year-old male patient was strangled in a car window. The patient was admitted to the pediatric intensive care unit with a Glasgow Coma Scale score of 8 and presented with progressive worsening of respiratory dysfunction and torpor. The patient also presented acute respiratory distress syndrome, acute pulmonary edema and shock. He was managed with protective mechanical ventilation, vasoactive drugs and antibiotic therapy. He was discharged from the intensive care unit without neurological or pulmonary sequelae. After 12 days of hospitalization, he was discharged from the hospital, and his state was very good. The incidence of automobile window strangulation is rare but of high morbidity and mortality due to the resulting choking mechanism. Fortunately, newer cars have devices that stop the automatic closing of the windows if resistance is encountered. However, considering the severity of complications strangulated patients experience, the intensive neuro-ventilatory and hemodynamic management of the pathologies involved is important to reduce morbidity and mortality, as is the need to implement new campaigns for the education of parents and caregivers of children, aiming to avoid easily preventable accidents and to optimize safety mechanisms in cars with electric windows.

  7. Accidental strangulation in children by the automatic closing of a car window

    Science.gov (United States)

    Serena, Kailene; Piva, Jefferson Pedro; Andreolio, Cinara; Carvalho, Paulo Roberto Antonacci; da Rocha, Tais Sica

    2018-01-01

    Among the main causes of death in our country are car accidents, drowning and accidental burns. Strangulation is a potentially fatal injury and an important cause of homicide and suicide among adults and adolescents. In children, its occurrence is usually accidental. However, in recent years, several cases of accidental strangulation in children around the world have been reported. A 2-year-old male patient was strangled in a car window. The patient was admitted to the pediatric intensive care unit with a Glasgow Coma Scale score of 8 and presented with progressive worsening of respiratory dysfunction and torpor. The patient also presented acute respiratory distress syndrome, acute pulmonary edema and shock. He was managed with protective mechanical ventilation, vasoactive drugs and antibiotic therapy. He was discharged from the intensive care unit without neurological or pulmonary sequelae. After 12 days of hospitalization, he was discharged from the hospital, and his state was very good. The incidence of automobile window strangulation is rare but of high morbidity and mortality due to the resulting choking mechanism. Fortunately, newer cars have devices that stop the automatic closing of the windows if resistance is encountered. However, considering the severity of complications strangulated patients experience, the intensive neuro-ventilatory and hemodynamic management of the pathologies involved is important to reduce morbidity and mortality, as is the need to implement new campaigns for the education of parents and caregivers of children, aiming to avoid easily preventable accidents and to optimize safety mechanisms in cars with electric windows.

  8. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  9. Perancangan dan Implementasi Kontroler PID untuk Pengaturan Autonomous Car-Following Car

    Directory of Open Access Journals (Sweden)

    Andreas Parluhutan Bonor Sinaga

    2014-03-01

    Full Text Available Pengiriman logistik ke daerah-daerah rawan bencana merupakan hal yang sangat sulit dilakukan, tentunya diperlukan pengetahuan mengenai kondisi medan jalan. Salah satu dampak yang utama adalah sulitnya melakukan manuver dalam pengendalian performansi  truk logistik yang pada umumnya berupa truk-truk gandeng. Untuk membantu pengemudi truk dalam berkendara pada kondisi tersebut, dirancang sebuah prototype mobil mandiri (Autonomous Car yang mampu melakukan manuver-manuver pergerakan secara sendirinya, salah satu manuver tersebut ialah Following Car.  Dalam Tugas Akhir ini perancangan sistem yang akan dilakukan dengan  memodelkan  dua buah kendaraan mobil RC (remote control yang bertindak sebagai  follower dan leader car. Pengoperasian dari  following car dilakukan dengan memodifikasi dari kendaraan RC-1, sedangkan RC-2 bertindak sebagai leader car yang dikondisikan secara manual. Dengan penerapan kontroler PID pada implementasi sistem didapatkan penurunan time settling menjadi 2,7 Detik dan peningkatan error steady state sebesar 2,44%. Pada implementasi diberikan kecepatan leader secara acak, dengan implementasi kontroler PID, kondisi jarak antara autonomous car dengan leader car masih dalam range keadaan ideal pada set point.

  10. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  11. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ... 10,189 2.1592 33 GENERAL MOTORS......... CHEVROLET HHR 172 80,781 2.1292 34 TOYOTA SCION TC 57 27,179... LINCOLN TOWN CAR....... 24 11,596 2.0697 38 TOYOTA AVALON 45 22,030 2.0427 39 NISSAN 350Z 1 503 1.9881 40....7898 48 GENERAL MOTORS......... CADILLAC CTS 91 50,926 1.7869 49 VOLVO S60 12 6,837 1.7552 50 TOYOTA...

  12. A Model for Deterring the Determined Thief of Patron Property

    Science.gov (United States)

    McKay, Richard

    2008-01-01

    Ongoing theft from library patrons may be the work of a determined thief, one who will not be deterred by the crimeproofing techniques that often stop less committed criminals. This type of theft can be deterred when the library staff makes their patrons aware that successful deterrence depends on them not abandoning their valuables. Other staff…

  13. Inseparability of Go and Stop in Inhibitory Control: Go Stimulus Discriminability Affects Stopping Behavior.

    Science.gov (United States)

    Ma, Ning; Yu, Angela J

    2016-01-01

    Inhibitory control, the ability to stop or modify preplanned actions under changing task conditions, is an important component of cognitive functions. Two lines of models of inhibitory control have previously been proposed for human response in the classical stop-signal task, in which subjects must inhibit a default go response upon presentation of an infrequent stop signal: (1) the race model, which posits two independent go and stop processes that race to determine the behavioral outcome, go or stop; and (2) an optimal decision-making model, which posits that observers decides whether and when to go based on continually (Bayesian) updated information about both the go and stop stimuli. In this work, we probe the relationship between go and stop processing by explicitly manipulating the discrimination difficulty of the go stimulus. While the race model assumes the go and stop processes are independent, and therefore go stimulus discriminability should not affect the stop stimulus processing, we simulate the optimal model to show that it predicts harder go discrimination should result in longer go reaction time (RT), lower stop error rate, as well as faster stop-signal RT. We then present novel behavioral data that validate these model predictions. The results thus favor a fundamentally inseparable account of go and stop processing, in a manner consistent with the optimal model, and contradicting the independence assumption of the race model. More broadly, our findings contribute to the growing evidence that the computations underlying inhibitory control are systematically modulated by cognitive influences in a Bayes-optimal manner, thus opening new avenues for interpreting neural responses underlying inhibitory control.

  14. Inseparability of Go and Stop in Inhibitory Control: Go Stimulus Discriminability Affects Stopping Behavior

    Directory of Open Access Journals (Sweden)

    Ning eMa

    2016-03-01

    Full Text Available Inhibitory control, the ability to stop or modify preplanned actions under changing task conditions, is an important component of cognitive functions. Two lines of models of inhibitory control have previously been proposed for human response in the classical stop-signal task, in which subjects must inhibit a default go response upon presentation of an infrequent stop signal: (1 the race model, which posits two independent go and stop processes that race to determine the behavioral outcome, go or stop; and (2 an optimal decision-making model, which posits that observers decides whether and when to go based on continually (Bayesian updated information about both the go and stop stimuli. In this work, we probe the relationship between go and stop processing by explicitly manipulating the discrimination difficulty of the go stimulus. While the race model assumes the go and stop processes are independent, and therefore go stimulus discriminability should not affect the stop stimulus processing, we simulate the optimal model to show that it predicts harder go discrimination results in a longer go reaction time (RT, a lower stop error rate, as well as a faster stop-signal RT. We then present novel behavioral data that validate these model predictions. The results thus favor a fundamentally inseparable account of go and stop processing, in a manner consistent with the optimal model, and contradicting the independence assumption of the race model. More broadly, our findings contribute to the growing evidence that the computations underlying inhibitory control are systematically modulated by cognitive influences in a Bayes-optimal manner, thus opening new avenues for interpreting neural responses underlying inhibitory control.

  15. The problem of theft depravity in traditional Russian culture(middle of the 19th - beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Т В Лис

    2008-06-01

    Full Text Available This article touches upon the problem of perceiving and comprehending the theft within its interrelationship with the concept of sin, which is in its turn considered to be one of the most important notions of the Christian ethics. Considering this very aspect theft studies make it easy to pinpoint certain peculiarities of the traditional sense of justice and national morality. In terms of temporal perspective the idea of sin correlates with an image of theft victim. Then the larceny turns into a certain visitation for the recently committed offence or crime. Thus, we can draw up a certain cause-and-effect line: any crime or offence entails punishment, which is actually a crime aimed at somebody, who has committed the crime first. In this case we can talk about the synonymy of crime and punishment as well as about the cumulation of sin.

  16. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  17. A speed guidance strategy for multiple signalized intersections based on car-following model

    Science.gov (United States)

    Tang, Tie-Qiao; Yi, Zhi-Yan; Zhang, Jian; Wang, Tao; Leng, Jun-Qiang

    2018-04-01

    Signalized intersection has great roles in urban traffic system. The signal infrastructure and the driving behavior near the intersection are paramount factors that have significant impacts on traffic flow and energy consumption. In this paper, a speed guidance strategy is introduced into a car-following model to study the driving behavior and the fuel consumption in a single-lane road with multiple signalized intersections. The numerical results indicate that the proposed model can reduce the fuel consumption and the average stop times. The findings provide insightful guidance for the eco-driving strategies near the signalized intersections.

  18. Stopping, goal-conflict, trait anxiety and frontal rhythmic power in the stop-signal task.

    Science.gov (United States)

    Neo, Phoebe S-H; Thurlow, Jane K; McNaughton, Neil

    2011-12-01

    The medial right frontal cortex is implicated in fast stopping of an initiated motor action in the stop-signal task (SST). To assess whether this region is also involved in the slower behavioural inhibition induced by goal conflict, we tested for effects of goal conflict (when stop and go tendencies are balanced) on low-frequency rhythms in the SST. Stop trials were divided, according to the delays at which the stop signal occurred, into short-, intermediate-, and long-delay trials. Consistent with goal-conflict processing, intermediate-delay trials were associated with greater 7-8 Hz EEG power than short- or long-delay trials at medial right frontal sites (Fz, F4, and F8). At F8, 7-8 Hz power was linked to high trait anxiety and neuroticism. A separate 4-7 Hz power increase was also seen in stop, relative to go, trials, but this was independent of delay, was maximal at the central midline site Cz, and predicted faster stopping. Together with previous data on the SST, these results suggest that the right frontal region could be involved in multiple inhibition mechanisms. We propose a hierarchical model of the control of stopping that integrates the literature on the neural control of fast motor stopping with that on slower, motive-directed behavioural inhibition.

  19. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  20. CAR2 - Czech Database of Car Speech

    Directory of Open Access Journals (Sweden)

    P. Sovka

    1999-12-01

    Full Text Available This paper presents new Czech language two-channel (stereo speech database recorded in car environment. The created database was designed for experiments with speech enhancement for communication purposes and for the study and the design of a robust speech recognition systems. Tools for automated phoneme labelling based on Baum-Welch re-estimation were realised. The noise analysis of the car background environment was done.

  1. CAR2 - Czech Database of Car Speech

    OpenAIRE

    Pollak, P.; Vopicka, J.; Hanzl, V.; Sovka, Pavel

    1999-01-01

    This paper presents new Czech language two-channel (stereo) speech database recorded in car environment. The created database was designed for experiments with speech enhancement for communication purposes and for the study and the design of a robust speech recognition systems. Tools for automated phoneme labelling based on Baum-Welch re-estimation were realised. The noise analysis of the car background environment was done.

  2. The Green City Car. A holistic approach for NVH abatement of city cars

    OpenAIRE

    Bein, Thilo; Mayer, Dirk; Elliott, Steve; Ferrali, Leonardo; Casella, Mauro; Saemann, Ernst-Ulrich; Kropp, Wolfgang; Nielsen, Finn Kryger; Meschke, Jens; Pisano, Emanuel

    2014-01-01

    Pursuing the different passive and active concepts in a holistic approach, the FP7 project Green City Car demonstrates the feasibility of applying active systems to NVH-related problems light city cars from a system point-of view. During the project, a city car equipped with a small engine has been considered equipped with the latest technology in terms of safety aspects related to pedestrian’s impact and car-to-car compatibility, which are of major importance in an urban environment. The noi...

  3. UV exposure in cars.

    Science.gov (United States)

    Moehrle, Matthias; Soballa, Martin; Korn, Manfred

    2003-08-01

    There is increasing knowledge about the hazards of solar and ultraviolet (UV) radiation to humans. Although people spend a significant time in cars, data on UV exposure during traveling are lacking. The aim of this study was to obtain basic information on personal UV exposure in cars. UV transmission of car glass samples, windscreen, side and back windows and sunroof, was determined. UV exposure of passengers was evaluated in seven German middle-class cars, fitted with three different types of car windows. UV doses were measured with open or closed windows/sunroof of Mercedes-Benz E 220 T, E 320, and S 500, and in an open convertible car (Mercedes-Benz CLK). Bacillus subtilis spore film dosimeters (Viospor) were attached to the front, vertex, cheeks, upper arms, forearms and thighs of 'adult' and 'child' dummies. UV wavelengths longer than >335 nm were transmitted through car windows, and UV irradiation >380 nm was transmitted through compound glass windscreens. There was some variation in the spectral transmission of side windows according to the type of glass. On the arms, UV exposure was 3-4% of ambient radiation when the car windows were shut, and 25-31% of ambient radiation when the windows were open. In the open convertible car, the relative personal doses reached 62% of ambient radiation. The car glass types examined offer substantial protection against short-wave UV radiation. Professional drivers should keep car windows closed on sunny days to reduce occupational UV exposure. In individuals with polymorphic light eruption, produced by long-wave UVA, additional protection by plastic films, clothes or sunscreens appears necessary.

  4. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    National Research Council Canada - National Science Library

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  5. Car use within the household

    DEFF Research Database (Denmark)

    de Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    2013-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate—for each car owned by the household—own and cross-price effects...... of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, we estimate fuel price elasticities of –0.81 and -0.65 for the primary and secondary cars...... efficient car, finding partial support for the underlying hypothesis. More importantly, the results of this extended model emphasize the importance of behavioural differences related to the position of the most fuel efficient car in the household, suggesting that households’ fuel efficiency choices...

  6. Tank car leaks gasoline

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    On January 27, 1994, a Canadian National (CN) tank car loaded with gasoline began to leak from a crack in the tank shell on the end of the car near the stub sill. The tank car had been damaged from impact switching. A part of the tank car was sent for laboratory analysis which concluded that: (1) the fracture originated in two locations in welds, (2) the cracks propagated in a symmetrical manner and progressed into the tank plate, (3) the fracture surface revealed inadequate weld fusion. A stress analysis of the tank car was conducted to determine the coupling force necessary to cause the crack. It was noted that over the last decade several problems have occurred pertaining to stub sill areas of tank cars that have resulted in hazardous material spills. An advisory was sent to Transport Canada outlining many examples where tank cars containing serious defects had passed CN inspections that were specifically designed to identify such defects. 4 figs

  7. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  8. Car allocation between household heads in car deficient households : A decision model

    NARCIS (Netherlands)

    Anggraini, Renni; Arentze, Theo A.; Timmermans, Harry J P

    2008-01-01

    This paper considers car allocation choice behaviour in car-deficient households explicitly in the context of an activity-scheduling process, focusing on work activities. A decision tree induction method is applied to derive a decision tree for the car allocation decision in automobile deficient

  9. First results from car-to-car and car-to-infrastructure radio channel measurements at 5.2GHZ

    OpenAIRE

    Paier, Alexander; Kåredal, Johan; Czink, Nicolai; Hofstetter, Helmut; Dumard, Charlotte; Zemen, Thomas; Tufvesson, Fredrik; Mecklenbräuker, Christoph; Molisch, Andreas

    2007-01-01

    Car-to-car and car-to-infrastructure (henceforth called C2X) communications are constantly gaining importance for road-safety and other applications. In order to design efficient C2X systems, an understanding of realistic C2X propagation channels is required, but currently, only few measurements have been published. This paper presents a description of an extensive measurement campaign recently conducted in an urban scenario, a rural scenario, and on a highway. We focused on 4 ÿ 4 multiple-in...

  10. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    Science.gov (United States)

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  11. Jet Car Track Site

    Data.gov (United States)

    Federal Laboratory Consortium — Located in Lakehurst, New Jersey, the Jet Car Track Site supports jet cars with J57 engines and has a maximum jet car thrust of 42,000 pounds with a maximum speed of...

  12. Report on electric cars and plug-in hybrid cars; Redegoerelse - elbiler og plug-in hybridbiler

    Energy Technology Data Exchange (ETDEWEB)

    Elkjaer Toennesen, A.; Winther, K.; Noerregaard, K. (Teknologisk Institut, Taastrup (Denmark)); Larsen, Esben; Christensen, Linda; Kveiborg, O. (Danmarks Teknologiske Univ., Kgs. Lyngby (DTU) (Denmark))

    2010-04-15

    The Center for Green Transport at the Danish Transport Authority has prepared this statement in order to uncover driving technical aspects, user expectations and needs, and the environmental consequences of using electric and plug-in hybrid cars. An electric car is defined as a car driven by an electric motor that has a battery that can be charged with power from the grid. A plug-in hybrid car is defined as a car that combines gasoline or diesel engine with an electric motor with a battery which can be recharged with power from the grid. From an overall consideration related to the transport sector electric cars and plug-in hybrid cars have the major advantage that negative impacts on environment and climate from traffic can be reduced while the high mobility is maintained. Through an increased use of electric cars and plug-in hybrid cars, the many advantages attached to the car as an individual transportation form is maintained, while CO{sub 2} emissions etc. are reduced. Electric cars and plug-in hybrid cars is one of the technologies that are considered to have particularly great prospects in the medium term when it comes to promoting new technologies in transport. Another advantage of using electric vehicles is the power supply factor. An increased use of electricity in transport will reduce the need for and dependence on fossil fuels in the sector. Both electric cars and plug-in hybrid cars are expected to be used for storage of wind power, a possibility which is hardly available today. The plug-in hybrid car could meet some of the challenges facing the pure electric car, because it also can use conventional fuel. The report presents analyses based on three focus areas: a) Users' needs, expectations and economics in relation to vehicles; b) The technology - and hence the manufacturers' opportunities and challenges; c) Connection to the power grid. (ln)

  13. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  14. Background free CARS imaging by phase sensitive heterodyne CARS

    NARCIS (Netherlands)

    Jurna, M.; Korterik, Jeroen P.; Otto, Cornelis; Herek, Jennifer Lynn; Offerhaus, Herman L.

