WorldWideScience

Sample records for vehicle theft law

  1. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  2. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  3. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  4. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  5. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    OpenAIRE

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  6. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  7. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  8. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  9. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  10. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  11. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  12. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  13. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  14. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  15. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  16. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  17. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  18. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  19. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  20. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  1. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  2. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  3. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  4. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  5. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  6. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  7. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  8. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  9. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  10. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  11. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  12. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  13. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  14. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  15. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  16. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  17. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  18. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  19. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  20. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  1. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  2. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  3. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  4. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  5. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  6. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  7. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  8. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  9. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  10. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    OpenAIRE

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  11. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  12. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  13. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  14. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  15. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  16. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  17. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  18. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  19. Overt theft and the peculiarities of the qualification

    OpenAIRE

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  20. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  1. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  2. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  3. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  4. 28 CFR 29.5 - Notification of law enforcement officials.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Notification of law enforcement officials. 29.5 Section 29.5 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT... program and with the conditions under which motor vehicles may be stopped. ...

  5. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  6. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  7. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  8. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  9. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  10. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    OpenAIRE

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  11. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  12. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  13. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  14. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  15. About criminal-law character of objective aspect of unlawful occupation of motorcar and other transport vehicle without the aim of stealing and proposals on improvement of the 166 section of the criminal Code of Russian Federation

    OpenAIRE

    Kolesnikov, Roman

    2009-01-01

    In the article the problem of criminal code constituents demarcation of Russia providing responsibility for the unlawful occupation of motorcar and other transport vehicle without the of stealing (overtaking) and theft while committing the object of crime is transport vehicle are considered. The concepts: «occupation», «overtaking», «using» are analyzed. The proposals on improvement of criminal law are formulated.

  16. Gun Theft and Crime.

    Science.gov (United States)

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  17. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    OpenAIRE

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  18. Current trends in copper theft prevention

    Energy Technology Data Exchange (ETDEWEB)

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  19. 49 CFR 567.4 - Requirements for manufacturers of motor vehicles.

    Science.gov (United States)

    2010-10-01

    ... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... statement: “This vehicle conforms to all applicable Federal motor vehicle safety and theft prevention... conforms to the applicable Federal motor vehicle theft prevention standard in effect on the date of...

  20. 76 FR 6512 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-02-04

    ... of Respondents: 7. In 1984, Congress enacted the Motor Vehicle Theft Law Enforcement Act (the 1984 Theft Act). As a means to prevent the theft of motor vehicles for their parts, the 1984 Theft Act required vehicle manufacturers to mark the major parts of ``high-theft'' passenger cars and the major...

  1. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  2. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  3. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  4. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  5. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  6. 77 FR 50671 - Withdrawal of Proposed Rule on Insurer Reporting Requirements; List of Insurers Required To File...

    Science.gov (United States)

    2012-08-22

    ... reports on their motor vehicle theft loss experiences. An insurer included in any of the appendices that...: Congress enacted the Motor Vehicle Theft Law Enforcement Act of 1984 (Pub. L. 98-547). This legislation... report includes information about thefts and recoveries of motor vehicles, the rating rules used by the...

  7. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  8. 49 CFR 567.7 - Requirements for persons who alter certified vehicles.

    Science.gov (United States)

    2010-10-01

    ... Federal motor vehicle safety, Bumper, and Theft Prevention standards, and (2) Assumes legal responsibility... Vehicle Safety, Bumper and Theft Prevention Standards affected by the alteration and in effect in (month... vehicles. 567.7 Section 567.7 Transportation Other Regulations Relating to Transportation (Continued...

  9. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    Institute of Scientific and Technical Information of China (English)

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  10. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  11. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  12. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  13. A theoretical and practical test of geographical profiling with serial vehicle theft in a U.K. context.

    Science.gov (United States)

    Tonkin, Matthew; Woodhams, Jessica; Bond, John W; Loe, Trudy

    2010-01-01

    Geographical profiling is an investigative methodology sometimes employed by the police to predict the residence of an unknown offender from the locations of his/her crimes. The validity of geographical profiling, however, has not been fully explored for certain crime types. This study, therefore, presents a preliminary test of the potential for geographical profiling with a sample of 145 serial vehicle thieves from the U.K. The behavioural assumptions underlying geographical profiling (distance decay and domocentricity) are tested and a simple practical test of profiling using the spatial mean is presented. There is evidence for distance decay but not domocentricity among the spatial behaviour of car thieves from the U.K. A degree of success was achieved when applying the spatial mean on a case-by-case basis. The level of success varied, however, and neither series length in days nor number of crimes could account for the variation. The findings question previously held assumptions regarding geographical profiling and have potential theoretical and practical implications for the study and investigation of vehicle theft in the U.K. 2009 John Wiley & Sons, Ltd.

  14. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  15. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  16. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  17. 49 CFR Appendix B to Part 591 - Section 591.5(f) Bond for the Entry of More Than a Single Vehicle

    Science.gov (United States)

    2010-10-01

    ...) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591... Federal motor vehicle safety, or bumper, or theft prevention standards; and WHEREAS, pursuant to 49 CFR... to conform to the Federal motor vehicle safety, bumper, and theft prevention standards; and WHEREAS...

  18. On Making Autonomous Vehicles Respect Traffic Law : a Case Study for Dutch Law

    NARCIS (Netherlands)

    Prakken, H.

    Among the problems that still need to be solved before autonomous vehicles can fully autonomously participate in traffic is the one of making them respect the traffic laws. This paper discusses this problem by way of a case study of Dutch traffic law. First it is discussed to what extent Dutch

  19. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  20. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  1. Hypersonic vehicle control law development using H(infinity) and micron-synthesis

    Science.gov (United States)

    Gregory, Irene M.; Mcminn, John D.; Shaughnessy, John D.; Chowdhry, Rajiv S.

    1993-01-01

    Hypersonic vehicle control law development using H(infinity) and mu-synthesis is discussed. Airbreathing SSTO vehicles has a mutli-faceted mission that includes orbital operations, as well as re-entry and descent culminating in horizontal landing. However, the most challenging part of the operations is the ascent to orbit. The airbreathing propulsion requires lengthy atmospheric flight that may last as long as 30 minutes and take the vehicle half way around the globe. The vehicles's ascent is characterized by tight payload to orbit margins which translate into minimum fuel orbit as the performance criteria. Issues discussed include: SSTO airbreathing vehicle issues; control system performance requirements; robust control law framework; H(infinity) controller frequency analysis; and mu controller frequency analysis.

  2. 25 CFR 11.412 - Theft.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  3. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  4. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  5. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  6. 78 FR 73565 - Agency Information Collection Activities: Proposed Collection, Comments Requested, New Collection...

    Science.gov (United States)

    2013-12-06

    ..., homicide offenses, human trafficking, kidnapping/abduction, larceny/theft offenses, motor vehicle theft...; Public Law110-457, Title II, Section 237(a), (b), December 23, 2008, the William Wilberforce Trafficking...

  7. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  8. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  9. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  10. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    OpenAIRE

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  11. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    OpenAIRE

    Samuel Andrew Hardy

    2015-01-01

    Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hire...

  12. 49 CFR 541.5 - Requirements for passenger motor vehicles.

    Science.gov (United States)

    2010-10-01

    ... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.5 Requirements for passenger motor vehicles. (a) Each passenger motor vehicle subject to... 49 Transportation 6 2010-10-01 2010-10-01 false Requirements for passenger motor vehicles. 541.5...

  13. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    it is emphasized that although in USA online identity theft is criminalized, there also is special legislation concerned with online identity theft and this should be considered as an effective measure against online identity theft. Since in Lithuania the estimation of online identity theft from the point of criminal law is quite complicated, it is suggested that online identity theft should be criminalized as well as it is criminalized in USA. In addition, the authors notice that electronic information security should be regulated in both—private and public sectors not only in the public sector as it is at the present time.The research has also shown that in Lithuania legal regulation of personal data is sufficient, except the sanctions for breaches of the requirements of personal data protection. However, the lack of legal regulation concerned with online identity theft is noticed in Lithuania and such a legal environment leads to advantageous conditions to commit online identity theft.

  14. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    emphasized that although in USA online identity theft is criminalized, there also is special legislation concerned with online identity theft and this should be considered as an effective measure against online identity theft. Since in Lithuania the estimation of online identity theft from the point of criminal law is quite complicated, it is suggested that online identity theft should be criminalized as well as it is criminalized in USA. In addition, the authors notice that electronic information security should be regulated in both—private and public sectors not only in the public sector as it is at the present time. The research has also shown that in Lithuania legal regulation of personal data is sufficient, except the sanctions for breaches of the requirements of personal data protection. However, the lack of legal regulation concerned with online identity theft is noticed in Lithuania and such a legal environment leads to advantageous conditions to commit online identity theft.

  15. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  16. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  17. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  18. 28 CFR 29.8 - Motor vehicle owner participation.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Motor vehicle owner participation. 29.8 Section 29.8 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.8 Motor vehicle owner participation. In order to participate in this program, the owner(s) of a...

  19. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  20. 14 CFR 1214.609 - Loss or theft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  1. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  2. 26 CFR 1.165-8 - Theft losses.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  3. 27 CFR 24.265 - Losses by theft.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  4. Do Blue Laws Save Lives? The Effect of Sunday Alcohol Sales Bans on Fatal Vehicle Accidents

    Science.gov (United States)

    Lovenheim, Michael F.; Steefel, Daniel P.

    2011-01-01

    This paper analyzes the effect of state-level Sunday alcohol sales restrictions ("blue laws") on fatal vehicle accidents, which is an important parameter in assessing the desirability of these laws. Using a panel data set of all fatal vehicle accidents in the U.S. between 1990 and 2009 combined with 15 state repeals of blue laws, we show that…

  5. Brake to the theft of fuels

    International Nuclear Information System (INIS)

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  6. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  7. Commercial-vehicle enforcement: a guide for law-enforcement managers

    International Nuclear Information System (INIS)

    1987-01-01

    The purpose of the document is to provide a resource for law enforcement agencies to evaluate their programs, and to promote the uniform application of concepts already shown to be effective in other jurisdictions, which identify and address commercial-vehicle traffic safety needs

  8. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  9. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  10. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  11. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  12. The effective use of unmanned aerial vehicles for local law enforcement

    Science.gov (United States)

    Gasque, Leighton

    This qualitative study was done to interview local law enforcement in Murfreesboro, Tennessee to determine if unmanned aerial vehicles could increase the safety of policy officers. Many police officers face dangerous scenarios on a daily basis; however, officers must also perform non-criminal related responsibilities that could put them in hazardous situations. UAVs have multiple capabilities that can decrease the number of hazards in an emergency situation whether it is environmental, traffic related, criminal activity, or investigations. Officers were interviewed to find whether or not unmanned aerial vehicles (UAV) could be useful manpower on the police force. The study was also used to find whether or not officers foresee UAVs being used in law enforcement. The study revealed that UAVs could be used to add useful manpower to law enforcement based on the capabilities a UAV may have. Police officers cannot confirm whether or not they would be able to use a UAV until further research is conducted to examine the relation of costs to usage.

  13. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  14. RxPATROL: a Web-based tool for combating pharmacy theft.

    Science.gov (United States)

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  15. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  16. Dog Theft: A Case for Tougher Sentencing Legislation.

    Science.gov (United States)

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  17. 7 CFR 331.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  18. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  19. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Science.gov (United States)

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  20. Study on Pick-pocketing Theft-- with the Relevant Provisions to the Eighth Criminal Law Amendment as Background%扒窃型盗窃罪研究——以《刑法修正案(八)》相关规定为背景

    Institute of Scientific and Technical Information of China (English)

    薛进展; 蔡正华

    2012-01-01

    扒窃型盗窃罪是《刑法修正案(八)》新增的盗窃罪独立定罪类型,也拓宽了扒窃行为入罪的评价路径。刑法上的扒窃是指“以非法占有为目的,秘密窃取他人随身携带的财物的行为”。但并不是所有的扒窃都可以构成扒窃型盗窃罪,只有符合“公共场合”、“从他人身上”以及“取得”等标准的扒窃行为才能构成扒窃型盗窃罪。扒窃型盗窃罪作为内涵最为丰富的盗窃罪定罪类型,其外延受到的限制最严格,所以当出现多种类型盗窃罪竞合时,理应首先认定行为是否构成扒窃型盗窃罪。%The pick-pocketing type Theft is a new type of independent theft in the "eighth Criminal Law Amendment ", which at the same time clear the way of incorporating pick-pocketing behavior into crime. Pick-pocketing in the criminal law referred to those behaviors which are for the purpose of illegal possession and by means of stealing others' property carried with in secret. However not all of pick-pocketing may constitute of pick-pocketing type theft, only those which are conducted in the "public places", from others' body and acquire may meet the definition. Pick-pocketing theft criminal type, who is the richest in connotation, has also the strictest restriction in its epitaxial. So when we meet multiple types of Theft competing, pick-pocketing type theft shall be considered in the first.

  1. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  2. Flight Control Laws for NASA's Hyper-X Research Vehicle

    Science.gov (United States)

    Davidson, J.; Lallman, F.; McMinn, J. D.; Martin, J.; Pahle, J.; Stephenson, M.; Selmon, J.; Bose, D.

    1999-01-01

    The goal of the Hyper-X program is to demonstrate and validate technology for design and performance predictions of hypersonic aircraft with an airframe-integrated supersonic-combustion ramjet propulsion system. Accomplishing this goal requires flight demonstration of a hydrogen-fueled scramjet powered hypersonic aircraft. A key enabling technology for this flight demonstration is flight controls. Closed-loop flight control is required to enable a successful stage separation, to achieve and maintain the design condition during the engine test, and to provide a controlled descent. Before the contract award, NASA developed preliminary flight control laws for the Hyper-X to evaluate the feasibility of the proposed scramjet test sequence and descent trajectory. After the contract award, a Boeing/NASA partnership worked to develop the current control laws. This paper presents a description of the Hyper-X Research Vehicle control law architectures with performance and robustness analyses. Assessments of simulated flight trajectories and stability margin analyses demonstrate that these control laws meet the flight test requirements.