    2008-01-01

    In this article we show that heterodyne CARS, based on a controlled and stable phase-preserving chain, can be used to measure amplitude and phase information of molecular vibration modes. The technique is validated by a comparison of the imaginary part of the heterodyne CARS spectrum to the

  15. Breaking car use habits

    DEFF Research Database (Denmark)

    Thøgersen, John; Møller, Berit Thorup

    2008-01-01

    Based on calls for innovative ways of reducing car traffic and research indicating that car driving is often the result of habitual decision-making and choice processes, this paper reports on a field experiment designed to test a tool aimed to entice drivers to skip the habitual choice of the car...... and consider using-or at least trying-public transport instead. About 1,000 car drivers participated in the experiment either as experimental subjects, receiving a free one-month travelcard, or as control subjects. As predicted, the intervention had a significant impact on drivers' use of public transport...... and it also neutralized the impact of car driving habits on mode choice. However, in the longer run (i.e., four months after the experiment) experimental subjects did not use public transport more than control subjects. Hence, it seems that although many car drivers choose travel mode habitually, their final...

  16. Misuse of car safety seats.

    Science.gov (United States)

    Bull, M J; Stroup, K B; Gerhart, S

    1988-01-01

    Correct use of car seats for small children is essential to prevent serious injuries and death from automotive accidents. Failure to use a car seat properly can contribute to serious injury or death of a child. A case study in which misuse of a car seat occurred is reported. The infant died of hemorrhage and shock secondary to liver laceration which resulted from excessive pressure over the abdomen sustained on impact. Surveys of car seat use for small children prior to and following a child restraint law are also reported. Observers noted types of car seats and specific forms of misuse. Survey results suggest that parents are more likely to misuse car seats for infants than toddlers. Medical professionals can reinforce the importance of proper car seat use by incorporating specific car seat use questions into the patient interview and by providing educational materials.

  17. Car-use habits

    DEFF Research Database (Denmark)

    Møller, Berit Thorup; Thøgersen, John

    2008-01-01

    It is often claimed that many drivers use their private car rather habitually. The claim gains credibility from the fact that travelling to many everyday destinations fulfils all the prerequisites for habit formation: it is recurring, performed under stable circumstances and produces rewarding...... consequences. Since the decision is made quite automatically and only one choice alternative is considered (the habitually chosen one), behaviour guided by habit is difficult to change. The implications of car use habits for converting drivers to commuters using public transportation is analysed based...... to do so, car use habit, and the interaction between the two, confirms the theory-derived hypothesis that car use habits act as an obstacle to the transformation of intentions to commute by public transportation into action....

  18. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    OpenAIRE

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  19. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  20. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  1. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  2. 49 CFR 1037.2 - Cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Cars. 1037.2 Section 1037.2 Transportation Other... GENERAL RULES AND REGULATIONS BULK GRAIN AND GRAIN PRODUCTS-LOSS AND DAMAGE CLAIMS § 1037.2 Cars. A car is... railroad-leased cars. [57 FR 54334, Nov. 18, 1992] ...

  3. Progress in understanding heavy-ion stopping

    Energy Technology Data Exchange (ETDEWEB)

    Sigmund, P., E-mail: sigmund@sdu.dk [Department of Physics, Chemistry and Pharmacy, University of Southern Denmark, DK-5230 Odense M (Denmark); Schinner, A. [Institut für Experimentalphysik, Johannes Kepler Universität, A-4040 Linz (Austria)

    2016-09-01

    We report some highlights of our work with heavy-ion stopping in the energy range where Bethe stopping theory breaks down. Main tools are our binary stopping theory (PASS code), the reciprocity principle, and Paul’s data base. Comparisons are made between PASS and three alternative theoretical schemes (CasP, HISTOP and SLPA). In addition to equilibrium stopping we discuss frozen-charge stopping, deviations from linear velocity dependence below the Bragg peak, application of the reciprocity principle in low-velocity stopping, modeling of equilibrium charges, and the significance of the so-called effective charge.

  4. Progress in understanding heavy-ion stopping

    International Nuclear Information System (INIS)

    Sigmund, P.; Schinner, A.

    2016-01-01

    We report some highlights of our work with heavy-ion stopping in the energy range where Bethe stopping theory breaks down. Main tools are our binary stopping theory (PASS code), the reciprocity principle, and Paul’s data base. Comparisons are made between PASS and three alternative theoretical schemes (CasP, HISTOP and SLPA). In addition to equilibrium stopping we discuss frozen-charge stopping, deviations from linear velocity dependence below the Bragg peak, application of the reciprocity principle in low-velocity stopping, modeling of equilibrium charges, and the significance of the so-called effective charge.

  5. Gasoline cars produce more carbonaceous particulate matter than modern filter-equipped diesel cars.

    Science.gov (United States)

    Platt, S M; El Haddad, I; Pieber, S M; Zardini, A A; Suarez-Bertoa, R; Clairotte, M; Daellenbach, K R; Huang, R-J; Slowik, J G; Hellebust, S; Temime-Roussel, B; Marchand, N; de Gouw, J; Jimenez, J L; Hayes, P L; Robinson, A L; Baltensperger, U; Astorga, C; Prévôt, A S H

    2017-07-13

    Carbonaceous particulate matter (PM), comprising black carbon (BC), primary organic aerosol (POA) and secondary organic aerosol (SOA, from atmospheric aging of precursors), is a highly toxic vehicle exhaust component. Therefore, understanding vehicle pollution requires knowledge of both primary emissions, and how these emissions age in the atmosphere. We provide a systematic examination of carbonaceous PM emissions and parameterisation of SOA formation from modern diesel and gasoline cars at different temperatures (22, -7 °C) during controlled laboratory experiments. Carbonaceous PM emission and SOA formation is markedly higher from gasoline than diesel particle filter (DPF) and catalyst-equipped diesel cars, more so at -7 °C, contrasting with nitrogen oxides (NO X ). Higher SOA formation from gasoline cars and primary emission reductions for diesels implies gasoline cars will increasingly dominate vehicular total carbonaceous PM, though older non-DPF-equipped diesels will continue to dominate the primary fraction for some time. Supported by state-of-the-art source apportionment of ambient fossil fuel derived PM, our results show that whether gasoline or diesel cars are more polluting depends on the pollutant in question, i.e. that diesel cars are not necessarily worse polluters than gasoline cars.

  6. Agutaynen Glottal Stop.

    Science.gov (United States)

    Quakenbush, J. Stephen

    A study investigated the phonemic and morphophonemic patterning of the glottal stop in Agutaynen, a Meso-Philippine language, and some comparison with two northern Philippine languages. Agutaynen glottal stop has as its sole origin a neutralization of contrast rule, the operation of which can be noted in three different linguistic environments.…

  7. Gasoline-powered series hybrid cars cause lower life cycle carbon emissions than battery cars

    Science.gov (United States)

    Meinrenken, Christoph; Lackner, Klaus S.

    2012-02-01

    Battery cars powered by grid electricity promise reduced life cycle green house gas (GHG) emissions from the automotive sector. Such scenarios usually point to the much higher emissions from conventional, internal combustion engine cars. However, today's commercially available series hybrid technology achieves the well known efficiency gains in electric drivetrains (regenerative breaking, lack of gearbox) even if the electricity is generated onboard, from conventional fuels. Here, we analyze life cycle GHG emissions for commercially available, state-of the-art plug-in battery cars (e.g. Nissan Leaf) and those of commercially available series hybrid cars (e.g., GM Volt, at same size and performance). Crucially, we find that series hybrid cars driven on (fossil) gasoline cause fewer emissions (126g CO2eq per km) than battery cars driven on current US grid electricity (142g CO2eq per km). We attribute this novel finding to the significant incremental emissions from plug-in battery cars due to losses during grid transmission and battery dis-/charging, and manufacturing larger batteries. We discuss crucial implications for strategic policy decisions towards a low carbon automotive sector as well as relative land intensity when powering cars by biofuel vs. bioelectricity.

  8. Gasoline-powered serial hybrid cars cause lower life cycle carbon emissions than battery cars

    Science.gov (United States)

    Meinrenken, Christoph J.; Lackner, Klaus S.

    2011-04-01

    Battery cars powered by grid electricity promise reduced life cycle green house gas (GHG) emissions from the automotive sector. Such scenarios usually point to the much higher emissions from conventional, internal combustion engine cars. However, today's commercially available serial hybrid technology achieves the well known efficiency gains from regenerative breaking, lack of gearbox, and light weighting - even if the electricity is generated onboard, from conventional fuels. Here, we analyze emissions for commercially available, state-of the-art battery cars (e.g. Nissan Leaf) and those of commercially available serial hybrid cars (e.g., GM Volt, at same size and performance). Crucially, we find that serial hybrid cars driven on (fossil) gasoline cause fewer life cycle GHG emissions (126g CO2e per km) than battery cars driven on current US grid electricity (142g CO2e per km). We attribute this novel finding to the significant incremental life cycle emissions from battery cars from losses during grid transmission, battery dis-/charging, and larger batteries. We discuss crucial implications for strategic policy decisions towards a low carbon automotive sector as well as relative land intensity when powering cars by biofuel vs. bioelectricity.

  9. NREL Model Car Competitions | NREL

    Science.gov (United States)

    work together building cars with guidance from a parent, teacher, or coach to compete in race and Solar and Lithium Ion model car races in Colorado. Building solar- and battery-powered cars requires listPDF for Junior Solar Sprint and Lithium-Ion Battery model cars. Junior Solar Sprint Solar Made Pitsco

  10. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Science.gov (United States)

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Increase of child car seat temperature in cars parked in the outpatient parking lot.

    Science.gov (United States)

    Sugimura, Tetsu; Suzue, Junji; Kamada, Makoto; Ozaki, Yukiko; Tananari, Yoshifumi; Maeno, Yasuki; Ito, Shinichi; Nishino, Hiroshi; Kakimoto, Noriko; Yamakawa, Rumi

    2011-12-01

    A guideline for the safe use of child car seats (CS) was published by the Japan Pediatric Society in 2008. There have been few studies of the increase of temperature of a CS in parked cars. The aim of this study was to determine the change in the temperature of the CS in cars parked in full sun. The temperature of CS was measured during summer (July and August) in 2006, 2007, and 2008. The CS used in this study (n= 50) were for children (≤ 6 years old) who were taken by car to Sugimura Children's Medical Clinic. Temperatures were only measured on sunny days. Measurements were performed from 09.00 to 17.00 hours. Thermochron (Thermochron i-Button: G type, Maxim Integrated Products, CA, USA) was used to measure the temperatures. The maximum temperatures of CS were compared in time at the clinic, taking into consideration seat colors, and car colors. Of the 50 cars, three cars were excluded due to being in the shade while the temperature was measured. A total of 47 cars were used for this study. The temperature of the CS ranged from 38.0 to 65.5°C (47.8 ± 5.8°C). Eighteen CS (38.3%) reached a temperature of 50°C or above. The maximum temperature of the 13.00-15.00-hours group was significantly higher than that of the 09.00-11.00-hours group (P= 0.035). The CS temperatures in the black car group were significantly higher than those of the white car group (P= 0.013). CS may become very hot while a car is parked in sun, especially if the car and the CS are black, so the CS should be cooled before a young child is placed in it. Guardians of small children should be aware of this risk. © 2011 The Authors. Pediatrics International © 2011 Japan Pediatric Society.

  12. All in One Stop? The Accessibility of Work Support Programs at One-Stop Centers.

    Science.gov (United States)

    Richer, Elise; Kubo, Hitomi; Frank, Abbey

    The accessibility of work support programs at one-stop centers was examined in a study during which 33 telephone directors or managers of one-stop centers in 22 states were interviewed by telephone. The interviews established the existence of extensive differences between one-stop centers from the standpoint of all aspects of their operation,…

  13. LHC Availability 2017: Technical Stop 1 to Technical Stop 2

    CERN Document Server

    Todd, Benjamin; Apollonio, Andrea; Walsh, David John; CERN. Geneva. ATS Department

    2017-01-01

    This document summarises the LHC machine availability for the period of Technical Stop 1 (TS1) to Technical Stop 2 (TS2) in 2017. This period was dedicated to proton physics with a bunch spacing of 25ns. This note has been produced and ratified by the Availability Working Group which has complied fault information for the period in question using the Accelerator Fault Tracker.

  14. The Socialist Car

    DEFF Research Database (Denmark)

    Christensen, Lars K.

    2013-01-01

    Review of L.H. Siegelbaum (ed.) The Socialist Car. Automobility in the Eastern Block. Cornell University Press, 2011.......Review of L.H. Siegelbaum (ed.) The Socialist Car. Automobility in the Eastern Block. Cornell University Press, 2011....

  15. Luminescent beam stop

    Energy Technology Data Exchange (ETDEWEB)

    Bryant, Diane; Morton, Simon A.

    2017-10-25

    This disclosure provides systems, methods, and apparatus related to beam stops. In one aspect, a device comprises a luminescent material, a beam stop plate, and an optical fiber. The luminescent material is a parallelepiped having a first side and a second side that are squares and having a third side that is a rectangle or a square. The first side and the second side are perpendicular to the third side. The beam stop plate is attached to the first side of the luminescent material. The optical fiber has a first end and a second end, with the first end of the optical fiber attached to the third side of the luminescent material.

  16. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  17. Probing Light Stops with Stoponium

    CERN Document Server

    Batell, Brian

    2015-01-01

    We derive new limits on light stops from diboson resonance searches in the $\\gamma\\gamma$, $Z \\gamma$, $ZZ$, $WW$ and $hh$ channels from the first run of the LHC. If the two-body decays of the light stop are mildly suppressed or kinematically forbidden, stoponium bound states will form in $pp$ collisions and subsequently decay via the pair annihilation of the constituent stops to diboson final states, yielding striking resonance signatures. Remarkably, we find that stoponium searches are highly complementary to direct collider searches and indirect probes of light stops such as Higgs coupling measurements. Using an empirical quarkonia potential model and including the first two $S$-wave stoponium states, we find that in the decoupling limit $m_{\\widetilde t_1} \\lesssim 130$ GeV is excluded for any value of the stop mixing angle and heavy stop mass by the combination of the latest resonance searches and the indirect constraints. The $\\gamma \\gamma$ searches are the most complementary to the indirect constraint...

  18. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  19. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  20. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  1. Substitution between Cars within the Household

    DEFF Research Database (Denmark)

    de Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate—for each car owned by the household—own and cross-price effects...... of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, we estimate fuel price elasticities of –0.81 and -0.65 for the primary and secondary cars...... efficient car, finding partial support for the underlying hypothesis. More importantly, the results of this extended model emphasize the importance of behavioural differences related to the position of the most fuel efficient car in the household, suggesting that households’ fuel efficiency choices...

  2. Cars, Cycles, and Consumers.

    Science.gov (United States)

    Idleman, Hillis K. Ed.

    The purpose of this consumer education module is to provide information and skills, and the ability to raise questions and find answers, while seeking the best automobile or motorcycle buy available for the money. The module may be used for a full or part semester course. The five sections (cars and the consumer, renting and leasing cars, cars and…

  3. Stop smoking support programs

    Science.gov (United States)

    Smokeless tobacco - stop smoking programs; Stop smoking techniques; Smoking cessation programs; Smoking cessation techniques ... You can find out about smoking cessation programs from: Your ... Your employer Your local health department The National Cancer ...

  4. Retroactive Stop Loss Special Pay

    Science.gov (United States)

    Pay (RSLSP), providing $500 for each month/partial month served in stop loss status. Service members served under stop loss must submit a claim for the special pay. Throughout the year, the services have or extension of service, became ineligible to receive retroactive stop loss special pay. There may be

  5. Stop feeling: inhibition of emotional interference following stop-signal trials.

    Science.gov (United States)

    Kalanthroff, Eyal; Cohen, Noga; Henik, Avishai

    2013-01-01

    Although a great deal of literature has been dedicated to the mutual links between emotion and the selective attention component of executive control, there is very little data regarding the links between emotion and the inhibitory component of executive control. In the current study we employed an emotional stop-signal task in order to examine whether emotion modulates and is modulated by inhibitory control. Results replicated previous findings showing reduced inhibitory control [longer stop-signal reaction time (SSRT)] following negative, compared to neutral pictures. Most importantly, results show decreased emotional interference following stop-signal trials. These results show that the inhibitory control component of executive control can serve to decrease emotional effects. We suggest that inhibitory control and emotion have a two-way connection in which emotion disrupts inhibitory control and activation of inhibitory control disrupts emotion.