  3. Money and Credit With Limited Commitment and Theft

    OpenAIRE

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  4. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  5. 41 CFR 102-34.230 - How am I responsible for protecting Government motor vehicles?

    Science.gov (United States)

    2010-07-01

    ... theft or damage; and (b) Lock the unattended Government motor vehicle. (The only exception to this... protecting Government motor vehicles? 102-34.230 Section 102-34.230 Public Contracts and Property Management... 34-MOTOR VEHICLE MANAGEMENT Official Use of Government Motor Vehicles § 102-34.230 How am I...

  6. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  7. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  8. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  9. 49 CFR 567.5 - Requirements for manufacturers of vehicles manufactured in two or more stages.

    Science.gov (United States)

    2010-10-01

    ... applicable Federal Motor Vehicle Safety Standards, [and Bumper and Theft Prevention Standards, if applicable... 49 Transportation 6 2010-10-01 2010-10-01 false Requirements for manufacturers of vehicles... CERTIFICATION § 567.5 Requirements for manufacturers of vehicles manufactured in two or more stages. (a...

  10. Revision of Paschen's Law Relating to the ESD of Aerospace Vehicle Surfaces

    Science.gov (United States)

    Hogue, Michael D.; Cox, Rachel E.; Mulligan, Jaysen; Kapat, Jayanta; Ahmed, Kareem; Wilson, Jennifer G.; Calle, Luz M.

    2017-01-01

    The purpose of this work is to develop a version of Paschen's law that takes into account the flow of ambient gas past electrode surfaces. Paschen's law does not consider the flow of gas past an aerospace vehicle whose surfaces may be triboelectrically charged by dust or ice crystal impingement while traversing the atmosphere. The basic hypothesis of this work is that the number of electron-ion pairs created per unit distance between electrode surfaces is mitigated by the electron-ion pairs removed per unit distance by the flow of gas. The revised theoretical model must be a function of the mean velocity vxm of the ambient gas and reduce to Paschen's law when the mean velocity is zero. A new theoretical formulation of Paschen's law, taking into account the Mach number and compressible dynamic pressure, derived by the authors, will be discussed. This equation has been evaluated by wind tunnel experimentation. Initial data of the baseline wind tunnel experiments show results consistent with the hypothesis. This work may enhance the safety of aerospace vehicles through a redefinition of electrostatic launch commit criteria. It is also possible for new products, such as antistatic coatings, to be formulated based on this data.

  11. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  12. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  13. 42 CFR 73.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  14. On the problem of making autonomous vehicles conform to traffic law

    NARCIS (Netherlands)

    Prakken, H.

    2017-01-01

    Autonomous vehicles are one of the most spectacular recent developments of Artificial Intelligence. Among the problems that still need to be solved before they can fully autonomously participate in traffic is the one of making their behaviour conform to the traffic laws. This paper discusses this

  15. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  16. Dog Theft: A Case for Tougher Sentencing Legislation

    Science.gov (United States)

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  17. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  18. Developmental Trajectories of Male Physical Violence and Theft

    Science.gov (United States)

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  19. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  20. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  1. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  2. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  3. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  4. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  5. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  6. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  7. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  8. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  9. 49 CFR 545.6 - Reporting requirements for vehicles listed in § 541.3(a)(1).

    Science.gov (United States)

    2010-10-01

    ... VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.6 Reporting requirements for vehicles listed in § 541.3(a)(1). (a) General reporting requirements. Within 60 days after the... 49 Transportation 6 2010-10-01 2010-10-01 false Reporting requirements for vehicles listed in Â...

  10. 49 CFR 545.7 - Reporting requirements for vehicles listed in § 541.3(b)(2).

    Science.gov (United States)

    2010-10-01

    ... VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.7 Reporting requirements for vehicles listed in § 541.3(b)(2). (a) General reporting requirements. Within 60 days after the... 49 Transportation 6 2010-10-01 2010-10-01 false Reporting requirements for vehicles listed in Â...

  11. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    Science.gov (United States)

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  12. Combating employee theft in the healthcare industry.

    Science.gov (United States)

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  13. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  14. On the electricity shortage, price and electricity theft nexus

    International Nuclear Information System (INIS)

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  15. 新型盗窃行为探析%An Analysis of the New types of Act of Theft

    Institute of Scientific and Technical Information of China (English)

    韩梅

    2013-01-01

    The 8th Amendment of the Criminal Law has added three new types act of theft, which makes the objective essentials of constituting crimes tend to be specific relatively. To study and discuss the new types of act of theft will be helpful for grasping the essence of theft and preventing such crimes more precisely. Indoor theft refers to an act entering relatively isolated residences of others’ living illegally to steal their properties. Theft with weapons refers to an act that the actor carrying the portable weapons banned in the country or other weapons to steal. Pick-pocketing refers to an act that the actor steals others’ properties in public places.%  《刑法修正案(八)》增加了三种新的盗窃行为类型,使盗窃罪的客观构成要件相对趋向于具体化。入户盗窃,是指非法进入他人生活的与外界相对隔离的住所窃取他人财物;携带凶器盗窃,是指行为人随身携带国家禁止个人携带的器械或其他器械进行盗窃的行为;扒窃是指行为人在公共场所盗窃别人随身的财物。对三种新类型盗窃行为方式的研究和探讨,有助于更准确地把握盗窃罪的实质和预防此类犯罪。

  16. Tricks of the trade: Mechanism of brood theft in an ant.

    Science.gov (United States)

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  17. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  18. Computer ethics and cyber laws to mental health professionals.

    Science.gov (United States)

    Raveesh, B N; Pande, Sanjay

    2004-04-01

    The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or as theft? Should ordinary communications be encrypted using codes that make it impossible for law-enforcement agencies to perform wiretaps? As we develop shared understandings and norms of behaviour, we are setting standards that will govern the information society for decades to come.

  19. Electrical injuries due to theft of copper.

    Science.gov (United States)

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  20. Deterring and remedying employee theft.

    Science.gov (United States)

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  1. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Science.gov (United States)

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  2. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  3. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Science.gov (United States)

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  4. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    Science.gov (United States)

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  5. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  6. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  7. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Science.gov (United States)

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  8. 49 CFR Appendix A to Part 591 - Section 591.5(f) Bond for the Entry of a Single Vehicle

    Science.gov (United States)

    2010-10-01

    ... VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. A Appendix A to Part 591—Section 591.5(f) Bond for the Entry of a Single Vehicle Department of Transportation... Vehicle A Appendix A to Part 591 Transportation Other Regulations Relating to Transportation (Continued...

  9. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  10. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  11. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  12. A Malaysian Vehicle License Plate Localization and Recognition System

    Directory of Open Access Journals (Sweden)

    Ganapathy Velappa

    2008-02-01

    Full Text Available Technological intelligence is a highly sought after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. In this paper, a license plate localization and recognition system for vehicles in Malaysia is proposed. This system is developed based on digital images and can be easily applied to commercial car park systems for the use of documenting access of parking services, secure usage of parking houses and also to prevent car theft issues. The proposed license plate localization algorithm is based on a combination of morphological processes with a modified Hough Transform approach and the recognition of the license plates is achieved by the implementation of the feed-forward backpropagation artificial neural network. Experimental results show an average of 95% successful license plate localization and recognition in a total of 589 images captured from a complex outdoor environment.

  13. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  14. Sim-based detection tools to minimize motorcycle theft

    Science.gov (United States)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  15. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  16. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  17. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  18. The Protection of Consumer’s Rights and the Application of Criminal Law in the Unlawful Operation of Services and Content Service Application

    Directory of Open Access Journals (Sweden)

    Edmon Makarim

    2012-05-01

    Full Text Available Media reports on cases of the theft of pre-paid pulses taking place nowadays have created a misunderstanding in terms of the appropriate application of criminal law. In the context of existing legal provisions concerning consumer protection as set forth both under the Consumer Protection Law as well as in part under the Telecommunications Law, law enforcement agencies are leaning towards applying general criminal provisions (theft which, after a careful observation of the Indonesian Criminal Code, in fact do not extend to corporate criminal acts. This paper purports to explain that the currently occurring cases of the theft of pre-paid pulses should be adequately dealt with by imposing administrative sanctions by the governing and supervisory agencies, both under the Telecommunications Law as well as the Consumer Protection Law. It is proposed that it would be more effective to apply the Consumer Protection Law in such cases, as it contains provisions concerning the threat of alternative criminal punishment in the form of confinement or fines, along with additional sanctions in the form of an order to pay compensation for damages to consumers accompanied by the seizure and the halting of the application system in use by the Operator and/or CP concerned. It is proposed that in administering a proper telecommunications system to the public, the application of the Consumer Protection Law is likely to be less counterproductive as opposed to the application of general criminal provisions, considering that the latter are contradictory to the principles of legal certainty and partnership mandated under the Telecommunications Law itself.

  19. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  20. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  1. New consumer load prototype for electricity theft monitoring

    International Nuclear Information System (INIS)

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  2. New consumer load prototype for electricity theft monitoring

    Science.gov (United States)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  3. 49 CFR 544.4 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... coverage means the indemnification of motor vehicle owners by an insurer against losses due to fire, theft... that issue motor vehicle insurance policies, vehicle theft means an actual physical removal of a motor... lease and not covered by theft insurance policies issued by insurers of motor vehicles, “vehicle theft...

  4. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    OpenAIRE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  5. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    International Nuclear Information System (INIS)

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  6. Kleptomania or common theft - diagnostic and judicial difficulties.

    Science.gov (United States)

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  7. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  8. High-Alpha Research Vehicle Lateral-Directional Control Law Description, Analyses, and Simulation Results

    Science.gov (United States)

    Davidson, John B.; Murphy, Patrick C.; Lallman, Frederick J.; Hoffler, Keith D.; Bacon, Barton J.

    1998-01-01

    This report contains a description of a lateral-directional control law designed for the NASA High-Alpha Research Vehicle (HARV). The HARV is a F/A-18 aircraft modified to include a research flight computer, spin chute, and thrust-vectoring in the pitch and yaw axes. Two separate design tools, CRAFT and Pseudo Controls, were integrated to synthesize the lateral-directional control law. This report contains a description of the lateral-directional control law, analyses, and nonlinear simulation (batch and piloted) results. Linear analysis results include closed-loop eigenvalues, stability margins, robustness to changes in various plant parameters, and servo-elastic frequency responses. Step time responses from nonlinear batch simulation are presented and compared to design guidelines. Piloted simulation task scenarios, task guidelines, and pilot subjective ratings for the various maneuvers are discussed. Linear analysis shows that the control law meets the stability margin guidelines and is robust to stability and control parameter changes. Nonlinear batch simulation analysis shows the control law exhibits good performance and meets most of the design guidelines over the entire range of angle-of-attack. This control law (designated NASA-1A) was flight tested during the Summer of 1994 at NASA Dryden Flight Research Center.

  9. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  10. Design Specification for a Thrust-Vectoring, Actuated-Nose-Strake Flight Control Law for the High-Alpha Research Vehicle

    Science.gov (United States)

    Bacon, Barton J.; Carzoo, Susan W.; Davidson, John B.; Hoffler, Keith D.; Lallman, Frederick J.; Messina, Michael D.; Murphy, Patrick C.; Ostroff, Aaron J.; Proffitt, Melissa S.; Yeager, Jessie C.; hide

    1996-01-01

    Specifications for a flight control law are delineated in sufficient detail to support coding the control law in flight software. This control law was designed for implementation and flight test on the High-Alpha Research Vehicle (HARV), which is an F/A-18 aircraft modified to include an experimental multi-axis thrust-vectoring system and actuated nose strakes for enhanced rolling (ANSER). The control law, known as the HARV ANSER Control Law, was designed to utilize a blend of conventional aerodynamic control effectors, thrust vectoring, and actuated nose strakes to provide increased agility and good handling qualities throughout the HARV flight envelope, including angles of attack up to 70 degrees.

  11. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  12. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  13. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  14. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  15. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  16. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  17. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  18. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  19. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  20. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Science.gov (United States)

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  1. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  2. Economic analysis of a Japanese air pollution regulation : an optimal retirement problem under vehicle type regulation in the NOx-particulate matter law

    Science.gov (United States)

    2008-06-01

    This paper empirically examines the vehicle type regulation that was introduced under the : Automobile Nitrogen OxidesParticulate Matter Law to mitigate air pollution problems in Japanese metropolitan areas. The vehicle type regulation effectively...

  3. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  4. Modeling Hot Spot Motor Vehicle Theft Crime in Relation to Landuse and Settlement Patterns

    Directory of Open Access Journals (Sweden)

    Djaka Marwasta

    2004-01-01

    Full Text Available The crowd of Yogyakarta urban has impacted its surrounding area, including Depok sub district, which is indicated by the rising of physical development, for example education facilities and settlements. The progress does not only bring positive impact, but also negative impact for instance the rising of crime number i.e. motor vehicle robbery. The aims of this research are 1 mapping motor vehicle robbery data as the distribution map and identifying motor vehicle robbery hot spot base on distrbution map; and 2 studying the correlation of motor vehicle robbery hot spot with physical environment phenomena, i.e. land use type and settlement pattern. The research method consists of two parts; they are motor vehicle robbery cluster analysis and the relation of motor vehicle robbery and physical environment analysis. Motor vehicle robbery cluster analysis is using distribution data, which analyzes the distribution into motor vehicle robbery hot spot with nearest neighbor tehnique. Contingency coefficient and frequency distribution analysis is used to analyze the correlation of motor vehicle robbery hot spot and physical environment. Contingency coefficient is used to study the relation of motor vehicle robbery hot spot polygon with physical environment condition, whereas frequency distribution is used to study the distribution of motor vehicle robbery in the hot spot with physical environment condition. Physical environment which consists of land use type, housing density, house regularity pattern, and the average of building size, are obtained from interpretation of black and white panchromatic aerial photograph year 2000, in the scale 1 : 20.000. the most motor vehicle robbery hot spot is found on the settlement area, 68,3% from 378 motor vehicle robbery cases in the hot spot. The seond level is found on the education area (16.4%. The most motor vehicle hot spot in the settlement is found on the hight density and irregular settlement, which have big

  5. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Science.gov (United States)

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  6. 78 FR 72749 - Reports, Forms and Record Keeping Requirements; Agency Information Collection Activity Under OMB...