  6. Stop feeling: Inhibition of emotional interference following stop-signal trials

    Directory of Open Access Journals (Sweden)

    Eyal eKalanthroff

    2013-03-01

    Full Text Available Although a great deal of literature has been dedicated to the mutual links between emotion and the selective attention component of executive control, there is very little data regarding the links between emotion and the inhibitory component of executive control. In the current study we employed an emotional stop-signal task in order to examine whether emotion modulates and is modulated by inhibitory control. Results replicated previous findings showing reduced inhibitory control (longer stop-signal reaction time following negative, compared to neutral pictures. Most importantly, results show decreased emotional interference following stop-signal trials. These results show that the inhibitory control component of executive control can serve to decrease emotional effects. We suggest that inhibitory control and emotion have a two-way connection in which emotion disrupts inhibitory control and activation of inhibitory control disrupts emotion.

  7. Ortho-aminoazotoluene activates mouse constitutive androstane receptor (mCAR) and increases expression of mCAR target genes

    International Nuclear Information System (INIS)

    Smetanina, Mariya A.; Pakharukova, Mariya Y.; Kurinna, Svitlana M.; Dong, Bingning; Hernandez, Juan P.; Moore, David D.; Merkulova, Tatyana I.

    2011-01-01

    2'-3-dimethyl-4-aminoazobenzene (ortho-aminoazotoluene, OAT) is an azo dye and a rodent carcinogen that has been evaluated by the International Agency for Research on Cancer (IARC) as a possible (class 2B) human carcinogen. Its mechanism of action remains unclear. We examined the role of the xenobiotic receptor Constitutive Androstane Receptor (CAR, NR1I3) as a mediator of the effects of OAT. We found that OAT increases mouse CAR (mCAR) transactivation in a dose-dependent manner. This effect is specific because another closely related azo dye, 3'-methyl-4-dimethyl-aminoazobenzene (3'MeDAB), did not activate mCAR. Real-time Q-PCR analysis in wild-type C57BL/6 mice revealed that OAT induces the hepatic mRNA expression of the following CAR target genes: Cyp2b10, Cyp2c29, Cyp3a11, Ugt1a1, Mrp4, Mrp2 and c-Myc. CAR-null (Car -/- ) mice showed no increased expression of these genes following OAT treatment, demonstrating that CAR is required for their OAT dependent induction. The OAT-induced CAR-dependent increase of Cyp2b10 and c-Myc expression was confirmed by Western blotting. Immunohistochemistry analysis of wild-type and Car -/- livers showed that OAT did not acutely induce hepatocyte proliferation, but at much later time points showed an unexpected CAR-dependent proliferative response. These studies demonstrate that mCAR is an OAT xenosensor, and indicate that at least some of the biological effects of this compound are mediated by this nuclear receptor. - Highlights: → The azo dye and mouse carcinogen OAT is a very effective mCAR activator. → OAT increases mCAR transactivation in a dose-dependent manner. → OAT CAR-dependently increases the expression of a specific subset of CAR target genes. → OAT induces an unexpectedly deferred, but CAR-dependent hepatocyte proliferation.

  8. Crash protection of stock car racing drivers--application of biomechanical analysis of Indy car crash research.

    Science.gov (United States)

    Melvin, John W; Begeman, Paul C; Faller, Ronald K; Sicking, Dean L; McClellan, Scott B; Maynard, Edwin; Donegan, Michael W; Mallott, Annette M; Gideon, Thomas W

    2006-11-01

    Biomechanical analysis of Indy car crashes using on-board impact recorders (Melvin et al. 1998, Melvin et al. 2001) indicates that Indy car driver protection in high-energy crashes can be achieved in frontal, side, and rear crashes with severities in the range of 100 to 135 G peak deceleration and velocity changes in the range of 50 to 70 mph. These crashes were predominantly single-car impacts with the rigid concrete walls of oval tracks. This impressive level of protection was found to be due to the unique combination of a very supportive and tight-fitting cockpit-seating package, a six-point belt restraint system, and effective head padding with an extremely strong chassis that defines the seat and cockpit of a modern Indy car. In 2000 and 2001, a series of fatal crashes in stock car racing created great concern for improving the crash protection for drivers in those racecars. Unlike the Indy car, the typical racing stock car features a more spacious driver cockpit due to its resemblance to the shape of a passenger car. The typical racing seat used in stock cars did not have the same configuration or support characteristics of the Indy car seat, and five-point belt restraints were used. The tubular steel space frame chassis of a stock car also differs from an Indy car's composite chassis structure in both form and mechanical behavior. This paper describes the application of results of the biomechanical analysis of the Indy car crash studies to the unique requirements of stock car racing driver crash protection. Sled test and full-scale crash test data using both Hybrid III frontal crash anthropomorphic test devices (ATDs) and BioSID side crash ATDs for the purpose of evaluating countermeasures involving restraint systems, seats and head/neck restraints has been instrumental in guiding these developments. In addition, the development of deformable walls for oval tracks (the SAFER Barrier) is described as an adjunct to improved occupant restraint through control

  9. Smart brake light system would provide more information to drivers

    OpenAIRE

    Trulove, Susan

    2008-01-01

    You are driving in heavy traffic. The brake lights on the car in front of you come on. Is the car slowing or is it going to stop? It slows to 25 mph and the lights go off. You drop back. The car in front of you stops suddenly! You stop just in time. The car behind you collects your rear bumper.

  10. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  11. Stop feeling: Inhibition of emotional interference following stop-signal trials

    OpenAIRE

    Eyal eKalanthroff; Noga eCohen; Avishai eHenik

    2013-01-01

    Although a great deal of literature has been dedicated to the mutual links between emotion and the selective attention component of executive control, there is very little data regarding the links between emotion and the inhibitory component of executive control. In the current study we employed an emotional stop-signal task in order to examine whether emotion modulates and is modulated by inhibitory control. Results replicated previous findings showing reduced inhibitory control [longer stop...

  12. Modelling and optimization of car-to-car compatibility - Modellierung und optimierung von pkw-pkw-kompatibilität

    NARCIS (Netherlands)

    Mooi, H.G.; Nastic, T.; Huibers, J.H.A.M.

    1999-01-01

    In this paper simple and more detailed MADYMO multibody models were used to simulate the car structure for improving the car-to-car compatibility of the whole car fleet. As a first step, survey studies were performed to develop a method for the optimization of car design with respect to frontal and

  13. Car Covers | Outdoor Covers Canada

    OpenAIRE

    Covers, Outdoor

    2018-01-01

    Protect your car from the elements with Ultimate Touch Car Cover. The multi-layer non-woven fabric is soft on the finish and offers 4 seasons all weather protection.https://outdoorcovers.ca/car-covers/

  14. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  15. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  16. Nanobody Based Dual Specific CARs

    Directory of Open Access Journals (Sweden)

    Stijn De Munter

    2018-01-01

    Full Text Available Recent clinical trials have shown that adoptive chimeric antigen receptor (CAR T cell therapy is a very potent and possibly curative option in the treatment of B cell leukemias and lymphomas. However, targeting a single antigen may not be sufficient, and relapse due to the emergence of antigen negative leukemic cells may occur. A potential strategy to counter the outgrowth of antigen escape variants is to broaden the specificity of the CAR by incorporation of multiple antigen recognition domains in tandem. As a proof of concept, we here describe a bispecific CAR in which the single chain variable fragment (scFv is replaced by a tandem of two single-antibody domains or nanobodies (nanoCAR. High membrane nanoCAR expression levels are observed in retrovirally transduced T cells. NanoCARs specific for CD20 and HER2 induce T cell activation, cytokine production and tumor lysis upon incubation with transgenic Jurkat cells expressing either antigen or both antigens simultaneously. The use of nanobody technology allows for the production of compact CARs with dual specificity and predefined affinity.

  17. Nanobody Based Dual Specific CARs.

    Science.gov (United States)

    De Munter, Stijn; Ingels, Joline; Goetgeluk, Glenn; Bonte, Sarah; Pille, Melissa; Weening, Karin; Kerre, Tessa; Abken, Hinrich; Vandekerckhove, Bart

    2018-01-30

    Recent clinical trials have shown that adoptive chimeric antigen receptor (CAR) T cell therapy is a very potent and possibly curative option in the treatment of B cell leukemias and lymphomas. However, targeting a single antigen may not be sufficient, and relapse due to the emergence of antigen negative leukemic cells may occur. A potential strategy to counter the outgrowth of antigen escape variants is to broaden the specificity of the CAR by incorporation of multiple antigen recognition domains in tandem. As a proof of concept, we here describe a bispecific CAR in which the single chain variable fragment (scFv) is replaced by a tandem of two single-antibody domains or nanobodies (nanoCAR). High membrane nanoCAR expression levels are observed in retrovirally transduced T cells. NanoCARs specific for CD20 and HER2 induce T cell activation, cytokine production and tumor lysis upon incubation with transgenic Jurkat cells expressing either antigen or both antigens simultaneously. The use of nanobody technology allows for the production of compact CARs with dual specificity and predefined affinity.

  18. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    Institute of Scientific and Technical Information of China (English)

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  19. Interaction of the phosphorylated DNA-binding domain in nuclear receptor CAR with its ligand-binding domain regulates CAR activation.

    Science.gov (United States)

    Shizu, Ryota; Min, Jungki; Sobhany, Mack; Pedersen, Lars C; Mutoh, Shingo; Negishi, Masahiko

    2018-01-05

    The nuclear protein constitutive active/androstane receptor (CAR or NR1I3) regulates several liver functions such as drug and energy metabolism and cell growth or death, which are often involved in the development of diseases such as diabetes and hepatocellular carcinoma. CAR undergoes a conversion from inactive homodimers to active heterodimers with retinoid X receptor α (RXRα), and phosphorylation of the DNA-binding domain (DBD) at Thr-38 in CAR regulates this conversion. Here, we uncovered the molecular mechanism by which this phosphorylation regulates the intramolecular interaction between CAR's DBD and ligand-binding domain (LBD), enabling the homodimer-heterodimer conversion. Phosphomimetic substitution of Thr-38 with Asp increased co-immunoprecipitation of the CAR DBD with CAR LBD in Huh-7 cells. Isothermal titration calorimetry assays also revealed that recombinant CAR DBD-T38D, but not nonphosphorylated CAR DBD, bound the CAR LBD peptide. This DBD-LBD interaction masked CAR's dimer interface, preventing CAR homodimer formation. Of note, EGF signaling weakened the interaction of CAR DBD T38D with CAR LBD, converting CAR to the homodimer form. The DBD-T38D-LBD interaction also prevented CAR from forming a heterodimer with RXRα. However, this interaction opened up a CAR surface, allowing interaction with protein phosphatase 2A. Thr-38 dephosphorylation then dissociated the DBD-LBD interaction, allowing CAR heterodimer formation with RXRα. We conclude that the intramolecular interaction of phosphorylated DBD with the LBD enables CAR to adapt a transient monomer configuration that can be converted to either the inactive homodimer or the active heterodimer.

  20. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  1. A whistle-stop tour of statistics

    National Research Council Canada - National Science Library

    Everitt, Brian

    2012-01-01

    "Preface according to my Penguin English dictionary, whistle-stop, used before a noun means 'consisting of brief stops in several places' and this whistle-stop tour of statistics does just that, with...

  2. External exposure dose of car mechanics during the maintenance of the cars from the risk cautionary area

    International Nuclear Information System (INIS)

    Kawakami, Hiroto; Yamada, Norikazu; Sasaki, Satoru; Kawasaki, Satoru

    2011-12-01

    At the request of the Local Nuclear Emergency Response Headquarters, JNES has estimated the effective external exposure dose of car mechanics during the maintenance of the cars from the risk cautionary area. JNES investigated the contamination of the cars from the risk cautionary area and of the average cars at Fukushima city cooperated by the Japan Automobile Dealers Association. Data of screed cars by the Local Nuclear Emergency Response Headquarters is also considered in. Effective external exposure dose of car mechanics treating the cars screened with the emergency situation screening level is estimated to be less than 1 mSv/y under the conservative conditions. This result shows that particular health concern isn't necessary for them. (author)

  3. 49 CFR 215.121 - Defective car body.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Defective car body. 215.121 Section 215.121..., DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Freight Car Components Car Bodies § 215.121 Defective car body. A railroad may not place or continue in service a car, if: (a) Any portion of...

  4. Engineering CAR-T cells.

    Science.gov (United States)

    Zhang, Cheng; Liu, Jun; Zhong, Jiang F; Zhang, Xi

    2017-01-01

    Chimeric antigen receptor redirected T cells (CAR-T cells) have achieved inspiring outcomes in patients with B cell malignancies, and are now being investigated in other hematologic malignancies and solid tumors. CAR-T cells are generated by the T cells from patients' or donors' blood. After the T cells are expanded and genetically modified, they are reinfused into the patients. However, many challenges still need to be resolved in order for this technology to gain widespread adoption. In this review, we first discuss the structure and evolution of chimeric antigen receptors. We then report on the tools used for production of CAR-T cells. Finally, we address the challenges posed by CAR-T cells.

  5. Car sick.

    Science.gov (United States)

    Renner, M G

    1988-01-01

    The automobile is currently seen as the most desirable mode of transportation. However, this view needs to be changed since the proliferation of the automobile worldwide is leading to the poisoning of the environment and people. In the US the number of passenger cars grew 51% between 1971-86 and in the noncommunist industrialized community that figure is 71%. The gasoline and diesel fuel used to power the overwhelming majority of cars creates a variety of problems. The pollution is estimated to have a hidden cost of US $.80/gallon. Others estimate that the pollution causes 30,000 premature deaths annually just in the US. 75% of the carbon monoxide (CO), 48% of nitrogen oxides (NO2), 13% of particulates (P), and 3% of sulfur (S) emissions come from cars in the countries of the Organization for Economic Cooperation and Development (OECD), which includes the US, Canada, Western Europe, Japan, Australia, and New Zealand. 17% of all worldwide carbon dioxide (CO2) emission comes from the production and use of fossil fuels for cars. The single biggest problem associated with cars is the photochemical smog they create in urban areas. In 1986 75 million Americans lived in areas that failed to meet national air quality standards for CO, P, and ozone (03). The only area of major improvement has been the removal of lead from gasoline. It was known to cause problems from the beginning of its use in the 1920s, but remained for 50 years because of auto and oil company pressure. Ground 03 is estimated by the US government to cost US $4 billion in annual losses, just for corn, wheat, soybeans, and peanuts. Acid rain is the other major problem associated with cars, and its damage is estimated at US $5 billion annually. Both these problems are shortterm, their effects occur immediately; the longterm disadvantage is the build up of CO2 and its contribution to the greenhouse effect. While the US is at the forefront of regulation and many other countries are modeling their emission

  6. Developing a strategy to speed up large-scale adoption of compressed-natural-gas-driven (CNG) cars

    Energy Technology Data Exchange (ETDEWEB)

    Egmond, Cees; Houtman, Simone; Jonkers, R.; Gelissen, R. [SenterNovem (Netherlands)

    2007-07-01

    Large-scale adoption of environmentally friendly, clean, silent and CO{sub 2}-neutral technological innovations into the market is necessary to reduce the human causes of the greenhouse effect and global warming. In theory, an innovation diffuses smoothly into the market following an S-shaped curve when the number of adopters is plotted against time. In practice, diffusion of innovation does not move smoothly from left to right on the S-shaped curve. Fundamental differences in the adoption characteristics between the visionary early adopters and the pragmatic mainstream cause diffusion to stop before reaching the mainstream market segment. This 'chasm' in the diffusion process is not the result of bad technology or bad products, but rather the result of 'incomplete' products that do not meet the needs of the pragmatic mainstream. In this paper, we report on a case study, conducted in the Netherlands, aimed at speeding up the adoption of the CNG car. This study contains an analysis of the market segments within a target group of local fleet owners. We used survey data covering about 200 local fleet owners. Through structured interviews and a questionnaire, we identified a niche group of the mainstream that would be most likely to adopt the CNG car. This niche is the group to target in a marketing strategy aimed at crossing the chasm. A focus-group discussion held with members of the niche identified the conditions under which the niche actors would consider buying CNG cars. Based on the results of this focus group and the niche market analysis, we concluded that the marketing of the CNG car is still in its beginning phase and has to focus on the early market. Following our recommendations, car dealers and the municipality of Leeuwarden are now developing a plan for marketing the CNG car. The marketing will focus on the early market as the first step into the mainstream.

  7. Development of RaRaII solar car. Solar car RaRaII no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Ohashi, M [Toyota Motor Corp., Aichi (Japan)

    1991-05-31

    A solar car was developed to be able to travel, by utilizing solar energy, as a guiding car for the marathon race in the public road. That car is 210kg in weight, 1 in number of riding persons and 4.8m in smallest rotating radius. Its traveling performance is 44km h in highest speed, 10{degree} in hill-climbing ability and 0.6m s{sup 2} in acceleration. Those principal particulars satisfied the required condition of guiding car for the marathon race. That car was equipped with a polycrystalline silicon type solar cell, 6m{sup 2} in area to generate 870Wp power. A silver oxide-zinc battery, used as a secondary battery to secure traveling in case of rain, is of a performance to travel twice the marathon race road through. To satisfy the public road traveling in safety standard, that car was equipped with head lamps, wiper, direction winkers, rear-view mirrors, etc. As material of the body, aramid fiber and carbon fiber were adopted for securing the rigidity to cover the lightening in weight. That car, as used at an opportunity of intercollegiate marathon relay race, traveled a distance of about 30km which was its entire public road portion of course. 2 figs., 2 tabs.

  8. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  9. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  10. Engineering an Affordable Self-Driving Car

    KAUST Repository

    Budisteanu, Alexandru Ionut

    2018-01-01

    for affordable self-driving cars and he designed a low-cost self-driving car. The car's roof has cameras and low-resolution 3D LiDAR equipment to detect traffic lanes, other cars, curbs and obstacles, such as people crossing by. To process this dizzying amount

  11. 49 CFR 215.203 - Restricted cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Restricted cars. 215.203 Section 215.203..., DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Restricted Equipment § 215.203 Restricted cars. (a) This section restricts the operation of any railroad freight car that is— (1) More than 50...

  12. Our Car as Power Plant

    NARCIS (Netherlands)

    Van Wijk, A.J.M.; Verhoef, L.

    2014-01-01

    Fuel cell cars can provide more efficient and cleaner transportation. However, we use our cars for transportation only 5% of the time. When parked, the fuel cell in the car can produce electricity from hydrogen, which is cleaner and more efficient than the current electricity system, generating

  13. Driving CAR T-cells forward

    Science.gov (United States)

    Jackson, Hollie J.; Rafiq, Sarwish; Brentjens, Renier J.

    2017-01-01

    The engineered expression of chimeric antigen receptors (CARs) on the surface of T cells enables the redirection of T-cell specificity. Early clinical trials using CAR T cells for the treatment of patients with cancer showed modest results, but the impressive outcomes of several trials of CD19-targeted CAR T cells in the treatment of patients with B-cell malignancies have generated an increased enthusiasm for this approach. Important lessons have been derived from clinical trials of CD19-specific CAR T cells, and ongoing clinical trials are testing CAR designs directed at novel targets involved in haematological and solid malignancies. In this Review, we discuss these trials and present strategies that can increase the antitumour efficacy and safety of CAR T-cell therapy. Given the fast-moving nature of this field, we only discuss studies with direct translational application currently or soon-to-be tested in the clinical setting. PMID:27000958

  14. Substitution between cars within the household

    DEFF Research Database (Denmark)

    De Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    The purpose of this paper is to study to what extent two-car households substitute the use of their less fuel efficient car by the use of their more fuel efficient car after an increase in fuel prices. Based on a simple theoretical framework we use a large sample of detailed Danish data on two-car...... households to estimate, for each car owned by the household, own and cross-price effects of increases in fuel costs per kilometer. The empirical results point at important substitution effects, so that models that estimate responses to fuel prices on the implicit or explicit assumption of one car per...

  15. 49 CFR 174.615 - Cleaning cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cleaning cars. 174.615 Section 174.615... Requirements for Division 6.1 (Poisonous) Materials § 174.615 Cleaning cars. (a) [Reserved] (b) After Division 6.1 (poisonous) materials are unloaded from a rail car, that car must be thoroughly cleaned unless...

  16. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    OpenAIRE

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  17. Measurement of stopping power of heavy ions

    International Nuclear Information System (INIS)

    Kitahara, Tetsuo

    1981-01-01

    The stopping power of heavy ions is discussed. In the low energy region, heavy ions keep some of their orbital electrons, and have equilibrium electron charge. The stopping power of penetrating particles depends on this effective charge. At present, it is hard to estimate this effective charge theoretically, accordingly, the estimation is made experimentally. Another difficulty in this estimation is that the Born approximation is not effective for heavy ions. In the low energy region, electronic stopping and nuclear stopping contribute to the stopping power. For the electronic stopping, a formula for the stopping power was given by Lindhard et al. The experimental values were obtained at GSI, and are inconsistent with the estimation by the Lindhard's formula. In the high energy region, where the Born approximation can be used, the Bethe's formula is applied, but the experimental data are scarce. Oscillations are seen in the Z dependence graph of the experimental stopping cross sections. Experimental works on the stopping power have been done. The differential and the integral methods were carried out. (Kato, T.)

  18. Proton - Malaysia's national car project

    DEFF Research Database (Denmark)

    Fleming, Daniel; Søborg, Henrik

    2017-01-01

    The rise and development of the Malaysian national car project. How this project has become an esential part of the industrial development in Malaysia and how it has underpinned a growing middle class consumption culture with house and car as it pivotal goods.......The rise and development of the Malaysian national car project. How this project has become an esential part of the industrial development in Malaysia and how it has underpinned a growing middle class consumption culture with house and car as it pivotal goods....

  19. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  20. Demand for mini cars and large cars; decay effects, and gasoline demand in Japan

    International Nuclear Information System (INIS)

    Bonilla, David; Schmitz, Klaus E.; Akisawa, Atsushi

    2012-01-01

    This article explains why: (a) consumers underinvest in new car fuel economy by opting to buy large vehicles; (b) macro shifts in vehicle classes have occurred in the last decades; and how (c) the effects of vehicle fuel economy and shifts in vehicle type influence the growth path of gasoline demand, which is the key to designing effective energy efficiency goals for transport. From 2008, 1.9 EXJ (Exajoules) of energy were consumed in Japan by private vehicles producing 124 MtCO 2 emissions. For the period 1980 to 2008, we estimated: (1) gasoline demand for three vehicle sizes; (2) vehicle sales; (3) new car fuel economy changes (the ‘real’ technical change); and (4) vehicle stocks. Using a data sample for 1980–2008 we found that: (a) in the short term consumers buy fuel economy, that is sales of mini and small cars increase, but this is not sustained in the long term: and (b) consumers increasingly traded in their cars for larger cars. A further finding was that gasoline demand is projected to increase to 2.3 EXJ by 2035, even with a growing number of mini cars. The policy implication is clear: Japan’s policy to reduce oil dependency to 80% by 2030 is in peril as long as buyers prefer larger cars and drive ever longer distances.

  1. Are weeds hitchhiking a ride on your car? A systematic review of seed dispersal on cars.

    Directory of Open Access Journals (Sweden)

    Michael Ansong

    Full Text Available When traveling in cars, we can unintentionally carry and disperse weed seed; but which species, and where are they a problem? To answer these questions, we systematically searched the scientific literature to identify all original research studies that assess seed transported by cars and listed the species with seed on/in cars. From the 13 studies that fit these criteria, we found 626 species from 75 families that have seed that can be dispersed by cars. Of these, 599 are listed as weeds in some part of the world, with 439 listed as invasive or naturalized alien species in one or more European countries, 248 are invasive/noxious weeds in North America, 370 are naturalized alien species in Australia, 167 are alien species in India, 77 are invasive species in China and 23 are declared weeds/invaders in South Africa. One hundred and one are classified as internationally important environmental weeds. Although most (487 were only recorded once, some species such as Chenopodium album, Poa pratensis and Trifolium repens were common among studies. Perennial graminoids seem to be favoured over annual graminoids while annual forbs are favoured over perennial forbs. Species characteristics including seed size and morphology and where the plants grew affected the probability that their seed was transported by cars. Seeds can be found in many different places on cars including under the chassis, front and rear bumpers, wheel wells and rims, front and back mudguards, wheel arches, tyres and on interior floor mats. With increasing numbers of cars and expanding road networks in many regions, these results highlight the importance of cars as a dispersal mechanism, and how it may favour invasions by some species over others. Strategies to reduce the risk of seed dispersal by cars include reducing seed on cars by mowing road verges and cleaning cars.

  2. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  3. SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet access

    OpenAIRE

    Boudguiga , Aymen; Quesnel , Flavien; Bouzerna , Nabil

    2017-01-01

    International audience; A blockchain infrastructure, combined with cryptographic signatures, can improve availability and accountability for the deployment of IoT updates.However, cars with limited or intermittent Internet access may have difficulties in downloading full updates fromthe blockchain. Therefore, we allow cars that successfully downloaded updates to share them with other cars by means of a Peer-to-Peer (P2P) mechanism.

  4. GLYCAN-DIRECTED CAR-T CELLS.

    Science.gov (United States)

    Steentoft, Catharina; Migliorini, Denis; King, Tiffany R; Mandel, Ulla; June, Carl H; Posey, Avery D

    2018-01-23

    Cancer immunotherapy is rapidly advancing in the treatment of a variety of hematopoietic cancers, including pediatric acute lymphoblastic leukemia and diffuse large B cell lymphoma, with chimeric antigen receptor (CAR)-T cells. CARs are genetically encoded artificial T cell receptors that combine the antigen specificity of an antibody with the machinery of T cell activation. However, implementation of CAR technology in the treatment of solid tumors has been progressing much slower. Solid tumors are characterized by a number of challenges that need to be overcome, including cellular heterogeneity, immunosuppressive tumor microenvironment (TME), and, in particular, few known cancer-specific targets. Post-translational modifications that differentially occur in malignant cells generate valid cell surface, cancer-specific targets for CAR-T cells. We previously demonstrated that CAR-T cells targeting an aberrant O-glycosylation of MUC1, a common cancer marker associated with changes in cell adhesion, tumor growth, and poor prognosis, could control malignant growth in mouse models. Here, we discuss the field of glycan-directed CAR-T cells and review the different classes of antibodies specific for glycan-targeting, including the generation of high affinity O-glycopeptide antibodies. Finally, we discuss historic and recently investigated glycan targets for CAR-T cells and provide our perspective on how targeting the tumor glycoproteome and/or glycome will improve CAR-T immunotherapy. © The Author(s) 2018. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. 49 CFR 231.6 - Flat cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Flat cars. 231.6 Section 231.6 Transportation... TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.6 Flat cars. (Cars with sides 12 inches or less above the floor may be equipped the same as flat cars.) (a) Hand brakes—(1) Number. Same as specified for...

  6. Engineering an Affordable Self-Driving Car

    KAUST Repository

    Budisteanu, Alexandru Ionut

    2018-01-17

    "More than a million people die in car accidents each year, and most of those accidents are the result of human errorヤ Alexandru Budisteanu is 23 years old and owns a group of startups including Autonomix, an Artificial Intelligence software for affordable self-driving cars and he designed a low-cost self-driving car. The car\\'s roof has cameras and low-resolution 3D LiDAR equipment to detect traffic lanes, other cars, curbs and obstacles, such as people crossing by. To process this dizzying amount of data, Alexandru employed Artificial Intelligence algorithms to extract information from the visual data and plot a safe route for the car. Then, he built a manufacturing facility in his garage from Romania to assembly affordable VisionBot Pick and Place robots that are used to produce electronics. During this lecture, Alexandru will talk about this autonomous self-driving car prototype, for which he received the grand prize of the Intel International Science and Engineering Fair, and was nominated by TIME magazine as one of the worldメs most influential teens of 2013.

  7. Slow, stopped and stored light

    International Nuclear Information System (INIS)

    Welch, G.; Scully, M.

    2005-01-01

    Light that can been slowed to walking pace could have applications in telecommunications, optical storage and quantum computing. Whether we use it to estimate how far away a thunderstorm is, or simply take it for granted that we can have a conversation with someone on the other side of the world, we all know that light travels extremely fast. Indeed, special relativity teaches us that nothing in the universe can ever move faster than the speed of light in a vacuum: 299 792 458 ms sup - sup 1. However, there is no such limitation on how slowly light can travel. For the last few years, researchers have been routinely slowing light to just a few metres per second, and have recently even stopped it dead in its tracks so that it can be stored for future use. Slow-light has considerable popular appeal, deriving perhaps from the importance of the speed of light in relativity and cosmology. If everyday objects such as cars or people can travel faster than 'slow' light, for example, then it might appear that relativistic effects could be observed at very low speeds. Although this is not the case, slow light nonetheless promises to play an important role in optical technology because it allows light to be delayed for any period of time desired. This could lead to all-optical routers that would increase the bandwidth of the Internet, and applications in optical data storage, quantum information and even radar. (U.K.)

  8. CAR-T cells are serial killers.

    Science.gov (United States)

    Davenport, Alexander J; Jenkins, Misty R; Ritchie, David S; Prince, H Miles; Trapani, Joseph A; Kershaw, Michael H; Darcy, Phillip K; Neeson, Paul J

    2015-12-01

    Chimeric antigen receptor (CAR) T cells have enjoyed unprecedented clinical success against haematological malignancies in recent years. However, several aspects of CAR T cell biology remain unknown. We recently compared CAR and T cell receptor (TCR)-based killing in the same effector cell and showed that CAR T cells can not only efficiently kill single tumor targets, they can also kill multiple tumor targets in a sequential manner. Single and serial killing events were not sustained long term due to CAR down-regulation after 20 hours.

  9. South Asia and the Nuclear Future: Rethinking the Causes and Consequences of Nuclear Proliferation

    National Research Council Canada - National Science Library

    Sechser, Todd S

    2004-01-01

    ... theft, and stop the further spread of nuclear weapons. Analyses of Indian and Pakistani nuclear behavior must consider the domestic political motivations of key decisionmakers and not just national security interests...

  10. Art Cars: Transformations of the Mundane

    Science.gov (United States)

    Stienecker, Dawn

    2010-01-01

    The automobile itself is often understood as an extension of oneself, where individuals may manipulate the interior and exterior of cars and trucks, decorating them through detailing, stickers, custom colors, and so on. Others go further and change their cars into unique works of art called art cars. Such cars break away from the banality of mass…

  11. Substitution between cars within the household

    DEFF Research Database (Denmark)

    De Borger, Bruno; Mulalic, Ismir; Rouwendal, Jan

    2016-01-01

    In this paper we study the demand for car kilometres in two-car households, focusing on the substitution between cars of different fuel efficiency in response to fuel price changes. We use a large sample of detailed Danish data on two-car households to estimate – for each car owned by the household...... – own and cross-price effects of increases in fuel costs per kilometre. The empirical results show that failure to capture substitution between cars within the household can result in substantial misspecification biases. Ignoring substitution, the basic model yielded fuel price elasticities of 0.......98 and 1.41 for the primary and secondary cars, respectively. Accounting for substitution effects, these figures reduce to, respectively, 0.32 and 0.45. Consistent with substitution behaviour, we find that the fuel price elasticity of fuel demand exceeds the elasticity of kilometre demands with respect...

  12. 49 CFR 238.311 - Single car test.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Single car test. 238.311 Section 238.311... Requirements for Tier I Passenger Equipment § 238.311 Single car test. (a) Except for self-propelled passenger cars, single car tests of all passenger cars and all unpowered vehicles used in passenger trains shall...

  13. 20 CFR 662.430 - Under what conditions may One-Stop operators designated to operate in a One-Stop delivery system...

    Science.gov (United States)

    2010-04-01

    ... designated to operate in a One-Stop delivery system established prior to the enactment of WIA be designated... DESCRIPTION OF THE ONE-STOP SYSTEM UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT One-Stop Operators § 662.430 Under what conditions may One-Stop operators designated to operate in a One-Stop delivery system...

  14. ADULTEROUS BEHAVIOUR WITHIN THE CAR-OWNER COUPLE

    Directory of Open Access Journals (Sweden)

    Francis PAPON

    2008-01-01

    Full Text Available The objective of this paper was to analyse two activities: who rents a car and why? Which households share the driving of their cars? In order to do that, the Parc-Auto (Car-Fleet database, built from annual postal surveys conducted with a panel of 10,000 French households, has been processed. Among approximately one hundred questions in the survey, two key questions have been crossed against many social, economic, demographic, geographic or time variables. KQ1: “During the last 12 months, did you — or another person from your home — rent a car in France for personal purposes?” KQ2: “Is this car occasionally used by other persons?” Here are the main findings. Renting households are mainly working, high income households, living in the core of big cities, and in particular in Paris. Most of them have two wage-sheets and two cars, one of which is generally a recent, high power, high quality car. Car rental is mainly an occasional practice. Yet for a minority of renters, it is a sustained habit. Households with more licence holders than cars share the most: about three quarters of them share their cars. On the contrary, single driver-single car households have less opportunity to share: only 15% share. Household car sharing shed light on the gender role within households: while 58% of the main users of the shared cars are male, 55% of secondary users are female. Household car sharing is mainly a regular practice. Finally, without diminishing the merits of innovative transport solutions proposed here and there, it is not a waste of time to give some insight on self established behaviour within households. This reveals that complex patterns have been built over time by the people themselves, to cope with diverse situations that cannot be easily handled by straightforward classifications. The car cannot be reduced to a personal object. Household car sharing also carries strong links with the issue of car dependency. Sifting car

  15. Clinical trials of CAR-T cells in China.

    Science.gov (United States)

    Liu, Bingshan; Song, Yongping; Liu, Delong

    2017-10-23

    Novel immunotherapeutic agents targeting tumor-site microenvironment are revolutionizing cancer therapy. Chimeric antigen receptor (CAR)-engineered T cells are widely studied for cancer immunotherapy. CD19-specific CAR-T cells, tisagenlecleucel, have been recently approved for clinical application. Ongoing clinical trials are testing CAR designs directed at novel targets involved in hematological and solid malignancies. In addition to trials of single-target CAR-T cells, simultaneous and sequential CAR-T cells are being studied for clinical applications. Multi-target CAR-engineered T cells are also entering clinical trials. T cell receptor-engineered CAR-T and universal CAR-T cells represent new frontiers in CAR-T cell development. In this study, we analyzed the characteristics of CAR constructs and registered clinical trials of CAR-T cells in China and provided a quick glimpse of the landscape of CAR-T studies in China.

  16. Perceptual assessment of fricative--stop coarticulation.

    Science.gov (United States)

    Repp, B H; Mann, V A

    1981-04-01

    The perceptual dependence of stop consonants on preceding fricatives [Mann and Repp, J. Acoust. Soc. Am. 69, 548--558 (1981)] was further investigated in two experiments employing both natural and synthetic speech. These experiments consistently replicated our original finding that listeners, report velar stops following [s]. In addition, our data confirmed earlier reports that natural fricative noises (excerpted from utterances of [st alpha], [sk alpha], [(formula: see text)k alpha]) contain cues to the following stop consonants; this was revealed in subjects' identifications of stops from isolated fricative noises and from stimuli consisting of these noises followed by synthetic CV portions drawn from a [t alpha]--[k alpha] continuum. However, these cues in the noise portion could not account for the contextual effect of fricative identity ([formula: see text] versus [sp) on stop perception (more "k" responses following [s]). Rather, this effect seems to be related to a coarticulatory influence of a preceding fricative on stop production; Subjects' responses to excised natural CV portions (with bursts and aspiration removed) were biased towards a relatively more forward place of stop articulation when the CVs had originally been preceded by [s]; and the identification of a preceding ambiguous fricative was biased in the direction of the original fricative context in which a given CV portion had been produced. These findings support an articulatory explanation for the effect of preceding fricatives on stop consonant perception.