    Science.gov (United States)

    2013-12-03

    ... Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards. OMB Number: 2127-0002... Federal motor vehicle safety, bumper, and theft prevention standards administered by NHTSA. The... vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper, and theft...

  7. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  8. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  9. Economic analysis of Japanese air pollution regulation : an optimal retirement problem under the vehicle type regulation in the NOx-particulate matter law

    Science.gov (United States)

    2009-05-01

    This paper examines the vehicle type regulation that was introduced under the Automobile : Nitrogen OxidesParticulate Matter Law to mitigate air pollution in Japanese metropolitan : areas. The vehicle type regulation effectively sets the timing fo...

  10. When should virtual cybercrime be brought under the scope of the criminal law?

    NARCIS (Netherlands)

    Strikwerda, Litska; Rogers, Marcus; Seigfried-Spellar, Kathryn C.

    2012-01-01

    This paper is about the question when virtual cybercrime should be brought under the scope of the criminal law. By virtual cybercrime I mean crime that involves a specific aspect of computers or computer networks: virtuality. Examples of virtual cybercrime are: virtual child pornography, theft of

  11. Ultrasonic intrusion sensor using the Doppler effect; Choonpa Doppler hoshiki shinnyu sensor

    Energy Technology Data Exchange (ETDEWEB)

    Kani, H; Iwasaki, N; Goto, M [Nippon Soken, Inc., Tokyo (Japan); Tsuzuki, T; Nakamura, T [Denso Corp., Aichi (Japan)

    1997-10-01

    For vehicle anti-theft alarm systems which cope with vehicle and car component theft, EU initiated vehicle security regulations from Jan 1997. Also, the insurance industry has instituted the insurance certification of vehicle anti-theft alarm systems. We have developed an ultrasonic intrusion sensor using the doppler effect for vehicle anti-theft alarm systems specifically for these EU regulations and insurance certification. 2 refs., 7 figs., 1 tab.

  12. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  13. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  14. 76 FR 20298 - Insurer Reporting Requirements; List of Insurers; Required To File Reports

    Science.gov (United States)

    2011-04-12

    ... vehicle insurers that are required to file reports on their motor vehicle theft loss experiences. An... the agency. Each insurer's report includes information about thefts and recoveries of motor vehicles... more vehicles not covered by theft insurance policies issued by insurers of motor vehicles, other than...

  15. 75 FR 34966 - Insurer Reporting Requirements; List of Insurers Required To File Reports

    Science.gov (United States)

    2010-06-21

    ... vehicle insurers that are required to file reports on their motor vehicle theft loss experiences. An... the agency. Each insurer's report includes information about thefts and recoveries of motor vehicles... vehicles not covered by theft insurance policies issued by insurers of motor vehicles, other than any...

  16. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  17. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  18. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  19. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  20. 77 FR 28343 - Insurer Reporting Requirements; List of Insurers Required To File Reports

    Science.gov (United States)

    2012-05-14

    ... vehicle insurers that are required to file reports on their motor vehicle theft loss experiences. An... vehicles not covered by theft insurance policies issued by insurers of motor vehicles, other than any... than any governmental entity) used for rental or lease whose vehicles are not covered by theft...

  1. Prevalence of smoke-free car and home rules in Maine before and after passage of a smoke-free vehicle law, 2007-2010.

    Science.gov (United States)

    Murphy-Hoefer, Rebecca; Madden, Patrick; Maines, Dorean; Coles, Carol

    2014-01-16

    This is the first study to examine the prevalence of self-reported smoke-free rules for private cars and homes before and after the passage of a smoke-free vehicle law. Data were examined for 13,461 Maine adults aged 18 or older who participated in the Behavioral Risk Factor Surveillance System, a state-based telephone survey covering health topics. Self-reported smoke-free car and home rules, smoking behavior, and demographic variables of age, sex, education, income, and children in household were analyzed for prevalence before and after the state's smoke-free vehicle law was passed. Prevalence of smoke-free car and home rules was significantly higher after Maine's smoke-free vehicle law was passed in the state (P = .004 for car rules and P = .009 for home rules). Variations in smoking rules differed by smoking and demographic variables. People with household incomes of less than $20,000 saw an increase of 14.3% in smoke-free car rules; overall, those with annual incomes of less than $20,000 and those with less than a high school education reported a lower prevalence of smoke-free car rules both before and after the law was passed than did people with higher incomes and higher education levels. The prevalence of smoke-free home rules after the law was implemented was higher among those with 4 or more years of college education than among those with lower levels of education (P = .02). The prevalence of smoke-free car and home rules among Maine adults was significantly higher after the passage of a statewide smoke-free vehicle law. This apparent change in smoke-free rule prevalence may be indicative of changing social norms related to the unacceptability of secondhand smoke exposure.

  2. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Directory of Open Access Journals (Sweden)

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  3. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  4. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  5. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  6. 49 CFR 543.2 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.2 Purpose. The purpose of... passenger motor vehicles to obtain an exemption from the parts-marking requirements of the vehicle theft... motor vehicle theft as compliance with the parts-marking requirements. This part also provides the...

  7. 49 CFR 591.5 - Declarations required for importation.

    Science.gov (United States)

    2010-10-01

    ... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... theft prevention standards. (b) The vehicle or equipment item conforms with all applicable safety... with all applicable Federal motor vehicle safety, bumper, and theft prevention standards, but is...

  8. Complex motion of a vehicle through a series of signals controlled by power-law phase

    Science.gov (United States)

    Nagatani, Takashi

    2017-07-01

    We study the dynamic motion of a vehicle moving through the series of traffic signals controlled by the position-dependent phase of power law. All signals are controlled by both cycle time and position-dependent phase. The dynamic model of the vehicular motion is described in terms of the nonlinear map. The vehicular motion varies in a complex manner by varying cycle time for various values of the power of the position-dependent phase. The vehicle displays the periodic motion with a long cycle for the integer power of the phase, while the vehicular motion exhibits the very complex behavior for the non-integer power of the phase.

  9. 75 FR 1548 - Insurer Reporting Requirements; List of Insurers Required To File Reports

    Science.gov (United States)

    2010-01-12

    ... vehicle insurers that are required to file reports on their motor vehicle theft loss experiences. An.... Each insurer's report includes information about thefts and recoveries of motor vehicles, the rating... state and; (3) rental and leasing companies with a fleet of 20 or more vehicles not covered by theft...

  10. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  11. Protection of endangered intangible assets specific insight into the role of the law

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2011-01-01

    Full Text Available There will always be states and corporations that will want and try to appropriate possessions of others without any intellectual or financial investments. Such a 'theft' is made easier by the fact that the owners of a certain property either have no awareness of its significance or tend to neglect the threats of a potential theft. For those, who naively believe that they don't possess property which will be 'attacked' by someone, and they don't want to know that it should be protected, and how to protect it, but the moment of sobering will be the moment of destruction. It is often wrongly assumed that intangible assets includes only brands, patents, information and similar. According to modern interpretations the intangible assets includes also the summary of knowledge, skills and experiences of the employees. In the Republic of Serbia also much more attention is paid to physical and technical protection of the material than of the intangible assets. In percentage terms the protection of employees, proprietors and owners as well as protection of business is so small that it is almost nonexistent. By analyzing historical data it has been decided that protection had always been behind the theft methods. It can also be concluded that the protection used to be efficient only for a limited and relatively short period of time. The problems of protection today lies in the fact that, being non-material, intangible assets does not actually need to be physically stolen so that the number of modalities of thefts and appropriation in different ways has considerably increased. Its protection today means adoption of such a massive protective system which, quite often, exceeds the capabilities of the owner. The significance of the intangible assets protection is best confirmed by the fact that is has been regulated in numerous multilateral as well as bilateral conventions and agreements. The law, actually, emerges as the basis, method and limitation of the

  12. 78 FR 12623 - Insurer Reporting Requirements

    Science.gov (United States)

    2013-02-25

    ... NHTSA's regulation requiring motor vehicle insurers to submit information on the number of thefts and recoveries of insured vehicles and actions taken by the insurer to deter or reduce motor vehicle theft. NHTSA..., which requires insurers to submit information about the make, model, and year of all vehicle thefts, the...

  13. 78 FR 7484 - Insurer Reporting Requirements; Reports Under 49 U.S.C. on Section 33112(c)

    Science.gov (United States)

    2013-02-01

    .... SUMMARY: This notice announces publication by NHTSA of the annual insurer report on motor vehicle theft... information on theft and recovery of vehicles; rating rules and plans used by motor vehicle insurers to reduce premiums due to a reduction in motor vehicle thefts; and actions taken by insurers to assist in deterring...

  14. 76 FR 41138 - Insurer Reporting Requirements; List of Insurers Required To File Reports

    Science.gov (United States)

    2011-07-13

    ... passenger motor vehicle insurers that are required to file reports on their motor vehicle theft loss... information about thefts and recoveries of motor vehicles, the rating rules used by the insurer to establish... companies with a fleet of 20 or more vehicles not covered by theft insurance policies issued by insurers of...

  15. 76 FR 77183 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2011-12-12

    ... stress and confusion relating to fundamental differences in how one operates a vehicle. This is... that are used to stop the vehicle engine or other propulsion system and that do not involve the use of...: Attempts to shut down the propulsion system without first moving the gear selection control to the ``park...

  16. What's the law got to do with it? Legislation regarding in-vehicle technology use and its impact on driver distraction.

    Science.gov (United States)

    Parnell, Katie J; Stanton, Neville A; Plant, Katherine L

    2017-03-01

    Legislation in the road transport domain aims to control safety on the roads. Despite this, a critical issue affecting road safety is that of driver distraction. Although poorly defined, distraction is a significant road safety issue which, in part, is caused by the prevalence of technology within vehicles. Legislation surrounding the use of in-vehicle technologies are explored in this paper from a socio-technical system perspective. This reveals the wider context of the road transport system operating under the current laws using an Accimap analysis. A distinction in the law between the use of hand-held mobile phones, a device that is typically banned for use by drivers worldwide, and the use of other technological devices that are covered by more general laws against 'careless' and/or 'dangerous' driving was found. Historically, individual drivers' have been blamed for distraction, whereas the systems approach shows how current legislation may have created the conditions necessary for driver distraction. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    CERN Multimedia

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  18. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    CERN Multimedia

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  19. 49 CFR 541.4 - Definitions.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... same make. (4) 1990/91 median theft rate means 3.5826 thefts per thousand vehicles produced. (5... surface means, with respect to a vehicle part, a surface that is not directly exposed to sun and...

  20. 76 FR 6514 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-02-04

    ... Vehicle Theft Prevention Standard (49 CFR Part 543). OMB Control Number: 2127-0542. Form Number: None... theft prevention standard to provide for the identification of certain motor vehicles and their major replacement parts to impede motor vehicle theft. 49 U.S.C. 33106 provides for an exemption to this...

  1. 28 CFR 29.2 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... used automobile dealerships. (c) The Program refers to the National Voluntary Motor Vehicle Theft... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.2 Definitions. For the purposes of this part: (a) The Act or the MVTPA means the Motor Vehicle Theft Prevention Act. (b) Owner...

  2. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  3. 76 FR 30424 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-05-25

    ... Exemption from the Vehicle Theft Prevention Standard (49 CFR Part 543). OMB Control Number: 2127-0542. Type... to promulgate a theft prevention standard to provide for the identification of certain motor vehicles and their major replacement parts to impede motor vehicle theft. 49 U.S.C. 33106 provides for an...

  4. 75 FR 54041 - Insurer Reporting Requirements; List of Insurers Required To File Reports

    Science.gov (United States)

    2010-09-03

    .... Each insurer's report includes information about thefts and recoveries of motor vehicles, the rating... state and; (3) Rental and leasing companies with a fleet of 20 or more vehicles not covered by theft...) used for rental or lease whose vehicles are not covered by theft insurance policies issued by insurers...

  5. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  6. Handling stolen goods in Iranian and English criminal law

    Directory of Open Access Journals (Sweden)

    Sayyed Mohammad Hoseini

    2014-07-01

    Full Text Available Handling stolen goods has been recognized as an independent offence in both Iranian and English law. Committing this offence, tacitly support those actions that are called theft. However, penal policy of Iran’s legislator does not provide effective fighting against the handlers of stolen goods. In others words, comparing the two Iranian and English legal system, make this issue clear that criminalization of stolen goods has some restrictions about physical element as well as the amount of relevant punishment that we can have more effective fighting against supporting factors of larceny with eliminating them and hereto, in the course of exercising appropriate reaction to the handlers, reducing the offence of theft. The article seeks to recommend some solutions for a better penal policy, such as increasing punishment of the offence and extending the scope of its physical behaviour, through comparative analysis of the offence of stolen goods; meanwhile different elements of the offence have been studied.

  7. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  8. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  9. Registration of vehicles at the Gex sous-préfecture: now by appointment only

    CERN Multimedia

    2016-01-01

    The Gex sous-préfecture has informed CERN that it has taken the following steps in order to reduce waiting times at its counters for the issue of carte grise vehicle registration certificates. As of 1 February 2016, you must book an appointment via the website http://www.rdv.ain.gouv.fr/ for all services relating to the registration of vehicles, in particular the:   change of the holder of a registration certificate, issue of a certificat de situation administrative (administrative status certificate required for the sale of a vehicle), change of marital status (or company name in the case of legal entities), change of address, change in the technical specification of the vehicle, corrections to registration certificates, equests for duplicates (loss or theft of registration certificates), registration of a diplomatic vehicle (CERN), registration of a new vehicle, registration of vehicles purchased tax-free in the Pays de Gex free zone (formerly TTW series), and import of vehicles (from ...