  17. Clinical trials of CAR-T cells in China

    Directory of Open Access Journals (Sweden)

    Bingshan Liu

    2017-10-01

    Full Text Available Abstract Novel immunotherapeutic agents targeting tumor-site microenvironment are revolutionizing cancer therapy. Chimeric antigen receptor (CAR-engineered T cells are widely studied for cancer immunotherapy. CD19-specific CAR-T cells, tisagenlecleucel, have been recently approved for clinical application. Ongoing clinical trials are testing CAR designs directed at novel targets involved in hematological and solid malignancies. In addition to trials of single-target CAR-T cells, simultaneous and sequential CAR-T cells are being studied for clinical applications. Multi-target CAR-engineered T cells are also entering clinical trials. T cell receptor-engineered CAR-T and universal CAR-T cells represent new frontiers in CAR-T cell development. In this study, we analyzed the characteristics of CAR constructs and registered clinical trials of CAR-T cells in China and provided a quick glimpse of the landscape of CAR-T studies in China.

  18. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  19. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  20. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  1. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  2. AAP Updates Recommendations on Car Seats

    Science.gov (United States)

    ... Size Email Print Share AAP Updates Recommendations on Car Seats Page Content Article Body Children should ride ... of approved car safety seats. Healthy Children Radio: Car Seat Safety Dennis Durbin, MD, FAAP, lead author ...

  3. Stopping of hypervelocity clusters in solids

    International Nuclear Information System (INIS)

    Anders, Christian; Ziegenhain, Gerolf; Urbassek, Herbert M; Bringa, Eduardo M

    2011-01-01

    Using molecular-dynamics simulations, we study the processes underlying the stopping of energetic clusters upon impact in matter. We investigate self-bombardment of both a metallic (Cu) and a van-der-Waals bonded (frozen Ar) target. Clusters with sizes up to N = 10 4 atoms and with energies per atom of E/N = 0.1-1600 eV atom -1 were studied. We find that the stopping force exerted on a cluster follows an N 2/3 -dependence with cluster size N; thus large clusters experience less stopping than equi-velocity atoms. In the course of being stopped, the cluster is strongly deformed and attains a roughly pancake shape. Due to the cluster inertia, maximum deformation occurs later than the maximum stopping force. The time scale of projectile stopping is set by t 0 , the time the cluster needs to cover its own diameter before impacting the target; it thus depends on both cluster size and velocity. The time when the cluster experiences its maximum stopping force is around (0.7-0.8)t 0 . We find that the cluster is deformed with huge strain rates of around 1/2t 0 ; this amounts to 10 11 -10 13 s -1 for the cases studied here. (paper)

  4. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Document Server

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  5. Seatbelts in CAR therapy: How Safe Are CARS?

    Directory of Open Access Journals (Sweden)

    Kentaro Minagawa

    2015-05-01

    Full Text Available T-cells genetically redirected with a chimeric antigen receptor (CAR to recognize tumor antigens and kill tumor cells have been infused in several phase 1 clinical trials with success. Due to safety concerns related to on-target/off-tumor effects or cytokine release syndrome, however, strategies to prevent or abate serious adverse events are required. Pharmacologic therapies; suicide genes; or novel strategies to limit the cytotoxic effect only to malignant cells are under active investigations. In this review, we summarize results and toxicities of investigations employing CAR redirected T-cells, with a focus on published strategies to grant safety of this promising cellular application.

  6. Evaluating the Effects of Traffic on Driver Stopping and Turn Signal Use at a Stop Sign: A Systematic Replication

    Science.gov (United States)

    Lebbon, Angela R.; Austin, John; Van Houten, Ron; Malenfant, Louis E.

    2007-01-01

    The current analyses of observational data found that oncoming traffic substantially affected driver stopping patterns and turn signal use at the target stop sign. The percentage of legal stops and turn signal use by drivers in the presence and absence of traffic was analyzed using a multi-element design. The results showed that legal stops were…

  7. How Can I Stop Cutting?

    Science.gov (United States)

    ... Educators Search English Español How Can I Stop Cutting? KidsHealth / For Teens / How Can I Stop Cutting? ... in a soft, cozy blanket Substitutes for the Cutting Sensation You'll notice that all the tips ...

  8. Intelligent Bus Stops in the Flexible Bus Systems

    Directory of Open Access Journals (Sweden)

    Razi Iqbal

    2014-09-01

    Full Text Available The purpose of this paper is to discuss Intelligent Bus Stops in a special Demand Responsive Transit (DRT, the Flexible Bus System. These Intelligent Bus Stops are more efficient and information rich than Traditional Bus Stops. The real time synchronization of the Flexible Bus System makes it unique as compared to Traditional Bus Systems. The Main concern is to make Bus Stops intelligent and information rich. Buses are informed about the no. of passengers waiting at the upcoming Bus Stops. If there are no passengers to ride or get off on upcoming Bus Stop, the Bus can skip that Bus Stop and head towards the next Bus Stop where passenger is waiting, which will decrease the ride time of the passengers on the Bus and also the wait time of the passengers waiting on the upcoming Bus Stops. Providing more information at Bus Stops about the Destination (Time to Destination, Distance to Destination etc. and Buses (Bus Location, Arrival Time of Bus etc. makes it easier for the passengers to decide whether to ride a particular Bus or not.

  9. DOES ELECTRIC CAR PRODUCE EMISSIONS?

    Directory of Open Access Journals (Sweden)

    Vladimír RIEVAJ

    2017-03-01

    Full Text Available This article focuses on the comparison of the amount of emissions produced by vehicles with a combustion engine and electric cars. The comparison, which is based on the LCA factor results, indicates that an electric car produces more emissions than a vehicle with combustion engine. The implementation of electric cars will lead to an increase in the production of greenhouse gases.

  10. Parents smoking in their cars with children present.

    Science.gov (United States)

    Nabi-Burza, Emara; Regan, Susan; Drehmer, Jeremy; Ossip, Deborah; Rigotti, Nancy; Hipple, Bethany; Dempsey, Janelle; Hall, Nicole; Friebely, Joan; Weiley, Victoria; Winickoff, Jonathan P

    2012-12-01

    To determine prevalence and factors associated with strictly enforced smoke-free car policies among smoking parents. As part of a cluster, randomized controlled trial addressing parental smoking, exit interviews were conducted with parents whose children were seen in 10 control pediatric practices. Parents who smoked were asked about smoking behaviors in their car and receipt of smoke-free car advice at the visit. Parents were considered to have a "strictly enforced smoke-free car policy" if they reported having a smoke-free car policy and nobody had smoked in their car within the past 3 months. Of 981 smoking parents, 817 (83%) had a car; of these, 795 parents answered questions about their car smoking policy. Of these 795 parents, 29% reported having a smoke-free car policy, and 24% had a strictly enforced smoke-free car policy. Of the 562 parents without a smoke-free car policy, 48% reported that smoking occurred with children present. Few parents who smoke (12%) were advised to have a smoke-free car. Multivariable logistic regression controlling for parent age, gender, education, and race showed that having a younger child and smoking ≤10 cigarettes per day were associated with having a strictly enforced smoke-free car policy. The majority of smoking parents exposed their children to tobacco smoke in cars. Coupled with the finding of low rates of pediatricians addressing smoking in cars, this study highlights the need for improved pediatric interventions, public health campaigns, and policies regarding smoke-free car laws to protect children from tobacco smoke.

  11. Aerodynamics of Race Cars

    Science.gov (United States)

    Katz, Joseph

    2006-01-01

    Race car performance depends on elements such as the engine, tires, suspension, road, aerodynamics, and of course the driver. In recent years, however, vehicle aerodynamics gained increased attention, mainly due to the utilization of the negative lift (downforce) principle, yielding several important performance improvements. This review briefly explains the significance of the aerodynamic downforce and how it improves race car performance. After this short introduction various methods to generate downforce such as inverted wings, diffusers, and vortex generators are discussed. Due to the complex geometry of these vehicles, the aerodynamic interaction between the various body components is significant, resulting in vortex flows and lifting surface shapes unlike traditional airplane wings. Typical design tools such as wind tunnel testing, computational fluid dynamics, and track testing, and their relevance to race car development, are discussed as well. In spite of the tremendous progress of these design tools (due to better instrumentation, communication, and computational power), the fluid dynamic phenomenon is still highly nonlinear, and predicting the effect of a particular modification is not always trouble free. Several examples covering a wide range of vehicle shapes (e.g., from stock cars to open-wheel race cars) are presented to demonstrate this nonlinear nature of the flow field.

  12. Developing a strategy to speed up large-scale adoption of compressed-natural-gas-driven (CNG) cars. Volume 1

    International Nuclear Information System (INIS)

    Egmond, Cees; Houtman, Simone; Jonkers, R.; Gelissen, R.

    2007-01-01

    Large-scale adoption of environmentally friendly, clean, silent and CO 2 -neutral technological innovations into the market is necessary to reduce the human causes of the greenhouse effect and global warming. In theory, an innovation diffuses smoothly into the market following an S-shaped curve when the number of adopters is plotted against time. In practice, diffusion of innovation does not move smoothly from left to right on the S-shaped curve. Fundamental differences in the adoption characteristics between the visionary early adopters and the pragmatic mainstream cause diffusion to stop before reaching the mainstream market segment. This 'chasm' in the diffusion process is not the result of bad technology or bad products, but rather the result of 'incomplete' products that do not meet the needs of the pragmatic mainstream. In this paper, we report on a case study, conducted in the Netherlands, aimed at speeding up the adoption of the CNG car. This study contains an analysis of the market segments within a target group of local fleet owners. We used survey data covering about 200 local fleet owners. Through structured interviews and a questionnaire, we identified a niche group of the mainstream that would be most likely to adopt the CNG car. This niche is the group to target in a marketing strategy aimed at crossing the chasm. A focus-group discussion held with members of the niche identified the conditions under which the niche actors would consider buying CNG cars. Based on the results of this focus group and the niche market analysis, we concluded that the marketing of the CNG car is still in its beginning phase and has to focus on the early market. Following our recommendations, car dealers and the municipality of Leeuwarden are now developing a plan for marketing the CNG car. The marketing will focus on the early market as the first step into the mainstream

  13. Developing a strategy to speed up large-scale adoption of compressed-natural-gas-driven (CNG) cars. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Egmond, Cees; Houtman, Simone; Jonkers, R.; Gelissen, R. [SenterNovem (Netherlands)

    2007-07-01

    Large-scale adoption of environmentally friendly, clean, silent and CO{sub 2}-neutral technological innovations into the market is necessary to reduce the human causes of the greenhouse effect and global warming. In theory, an innovation diffuses smoothly into the market following an S-shaped curve when the number of adopters is plotted against time. In practice, diffusion of innovation does not move smoothly from left to right on the S-shaped curve. Fundamental differences in the adoption characteristics between the visionary early adopters and the pragmatic mainstream cause diffusion to stop before reaching the mainstream market segment. This 'chasm' in the diffusion process is not the result of bad technology or bad products, but rather the result of 'incomplete' products that do not meet the needs of the pragmatic mainstream. In this paper, we report on a case study, conducted in the Netherlands, aimed at speeding up the adoption of the CNG car. This study contains an analysis of the market segments within a target group of local fleet owners. We used survey data covering about 200 local fleet owners. Through structured interviews and a questionnaire, we identified a niche group of the mainstream that would be most likely to adopt the CNG car. This niche is the group to target in a marketing strategy aimed at crossing the chasm. A focus-group discussion held with members of the niche identified the conditions under which the niche actors would consider buying CNG cars. Based on the results of this focus group and the niche market analysis, we concluded that the marketing of the CNG car is still in its beginning phase and has to focus on the early market. Following our recommendations, car dealers and the municipality of Leeuwarden are now developing a plan for marketing the CNG car. The marketing will focus on the early market as the first step into the mainstream.

  14. Ground effect aerodynamics of racing cars

    OpenAIRE

    Zhang, Xin; Toet, Willem; Zerihan, Jonathan

    2006-01-01

    We review the progress made during the last thirty years on ground effect aerodynamics associated with race cars, in particular open wheel race cars. Ground effect aerodynamics of race cars is concerned with generating downforce, principally via low pressure on the surfaces nearest to the ground. The “ground effected” parts of an open wheeled car's aerodynamics are the most aerodynamically efficient and contribute less drag than that associated with, for example, an upper rear wing. Whilst dr...

  15. 49 CFR 210.9 - Movement of a noise defective locomotive, rail car, or consist of a locomotive and rail cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Movement of a noise defective locomotive, rail car, or consist of a locomotive and rail cars. 210.9 Section 210.9 Transportation Other Regulations... locomotive, rail car, or consist of a locomotive and rail cars. A locomotive, rail car, or consist of a...

  16. Biobjective Optimization and Evaluation for Transit Signal Priority Strategies at Bus Stop-to-Stop Segment

    Directory of Open Access Journals (Sweden)

    Rui Li

    2016-01-01

    Full Text Available This paper proposes a new optimization framework for the transit signal priority strategies in terms of green extension, red truncation, and phase insertion at the stop-to-stop segment of bus lines. The optimization objective is to minimize both passenger delay and the deviation from bus schedule simultaneously. The objective functions are defined with respect to the segment between bus stops, which can include the adjacent signalized intersections and downstream bus stops. The transit priority signal timing is optimized by using a biobjective optimization framework considering both the total delay at a segment and the delay deviation from the arrival schedules at bus stops. The proposed framework is evaluated using a VISSIM model calibrated with field traffic volume and traffic signal data of Caochangmen Boulevard in Nanjing, China. The optimized TSP-based phasing plans result in the reduced delay and improved reliability, compared with the non-TSP scenario under the different traffic flow conditions in the morning peak hour. The evaluation results indicate the promising performance of the proposed optimization framework in reducing the passenger delay and improving the bus schedule adherence for the urban transit system.

  17. The kinematic advantage of electric cars

    Science.gov (United States)

    Meyn, Jan-Peter

    2015-11-01

    Acceleration of a common car with with a turbocharged diesel engine is compared to the same type with an electric motor in terms of kinematics. Starting from a state of rest, the electric car reaches a distant spot earlier than the diesel car, even though the latter has a better specification for engine power and average acceleration from 0 to 100 km h-1. A three phase model of acceleration as a function of time fits the data of the electric car accurately. The first phase is a quadratic growth of acceleration in time. It is shown that the tenfold higher coefficient for the first phase accounts for most of the kinematic advantage of the electric car.

  18. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  19. Bubble formation after a 20-m dive: deep-stop vs. shallow-stop decompression profiles

    NARCIS (Netherlands)

    Schellart, Nico A. M.; Corstius, Jan-Jaap Brandt; Germonpré, Peter; Sterk, Wouter

    2008-01-01

    OBJECTIVES: It is claimed that performing a "deep stop," a stop at about half of maximal diving depth (MDD), can reduce the amount of detectable precordial bubbles after the dive and may thus diminish the risk of decompression sickness. In order to ascertain whether this reduction is caused by the

  20. Active deceleration support in car following

    NARCIS (Netherlands)

    Mulder, M.; Pauwelussen, J.J.A.; Paassen, M.M. van; Mulder, M.; Abbink, D.A.

    2010-01-01

    A haptic gas pedal feedback system is developed that provides car-following information via haptic cues from the gas pedal. During normal car-following situations, the haptic feedback (HF) cues were sufficient to reduce control activity and improve car-following performance. However, in more

  1. Passenger car fuel consumption survey

    Energy Technology Data Exchange (ETDEWEB)

    1984-03-01

    This survey originated from a proposal to monitor the fuel consumption and fuel economy of personal use passenger cars operated in Canada. Its purpose is to establish a data base which would contain information on total distance travelled, total amount of fuel consumed, average distance obtained per unit of fuel, total expenditures on fuel, and seasonal fluctuations in fuel consumption and in distance travelled. Among the needs served by this data base are the monitoring of passenger car fuel economy standards and the estimation of pasenger car fuel requirements in conditions involving fuel shortages. Survey methodology is by telephone interview to trace selected vehicles to the registered owners, at which time a fuel purchase diary is then mailed to the principal driver of the car. The results are tabulated on a quarterly basis and to be released as they become available in bulletins similar to this. Data are presented for each province and the total for Canada is given. During the fourth quarter of 1982, it is estimated that there were 7.3 million personal use passenger cars operated in Canada. These cars were driven 28 billion kilometers and consumed 4.3 billion litres of fuel. Their average litres/100 kilometres and the average fuel consumption was 590 litres. 8 tabs.

  2. 30 CFR 57.19079 - Blocking mine cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Blocking mine cars. 57.19079 Section 57.19079... Hoisting Procedures § 57.19079 Blocking mine cars. Where mine cars are hoisted by cage or skip, means for blocking cars shall be provided at all landings and also on the cage. ...

  3. 30 CFR 56.19079 - Blocking mine cars.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Blocking mine cars. 56.19079 Section 56.19079... Hoisting Procedures § 56.19079 Blocking mine cars. Where mine cars are hoisted by cage or skip, means for blocking cars shall be provided at all landings and also on the cage. ...

  4. Prediction of future car forms based on historical trends

    Directory of Open Access Journals (Sweden)

    Bijendra Kumar

    2016-09-01

    Full Text Available Cars are one of the most important products that affects our daily life. Manufacturers of cars are inclined to know factors that affect the sales of cars and how to influence them. Car is a very competitive product whose technology is already matured. Thus, purchase decisions of a car depend on factors such as, aesthetics, ergonomics, features available and price. Exterior form and colour of a car are the most important factors that influence likeness of the car. We did a case study on car aesthetics (form, colour, shape, and user focus with more than 500 car advertisements over the past 70 years, appearing in various car magazines. Results show that form of cars has changed from sharp to smooth over the years, and white colour cars are becoming more popular. Additionally, car size is becoming smaller and increasingly focused towards family. Thus, manufacturers are recommended to develop compact, efficient and hybrid cars.

  5. 49 CFR 174.57 - Cleaning cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Cleaning cars. 174.57 Section 174.57... and Loading Requirements § 174.57 Cleaning cars. All hazardous material which has leaked from a package in any rail car or on other railroad property must be carefully removed. ...

  6. Car Builder: Design, Construct and Test Your Own Cars. School Version with Lesson Plans. [CD-ROM].

    Science.gov (United States)

    Highsmith, Joni Bitman

    Car Builder is a scientific CD-ROM-based simulation program that lets students design, construct, modify, test, and compare their own cars. Students can design sedans, four-wheel-drive vehicles, vans, sport cars, and hot rods. They may select for aerodynamics, power, and racing ability, or economic and fuel efficiency. It is a program that teaches…

  7. CAN PUBLIC TRANSPORT COMPETE WITH THE PRIVATE CAR?

    Directory of Open Access Journals (Sweden)

    Linda STEG

    2003-01-01

    Full Text Available Public transport is often perceived to be a poor alternative for car use. This paper describes who may be open to use public transport more often, and how people might be persuaded to use it. A computerised questionnaire study was conducted among 1,803 Dutch respondents in May 2001. Results revealed that especially fervent car users disliked public transport. For them, the car outperformed public transport not only because of its instrumental function, but also because the car represents cultural and psychological values, e.g. the car is a symbol of freedom and independence, a status symbol and driving is pleasurable. So, for fervent car users, car use is connected with various important values in modern society. Infrequent car users judged less positively about the car and less negatively about public transport. Consequently, they may be open to use public transport more regularly. In contrast, many efforts are needed to stimulate fervent car users to travel by public transport, because in their view, public transport cannot compete with their private car. In this case, policies should be aimed at reducing the functional, psychological and cultural values of private cars, as well as increasing the performance of public transport and other (more environmentally sound modes of transport on these aspects.

  8. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  9. 77 FR 44258 - Agency Information Collection Activities: Exportation of Used Self-Propelled Vehicles

    Science.gov (United States)

    2012-07-27

    ... clarity of the information to be collected; (d) ways to minimize the burden including the use of automated... 401 of the Anti-Car Theft Act of 1992, 19 U.S.C. 1646(c) which requires all persons or entities...

  10. Optimal Stopping and Policyholder Behaviour in Life Insurance

    DEFF Research Database (Denmark)

    Gad, Kamille Sofie Tågholt

    . Below, I give a brief overview of the results of each of the chapters. A more thorough overview is presented in Chapter 1. In Chapter 2 we consider a general geometric Lévy process and solve the non-linear optimal stopping problem of maximizing the variance at the stopping time. For solving this problem...... we solve an auxiliary quadratic optimal stopping problem. We show that the solution to maximizing variance depends on whether randomized stopping times are included in the set of stopping times we maximize over. For some problems the inclusion of randomized stopping times increase the value function...... and for some it does not. Even when the value function is not affected by inclusion of randomized stopping times, a solution may be easier to identify when they are. In Chapter 3 we consider the non-linear optimal stopping problem of maximizing the mean minus a positive constant times the variance...

  11. Solar Powered Heat Control System for Cars

    OpenAIRE

    Abin John; Jithin Thomas

    2014-01-01

    It takes times for an air-conditioner to effectively start cooling the passenger compartment in the car. So the passenger of the car will feel the heat in the car extremely before the air-conditioner fully cooling the interior of the car. Excessive heat can also damage an automobile's interior as well as personal property kept in the passenger compartment. So, a system to reduce this excessive heat by pumping out hot air and allowing cooler ambient air to enter the car by mean...

  12. Flying car design and testing

    OpenAIRE

    Klein, S.; Smrcek, L.

    2009-01-01

    This paper is primarily concerned with the inverted design process and manufacture of a flying car prototype which can overcome the problem of traffic management in the world today. A possible solution to the problem of overcrowded roads would be to design a flying or hovering car. Given technological advances in aircraft construction, navigation and operation, flying cars or personal aircraft are now a feasible proposition. The viability of such a concept was investigated in terms of produci...

  13. 49 CFR 180.507 - Qualification of tank cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Qualification of tank cars. 180.507 Section 180... QUALIFICATION AND MAINTENANCE OF PACKAGINGS Qualification and Maintenance of Tank Cars § 180.507 Qualification of tank cars. (a) Each tank car marked as meeting a “DOT” specification or any other tank car used...

  14. Car sharing à la carte

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  15. Consumer Behavior towards Safer Car Purchasing Decisions

    Directory of Open Access Journals (Sweden)

    Khairil Anwar Abu Kassim

    2016-08-01

    Full Text Available In Malaysia, the car safety level has been elevated through regulations and a consumer-based approach, i.e. the New Car Assessment Program in Southeast Asian Countries (ASEAN NCAP. Nevertheless, the availability of information on consumers’ car purchasing decisions towards safety is still limited in Malaysia. Thus, this study was aimed at evaluating consumers’ purchasing decisions of their present cars and investigating their awareness of ASEAN NCAP. Self-administered questionnaires were distributed among consumers visiting different car showrooms and dealer shops. The findings suggest that safety was considered as one of the top three factors by the respondents when purchasing their present cars. Awareness of ASEAN NCAP has increased as compared to a previous study. This information is essential for policy makers, manufacturers and other stakeholders to assist in setting priorities with regard to the promotion of car safety in the country.

  16. Stock-car racing makes intuitive physicists

    Science.gov (United States)

    Gwynne, Peter

    2008-03-01

    Formula One races involve cars festooned with gadgets and complex electronic devices, in which millions of dollars are spent refining a vehicle's aerodynamics and reducing its weight. But in events run by America's National Association of Stock Car Auto Racing (NASCAR), cars hurtle round an oval track at speeds of about 300 km h-1 without the help of the complex sensors that are employed in Formula One cars. To avoid crashing, drivers must make their own adjustments to track conditions, engine problems and the traffic around them.

  17. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  18. 77 FR 60134 - Agency Information Collection Activities: Exportation of Used Self-Propelled Vehicles

    Science.gov (United States)

    2012-10-02

    ...) ways to minimize the burden including the use of automated collection techniques or the use of other... Title IV, Section 401 of the Anti-Car Theft Act of 1992, 19 U.S.C. 1646(c) which requires all persons or...

  19. Electric Cars and Oil Prices

    OpenAIRE

    Azar, Jose

    2009-01-01

    This paper studies the joint dynamics of oil prices and interest in electric cars, measured as the volume of Google searches for related phrases. Not surprisingly, I find that oil price shocks predict increases in Google searches for electric cars. Much more surprisingly, I also find that an increase in Google searches predicts declines in oil prices. The high level of public interest in electric cars between April and August of 2008 can explain approximately half of the decline in oil prices...

  20. Research of braking peculiarities of used cars

    Directory of Open Access Journals (Sweden)

    V. Mitunevičius

    2002-06-01

    Full Text Available This paper briefly describes some analysis of a car braking process - the peculiarities of car wheel-to-road adhesion, the influence of distribution of braking forces on car stability between front and rear axles. The requirements of EU Directive 71/320/EEC to braking force coefficients of car front and rear axles are exposed. Structural designs of braking systems are analyzed with respect to their meeting the EU standards. Experimental measurements of braking force coefficients for some models of cars which are used in Lithuania, are presented with the analysis how these coefficients meet the EU standards. The analysis of test results, suggestions for the ratio of braking forces of car front and rear axles are presented.

  1. Optimally Stopped Optimization

    Science.gov (United States)

    Vinci, Walter; Lidar, Daniel

    We combine the fields of heuristic optimization and optimal stopping. We propose a strategy for benchmarking randomized optimization algorithms that minimizes the expected total cost for obtaining a good solution with an optimal number of calls to the solver. To do so, rather than letting the objective function alone define a cost to be minimized, we introduce a further cost-per-call of the algorithm. We show that this problem can be formulated using optimal stopping theory. The expected cost is a flexible figure of merit for benchmarking probabilistic solvers that can be computed when the optimal solution is not known, and that avoids the biases and arbitrariness that affect other measures. The optimal stopping formulation of benchmarking directly leads to a real-time, optimal-utilization strategy for probabilistic optimizers with practical impact. We apply our formulation to benchmark the performance of a D-Wave 2X quantum annealer and the HFS solver, a specialized classical heuristic algorithm designed for low tree-width graphs. On a set of frustrated-loop instances with planted solutions defined on up to N = 1098 variables, the D-Wave device is between one to two orders of magnitude faster than the HFS solver.

  2. Preferences for Alternative Fuel Vehicles of Company Car Drivers

    NARCIS (Netherlands)

    Koetse, M.J.; Hoen, A.

    2014-01-01

    Costs of car ownership for company cars drivers and private car owners are very different. Car use, car choice decisions and preferences for car characteristics may therefore differ substantially between these two markets. In this paper, we present results of a study on the preferences of company

  3. Simulating fail-stop in asynchronous distributed systems

    Science.gov (United States)

    Sabel, Laura; Marzullo, Keith

    1994-01-01

    The fail-stop failure model appears frequently in the distributed systems literature. However, in an asynchronous distributed system, the fail-stop model cannot be implemented. In particular, it is impossible to reliably detect crash failures in an asynchronous system. In this paper, we show that it is possible to specify and implement a failure model that is indistinguishable from the fail-stop model from the point of view of any process within an asynchronous system. We give necessary conditions for a failure model to be indistinguishable from the fail-stop model, and derive lower bounds on the amount of process replication needed to implement such a failure model. We present a simple one-round protocol for implementing one such failure model, which we call simulated fail-stop.

  4. The Electric Cars Challenge

    Science.gov (United States)

    Roman, Harry T.

    2011-01-01

    Over 100 years ago, the great inventor Thomas Edison warned that gasoline cars would pollute the environment and lead to gasoline shortages. He preferred the use of clean electric vehicles. He also put his money where his mouth was and developed an entirely new alkaline storage battery system for his beloved cars, the nickel-iron storage battery.…

  5. 49 CFR 231.8 - Tank cars without side sills and tank cars with short side sills and end platforms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Tank cars without side sills and tank cars with... APPLIANCE STANDARDS § 231.8 Tank cars without side sills and tank cars with short side sills and end platforms. (a) Hand brakes—(1) Number. Same as specified for “Box and other house cars” (see § 231.1(a)(1...

  6. CARS 2009. Computer assisted radiology and surgery. Proceedings

    International Nuclear Information System (INIS)

    Anon.

    2009-01-01

    The CARS 2009 proceedings include contributions and poster sessions concerning different conferences and workshops: computer assisted radiology, 23rd international congress and exhibition, CARS clinical day, 13th annual conference of the international society for computer aided surgery, 10th CARS/SPIE/EuroPACS joint workshop on surgical PACS and the digital operating, 11th international workshop on computer-aided diagnosis, 15th computed maxillofacial imaging congress, CARS - computer assisted radiology and surgery, 1st EPMA/CARS workshop on personalized medicine and ICT, JICARS - Japanese institutes of CARS, 1st EuroNotes/CTAC/CARS workshop on NOTES: an interdisciplinary challenge, 13th annual conference for computer aided surgery, 27th international EuroPACS meeting.

  7. IL-7 and CCL19 expression in CAR-T cells improves immune cell infiltration and CAR-T cell survival in the tumor.

    Science.gov (United States)

    Adachi, Keishi; Kano, Yosuke; Nagai, Tomohiko; Okuyama, Namiko; Sakoda, Yukimi; Tamada, Koji

    2018-04-01

    Infiltration, accumulation, and survival of chimeric antigen receptor T (CAR-T) cells in solid tumors is crucial for tumor clearance. We engineered CAR-T cells to express interleukin (IL)-7 and CCL19 (7 × 19 CAR-T cells), as these factors are essential for the maintenance of T-cell zones in lymphoid organs. In mice, 7 × 19 CAR-T cells achieved complete regression of pre-established solid tumors and prolonged mouse survival, with superior anti-tumor activity compared to conventional CAR-T cells. Histopathological analyses showed increased infiltration of dendritic cells (DC) and T cells into tumor tissues following 7 × 19 CAR-T cell therapy. Depletion of recipient T cells before 7 × 19 CAR-T cell administration dampened the therapeutic effects of 7 × 19 CAR-T cell treatment, suggesting that CAR-T cells and recipient immune cells collaborated to exert anti-tumor activity. Following treatment of mice with 7 × 19 CAR-T cells, both recipient conventional T cells and administered CAR-T cells generated memory responses against tumors.

  8. Frame by frame stop motion non-traditional approaches to stop motion animation

    CERN Document Server

    Gasek, Tom

    2011-01-01

    In a world that is dominated by computer images, alternative stop motion techniques like pixilation, time-lapse photography and down-shooting techniques combined with new technologies offer a new, tangible and exciting approach to animation. With over 25 years professional experience, industry veteran, Tom Gasek presents a comprehensive guide to stop motion animation without the focus on puppetry or model animation. With tips, tricks and hands-on exercises, Frame by Frame will help both experienced and novice filmmakers get the most effective results from this underutilized branch of animation

  9. How does Euro NCAP results correlate to real life injury risks - a paired comparison study of car-to-car crashes in Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Lie, A. [Swedish National Road Administration, Borlaenge (Sweden)]|[ Karolinska Institutet (Sweden); Tingvall, C. [Monash University, Accident Research Centre (Australia)

    2001-07-01

    Euro NCAP is a resource for consumers regarding vehicle crash safety. The program also promotes safety developments, and credits car manufacturers focussing on safety. This study, based on real life car to car crashes, shows that the overall indication of the safety level, provided by the crash testing, is a valid prediction, at least when looking at the star rating and severe to fatal injuries. For minor injuries no significant injury risk differences are seen. The cars with three or four stars are approximately 30% safer, compared to two star cars or cars without an Euro NCAP score, in car to car collisions. The good general correlation between injury risk, and Euro NCAP scores is not necessarily similarly good for individual car models. Pedestrian safety and child occupant protection was not studied. (orig.)

  10. A light sneutrino rescues the light stop

    Energy Technology Data Exchange (ETDEWEB)

    Chala, M. [Departament de Física Tèorica, Universitat de València and IFIC, Universitat de València-CSIC,Dr. Moliner 50, E-46100 Burjassot (València) (Spain); Delgado, A. [Department of Physics, University of Notre Dame, 225 Nieuwland Science Hall, Notre Dame, IN 46556 (United States); Nardini, G. [Albert Einstein Center (AEC), Institute for Theoretical Physics (ITP), University of Bern,Sidlerstrasse 5, CH-3012 Bern (Switzerland); Quirós, M. [Institut de Física d’Altes Energies (IFAE), The Barcelona Institute of Science and Technology (BIST),Institució Catalana de Recerca i Estudis Avançats - ICREA, Campus UAB, 08193 Bellaterra, Barcelona (Spain)

    2017-04-18

    Stop searches in supersymmetric frameworks with R-parity conservation usually assume the lightest neutralino to be the lightest supersymmetric particle. In this paper we consider an alternative scenario in which the left-handed tau sneutrino is lighter than neutralinos and stable at collider scales, but possibly unstable at cosmological scales. Moreover the (mostly right-handed) stop t̃ is lighter than all electroweakinos, and heavier than the scalars of the third generation lepton doublet, whose charged component, τ̃, is heavier than the neutral one, ν̃. The remaining supersymmetric particles are decoupled from the stop phenomenology. In most of the parameter space, the relevant stop decays are only into tτ̃τ, tν̃ν and bν̃τ via off-shell electroweakinos. We constrain the branching ratios of these decays by recasting the most sensitive stop searches. Due to the “double invisible” kinematics of the t̃→tν̃ν process, and the low efficiency in tagging the tτ̃τ decay products, light stops are generically allowed. In the minimal supersymmetric standard model with ∼ 100 GeV sneutrinos, stops with masses as small as ∼ 350 GeV turn out to be allowed at 95% CL.

  11. Perceptions and attitudes of car owners on innovative automobiles

    International Nuclear Information System (INIS)

    Pol, M.; Brunsting, S.

    2012-01-01

    To abate the detrimental effects of transport a transition is foreseen from the conventional fossil cars to energy-sustainable cars. A successful transition requires a major behavioral change of car consumers who need to make choices about new options for transport with uncertain costs and benefits compared to their current car. This paper examines consumers' perceptions about innovative cars and considerations for buying or not buying innovative cars (hybrid, electric, plug-in electric, hydrogen, flexifuel). In this study an on-line questionnaire on attitudes, interests and social norms regarding innovative cars was conducted among 339 Dutch respondents who recently bought a new car. To obtain in-depth understanding of the answers, a follow-up study was conducted consisting of two focus groups with a sample of survey participants. These focus groups respectively concentrated on respondents' perceptions of innovative cars, and on the personality traits of the 'typical' innovative car driver. The results of the survey shows that the attitude towards innovative cars are strongly influenced by affective aspects (such as comfort and pleasant) and to a (much) smaller extent by environmental considerations. The results of the focus groups confirm these findings. According to the participants the price of the car is decisive whereby environmental concerns play no role. The design and image of the car are important. In addition, it appears that the familiarity with (and thus the knowledge about) the innovative cars is still very limited (with the exception of the hybrid car). This point of view stresses the importance of the way in which innovative cars are positioned thereby affecting the image (social norms) people will have regarding these cars. [nl

  12. Forecasting U.S. Car Sales and Car Registrations in Japan: Rationality, Accuracy and Herding

    DEFF Research Database (Denmark)

    Stadtmann, Georg; Rülke, Jan; Pierdzioch, Christian

    2011-01-01

    We analyze forecasts of car sales in the U.S. and forecasts of car registrations in Japan. We document a substantial heterogeneity of forecasts, and we show that, based on traditional criteria, forecasts are neither rational nor unbiased. We also report that forecasters anti-herd, that is...