  10. Delaney and the Motor Vehicle Insurance Directives: Lessons for the Teaching of EU Law

    OpenAIRE

    Marson, James; Ferris, Katy

    2016-01-01

    A recent series of cases relating to the EU Motor Vehicle Insurance Directives and their application in the UK makes for interesting reading. It is the UK’s negligent transposition, and a lack of knowledge and awareness by lawyers and judges in the cases of the interaction between domestic and EU law, which compounds the negative effects. The issues raised in Delaney v Pickett [2011] and Delaney v Secretary of State [2014] do not just generate concern as to the implications they have for the ...

  11. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    Science.gov (United States)

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  12. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Science.gov (United States)

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  13. Autonomous Vehicles: A Policy Roadmap for Law Enforcement

    Science.gov (United States)

    2015-09-01

    autonomous vehicle , vehicles , self - driving car , automated...the fault of the autonomous vehicle .6 In other words, human error was the fault in all of the collisions and the self - driving car has NEVER caused a...32 David Shamah, “As Google Dreams of Driverless Cars , IDF Deploys Them: Self Driving Vehicles Are not New for the Israeli Army, and a

  14. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  15. 32 CFR 635.27 - Vehicle Registration System.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Vehicle Registration System. 635.27 Section 635.27 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Offense Reporting § 635.27 Vehicle Registration System. The Vehicle Registration System (VR...

  16. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Science.gov (United States)

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  17. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Directory of Open Access Journals (Sweden)

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  18. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  19. Prediksi Kerawanan Wilayah Terhadap Tindak Pencurian Sepeda Motor Menggunakan Metode (S)ARIMA Dan CART

    OpenAIRE

    Utomo, Pradita Eko Prasetyo; SN, Azhari

    2017-01-01

    Motor vehicle theft is a crime that is most common in Indonesia. Growth of vehicle motorcycle significant in each year accompanied by the increasing theft of motorcycles in each year, we need a system that is able to forecast the development and the theft of the motorcycle. This research proposes the development of forecasting models vulnerability criminal offense of theft of motorcycles with ARIMA forecasting method. This method not only forecast from variable of theft but also residents...

  20. Reducing theft and embezzlement by encouraging ethical behavior.

    Science.gov (United States)

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  1. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  2. Securing Public Safety Vehicles: Reducing Vulnerabilities by Leveraging Smart Technology and Design Strategies

    Science.gov (United States)

    2013-12-01

    there are technologies available today that would reduce the risk of vehicle theft and misuse by fortifying vulnerabilities. They offer several levels...confirm identity by identify “what I am (what I do)” in the electronic context of “who am I?”80 Furthermore, biometrics is a digital representation of...can build a comprehensive and effective biometric identification system, improve overall performance, improve system robustness, and reduce the

  3. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  4. The tariff for fire and theft car insurance: analysis with a Cox model

    OpenAIRE

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  5. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    CERN Multimedia

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  6. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Science.gov (United States)

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  7. 49 CFR 541.2 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.2 Purpose. The purpose of this standard is to reduce the incidence of motor vehicle thefts by facilitating the tracing and recovery of parts from stolen vehicles. ...

  8. Fighting the scourge of metal theft.

    Science.gov (United States)

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  9. 76 FR 57103 - Reports, Forms and Recordkeeping Requirements Agency Information Collection Activity Under OMB...

    Science.gov (United States)

    2011-09-15

    ... Federal Motor Vehicle Theft Prevention Standard was extended to include all passenger cars and... Vehicle Theft Prevention Standard (Part 541), all passenger cars, and multipurpose passenger vehicles with..., 565 and 567. Part 541 The Motor Vehicle Information and Cost Savings Act was amended by the Anti-Car...

  10. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  11. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  12. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  13. 75 FR 19673 - Petition for Exemption From the Vehicle Theft Prevention Standard; Saab

    Science.gov (United States)

    2010-04-15

    ... content requirements of Sec. 543.6. Saab stated that before the vehicle can operate, driver authentication... device will provide the five types of performance listed in Sec. 543.6(a)(3): promoting activation...

  14. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  15. 75 FR 15621 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2010-03-30

    ... indication either in the text of the K.T. Safety Act or its associated legislative history that Congress... why a decision was made to operate these vehicles in this fashion. In short, we are not convinced that...

  16. 49 CFR 591.2 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.2 Purpose. The purpose of this part is to ensure that motor vehicles and motor vehicle equipment permanently imported into the United States conform with theft...

  17. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  18. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  19. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  20. Details of criminological investigations of large-valued thefts related to nuclear materials (diversion safeguards program)

    International Nuclear Information System (INIS)

    Leachman, R.B.; Cornella, A.P.

    1972-06-01

    Studies were made of five areas of criminology which have great similarity to the case of nuclear materials. Actual cases of crimes were analyzed by experts in law enforcement and criminal justice. To identify fields of analogous criminology, possible characteristics of nuclear material thefts were considered: total value, high unit cost, limited marketability, special technology for handling, and licensing. The items considered to be analogous to nuclear materials in these aspects were: narcotics, data (as exists in computer memories, tapes, or discs), precious metal and gems, objects of art, and weapons. A criminology survey was conducted in which 509 individuals received one or more questionnaires soliciting opinion responses. Sixty-five questionnaires were returned. Eighty-four individuals replied by letter indicating inadequate knowledge of the crimes being surveyed. The questionnaire was supplemented by 18 interviews with criminal justice and industry personnel for more definitive information on diversion problems. Results of this survey are reported

  1. 49 CFR 591.4 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... (other than a damage settlement in connection with a recovered theft vehicle unless such motor vehicle..., DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.4 Definitions. All terms used in this part that are defined...

  2. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  3. Vehicle access and search training manual. Report for Oct 77-sep 79

    International Nuclear Information System (INIS)

    Obermiller, J.E.; Wait, H.J.

    1979-11-01

    This Vehicle Access and Search Training Manual is intended to assist NRC-licensed organizations and their security personnel in developing vehicle access, control and search operations necessary at nuclear fuel cycle facilities and at reactor facilities. The manual is based on security requirements prescribed by The Nuclear Regulatory Commission as contained in Title 10 of the Code of Federal Regulations, Part 73, 'Physical Protection of Plants and Materials.' As a condition of the licensing agreement, the licensee is required to maintain a physical protection system which includes a training program for security personnel. The manual includes lesson plans in (1) controlling vehicle entry and exit, (2) searching for contraband, and (3) protecting the facility from sabotage and/or theft of special nuclear materials. These training guidelines provide information and instruction for self-study, discussion and hands-on training. A job knowledge test reviews the entire training program

  4. Towards creating believable decoy project folders for detecting data theft

    NARCIS (Netherlands)

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  5. 49 CFR 544.2 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... Theft Prevention to prevent or discourage the theft of motor vehicles, to prevent or discourage the sale or distribution in interstate commerce of used parts removed from stolen motor vehicles, and to help reduce the cost to consumers of comprehensive insurance coverage for motor vehicles. [62 FR 33756, June...

  6. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  7. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  8. Theft detection and smart metering practices and expectations in the Netherlands

    NARCIS (Netherlands)

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  9. 32 CFR 634.26 - Traffic law enforcement principles.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic law enforcement principles. 634.26 Section 634.26 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW... law enforcement principles. (a) Traffic law enforcement should motivate drivers to operate vehicles...

  10. Copper wire theft and high voltage electrical burns

    OpenAIRE

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  11. Prediksi Kerawanan Wilayah Terhadap Tindak Pencurian Sepeda Motor Menggunakan Metode (SARIMA Dan CART

    Directory of Open Access Journals (Sweden)

    Pradita Eko Prasetyo Utomo

    2017-07-01

    Full Text Available Motor vehicle theft is a crime that is most common in Indonesia. Growth of vehicle motorcycle significant in each year accompanied by the increasing theft of motorcycles in each year, we need a system that is able to forecast the development and the theft of the motorcycle. This research proposes the development of forecasting models vulnerability criminal offense of theft of motorcycles with ARIMA forecasting method. This method not only forecast from variable of theft but also residents, vehicles and unemployment. The study also determined the classification level of vulnerability to the crime of theft of a motorcycle using a method based on the Decision Tree CART ARIMA forecasting method. Forecasting time series data with ARIMA method performed by each of the variables to produce the best ARIMA forecasting model which varies based on the data pattern of each of those variables. The results of classification by CART method to get the value of accuracy of 92% for the city of Yogyakarta and 85% for DIY. Based on the above, the results of ARIMA forecasting and classification CART can be used in determining the level of vulnerability to the crime of theft of motorcycles.

  12. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  13. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  14. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  15. Exponential Stabilization of Underactuated Vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Pettersen, K.Y.

    1996-12-31

    Underactuated vehicles are vehicles with fewer independent control actuators than degrees of freedom to be controlled. Such vehicles may be used in inspection of sub-sea cables, inspection and maintenance of offshore oil drilling platforms, and similar. This doctoral thesis discusses feedback stabilization of underactuated vehicles. The main objective has been to further develop methods from stabilization of nonholonomic systems to arrive at methods that are applicable to underactuated vehicles. A nonlinear model including both dynamics and kinematics is used to describe the vehicles, which may be surface vessels, spacecraft or autonomous underwater vehicles (AUVs). It is shown that for a certain class of underactuated vehicles the stabilization problem is not solvable by linear control theory. A new stability result for a class of homogeneous time-varying systems is derived and shown to be an important tool for developing continuous periodic time-varying feedback laws that stabilize underactuated vehicles without involving cancellation of dynamics. For position and orientation control of a surface vessel without side thruster a new continuous periodic feedback law is proposed that does not cancel any dynamics, and that exponentially stabilizes the origin of the underactuated surface vessel. A further issue considered is the stabilization of the attitude of an AUV. Finally, the thesis discusses stabilization of both position and attitude of an underactuated AUV. 55 refs., 28 figs.

  16. Copper wire theft and high voltage electrical burns.

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  17. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  18. Copper wire theft and high voltage electrical burns

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  19. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  20. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  1. 77 FR 65767 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2012-10-30

    ... (RFHM), Ignition Node Module (IGNM), Engine Control Module, Body Controller Module, Sentry Key... disable engine operation and immobilize the vehicle after two seconds of running. This process is also...

  2. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  3. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  4. 76 FR 68260 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2011-11-03

    ...), Ignition Node Module (IGNM), Engine Control Module (ECM), Body Controller Module (BCM), Sentry Key... and immobilize the vehicle after two seconds of running. This process is also similar for the keyless...

  5. 76 FR 35270 - Reports, Forms, and Recordkeeping Requirements

    Science.gov (United States)

    2011-06-16

    ... respond, including the use of appropriate automated, electronic, mechanical, or other technological... the Anti-Car Theft Act of 1992 (Pub. L. 102-519). The enacted Theft Act requires specified parts of... cars and multipurpose passenger vehicles with a gross vehicle weight rating of 6,000 pounds or less...

  6. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  7. Policy Brief: What is the Legal Framework for Automated Vehicles in Texas?

    Science.gov (United States)

    2017-11-01

    During the 85th Texas Legislature in 2017, Texas enacted a law related to automated vehicles. The bill, SB 2205, creates the legal framework for automated vehicle operation and testing in Texas. Although this law addresses a number of issues that can...

  8. 32 CFR 634.41 - Compliance with State laws.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Compliance with State laws. 634.41 Section 634.41 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.41 Compliance with State laws. (a) Installation commanders...

  9. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  10. Emergence of power-law in a market with mixed models

    Science.gov (United States)

    Ali Saif, M.; Gade, Prashant M.

    2007-10-01

    We investigate the problem of wealth distribution from the viewpoint of asset exchange. Robust nature of Pareto's law across economies, ideologies and nations suggests that this could be an outcome of trading strategies. However, the simple asset exchange models fail to reproduce this feature. A Yardsale (YS) model in which amount put on the bet is a fraction of minimum of the two players leads to condensation of wealth in hands of some agent while theft and fraud (TF) model in which the amount to be exchanged is a fraction of loser's wealth leads to an exponential distribution of wealth. We show that if we allow few agents to follow a different model than others, i.e., there are some agents following TF model while rest follow YS model, it leads to distribution with power-law tails. Similar effect is observed when one carries out transactions for a fraction of one's wealth using TF model and for the rest YS model is used. We also observe a power-law tail in wealth distribution if we allow the agents to follow either of the models with some probability.

  11. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  12. The problem of theft depravity in traditional Russian culture(middle of the 19th - beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Т В Лис

    2008-06-01

    Full Text Available This article touches upon the problem of perceiving and comprehending the theft within its interrelationship with the concept of sin, which is in its turn considered to be one of the most important notions of the Christian ethics. Considering this very aspect theft studies make it easy to pinpoint certain peculiarities of the traditional sense of justice and national morality. In terms of temporal perspective the idea of sin correlates with an image of theft victim. Then the larceny turns into a certain visitation for the recently committed offence or crime. Thus, we can draw up a certain cause-and-effect line: any crime or offence entails punishment, which is actually a crime aimed at somebody, who has committed the crime first. In this case we can talk about the synonymy of crime and punishment as well as about the cumulation of sin.

  13. 78 FR 53500 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2013-08-29

    ... Radio Frequency Hub Module (RFHM), Ignition Node Module (IGNM), Engine Control Module, Body Controller...) transceiver and a microprocessor and it initiates the ignition process by communicating with the BCM through... vehicles, the RFHM is connected to a Keyless Ignition Node (KIN) with a START/STOP push button as an...

  14. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  15. 32 CFR 634.33 - Training of law enforcement personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Training of law enforcement personnel. 634.33 Section 634.33 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.33 Training of law enforcement personnel. (a) A...