  13. Collaborative Car Pooling System

    OpenAIRE

    João Ferreira; Paulo Trigo; Porfírio Filipe

    2009-01-01

    This paper describes the architecture for a collaborative Car Pooling System based on a credits mechanism to motivate the cooperation among users. Users can spend the accumulated credits on parking facilities. For this, we propose a business model to support the collaboration between a car pooling system and parking facilities. The Portuguese Lisbon-s Metropolitan area is used as application scenario.

  14. Panorama 2014 - Car-sharing

    International Nuclear Information System (INIS)

    Vinot, Simon

    2013-10-01

    Car-sharing is a new mode of transportation that consists of multiple users sharing the same vehicle. This type of service is expanding with the arrival of larger players, such as traditional car rental companies, automotive manufacturers, and large firms specializing in transportation. This new mode of transportation offers real potential and is currently finding its users, in France and worldwide. (author)

  15. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... Mohs AUC MyDermPath+ Psoriasis Patient education resources ... Try to gradually stop biting your nails: Some doctors recommend taking a gradual approach to break the habit. Try to stop biting ...

  16. Comparative analysis of used car price evaluation models

    Science.gov (United States)

    Chen, Chuancan; Hao, Lulu; Xu, Cong

    2017-05-01

    An accurate used car price evaluation is a catalyst for the healthy development of used car market. Data mining has been applied to predict used car price in several articles. However, little is studied on the comparison of using different algorithms in used car price estimation. This paper collects more than 100,000 used car dealing records throughout China to do empirical analysis on a thorough comparison of two algorithms: linear regression and random forest. These two algorithms are used to predict used car price in three different models: model for a certain car make, model for a certain car series and universal model. Results show that random forest has a stable but not ideal effect in price evaluation model for a certain car make, but it shows great advantage in the universal model compared with linear regression. This indicates that random forest is an optimal algorithm when handling complex models with a large number of variables and samples, yet it shows no obvious advantage when coping with simple models with less variables.

  17. Is this car looking at you? How anthropomorphism predicts fusiform face area activation when seeing cars.

    Science.gov (United States)

    Kühn, Simone; Brick, Timothy R; Müller, Barbara C N; Gallinat, Jürgen

    2014-01-01

    Anthropomorphism encompasses the attribution of human characteristics to non-living objects. In particular the human tendency to see faces in cars has long been noticed, yet its neural correlates are unknown. We set out to investigate whether the fusiform face area (FFA) is associated with seeing human features in car fronts, or whether, the higher-level theory of mind network (ToM), namely temporoparietal junction (TPJ) and medial prefrontal cortex (MPFC) show a link to anthropomorphism. Twenty participants underwent fMRI scanning during a passive car-front viewing task. We extracted brain activity from FFA, TPJ and MPFC. After the fMRI session participants were asked to spontaneously list adjectives that characterize each car front. Five raters judged the degree to which each adjective can be applied as a characteristic of human beings. By means of linear mixed models we found that the implicit tendency to anthropomorphize individual car fronts predicts FFA, but not TPJ or MPFC activity. The results point to an important role of FFA in the phenomenon of ascribing human attributes to non-living objects. Interestingly, brain regions that have been associated with thinking about beliefs and mental states of others (TPJ, MPFC) do not seem to be related to anthropomorphism of car fronts.

  18. 49 CFR 172.331 - Bulk packagings other than portable tanks, cargo tanks, tank cars and multi-unit tank car tanks.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Bulk packagings other than portable tanks, cargo tanks, tank cars and multi-unit tank car tanks. 172.331 Section 172.331 Transportation Other Regulations... packagings other than portable tanks, cargo tanks, tank cars and multi-unit tank car tanks. (a) Each person...

  19. The Car of Tomorrow: fuel and electricity. Report of the mission presided by Jean Syrota

    International Nuclear Information System (INIS)

    Hirtzman, Philippe; Bryden, Alan; Syrota, Jean; Auverlot, Dominique; Beeker, Etienne; Buba, Johanne; Le Moign, Caroline; Hossie, Gaelle; Chriqui, Vincent; Mourier, Pierre-Francois; Broca, Olivier de; Mahoudiaux, Christine; Von Pechmann, Felix

    2011-01-01

    depends on the mode of power generation in each country. As for the internal combustion engine vehicle, it certainly has not exhausted its room for improvement. In the 1950's, a big American car consumed 30 liters of petrol per 100 km, a Citroen DS in the 1970's was still drinking 12 liters over the same distance, our modern hatchbacks merely 6 liters... The engine should still see nearly double its energy efficiency by 2030. The down-sizing, direct injection, the electromagnetic valve control should halve CO 2 emissions. These ways of improvement will be critical in the short-medium term: according to manufacturers, the car engine should still represent almost 90% of sales in 2020. This would imply a gradual electrification of the vehicle thermal. Systems 'stop and start' off the engine when the car is stopped and then restarted (or, in an improved version, the cut below the threshold of 10-20 km / hour) in congested areas, these systems reduce the consumption of 20% to 25%. Hybrid vehicles, which combine an internal combustion engine and an electric motor (it is being operated at low speed), are also expected to grow, initially on the high end market. Governments can accelerate the transition in several ways. It is obviously desirable to invest in long-term research, including lithium-air. Through the interplay of incentives and regulation (with the purchase or use) it is also possible to promote all-electric vehicles but also hybrids. Finally, the public is only able to establish standards and regulations that will govern the development of infrastructure for electric vehicles of tomorrow (standard plugs and charging stations). The big sedan road and electric will be maybe not tomorrow. However, our urban environment could quickly accommodate light electric vehicles, two, three or four wheels, that will enhance our understanding of travel. The Chinese and circulated more than 120 million electric bikes a few years... It is clear that the forms of

  20. Benefits of magnesium wheels for consumer cars

    Science.gov (United States)

    Frishfelds, Vilnis; Timuhins, Andrejs; Bethers, Uldis

    2018-05-01

    Advantages and disadvantages of magnesium wheels are considered based on a mechanical model of a car. Magnesium wheels are usually applied to racing cars as they provide slightly better strength/weight ratio than aluminum alloys. Do they provide notable benefits also for the everyday user when the car speeds do not exceed allowed speed limit? Distinct properties of magnesium rims are discussed. Apart from lighter weight of magnesium alloys, they are also good in dissipating the energy of vibrations. The role of energy dissipation in the rim of a wheel is estimated by a quarter car model. Improvements to safety by using the magnesium wheels are considered. Braking distance and responsiveness of the car is studied both with and without using an Anti Blocking System (ABS). Influence of rim weight on various handling parameters of the car is quantitatively tested.

  1. Rear-facing car seat (image)

    Science.gov (United States)

    A rear-facing car seat position is recommended for a child who is very young. Extreme injury can occur in an accident because ... child. In a frontal crash a rear-facing car seat is best, because it cradles the head, ...

  2. FUEL PRICES AND CAR SALES

    OpenAIRE

    Vlad Cârstea

    2008-01-01

    Automotive industry is a very important economic sector that is highly responsive to changes in the world economy. The fuel price is the biggest enemy of car manufacturers. This is a compared analysis between Europe and Romania regarding new car registrations.

  3. Running performance of racing solar car; Kyogiyo solar car no soko seino

    Energy Technology Data Exchange (ETDEWEB)

    Fujita, H [Osaka Sangyo Univ., Osaka (Japan); Ando, Y

    1997-11-25

    The paper reported on `96 World Solar Challenge which is a solar car race traveling a total of 3010km from Darwin to Adelaide of the Australian continent. We accomplished running with general cars on general roads at mean speed of 60.3km/h for 6 days. To reduce vehicle weight, the monocock structure honeycombed with carbon fiber and aramid was adopted to the whole vehicle, and a light alloy to driving system parts. To reduce air resistance, adopted were reduction in the front projection area and the smooth body form. The required power is 44.8 kWh, and the power consumption ratio during travel is very high, approximately 67 km/kWh. In the travel of solar car in the unstable weather, dependence upon battery becomes higher, and therefore the battery capacity of 3.5 kWh with which the car was loaded is small, which resulted in affecting the race totally. To predict the travel in the race and determine the travel method, needed are collection and management of realtime and accurate travel data. The measuring management system developed this time together with the vehicle was applicable to the actual race and high in practicality. 2 refs., 7 figs., 1 tab.

  4. Modelling strategic responses to car and fuel taxation

    NARCIS (Netherlands)

    Heijnen, P.; Kooreman, P.

    We develop a model to analyse the interactions between actors involved in car and fuel taxation: consumers, car producers, fuel producers and the government. Heterogeneous consumers choose between two versions of a car that differ in engine type (diesel or gasoline). Car manufacturers and fuel

  5. Consumer Behavior towards Safer Car Purchasing Decisions

    OpenAIRE

    Khairil Anwar Abu Kassim; Mohd Hafzi Md Isa; Yahaya Ahmad; Intan Osman; Lawrence Arokiasamy

    2016-01-01

    In Malaysia, the car safety level has been elevated through regulations and a consumer-based approach, i.e. the New Car Assessment Program in Southeast Asian Countries (ASEAN NCAP). Nevertheless, the availability of information on consumers' car purchasing decisions towards safety is still limited in Malaysia. Thus, this study was aimed at evaluating consumers' purchasing decisions of their present cars and investigating their awareness of ASEAN NCAP. Self-administered questionnaires were dis...

  6. Company car study 2011. Reduction of environmental impacts by influencing the selection process of company cars; Tyoesuhdeautotutkimus 2011. Ympaeristoehaittojen vaehentaeminen autonvalinnan ohjauksella

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    The purpose of the study is to identify: What kinds of operational models directing towards eco-friendlier company car use there are and which are in use. What kinds of practical impacts these operational models have had. What is the demand for company car use and what changes have taken place from the viewpoint of companies and beneficiaries. What factors should the best company car taxation include in terms of directiveness (from the environmental point of view). The main objective is to find directive factors in company car use which would result in smaller environmental impacts and which company car users could commit themselves to. The main target groups of the study were the recipients of company car benefits, and enterprises using company cars. Company cars are mainly used for two reasons: in many organisations, work is carried out where the customer is, in which case company cars are used for reducing travel costs. On the other hand, a company car is a significant means for attracting and motivating employees, especially skilled experts and management staff. Company cars also play a significant role in the replacement rate of Finnish motor vehicles. The car selection rules of organisations determine the roles that entitle an employee to have a company car and how they can choose their car. Factors restricting the choice are usually CO{sub 2} and the price and make of the car. The CO{sub 2} limit is used by about 70% of organisations. According to this study, the average emission limit is 168 g/km, depending on the company and the position of the beneficiary. However, the average CO{sub 2} emissions of new company cars are currently about 140 g/km, and therefore the emission limits of organisations have not followed the development of motor technology. In entrepreneurship, environmental issues will be regarded as very important in the future, and there is also a notion for this to be reflected in the guidelines for selecting company cars. Emissions reduction

  7. City Car = The City Car / Andres Sevtshuk

    Index Scriptorium Estoniae

    Sevtshuk, Andres, 1981-

    2008-01-01

    Massachusettsi Tehnoloogiainstituudi (MIT) meedialaboratooriumi juures tegutseva Targa Linna Grupi (Smart City Group) ja General Motorsi koostööna sündinud kaheistmelisest linnasõbralikust elektriautost City Car. Nimetatud töögrupi liikmed (juht William J. Mitchell, töögruppi kuulus A. Sevtshuk Eestist)

  8. How to Stop Biting Your Nails

    Medline Plus

    Full Text Available ... your fingers and from your nails to your face and mouth. To help you stop biting your ... re inclined to bite may help solve the problem. Try to gradually stop biting your nails: Some ...

  9. Shopping for a safer car

    Science.gov (United States)

    2010-01-01

    This brochure provides some helpful tips on what to look for when shopping for a safer car. Automakers are increasingly advertising the safety features of their cars. The problem is sorting out their claims and zeroing in on the safety features that ...

  10. Application of the RADTRAN 5 stop model

    International Nuclear Information System (INIS)

    Neuhauser, K.S.; Kanipe, R.L.; Weiner, R.F.

    1997-01-01

    A number of environmental impact analyses with the RADTRAN computer code have shown that dose to persons at stops is one of the largest components of incident-free dose during overland carriage of spent fuel and other radioactive materials (e.g., USDOE, 1994). The input data used in these analyses were taken from a 1983 study that reports actual observations of spent fuel shipments by truck. Early RADTRAN stop models, however, were insufficiently flexible to take advantage of the detailed information in the study. A more recent study of gasoline service stations that specialize in servicing large trucks, which are the most likely stop locations for shipments of Type B packages in the United States, has provided additional, detailed data on refueling/meal stops. The RADTRAN 5 computer code for transportation risk analysis allows exposures at stops to be more fully modeled than have previous releases of the code and is able to take advantage of detailed data. It is the intent of this paper first to compare results from RADTRAN and RADTRAN 5 for the old, low-resolution form of input data, and then to demonstrate what effect the new data and input format have on stop-dose estimates for an individual stop and for a hypothetical shipment route. Finally, these estimated public doses will be contrasted with doses calculated for a special population group -- inspectors

  11. Application of the radtran 5 stop model

    International Nuclear Information System (INIS)

    Neuhauser, K.S.; Kanipe, R.L.; Weiner, R.F.

    1998-01-01

    A number of environmental impact analyzes with the RADTRAN computer code have shown that dose to persons at stops is one of the largest components of incident-free dose during overland carriage of spent fuel and other radioactive materials. The input data used in these analyses were taken from a 1983 study that reports actual observations of spent fuel shipments by truck. Early RADTRAN stop models, however, were insufficiently flexible to take advantage of the detailed information in the study. A more recent study of gasoline service stations that specialize in servicing large trucks, which are the most likely stop locations for shipments of Type B packages in the United States, has provided additional, detailed data on refueling/meal stops. The RADTRAN 5 computer code for transportation risk analysis allows exposures at stops to be more fully modelled than have previous releases of the code and is able to take advantage of detailed data. It is the intent of this paper first to compare results from RADTRAN 4 and RADTRAN 5 for the old, low-resolution form of input data, and then to demonstrate what effect the new data and input format have on stop-dose estimates for an individual stop and for a hypothetical shipment route. Finally, these estimated public doses will be contrasted with doses calculated for a special population group-inspectors. (authors)

  12. Dwelling on Everyday Car Journeys

    DEFF Research Database (Denmark)

    Tølbøll, Lene; Jensen, Hanne Louise

    different traffic conditions as well as the emotional states related to the drivers’ thoughts about work and family issues, the materiality of the car and the recreational activities inside the car. Analyses are based on a web-based questionnaire, sent to 373 participating drivers in the Big Data research...... project Intelligent Transportation System Platform North Denmark (Lahrmann 2012). In that project data on e.g. position and speed was collected via an On Board Unit from more than 400 cars in 2012-2014 (Tøfting et. al. 2014). The full dataset includes a driven distance of approximately 14 million km...... experiences related to commuting. The findings will be discussed using theoretical inspiration from Sheller (2004), Bull (2003) and Thrift (2004) and we will suggest that the various emotional experiences of the commuters are of great importance for their ability to use of the car as a dwelling place....

  13. Pollutants Characterization of Car Wash Wastewater

    Directory of Open Access Journals (Sweden)

    Hashim Nor Haslina

    2016-01-01

    Full Text Available The huge quantity of water consumed per car during washing cars yields the untreated effluents discharged to the stormwater system. Wastewater samples from snow car wash and two full hand service car wash station were analyzed for pH and the presence of PO43-,TP, O&G, alkalinity, TSS, NO3-, NO2-, COD and surfactant in accordance Standard Method of Water and Wastewater 2012. Two full hand wash service stations and one station of snow foam service were investigated in this study. Amongst the stations, snow foam car wash station indicates the highest concentration of PO43-, TP, O&G, TSS, COD and surfactant with the average value of 10.18 ± 0.87 mg/L, 30.93 ± 0.31 mg/L , 85.00 ± 0.64 mg/L 325.0 ± 0.6 mg/L, 485.0 ± 0.3 mg/L and 54.00 ± 2.50 mg/L as MBAS, respectively. Whereas, in parameters characterization in different stages throughout the car wash process, O&G was found to be the highest in pre soak stage, PO43-, TP, TSS and COD in washing stage and NO3- and NO2- in rinse stage. All parameters were compared to Environmental Quality (Industrial Effluent Regulations, 2009. There is a strong need to study on the characterization of car wash water in order to suggest the suitable treatment need for this type of wastewater.

  14. Lifespan changes in global and selective stopping and performance adjustments

    Directory of Open Access Journals (Sweden)

    Maria Christina Van De Laar

    2011-12-01

    Full Text Available This study examined stopping and performance adjustments in four age groups (M ages: 8, 12, 21, and 76 years. All participants performed on three tasks, a standard two-choice task and the same task in which stop-signal trials were inserted requiring either the suppression of the response activated by the choice stimulus (global stop task or the suppression of the response when one stop signal was presented but not when the other stop signal occurred (selective stop task. The results showed that global stopping was faster than selective stopping in all age groups. Global stopping matured more rapidly than selective stopping. The developmental gain in stopping was considerably more pronounced compared to the loss observed during senescence. All age groups slowed the response on trials without a stop signal in the stop task compared to trials in the choice task, the elderly in particular. In addition, all age groups slowed on trials following stop-signal trials, except the elderly who did not slow following successful inhibits. By contrast, the slowing following failed inhibits was disproportionally larger in the elderly compared to young adults. Finally, sequential effects did not alter the pattern of performance adjustments. The results were interpreted in terms of developmental change in the balance between proactive and reactive control.