  16. Automated Vehicle Regulation: An Energy and Emissions Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Aaron

    2016-05-18

    This presentation provides a summary of the current automated vehicles polices in the United States and how they related to reducing greenhouse gas (GHG) emissions. The presentation then looks at future automated vehicle trends that will increase and reduce GHG emissions and what current policies utilized in other areas of law could be adapted for automated vehicle GHG emissions.

  17. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    National Research Council Canada - National Science Library

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  18. Tensegrity Models and Shape Control of Vehicle Formations

    OpenAIRE

    Nabet, Benjamin; Leonard, Naomi Ehrich

    2009-01-01

    Using dynamic models of tensegrity structures, we derive provable, distributed control laws for stabilizing and changing the shape of a formation of vehicles in the plane. Tensegrity models define the desired, controlled, multi-vehicle system dynamics, where each node in the tensegrity structure maps to a vehicle and each interconnecting strut or cable in the structure maps to a virtual interconnection between vehicles. Our method provides a smooth map from any desired planar formation shape ...

  19. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  20. 24 CFR 17.44 - Restrictions on certain claims.

    Science.gov (United States)

    2010-04-01

    ... by theft from quarters (as limited by paragraph (a) of § 17.45). In instances of theft from quarters, it must be conclusively shown that the quarters were locked at the time of the theft. Reimbursement... relation to the value of the property or the cost of the repairs. (d) Automobiles and other motor vehicles...

  1. 32 CFR 1903.15 - Preservation of property.

    Science.gov (United States)

    2010-07-01

    ...) Property Damage. Destroying or damaging private property. (b) Theft. The theft of private property, except..., the throwing of articles of any kind from or at buildings, vehicles, or persons while on an Agency...

  2. 75 FR 27934 - Qualified Nonpersonal Use Vehicles

    Science.gov (United States)

    2010-05-19

    ... law to carry firearms, execute search warrants, and to make arrests (other than merely a citizen's... safety officer vehicles occurring after May 19, 2010. FOR FURTHER INFORMATION CONTACT: Don Parkinson at... final Income Tax Regulations under section 274(i) added by section 2(b) of Public Law 99-44 (May 24...

  3. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  4. 76 FR 2631 - Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft...

    Science.gov (United States)

    2011-01-14

    ... Management receives them by February 28, 2011. ADDRESSES: Comments should refer to the docket and notice...://www.regulations.gov . Follow the online instructions for submitting comments. Mail: Docket Management... documentary proof of the vehicle's destruction, exportation, or abandonment within 15 days from the date of...

  5. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    OpenAIRE

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  6. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  7. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  8. Remote data entry and retrieval for law enforcement

    Science.gov (United States)

    Kwasowsky, Bohdan R.; Capraro, Gerard T.; Berdan, Gerald B.; Capraro, Christopher T.

    1997-02-01

    Law enforcement personnel need to capture and retrieve quality multimedia data in `real time' while in the field. This is not done today, for the most part. Most law enforcement officers gather data on handwritten forms and retrieve data via voice communications or fax. This approach is time consuming, costly, prone to errors, and may require months before some data are entered into a usable law enforcement database. With advances in the computing and communications industries, it is now possible to communicate with anyone using a laptop computer or personal digital assistant (PDA), given a phone line, an RF modem, or cellular capability. Many law enforcement officers have access to laptop computers within their vehicles and can stay in touch with their command center and/or retrieve data from local, state, or federal databases. However, this same capability is not available once they leave the vehicle or if the officer is on a beat, motorcycle, or horseback. This paper investigates the issues and reviews the state of the art for integrating a PDA into the gathering and retrieving of multimedia data for law enforcement.

  9. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Science.gov (United States)

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. 77 FR 51612 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of...

    Science.gov (United States)

    2012-08-24

    .... Components of the OSS include the engine switch, keyless operation electronic control unit (KOS ECU), OSS ECU and KOS key. Mitsubishi will not incorporate an audible and visual alarm system on its vehicles...

  11. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  12. Motor vehicle injury, mortality, and hospital charges by strength of graduated driver licensing laws in 36 States.

    Science.gov (United States)

    Pressley, Joyce C; Benedicto, Camilla B; Trieu, Lisa; Kendig, Tiffany; Barlow, Barbara

    2009-07-01

    To assess the relation between strength of graduated driver licensing (GDL) laws and motor vehicle (MV) injury burden, this study examined injury mortality, hospitalizations and related charges for 15 year to 17 year olds in 36 states by strength of GDL legislation. Data sources include the CDC's Web-Based Injury Statistics Query and Reporting System (WISQARS) and the 2003 Healthcare Cost and Utilization Kids' Inpatient database (KID). Hospital admissions for injuries in 15 year to 17 year olds (n = 49,520) are unweighted. Injury severity was assessed using ICDMAP-90 and International Classification of Injury Severity Scores. The Insurance Institute for Highway Safety rating system was used to categorize legislative strength: good, fair, marginal/poor, and none. Logistic regression was used to assess independent predictors of MV injury. MV injury accounted for 14.6% of all-cause injury-related hospital admissions with 47.7% classified as drivers. Total MV occupant mortality was 14.6% lower after enactment of GDL with greater improvement observed in the good law category (26.0%). In multivariate models for hospitalized injury, all GDL law categories were protective for MV driver injury in 16 year olds. Compared with whites, black and Hispanic teens were more frequently injured as passengers than drivers. The contribution of MV occupant to all-cause injury-related hospital charges was 16.0% lower in good versus no-GDL categories and 39.5% lower for MV drivers. These findings suggest that the presence of any GDL legislation is associated with a lower burden of MV-related injury and expenditures with the largest differences observed for 16-year-old drivers.

  13. Terminal Sliding Mode Tracking Controller Design for Automatic Guided Vehicle

    Science.gov (United States)

    Chen, Hongbin

    2018-03-01

    Based on sliding mode variable structure control theory, the path tracking problem of automatic guided vehicle is studied, proposed a controller design method based on the terminal sliding mode. First of all, through analyzing the characteristics of the automatic guided vehicle movement, the kinematics model is presented. Then to improve the traditional expression of terminal sliding mode, design a nonlinear sliding mode which the convergence speed is faster than the former, verified by theoretical analysis, the design of sliding mode is steady and fast convergence in the limited time. Finally combining Lyapunov method to design the tracking control law of automatic guided vehicle, the controller can make the automatic guided vehicle track the desired trajectory in the global sense as well as in finite time. The simulation results verify the correctness and effectiveness of the control law.

  14. Introduction of ecologically based heavy vehicle charges for road haulage. Assessment from the angle of German constitutional law and EU law: models, constraints, design options. Study of the report 200 96 130 UBA-FB-000217; Umweltorientierte Schwerverkehrsabgaben aus der Sicht des Verfassungs- und Europarechts: Modelle, Restriktionen, Gestaltungsoptionen. Studie zum Forschungsbericht 200 96 130 UBA-FB-000217

    Energy Technology Data Exchange (ETDEWEB)

    Klinski, S.

    2001-10-01

    The document contains a study commissioned by the German Federal Environment Office, (UBA), investigating the legal basis as well as constraints of new, ecologically based legislation envisaged by the German Federal Government for the transport sector. To put it in a nutshell: introduction of a kilometer-based road user charge for heavy goods vehicles, toll levels to be varied by vehicle weight and emission standards. Compliance with German constitutional law and the relevant law of the European Union is examined, and foreseeable non-compliance issues and conflicts in law are shown. Approaches will be outlined for solving legal obstacles by amending the German constitutional law and/or EU law and harmonizing the two legal systems. (orig./CB) [German] Aufgabe der Untersuchung ist es, im Einzelnen zu analysieren, welche Moeglichkeiten das uebergeordnete Verfasssungs- und Europarecht bereit haelt, um eine fuer das Territorium der Bundesrepublik geltende Schwerverkehrsabgabe zu erheben und diese moeglichst so auszugestalten, dass ein Maximum an umweltpolitisch motivierten Lenkungswirkungen und ein Minimum an umweltpolitisch bedenklichen Fehlsteuerungen erreicht werden kann. Soweit sich auf den beiden Ebenen des Verfassungs- und Euoparechts aus umweltpolitischer Sicht problematiche Restriktionen ergeben, werden Moeglichkeiten zur Aenderung des uebergeordneten Rechts erwogen. (orig./CB)

  15. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  16. Comfort-oriented vehicle suspension design with skyhook inerter configuration

    Science.gov (United States)

    Hu, Yinlong; Chen, Michael Z. Q.; Sun, Yonghui

    2017-09-01

    This paper is concerned with the comfort-oriented vehicle suspension design problem by using a skyhook inerter configuration. The rationale of the skyhook inerter is to use a grounded inerter to virtually increase the sprung mass of a vehicle, as it is analytically demonstrated that increasing the sprung mass can always improve the ride comfort performance. Semi-active means to realize the skyhook inerter configuration are investigated by using semi-active inerters. Three control laws, that is the on-off control, the anti-chatter on-off control, and the continuous control, are proposed for the semi-active inerter to approximate the skyhook inerter. Numerical simulations are performed to demonstrate the effectiveness and performances of these control laws. It is shown that the semi-active realizations of the skyhook inerter by using the proposed control laws can achieve over 10% improvement compared with the traditional strut, and similar performances are obtained for these control laws, with slight differences with respect to different static stiffnesses of the suspension system.

  17. Tribal motor vehicle injury prevention programs for reducing disparities in motor vehicle-related injuries.

    Science.gov (United States)

    West, Bethany A; Naumann, Rebecca B

    2014-04-18

    A previous analysis of National Vital Statistics System data for 2003-2007 that examined disparities in rates of motor vehicle-related death by race/ethnicity and sex found that death rates for American Indians/Alaska Natives were two to four times the rates of other races/ethnicities. To address the disparity in motor vehicle-related injuries and deaths among American Indians/Alaska Natives, CDC funded four American Indian tribes during 2004-2009 to tailor, implement, and evaluate evidence-based road safety interventions. During the implementation of these four motor vehicle-related injury prevention pilot programs, seat belt and child safety seat use increased and alcohol-impaired driving decreased. Four American Indian/Alaska Native tribal communities-the Tohono O'odham Nation, the Ho-Chunk Nation, the White Mountain Apache Tribe, and the San Carlos Apache Tribe-implemented evidence-based road safety interventions to reduce motor vehicle-related injuries and deaths. Each community selected interventions from the Guide to Community Preventive Services and implemented them during 2004-2009. Furthermore, each community took a multifaceted approach by incorporating several strategies, such as school and community education programs, media campaigns, and collaborations with law enforcement officers into their programs. Police data and direct observational surveys were the main data sources used to assess results of the programs. Results included increased use of seat belts and child safety seats, increased enforcement of alcohol-impaired driving laws, and decreased motor vehicle crashes involving injuries or deaths. CDC's Office of Minority Health and Health Equity selected the intervention analysis and discussion as an example of a program that might be effective for reducing motor vehicle-related injury disparities in the United States. The Guide to Community Preventive Services recognizes these selected interventions as effective; this report examines the

  18. Distance Dependence of Path Loss for Millimeter Wave Inter-Vehicle Communications

    Directory of Open Access Journals (Sweden)

    M. Fujise

    2004-12-01

    Full Text Available Millimeter-wave path loss between two cars was measured to obtainthe general applicable distance for inter-vehicle communication systemsin real environments. An abrupt and substantial increase in path lossdue to interruption, curves, and different-lane traveling has been amajor concern in inter-vehicle communications. The path lossmeasurements were carried out using 60-GHz CW radiowaves and standardhorn antennas on metropolitan highways and regular roads. Because thepropagation loss is traffic-dependent, the highways were classifiedinto uncrowded and crowded highways, and the regular roads wereclassified into uncrowded and crowded roads. The path loss for thehighways exhibited 2nd-power-law attenuation and that for the regularroads exhibited 1st-power-law attenuation with an increase ininter-vehicle distance. Additional losses of 15 dB for the highways and5 dB for the regular roads were observed when the inter-vehicledistance was more than approximately 30 m. Thus, we were able todemonstrate millimeter-wave inter-vehicle communications at aninter-vehicle distance of more than 100 m.

  19. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  20. Vehicle to Grid Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Willett Kempton; Meryl Gardner; Michael Hidrue; Fouad Kamilev; Sachin Kamboj; Jon Lilley; Rodney McGee; George Parsons; Nat Pearre; Keith Trnka

    2010-12-31

    This report summarizes the activities and accomplishments of a two-year DOE-funded project on Grid-Integrated Vehicles (GIV) with vehicle to grid power (V2G). The project included several research and development components: an analysis of US driving patterns; an analysis of the market for EVs and V2G-capable EVs; development and testing of GIV components (in-car and in-EVSE); interconnect law and policy; and development and filing of patents. In addition, development activities included GIV manufacturing and licensing of technologies developed under this grant. Also, five vehicles were built and deployed, four for the fleet of the State of Delaware, plus one for the University of Delaware fleet.

  1. OPTIMUM PROGRAMMABLE CONTROL OF UNMANNED FLYING VEHICLE

    Directory of Open Access Journals (Sweden)

    A. А. Lobaty

    2012-01-01

    Full Text Available The paper considers an analytical synthesis problem pertaining to programmable control of an unmanned flying vehicle while steering it to the fixed space point. The problem has been solved while applying a maximum principle which takes into account a final control purpose and its integral expenses. The paper presents an optimum law of controlling overload variation of a flying vehicle that has been obtained analytically

  2. Autonomous and Connected Vehicles: A Law Enforcement Primer

    Science.gov (United States)

    2015-12-01

    parallel or back-in parking in Toyota Prius vehicles is one example currently marketed and in operation in the United States.275 Testing is on-going...ownership in a connected environment.276 275 “All-New Third Generation Toyota Prius Raises the Bar for...design-patterns-and- operational-concepts-tasks-28-42-115/. Toyota . “All-New Third Generation Toyota Prius Raises the Bar for Hybrid Vehicles— Again

  3. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  4. 49 CFR 591.1 - Scope.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.1 Scope. This part establishes procedures governing the importation of motor vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper...

  5. 49 CFR 545.4 - Response to inquiries.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL..., 2007, each manufacturer must, upon request from the Office of Vehicle Safety Compliance, provide information identifying the vehicles (by make, model, and vehicle identification number) that have been...

  6. 75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-03-10

    ...)....... 91 41867 2.1735 45 TOYOTA......... COROLLA 740 351414 2.1058 46 NISSAN......... INFINITI FX45... 18579 1.6147 70 NISSAN......... INFINITI M35/M45.... 48 30144 1.5924 71 TOYOTA......... YARIS 252 159292... QUATTRO/ 18 11660 1.5437 S6/S6 AVANT. 77 FORD MOTOR CO.. FIVE HUNDRED........ 94 61270 1.5342 78 TOYOTA...

  7. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-10-24

    ......... S-CLASS 22 10,189 2.1592 34 GENERAL MOTORS..... CHEVROLET HHR...... 172 80,781 2.1292 35 TOYOTA... MOTOR CO...... LINCOLN TOWN CAR... 24 11,596 2.0697 39 TOYOTA AVALON 45 22,030 2.0427 40 NISSAN 350Z 1....7552 50 TOYOTA CAMRY/SOLARA....... 781 447,882 1.7438 51 TOYOTA COROLLA 632 363,515 1.7386 52 HYUNDAI...

  8. 77 FR 38024 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-06-26

    ............ SEBRING......... 130 43,022 3.0217 8 TOYOTA LEXUS SC........ 1 335 2.9851 9 CHRYSLER......... DODGE...,199 2.1822 24 TOYOTA CAMRY/SOLARA.... 691 317,754 2.1746 25 GENERAL MOTORS... CHEVROLET MALIBU 381 183...... SATURN VUE...... 4 2,904 1.3774 47 TOYOTA 4RUNNER......... 18 13,345 1.3488 48 NISSAN MAXIMA 89 66,639 1...

  9. 77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-09-21

    ....0217 8 TOYOTA LEXUS SC 1 335 2.9851 9 CHRYSLER DODGE AVENGER....... 197 67,604 2.9140 10 KIA RIO 55 18....1822 24 TOYOTA CAMRY/SOLARA........ 691 317,754 2.1746 25 GENERAL MOTORS...... CHEVROLET MALIBU.... 381......... SATURN VUE 4 2,904 1.3774 47 TOYOTA 4RUNNER 18 13,345 1.3488 48 NISSAN MAXIMA 89 66,639 1.3356 49 NISSAN...

  10. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ... 10,189 2.1592 33 GENERAL MOTORS......... CHEVROLET HHR 172 80,781 2.1292 34 TOYOTA SCION TC 57 27,179... LINCOLN TOWN CAR....... 24 11,596 2.0697 38 TOYOTA AVALON 45 22,030 2.0427 39 NISSAN 350Z 1 503 1.9881 40....7898 48 GENERAL MOTORS......... CADILLAC CTS 91 50,926 1.7869 49 VOLVO S60 12 6,837 1.7552 50 TOYOTA...

  11. 75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-09

    ........... 223 99681 2.2371 43 MERCEDES-BENZ......... 220 (S-CLASS)........ 91 41867 2.1735 44 TOYOTA COROLLA 740... M35/M45..... 48 30144 1.5924 71 TOYOTA YARIS 252 159292 1.5820 72 HONDA ACCORD 664 421206 1.5764 73............ FIVE HUNDRED......... 94 61270 1.5342 78 TOYOTA AVALON 121 79137 1.5290 79 NISSAN MURANO 137 92516 1...

  12. 78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-07-09

    ... MOTORS..... CHEVROLET CAMARO.. 196 97,518 2.0099 21 MERCEDES-BENZ...... S-CLASS 19 9,652 1.9685 22 TOYOTA... 62,836 1.6074 32 TOYOTA CAMRY/SOLARA...... 781 486,288 1.6060 33 FORD MOTOR CO...... TAURUS 118 76,821 1.5360 34 TOYOTA YARIS 38 24,850 1.5292 35 AUDI AUDI A3 10 6,734 1.4850 36 CHRYSLER 300 42 28,373...

  13. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Document Server

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  14. Hypersonic vehicle model and control law development using H(infinity) and micron synthesis

    Science.gov (United States)

    Gregory, Irene M.; Chowdhry, Rajiv S.; Mcminn, John D.; Shaughnessy, John D.

    1994-01-01

    The control system design for a Single Stage To Orbit (SSTO) air breathing vehicle will be central to a successful mission because a precise ascent trajectory will preserve narrow payload margins. The air breathing propulsion system requires the vehicle to fly roughly halfway around the Earth through atmospheric turbulence. The turbulence, the high sensitivity of the propulsion system to inlet flow conditions, the relatively large uncertainty of the parameters characterizing the vehicle, and continuous acceleration make the problem especially challenging. Adequate stability margins must be provided without sacrificing payload mass since payload margins are critical. Therefore, a multivariable control theory capable of explicitly including both uncertainty and performance is needed. The H(infinity) controller in general provides good robustness but can result in conservative solutions for practical problems involving structured uncertainty. Structured singular value mu framework for analysis and synthesis is potentially much less conservative and hence more appropriate for problems with tight margins. An SSTO control system requires: highly accurate tracking of velocity and altitude commands while limiting angle-of-attack oscillations, minimized control power usage, and a stabilized vehicle when atmospheric turbulence and system uncertainty are present. The controller designs using H(infinity) and mu-synthesis procedures were compared. An integrated flight/propulsion dynamic mathematical model of a conical accelerator vehicle was linearized as the vehicle accelerated through Mach 8. Vehicle acceleration through the selected flight condition gives rise to parametric variation that was modeled as a structured uncertainty. The mu-analysis approach was used in the frequency domain to conduct controller analysis and was confirmed by time history plots. Results demonstrate the inherent advantages of the mu framework for this class of problems.

  15. 49 CFR 545.3 - Applicability.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.3 Applicability. This subpart applies to manufacturers of motor vehicles. ...

  16. “Your character has been robbed. Do you want to sue the other player?” Polish criminal law and the notion of “theft” in a computer game.

    OpenAIRE

    Olczyk, Adam

    2014-01-01

    Technological development implies a lot of new ways to commit crimes in cyberspace. Stealing virtual objects (such as magical swords or shoes) is one of them. It is unique because virtual theft combines one of the oldest types of criminal activity with the achievements of modern technology. This article deals with those situations when the actions taken by players stop being protected by the ‘magic circle’ and become criminal. It will also explore how the Polish Penal Law deals with these mat...

  17. 49 CFR 567.1 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... Federal Theft Prevention Standards (part 541 of this chapter), are applicable to the vehicle. ... and location of, and other requirements for, the certification label to be affixed to motor vehicles as required by the National Traffic and Motor Vehicle Safety Act, as amended (the Vehicle Safety Act...

  18. 49 CFR 592.9 - Forfeiture of bond.

    Science.gov (United States)

    2010-10-01

    ... Federal motor vehicle safety, bumper, and theft prevention standard in effect at the time the vehicle was... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REGISTERED IMPORTERS OF VEHICLES NOT ORIGINALLY MANUFACTURED TO CONFORM TO THE FEDERAL MOTOR VEHICLE SAFETY STANDARDS § 592.9 Forfeiture of bond. A Registered...

  19. Comparative Study Between The IAEA Model Regulations and The Egyptian Nuclear Law

    International Nuclear Information System (INIS)

    Abaza, A.; Hosni, M.

    2015-01-01

    This study deals with the security of radioactive sources due to its great importance, in order to provide the adequate security of these sources from the threat of theft, sabotage, illegal seizure through doing a comparison between the model regulations of the International Atomic Energy Agency (IAEA) (11) and the Egyptian law (No. 7/2010) that regulates nuclear and radiation activities and its executive regulations. The Egyptian legislator has put a chapter entitled n uclear security w ith the aim of organizing the security of nuclear materials. However, there was a review to some regulatory rules issued by the IAEA on the security of these sources which include the responsibilities of the licensee towards it. This chapter also, addressed the security culture through rehabilitation and training, in addition to the obligations of the competent authorities who is responsible for the process of issuing the license when full requirements are met. It has been shown that the Egyptian law and its executive regulations contained the rule that provides the necessary protection for these radioactive sources. Furthermore, more regulations are still needed to provide adequate security and more protection for the radioactive sources and its facilities

  20. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  1. Estimated medical cost savings in Massachusetts by implementation of a primary seat belt law

    Science.gov (United States)

    2008-12-01

    This report examines 2006 hospital discharge data reporting cases where the external cause of injury to a vehicle occupant was a motor vehicle crash to predict the estimated savings to Massachusetts if a primary seat belt law is implemented. The savi...

  2. 49 CFR 591.7 - Restrictions on importations.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.7 Restrictions on importations. (a) A vehicle or... a vehicle or equipment item under § 591.5(j) does not intend to export or destroy the vehicle or...

  3. 49 CFR 545.1 - Scope.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.1 Scope. This part establishes requirements for manufacturers of motor vehicles..., concerning the number of vehicles that meet the requirements of 49 CFR part 541, and the number of vehicles...

  4. The Bekker Model Analysis for Small Robotic Vehicles

    National Research Council Canada - National Science Library

    Gerhart, Grant R

    2004-01-01

    .... This formalism consists of two fundamental equations. The first uses the Coulomb-Mohr law and a linear, one degree of freedom spring/mass/damper model to predict terrain shear rates from maximum vehicle tractive effort...

  5. 76 FR 37025 - Make Inoperative Exemptions; Vehicle Modifications To Accommodate People With Disabilities, Side...

    Science.gov (United States)

    2011-06-24

    ... chapter does not exempt a person from liability at common law.'' 49 U.S.C. 30103(e) Pursuant to this provision, State common law tort causes of action against motor vehicle manufacturers that might otherwise... has recognized the possibility, in some instances, of implied preemption of State common law tort...

  6. Dynamic Gas Flow Effects on the ESD of Aerospace Vehicle Surfaces

    Science.gov (United States)

    Hogue, Michael D.; Kapat, Jayanta; Ahmed, Kareem; Cox, Rachel E.; Wilson, Jennifer G.; Calle, Luz M.; Mulligan, Jaysen

    2016-01-01

    The purpose of this work is to develop a dynamic version of Paschen's Law that takes into account the flow of ambient gas past aerospace vehicle surfaces. However, the classic Paschen's Law does not take into account the flow of gas of an aerospace vehicle, whose surfaces may be triboelectrically charged by dust or ice crystal impingement, traversing the atmosphere. The basic hypothesis of this work is that the number of electron-ion pairs created per unit distance by the electric field between the electrodes is mitigated by the electron-ion pairs removed per unit distance by the flow of gas. The revised Paschen equation must be a function of the mean velocity, v(sub xm), of the ambient gas and reduces to the classical version of Paschen's law when the gas mean velocity, v(sub xm) = 0. New formulations of Paschen's Law, taking into account Mach number and dynamic pressure, derived by the authors, will be discussed. These equations will be evaluated by wind tunnel experimentation later this year. Based on the results of this work, it is hoped that the safety of aerospace vehicles will be enhanced with a redefinition of electrostatic launch commit criteria. It is also possible that new products, such as new anti-static coatings, may be formulated from this data.

  7. 77 FR 17105 - Identification of Interstate Motor Vehicles: City of Chicago, IL Registration Emblem Requirement...

    Science.gov (United States)

    2012-03-23

    ... section 31704; (2) Under the International Fuel Tax Agreement under section 31705 or under an applicable... through the International Fuel Tax Agreement; (3) Under a State law regarding motor vehicle license plates... Chicago Ground Transportation Tax is preempted by Federal law. Federal law prohibits States and their...

  8. A Comparison of Military and Law Enforcement Body Armour

    Science.gov (United States)

    Pope, Rodney

    2018-01-01

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS), task simulations (vehicle exit; victim recovery), and subjective measures. Ten volunteer police officers (six females, four males) were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable. PMID:29443905

  9. A Comparison of Military and Law Enforcement Body Armour.

    Science.gov (United States)

    Orr, Robin; Schram, Ben; Pope, Rodney

    2018-02-14

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS), task simulations (vehicle exit; victim recovery), and subjective measures. Ten volunteer police officers (six females, four males) were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable.

  10. A Comparison of Military and Law Enforcement Body Armour

    Directory of Open Access Journals (Sweden)

    Robin Orr

    2018-02-01

    Full Text Available Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg and law-enforcement body armour (LEBA: 2.1 kg in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS, task simulations (vehicle exit; victim recovery, and subjective measures. Ten volunteer police officers (six females, four males were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable.

  11. The Bekker Model Analysis for Small Robotic Vehicles

    National Research Council Canada - National Science Library

    Gerhart, Grant R

    2004-01-01

    .... This formalism consists or two fundamental equations. The ii ret uses the Coulomb-Mohr law and a linear, one degree or freedom spring/mass/damper model to predict terrain shear rates from maximum vehicle tractive effort...

  12. Estimated medical cost savings in Utah by implementation of a primary seat belt law

    Science.gov (United States)

    2010-05-01

    This report examines 2007 hospital discharge data reporting cases where the external cause of injury to : a vehicle occupant was a motor vehicle crash to predict the estimated savings to Utah if a primary seat : belt law is implemented. The savings a...

  13. Estimated medical cost savings in Nevada by implementation of a primary seat belt law

    Science.gov (United States)

    2008-09-01

    This report examines 2007 hospital discharge data reporting cases where the external cause of injury to a vehicle occupant was a motor vehicle crash to predict the estimated savings to Nevada if a primary seat belt law is implemented. The savings are...