  15. Lifespan Changes in Global and Selective Stopping and Performance Adjustments

    Science.gov (United States)

    van de Laar, Maria C.; van den Wildenberg, Wery P. M.; van Boxtel, Geert J. M.; van der Molen, Maurits W.

    2011-01-01

    This study examined stopping and performance adjustments in four age groups (M ages: 8, 12, 21, and 76 years). All participants performed on three tasks, a standard two-choice task and the same task in which stop-signal trials were inserted requiring either the suppression of the response activated by the choice stimulus (global stop task) or the suppression of the response when one stop-signal was presented but not when the other stop-signal occurred (selective stop task). The results showed that global stopping was faster than selective stopping in all age groups. Global stopping matured more rapidly than selective stopping. The developmental gain in stopping was considerably more pronounced compared to the loss observed during senescence. All age groups slowed the response on trials without a stop-signal in the stop task compared to trials in the choice task, the elderly in particular. In addition, all age groups slowed on trials following stop-signal trials, except the elderly who did not slow following successful inhibits. By contrast, the slowing following failed inhibits was disproportionally larger in the elderly compared to young adults. Finally, sequential effects did not alter the pattern of performance adjustments. The results were interpreted in terms of developmental change in the balance between proactive and reactive control. PMID:22180746

  16. 49 CFR 215.119 - Defective freight car truck.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Defective freight car truck. 215.119 Section 215... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Freight Car Components Suspension System § 215.119 Defective freight car truck. A railroad may not place or continue in service a...

  17. 19 CFR 151.26 - Molasses in tank cars.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Molasses in tank cars. 151.26 Section 151.26....26 Molasses in tank cars. When molasses is imported in tank cars, the importer shall file with the... sugars or the character of the molasses in the different cars. ...

  18. Influence in the car taxation system. Henkiloeautojen vermuutosten vaikutukset

    Energy Technology Data Exchange (ETDEWEB)

    Alppivuori, K; Kallberg, H; Pekki, M

    1986-06-01

    In Finland the car prices are exeptionally high due to car taxes included in the new car prices. The gasoline price, which is at international leve, includes also taxes. The aim of this study was to calculate the effects of reducing the car taxes and correspondingly rising fuel taxes so that the state income car taxation does not change. The study was performed in two stages: an interview and a simulation study. The interview was aimed at the general public (postal poll) and at experts in car trade (personal interview). The aim was to reveal the parameters in the economic models explaining the behaviour of the public in car purchasing and car use. The simulation study was performed to calculate quantitative changes in, e.g. car park, traffic volumes and energy consumption caused by supposed changes in the taxation. One of the main results was that unchanged taxation is leading to rapidly increasing traffic volumes and total taxes for car use.

  19. Flex cars and the alcohol price

    International Nuclear Information System (INIS)

    Ferreira, Alex Luiz; Da Silveira, Jaylson Jair; De Almeida Prado, Fernando Pigeard

    2009-01-01

    We build a model that incorporates the effect of the innovative 'flex' car, an automobile that is able to run with either gasoline or alcohol, on the dynamics of fuel prices in Brazil. Our model shows that differences regarding fuel prices will now depend on the proportions of alcohol, gasoline and flex cars in the total stock. Conversely, the demand for each type of car will also depend on the expected future prices of alcohol and gasoline (in addition to the car prices). The model reflects our findings that energy prices are tied in the long run and that causality runs stronger from gasoline to alcohol. The estimated error correction parameter is stable, implying that the speed of adjustment towards equilibrium remains unchanged. The latter result is probably due to a still small fraction of flex cars in the total stock (approx. 5%), despite the fact that its sales nearly reached 100% in 2006. (author)

  20. 49 CFR 231.11 - Caboose cars without platforms.

    Science.gov (United States)

    2010-10-01

    ... inches end-ladder clearance, within 30 inches of side of car, until car is shopped for work amounting to... 49 Transportation 4 2010-10-01 2010-10-01 false Caboose cars without platforms. 231.11 Section 231... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD SAFETY APPLIANCE STANDARDS § 231.11 Caboose cars without...

  1. 49 CFR 215.303 - Stenciling of restricted cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Stenciling of restricted cars. 215.303 Section 215... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Stenciling § 215.303 Stenciling of restricted cars. (a) Each restricted railroad freight car that is described in § 215.205(a) of...

  2. Rational-driver approximation in car-following theory

    Science.gov (United States)

    Lubashevsky, Ihor; Wagner, Peter; Mahnke, Reinhard

    2003-11-01

    The problem of a car following a lead car driven with constant velocity is considered. To derive the governing equations for the following car dynamics a cost functional is constructed. This functional ranks the outcomes of different driving strategies, which applies to fairly general properties of the driver behavior. Assuming rational-driver behavior, the existence of the Nash equilibrium is proved. Rational driving is defined by supposing that a driver corrects continuously the car motion to follow the optimal path minimizing the cost functional. The corresponding car-following dynamics is described quite generally by a boundary value problem based on the obtained extremal equations. Linearization of these equations around the stationary state results in a generalization of the widely used optimal velocity model. Under certain conditions (the “dense traffic” limit) the rational car dynamics comprises two stages, fast and slow. During the fast stage a driver eliminates the velocity difference between the cars, the subsequent slow stage optimizes the headway. In the dense traffic limit an effective Hamiltonian description is constructed. This allows a more detailed nonlinear analysis. Finally, the differences between rational and bounded rational driver behavior are discussed. The latter, in particular, justifies some basic assumptions used recently by the authors to construct a car-following model lying beyond the frameworks of rationality.

  3. Locomotive monitoring system using wireless sensor networks

    CSIR Research Space (South Africa)

    Croucamp, PL

    2014-07-01

    Full Text Available Theft of cables used for powering a locomotive not only stops the train from functioning but also paralyzes the signalling and monitoring system. This means that information on certain locomotive's cannot be passed onto other locomotives which may...

  4. Note on measuring electronic stopping of slow ions

    Science.gov (United States)

    Sigmund, P.; Schinner, A.

    2017-11-01

    Extracting stopping cross sections from energy-loss measurements requires careful consideration of the experimental geometry. Standard procedures for separating nuclear from electronic stopping treat electronic energy loss as a friction force, ignoring its dependence on impact parameter. In the present study we find that incorporating this dependence has a major effect on measured stopping cross sections, in particular for light ions at low beam energies. Calculations have been made for transmission geometry, nuclear interactions being quantified by Bohr-Williams theory of multiple scattering on the basis of a Thomas-Fermi-Molière potential, whereas electronic interactions are characterized by Firsov theory or PASS code. Differences between the full and the restricted stopping cross section depend on target thickness and opening angle of the detector and need to be taken into account in comparisons with theory as well as in applications of stopping data. It follows that the reciprocity principle can be violated when checked on restricted instead of full electronic stopping cross sections. Finally, we assert that a seeming gas-solid difference in stopping of low-energy ions is actually a metal-insulator difference. In comparisons with experimental results we mostly consider proton data, where nuclear stopping is only a minor perturbation.

  5. CARS diagnostics of high pressure discharges

    International Nuclear Information System (INIS)

    Uhlenbusch, J.

    2001-01-01

    After a short description of the principles of the CARS, RECARS and POLCARS techniques and a discussion of setups for CARS experiments some experimental results are summarized. The results concern mainly plasma under atmospheric pressure, in particular the determination of temperature in a CO 2 laser-induced pyrolysis flame burning in a silane-acetylene gas mixture, the measurements of N 2 vibrational and rotational temperatures as well as the electron density by CARS and of an NO minority by POLCARS in an atmospheric microwave discharge, and finally RECARS experiments on indium iodide, Which is present in metal halide discharge lamps. Guided by these examples some problems and difficulties arising when performing CARS measurements are discussed

  6. CarSim: Automatic 3D Scene Generation of a Car Accident Description

    OpenAIRE

    Egges, A.; Nijholt, A.; Nugues, P.

    2001-01-01

    The problem of generating a 3D simulation of a car accident from a written description can be divided into two subtasks: the linguistic analysis and the virtual scene generation. As a means of communication between these two system parts, we designed a template formalism to represent a written accident report. The CarSim system processes formal descriptions of accidents and creates corresponding 3D simulations. A planning component models the trajectories and temporal values of every vehicle ...

  7. Stop searches in flavourful supersymmetry

    CERN Document Server

    Crivellin, Andreas; Tunstall, Lewis C.

    2016-01-01

    Natural realisations of supersymmetry require light stops ${\\tilde t}_1$, making them a prime target of LHC searches for physics beyond the Standard Model. Depending on the kinematic region, the main search channels are ${\\tilde t_1}\\to t \\tilde \\chi^0_1$, ${\\tilde t_1}\\to W b \\tilde \\chi^0_1$ and ${\\tilde t_1}\\to c \\tilde \\chi^0_1$. We first examine the interplay of these decay modes with ${\\tilde c_1}\\to c \\tilde \\chi^0_1$ in a model-independent fashion, revealing the existence of large regions in parameter space which are excluded for any ${\\tilde t_1}\\to c \\tilde \\chi^0_1$ branching ratio. This effect is then illustrated for scenarios with stop-scharm mixing in the right-handed sector, where it has previously been observed that the stop mass limits can be significantly weakened for large mixing. Our analysis shows that once the LHC bounds from ${\\tilde c_1}\\to c \\tilde \\chi^0_1$ searches are taken into account, non-zero stop-scharm mixing leads only to a modest increase in the allowed regions of parameter...

  8. Stopping power for heavy ions in low energy region

    International Nuclear Information System (INIS)

    Kitagawa, Mitsuo

    1983-01-01

    Review is made for the study on the power for stopping heavy ions. The studies on the power for stopping heavy ions passing through materials have been developed in the last twenty years due to the accuracy improvement in the data analysis of the power for stopping light ions, the requirement of data establishment on the power for stopping heavy ions from fusion research and the development of the experimental studies by heavy-ion accelerators. The relation between the analysis of the power for stopping heavy ions and the power for stopping light ions is described from the standpoint that the results on the power for stopping light ions serve as the guide for the study on the power for stopping heavy ions. Both at present and in future. The analysis of stopping power data with the accuracy from +-10 to 20 % is possible from the theoretical analysis of effective electric charge and its systematic table of the numerical data. The outline of the scaling rule on effective electric charge is discussed. The deviation of the experimental data from the scaling rule is discussed by comparing with the measured values of effective electric charge ratio. Various analyses of the power for stopping heavy ions are summarized. (Asami, T.)

  9. Car radiator burns: a prevention issue.

    Science.gov (United States)

    Rabbitts, Angela; Alden, Nicole E; Conlin, Tara; Yurt, Roger W

    2004-01-01

    Scald burns continue to be the major cause of injury to patients admitted to the burn center. Scald burns occurring from car radiator fluid comprise a significant subgroup. Although manufacturer warning labels have been placed on car radiators, these burns continue to occur. This retrospective review looks at all patients admitted to our burn center who suffered scald burns from car radiator fluid to assess the extent of this problem. During the study period, 86 patients were identified as having suffered scald burns as a result of contact with car radiator fluid. Seventy-one percent of the burn injuries occurred in the summer months. The areas most commonly burned were the head and upper extremities. Burn prevention efforts have improved greatly over the years; however, this study demonstrates that scald burns from car radiator fluid continue to cause physical, emotional, and financial devastation. The current radiator warning labels alone are not effective. The National Highway Traffic Safety Administration has proposed a new federal motor vehicle safety standard to aid in decreasing the number of scald burns from car radiators. The results of this study were submitted to the United States Department of Transportation for inclusion in a docket for federal legislation supporting these safety measures.

  10. Automated Coal-Mine Shuttle Car

    Science.gov (United States)

    Collins, E. R., Jr.

    1984-01-01

    Cable-guided car increases efficiency in underground coal mines. Unmanned vehicle contains storage batteries in side panels for driving traction motors located in wheels. Batteries recharged during inactive periods or slid out as unit and replaced by fresh battery bank. Onboard generator charges batteries as car operates.

  11. MODERN ELECTRIC CARS OF TESLA MOTORS COMPANY

    Directory of Open Access Journals (Sweden)

    O. F. Vynakov

    2016-08-01

    Full Text Available This overview article shows the advantages of a modern electric car as compared with internal combustion cars by the example of the electric vehicles of Tesla Motors Company. It (в смысле- статья describes the history of this firm, provides technical and tactical characteristics of three modifications of electric vehicles produced by Tesla Motors. Modern electric cars are not less powerful than cars with combustion engines both in speed and acceleration amount. They are reliable, economical and safe in operation. With every year the maximum range of an electric car is increasing and its battery charging time is decreasing.Solving the problem of environmental safety, the governments of most countries are trying to encourage people to switch to electric cars by creating subsidy programs, lending and abolition of taxation. Therefore, the advent of an electric vehicle in all major cities of the world is inevitable.

  12. 49 CFR 173.314 - Compressed gases in tank cars and multi-unit tank cars.

    Science.gov (United States)

    2010-10-01

    ... or secondary Division 2.1 (flammable gas) hazard. For single unit tank cars, interior pipes of... lading exceeding 1.52 mm (0.060 inch) diameter must be equipped with excess flow valves. For single unit... inches) glass fiber placed over 5.08 cm (2 inches) of ceramic fiber. Tank cars must have excess flow...

  13. 49 CFR 173.31 - Use of tank cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Use of tank cars. 173.31 Section 173.31... SHIPMENTS AND PACKAGINGS Preparation of Hazardous Materials for Transportation § 173.31 Use of tank cars. (a) General. (1) No person may offer a hazardous material for transportation in a tank car unless the tank car...

  14. 76 FR 72750 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-11-25

    ..., including the use of appropriate automated, electronic, mechanical, or other technological collection... States Code) which mandated this information collection. The 1984 Theft Act was amended by the Anti Car... the burden of the collection of information on respondents, including the use of automated collection...

  15. Sweet Spots and Door Stops

    Science.gov (United States)

    Thompson, Michael; Tsui, Stella; Leung, Chi Fan

    2011-01-01

    A sweet spot is referred to in sport as the perfect place to strike a ball with a racquet or bat. It is the point of contact between bat and ball where maximum results can be produced with minimal effort from the hand of the player. Similar physics can be applied to the less inspiring examples of door stops; the perfect position of a door stop is…

  16. CHANGE TRENDS IN THE USE OF PASSENGER CARS ON URBAN TRIPS: CAR-POOLING IN GDYNIA

    Directory of Open Access Journals (Sweden)

    Katarzyna HEBEL

    2017-09-01

    Full Text Available The wide accessibility of European citizens to cars results in problems caused by their excessive use as a means of urban transport. Given this situation, it is necessary to find new solutions for the more efficient use of passenger cars in cities. This problem affects almost all European cities, including those in Poland. The paper analyses the level of motorization and modal split in Polish cities with county status, while selected European cities serve as a background to determine the scale of the problem. In the search of solutions in relation to Poland, an analysis of different documents outlining the directions of urban mobility was conducted. One of these documents concerned the promotion of car-pooling, the history of which dates back to the Second World War and the 1950s. Initially introduced in the USA, its increasing development in European cities has been witnessed in recent years. Research on the evaluation of real car-pooling in Polish cities was conducted in Gdynia by the authors of this study. The results of marketing research presented in the article have determined the degree to which participants in urban mobility are inclined to take part in car-pooling schemes in Polish cities.

  17. MODERN ELECTRIC CARS OF TESLA MOTORS COMPANY

    OpenAIRE

    O. F. Vynakov; E. V. Savolova; A. I. Skrynnyk

    2016-01-01

    This overview article shows the advantages of a modern electric car as compared with internal combustion cars by the example of the electric vehicles of Tesla Motors Company. It (в смысле- статья) describes the history of this firm, provides technical and tactical characteristics of three modifications of electric vehicles produced by Tesla Motors. Modern electric cars are not less powerful than cars with combustion engines both in speed and acceleration amount. They are reliable, economical ...

  18. Intelligent Bus Stops in the Flexible Bus Systems

    OpenAIRE

    Razi Iqbal; Muhammad Usman Ghani

    2014-01-01

    The purpose of this paper is to discuss Intelligent Bus Stops in a special Demand Responsive Transit (DRT), the Flexible Bus System. These Intelligent Bus Stops are more efficient and information rich than Traditional Bus Stops. The real time synchronization of the Flexible Bus System makes it unique as compared to Traditional Bus Systems. The Main concern is to make Bus Stops intelligent and information rich. Buses are informed about the no. of passengers waiting at the upcoming ...

  19. Clean cars

    Energy Technology Data Exchange (ETDEWEB)

    Piffaretti, M.

    2008-07-01

    This well-illustrated presentation made at the Swiss 2008 research conference on traffic by the Protoscar company takes a look at research, design, engineering and communication topics in the area of 'clean cars'. The present situation with electrically driven and hybrid-drive cars is reviewed and the chances and problems of the present-day vehicles are examined. New developments and a number of vehicles that should be on the market in the period from 2012 to 2015 are presented. Also, 'clean' specialist vehicles such as trucks and buses are reviewed. Battery systems and associated problems and new developments are looked at. The promotion scheme in Mendrisio, Switzerland is reviewed. Bottom-up and top-down approaches are discussed and future market developments are looked at, as are promotional activities in various countries.

  20. Initial heating in cold cars

    NARCIS (Netherlands)

    Daanen, H.A.M.; Teunissen, L.P.J.; Hoogh, I.M. de

    2012-01-01

    During the initial minutes after entering a cold car, people feel uncomfortably cold. Six different warming systems were investigated in a small car in order to find out how to improve the feeling of comfort using 16 volunteers. The methods were: no additional warming next to a standard heating