  14. Estimated medical cost savings in Vermont by implementation of a primary seat belt law

    Science.gov (United States)

    2008-09-01

    This report examines 2005 hospital discharge data reporting cases where the external cause of injury to a vehicle occupant was a motor vehicle crash to predict the estimated savings to the State of Vermont if a primary seat belt law is implemented. T...

  15. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  16. 49 CFR 543.3 - Application.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.3 Application. This part applies to manufacturers of vehicles subject to the requirements of part 541 of this chapter, and to any...

  17. 26 CFR 41.4481-1 - Imposition of tax.

    Science.gov (United States)

    2010-04-01

    ... of an overpayment of tax under section 4481(a) due to destruction or theft of the vehicle shall be... TAXES EXCISE TAX ON USE OF CERTAIN HIGHWAY MOTOR VEHICLES Tax on Use of Certain Highway Motor Vehicles... registered highway motor vehicle that (together with the semitrailers and trailers customarily used in...

  18. Restraint use law enforcement intervention in Latino communities.

    Science.gov (United States)

    Schaechter, Judy; Uhlhorn, Susan B

    2011-11-01

    Motor vehicle crashes are the leading cause of death for U.S. Latinos aged 1 to 35 years. Restraint use is an effective means of prevention of motor vehicle crash injury. Effective interventions to raise restraint use include the following: legislation, law enforcement, education, and equipment distribution. The effects of law enforcement interventions in Latino immigrant communities are understudied. We measured the community-level effect of a combined intervention that included warnings and citations phase enforcement in Latino communities. We designed and implemented in two of three Latino-majority communities a multicomponent intervention consisting of a community awareness campaign, restraint use education with equipment distribution, and a two-staged law enforcement intervention. Restraint use observations were conducted in all three communities at baseline, after the warnings phase and again after the citations phase of the intervention were completed. The combined intervention of community awareness, education, child passenger restraint distribution, and law enforcement focused on educational traffic stops with incentives and warnings was associated with a significant increase in both driver and child passenger restraint use in one intervention community, but only driver restraint increased to a level of significance in the other intervention community; significant increase was also noted among nonintervention drivers. The citations phase of the intervention did not result in a significant increase in restraint use and was complicated by interruptions due to unlicensed drivers. The combined effort of community awareness, education, equipment distribution and law enforcement intervention that included incentives and warnings may be effective at increasing seat belt use in Latino communities without the need for citations.

  19. 78 FR 13754 - Notice of Receipt of Petition for Decision That Nonconforming 2004 Ford F-150 Crew Cab Trucks...

    Science.gov (United States)

    2013-02-28

    ... Hoses, 113 Hood Latch System, 114 Theft Protection, 116 Motor Vehicle Brake Fluids, 118 Power-Operated... Tires, 124 Accelerator Control Systems, 135 Light Vehicle Brake Systems, 201 Occupant Protection in... originally manufactured to comply with all applicable Federal Motor Vehicle Safety Standards (FMVSS), are...

  20. 49 CFR 592.6 - Duties of a registered importer.

    Science.gov (United States)

    2010-10-01

    ... marking requirements of the theft prevention standard (part 541 of this chapter); or (ii) The vehicle... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REGISTERED IMPORTERS OF VEHICLES NOT ORIGINALLY MANUFACTURED TO CONFORM TO THE FEDERAL MOTOR VEHICLE SAFETY STANDARDS § 592.6 Duties of a...

  1. H∞ control for path tracking of autonomous underwater vehicle motion

    Directory of Open Access Journals (Sweden)

    Lin-Lin Wang

    2015-05-01

    Full Text Available In order to simplify the design of path tracking controller and solve the problem relating to nonlinear dynamic model of autonomous underwater vehicle motion planning, feedback linearization method is first adopted to transform the nonlinear dynamic model into an equivalent pseudo-linear dynamic model in horizontal coordinates. Then considering wave disturbance effect, mixed-sensitivity method of H∞ robust control is applied to design state-feedback controller for this equivalent dynamic model. Finally, control law of pseudo-linear dynamic model is transformed into state (surge velocity and yaw angular rate tracking control law of nonlinear dynamic model through inverse coordinate transformation. Simulation indicates that autonomous underwater vehicle path tracking is successfully implemented with this proposed method, and the influence of parameter variation in autonomous underwater vehicle dynamic model on its tracking performance is reduced by H∞ controller. All the results show that the method proposed in this article is effective and feasible.

  2. Study on Standard Fatigue Vehicle Load Model

    Science.gov (United States)

    Huang, H. Y.; Zhang, J. P.; Li, Y. H.

    2018-02-01

    Based on the measured data of truck from three artery expressways in Guangdong Province, the statistical analysis of truck weight was conducted according to axle number. The standard fatigue vehicle model applied to industrial areas in the middle and late was obtained, which adopted equivalence damage principle, Miner linear accumulation law, water discharge method and damage ratio theory. Compared with the fatigue vehicle model Specified by the current bridge design code, the proposed model has better applicability. It is of certain reference value for the fatigue design of bridge in China.

  3. 49 CFR 591.3 - Applicability.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.3 Applicability. This part applies to any person offering a motor vehicle or item of motor vehicle equipment for importation into the United States. [55 FR 11378...

  4. Estimated medical cost savings in Rhode Island by implementation of a primary seat belt law

    Science.gov (United States)

    2008-09-01

    This report examines 2006 hospital discharge data reporting cases where the external cause of injury to a vehicle occupant was a motor vehicle crash to predict the estimated savings to Rhode Island if a primary seat belt law is implemented. The savin...

  5. Fault-tolerant cooperative output regulation for multi-vehicle systems with sensor faults

    Science.gov (United States)

    Qin, Liguo; He, Xiao; Zhou, D. H.

    2017-10-01

    This paper presents a unified framework of fault diagnosis and fault-tolerant cooperative output regulation (FTCOR) for a linear discrete-time multi-vehicle system with sensor faults. The FTCOR control law is designed through three steps. A cooperative output regulation (COR) controller is designed based on the internal mode principle when there are no sensor faults. A sufficient condition on the existence of the COR controller is given based on the discrete-time algebraic Riccati equation (DARE). Then, a decentralised fault diagnosis scheme is designed to cope with sensor faults occurring in followers. A residual generator is developed to detect sensor faults of each follower, and a bank of fault-matching estimators are proposed to isolate and estimate sensor faults of each follower. Unlike the current distributed fault diagnosis for multi-vehicle systems, the presented decentralised fault diagnosis scheme in each vehicle reduces the communication and computation load by only using the information of the vehicle. By combing the sensor fault estimation and the COR control law, an FTCOR controller is proposed. Finally, the simulation results demonstrate the effectiveness of the FTCOR controller.

  6. Virtuelle ting

    DEFF Research Database (Denmark)

    Mathiasen, Peter Dueholm

    2014-01-01

    In the article it is discussed whether virtual items can be described as "rørlige ting” (movable objects) and therefore subject to protection against e.g. theft under the Danish Criminal Code. Norwegian, Swedish and Dutch criminal laws are included in the article.......In the article it is discussed whether virtual items can be described as "rørlige ting” (movable objects) and therefore subject to protection against e.g. theft under the Danish Criminal Code. Norwegian, Swedish and Dutch criminal laws are included in the article....

  7. THEORETICAL AND JUDICIAL PRACTICE REFLECTIONS REGARDING THE OFFENCE OF PUTTING INTO CIRCULATION OR DRIVING AN UNREGISTERED/UNLISTED VEHICLE (ART. 334. CRIMINAL LAW

    Directory of Open Access Journals (Sweden)

    Alin Sorin NICOLESCU

    2017-05-01

    Full Text Available With the entry into force of the New Criminal Code, the offenses of road safety on public roads have been repealed from the Government Emergency Ordinance no. 95/2002 and inserted into the contents of the normative document. At the time of the transition, the legislator has chosen to amend certain aspects relating to the existing criminal incriminations of antisocial deeds in direct connection with the road domain. The regulation of the offense for putting into circulation or driving an unlisted vehicle contained in the provisions of article 334 of the New Criminal Code has a correspondent in Article 85 of the GEO no. 195/2002 on the circulation on public roads. The deeds incriminated by the provisions referred to in Article 334 par. (1, (2, (3 and (4 have the content almost identical with the previous settlement thereof, with differences under the aspect of the sanctioning regime. Also, regarding the content, the only difference which is meant to better clarify the incrimination conditions refers to the requirement that the vehicle or the tram not to be registered or recorded according to the law. During the study, we shall try to present a series of theoretical aspects and judicial practice regarding the committing of such crimes.

  8. 49 CFR 543.1 - Scope.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.1 Scope. This part establishes procedures under section 605 of the Motor Vehicle Information and Cost Savings Act (15 U.S.C. 2025) for filing and processing petitions to exempt lines of passenger motor vehicles from part 541 of this...

  9. 49 CFR 543.4 - Definitions.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.4 Definitions. (a) Statutory terms. All terms defined in sections 2, 601, and 605 of the Motor Vehicle Information and Cost... a group of motor vehicles of the same make which have the same body or chassis, or otherwise are...

  10. 41 CFR 109-38.403-2 - Responsibility.

    Science.gov (United States)

    2010-07-01

    ..., including vandalism, theft and parking lot damage to a DOE vehicle which occurs during the period that the vehicle is assigned to an employee of that organization. The charges recovered by the designated..., AND MOTOR VEHICLES 38-MOTOR EQUIPMENT MANAGEMENT 38.4-Use and Replacement Standards § 109-38.403-2...

  11. 49 CFR 573.7 - Quarterly reports.

    Science.gov (United States)

    2010-10-01

    ... number of vehicles or items of equipment determined to be unreachable for inspection due to export, theft... vehicles or items of replacement equipment involved in the campaign, whichever occurs first. (b) Each... notification began and the date completed. (3) The number of vehicles or items of equipment involved in the...

  12. Investigation of natural gas theft by magnetic remanence mapping.

    Science.gov (United States)

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  13. The return of Khulekani Khumalo, zombie captive: imposture, law, and paradoxes of personhood in the postcolony

    Directory of Open Access Journals (Sweden)

    John Comaroff

    2015-03-01

    Full Text Available What might imposture tell us about personhood in ‘postcolonial’ times? About the means of producing selfhood, identity, social viability? While the figure of the false double has long haunted Western ideas of personhood, imposture of various kinds has become ever more striking in late modern times. It is especially common in post-apartheid South Africa, for instance, where identity theft, plagiarism, fakery, even counterfeit crime are everyday occurrences. Taking a celebrated national case – the alleged ‘return’ of a famous Zulu musician who died three years ago – this paper explores what such acts of imposture might tell us about postcolonial self-fashioning, about personhood under contemporary social conditions, and about the difficulties posed by all this for law, evidence, and the meaning of recognition.

  14. By-law from December 5, 1996 relative to the road transport of dangerous goods (called ''ADR by-law''). (Dangerous materials no. 1)

    International Nuclear Information System (INIS)

    Mesnil, H. du

    1996-01-01

    The aim of this by-law from the French ministry of equipment, lodging, transports and tourism is to define the specific rules that must be applied in France to the national or international road transport of dangerous freight (radioactive materials, explosive materials, under pressure compressed, liquefied or dissolved gases, flammable liquids and solids, spontaneously flammable materials, combustive agents, organic peroxides, noxious, infectious and corrosive materials etc..). The classification of dangerous materials and the freight that cannot be transported by road is listed in two appendixes [700 p.] at the end of the document. This by-law gives the rules concerning: the building, testing, agreement, labelling, periodical controls and conditions for use of packing materials, drums, containers, tanks and vehicles; the equipments, the loading and unloading, the running and parking of vehicles; the training of personnel and the organization of companies; the documents for control or safety assistance. Special rules concerning the transportation of gamma radiography apparatuses are given. (J.S.)

  15. Mechanical Properties Experimental Study of Engineering Vehicle Refurbished Tire

    Science.gov (United States)

    Qiang, Wang; Xiaojie, Qi; Zhao, Yang; Yunlong, Wang; Guotian, Wang; Degang, Lv

    2018-05-01

    The vehicle refurbished tire test system was constructed, got load-deformation, load-stiffness, and load-compression ratio property laws of engineering vehicle refurbished tire under the working condition of static state and ground contact, and built radial direction loading deformation mathematics model of 26.5R25 engineering vehicle refurbished tire. The test results show that radial-direction and side-direction deformation value is a little less than that of the new tire. The radial-direction stiffness and compression ratio of engineering vehicle refurbished tire were greatly influenced by radial-direction load and air inflation pressure. When load was certain, radial-direction stiffness would increase with air inflation pressure increasing. When air inflation pressure was certain, compression ratio of engineering vehicle refurbished tire would enlarge with radial-direction load increasing, which was a little less than that of the new and the same type tire. Aging degree of old car-case would exert a great influence on deformation property of engineering vehicle refurbished tire, thus engineering vehicle refurbished tires are suitable to the working condition of low tire pressure and less load.

  16. 49 CFR 591.6 - Documents accompanying declarations.

    Science.gov (United States)

    2010-10-01

    ... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.6 Documents accompanying... be accompanied by a statement substantiating that the vehicle was not manufactured for use on the...

  17. Vision-based control in driving assistance of agricultural vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Khadraoui, D.; Martinet, P.; Bonton, P.; Gallice, J. [Univ. Blaise Pascal, Aubiere (France). Lab. des Sciences et Materiaux pour l`Electronique et d`Automatique; Debain, C. [Inst. de Recherche pour l`Ingenierie de l`Agriculture et de l`Environment, Montoldre (France). Div. Techniques du Machinisme Agricole; Rouveure, R. [Inst. de Recherche pour l`Ingenierie de l`Agriculture et de l`Environment, Antony (France). Div. Electronique et Intelligence Artificielle

    1998-10-01

    This article presents a real-time control system for an agricultural mobile machine (vehicle) based on an on-board vision system using a single camera. This system has been designed to help humans in repetitive and difficult tasks in the agricultural domain. The aim of the robotics application concerns the control of the vehicle with regard to the reap limit detected in image space. The perception aspect in relation to the application has been described in previous work, and here the authors deal with the control aspect. They integrate image features issues from the modeling of the scene in the control loop to perform an image-based servoing technique. The vehicle behavior described here concerns bicycle and neural models, and three control laws are then synthesized. The first and the second are modeling approaches and use an interaction between the scene and the image space. They are based on the regulation of a task function. The third is a black-box modeling technique, and is based on a neural network. Finally, experimental results obtained with these different control laws in different conditions are presented and discussed.

  18. Analyzing the Impact of Theft and Vandalism in Relation to the Sustainability of Renewable Energy Development Projects in Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Eugene C.X. Ikejemba

    2018-03-01

    Full Text Available Theft and vandalism impede the sustainability of renewable energy (RE development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances on implemented projects. We utilize a consumer clinic approach to generate data that represents the situation. We define our instigators practically (Government Inequality, Crime to Survive, Sabotage and demarcate the actions of the offenders into 4 types: (1 vandalization of small RE projects (SPv; (2 theft of RE infrastructures from small RE projects (SPt; (3 vandalization of large RE projects (LPv; and (4 theft of RE infrastructures from large RE projects (LPt. To counteract these actions we define three types of security interference: human, societal and technical. We model the career of an RE criminal as a multi-stage Markov model. In every stage the offender can commit any of the offences SPv, SPt, LPv, LPt, or go to rest. Transition probabilities are our means to reflect offender maturity. Crucial to our model is that they are affected by the level of interference installed at the project site. Calibrated on a dialogue with 144 respondents, our Markov model directs us to adequate interferences per project. Specifically, for large projects technical and human security are the most effective, whereas, for small projects we recommend societal security. The paper introduces a mathematical model of the career of a RE-offender including the influence of security interference and calibrates the parameters through an ethnographic approach.

  19. 49 CFR 591.9 - Petitions for remission or mitigation of forfeiture.

    Science.gov (United States)

    2010-10-01

    ... VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.9 Petitions... forfeiture only if the motor vehicle has been imported pursuant to paragraph 591.5(f) and the condition not met relates to the compliance of a passenger motor vehicle with part 581 of this chapter. (b) A...

  20. A review of dynamic characteristics of magnetically levitated vehicle systems

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Y.; Chen, S.S.

    1995-11-01

    The dynamic response of magnetically levitated (maglev) ground transportation systems has important consequences for safety and ride quality, guideway design, and system costs. Ride quality is determined by vehicle response and by environmental factors such as humidity and noise. The dynamic response of the vehicles is the key element in determining ride quality, while vehicle stability is an important safety-related element. To design a guideway that provides acceptable ride quality in the stable region, vehicle dynamics must be understood. Furthermore, the trade-off between guideway smoothness and levitation and control systems must be considered if maglev systems are to be economically feasible. The link between the guideway and the other maglev components is vehicle dynamics. For a commercial maglev system, vehicle dynamics must be analyzed and tested in detail. This report, which reviews various aspects of the dynamic characteristics, experiments and analysis, and design guidelines for maglev systems, discusses vehicle stability, motion dependent magnetic force components, guideway characteristics, vehicle/ guideway interaction, ride quality, suspension control laws, aerodynamic loads and other excitations, and research needs.

  1. U27 : real-time commercial vehicle safety & security monitoring final report.

    Science.gov (United States)

    2012-12-01

    Accurate real-time vehicle tracking has a wide range of applications including fleet management, drug/speed/law enforcement, transportation planning, traffic safety, air quality, electronic tolling, and national security. While many alternative track...

  2. Comparative analysis of the operation efficiency of the continuous and relay control systems of a multi-axle wheeled vehicle suspension

    Science.gov (United States)

    Zhileykin, M. M.; Kotiev, G. O.; Nagatsev, M. V.

    2018-02-01

    In order to improve the efficiency of the multi-axle wheeled vehicles (MWV) automotive engineers are increasing their cruising speed. One of the promising ways to improve ride comfort of the MWV is the development of the dynamic active suspension systems and control laws for such systems. Here, by the dynamic control systems we mean the systems operating in real time mode and using current (instantaneous) values of the state variables. The aim of the work is to develop the MWV suspension optimal control laws that would reduce vibrations on the driver’s seat at kinematic excitation. The authors have developed the optimal control laws for damping the oscillations of the MWV body. The developed laws allow reduction of the vibrations on the driver’s seat and increase in the maximum speed of the vehicle. The laws are characterized in that they allow generating the control inputs in real time mode. The authors have demonstrated the efficiency of the proposed control laws by means of mathematical simulation of the MWV driving over unpaved road with kinematic excitation. The proposed optimal control laws can be used in the MWV suspension control systems with magnetorheological shock absorbers or controlled hydropneumatic springs. Further evolution of the research line can be the development of the energy-efficient MWV suspension control systems with continuous control input on the vehicle body.

  3. Complex Formation Control of Large-Scale Intelligent Autonomous Vehicles

    Directory of Open Access Journals (Sweden)

    Ming Lei

    2012-01-01

    Full Text Available A new formation framework of large-scale intelligent autonomous vehicles is developed, which can realize complex formations while reducing data exchange. Using the proposed hierarchy formation method and the automatic dividing algorithm, vehicles are automatically divided into leaders and followers by exchanging information via wireless network at initial time. Then, leaders form formation geometric shape by global formation information and followers track their own virtual leaders to form line formation by local information. The formation control laws of leaders and followers are designed based on consensus algorithms. Moreover, collision-avoiding problems are considered and solved using artificial potential functions. Finally, a simulation example that consists of 25 vehicles shows the effectiveness of theory.

  4. 41 CFR 102-34.135 - What do we do about a lost or stolen license plate?

    Science.gov (United States)

    2010-07-01

    ... 34-MOTOR VEHICLE MANAGEMENT Identifying and Registering Motor Vehicles License Plates § 102-34.135 What do we do about a lost or stolen license plate? You must report the loss or theft of license plates...), local police, to GSA Fleet when a GSA Fleet leased motor vehicle is involved, and to the Federal...

  5. Flight simulation program for high altitude long endurance unmanned vehicle; Kokodo mujinki no hiko simulation program

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, H.; Hashidate, M. [National Aerospace Laboratory, Tokyo (Japan)

    1995-11-01

    An altitude of about 20 km has the atmospheric density too dilute for common aircraft, and the air resistance too great for satellites. Attention has been drawn in recent years on a high-altitude long-endurance unmanned vehicle that flies at this altitude for a long period of time to serve as a wave relaying base and perform traffic control. Therefore, a development was made on a flight simulation program to evaluate and discuss the guidance and control laws for the high-altitude unmanned vehicle. Equations of motion were derived for three-dimensional six freedom and three-dimensional three freedom. Aerodynamic characteristics of an unmanned vehicle having a Rectenna wing were estimated, and formulation was made according to the past research results on data of winds that the unmanned vehicle is anticipated to encounter at an altitude of 20 km. Noticing the inside of a horizontal plane, a proposal was given on a guidance law that follows a given path. A flight simulation was carried out to have attained a prospect that the unmanned vehicle may be enclosed in a limited space even if the vehicle is encountered with a relatively strong wind. 18 refs., 20 figs., 1 tab.

  6. Natural Gas Vehicle Cylinder Safety, Training and Inspection Project

    Energy Technology Data Exchange (ETDEWEB)

    Hank Seiff

    2008-12-31

    Under the auspices of the National Energy Technology Laboratory and the US Department of Energy, the Clean Vehicle Education Foundation conducted a three-year program to increase the understanding of the safe and proper use and maintenance of vehicular compressed natural gas (CNG) fuel systems. High-pressure fuel systems require periodic inspection and maintenance to insure safe and proper operation. The project addressed the needs of CNG fuel containers (cylinders) and associated high-pressure fuel system components related to existing law, codes and standards (C&S), available training and inspection programs, and assured coordination among vehicle users, public safety officials, fueling station operators and training providers. The program included a public and industry awareness campaign, establishment and administration of a cylinder inspector certification training scholarship program, evaluation of current safety training and testing practices, monitoring and investigation of CNG vehicle incidents, evaluation of a cylinder recertification program and the migration of CNG vehicle safety knowledge to the nascent hydrogen vehicle community.

  7. Analyzing the impact of theft and vandalism in relation to the sustainability of renewable energy development projects in Sub-Saharan Africa

    NARCIS (Netherlands)

    Ikejemba, Eugene C.X.; Schuur, Peter C.

    2018-01-01

    Theft and vandalism impede the sustainability of renewable energy (RE) development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances

  8. The perspectives of development of natural gas for vehicles

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    This short paper analyses the actions carried out in the world, and in particular in France, to develop and promote the use of natural gas for vehicles (NGV). In France, a protocol of agreement was signed in June 1994 between the French car manufacturers, Gaz de France and the French Association of Natural Gas for Vehicles (AFGNV) in order to develop new kinds of gas fueled vehicles, more optimized engines, to increase the number of gas distribution stations, to ratify the new models of vehicles and the specific parts for these vehicles (composite materials tanks), to carry out R and D work on gas compressors, and to develop public and private fleets of urban buses and public service vehicles. The forthcoming application of the 'Clean Air Law' will support these actions. Significant and similar developments take place also in more than 30 other countries under the same environmental motivation and ambitious programs are planned in the USA, Japan and Argentina for the year 2000. The R and D effort now focusses on the use of LNG instead of compressed natural gas. (J.S.)

  9. Guide to alternative fuel vehicle incentives and laws: September 1998

    Energy Technology Data Exchange (ETDEWEB)

    Riley, C.; O' Connor, K.

    1998-12-22

    This guide provides information in support of the National Clean Cities Program, which will assist one in becoming better informed about the choices and options surrounding the use of alternative fuels and the purchase of alternative fuel vehicles. The information printed in this guide is current as of September 15, 1998. For recent additions or more up-to-date information, check the Alternative Fuels Data Center Web site at http://www.afdc.doe.gov

  10. Reactive Planning of Autonomous Vehicles for Traffic Scenarios

    Directory of Open Access Journals (Sweden)

    Rahul Kala

    2015-10-01

    Full Text Available Autonomous vehicles operate in real time traffic scenarios and aim to reach their destination from their source in the most efficient manner possible. Research in mobile robotics provides a variety of sophisticated means with which to plan the path of these vehicles. Conversely professional human drivers usually drive using instinctive means, which enables them to reach their goal almost optimally whilst still obeying all traffic laws. In this paper we propose the use of fuzzy logic for novel motion planning. The planner is generated using an evolutionary algorithm which resembles the learning stage of professional drivers. Whether to overtake or not, is a decision which affects one’s driving and the decision is made using some deliberation. We further extend the approach to perform decision making regarding overtaking for all vehicles. Further we coordinate the motion of the vehicles at a traffic crossing to avoid any potential jam or collision. Experimental results prove that by using this approach we have been able to make the vehicles move in an optimal manner in a variety of scenarios.

  11. Decentralized fuzzy control of multiple nonholonomic vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Driessen, B.J.; Feddema, J.T.; Kwok, K.S.

    1997-09-01

    This work considers the problem of controlling multiple nonholonomic vehicles so that they converge to a scent source without colliding with each other. Since the control is to be implemented on simple 8-bit microcontrollers, fuzzy control rules are used to simplify a linear quadratic regulator control design. The inputs to the fuzzy controllers for each vehicle are the (noisy) direction to the source, the distance to the closest neighbor vehicle, and the direction to the closest vehicle. These directions are discretized into four values: Forward, Behind, Left, and Right, and the distance into three values: Near, Far, Gone. The values of the control at these discrete values are obtained based on the collision-avoidance repulsive forces and the change of variables that reduces the motion control problem of each nonholonomic vehicle to a nonsingular one with two degrees of freedom, instead of three. A fuzzy inference system is used to obtain control values for inputs between the small number of discrete input values. Simulation results are provided which demonstrate that the fuzzy control law performs well compared to the exact controller. In fact, the fuzzy controller demonstrates improved robustness to noise.

  12. 77 FR 69539 - Notice of Receipt of Petition for Decision That Nonconforming 2007 Chevrolet Corvette Passenger...

    Science.gov (United States)

    2012-11-19

    ... Transmission Braking Effect, 103 Windshield Defrosting and Defogging Systems, 104 Windshield Wiping and Washing..., 113 Hood Latch System, 114 Theft Protection, 116 Motor Vehicle Brake Fluids, 118 Power-Operated Window, Partition, and Roof Panel Systems, 124 Accelerator Control Systems, 135 Light Vehicle Brake Systems, 138...

  13. 77 FR 46803 - Notice of Receipt of Petition for Decision That Nonconforming 2005 Chevrolet Suburban Multi...

    Science.gov (United States)

    2012-08-06

    ... Transmission Braking Effect, 103 Windshield Defrosting and Defogging Systems, 104 Windshield Wiping and Washing..., 113 Hood Latch System, 114 Theft Protection, 116 Motor Vehicle Brake Fluids, Standard No. 118 Power-Operated Window, Partition, and Roof Panel Systems, 119 New Pneumatic Tires for Vehicles other than...

  14. 49 CFR 591.8 - Conformance bond and conditions.

    Science.gov (United States)

    2010-10-01

    ... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.8 Conformance bond and conditions. (a) The bond required under section 591.6(c) for importation of a vehicle not originally manufactured...

  15. Search and Classification Using Multiple Autonomous Vehicles Decision-Making and Sensor Management

    CERN Document Server

    Wang, Yue

    2012-01-01

    Search and Classification Using Multiple Autonomous Vehicles provides a comprehensive study of decision-making strategies for domain search and object classification using multiple autonomous vehicles (MAV) under both deterministic and probabilistic frameworks. It serves as a first discussion of the problem of effective resource allocation using MAV with sensing limitations, i.e., for search and classification missions over large-scale domains, or when there are far more objects to be found and classified than there are autonomous vehicles available. Under such scenarios, search and classification compete for limited sensing resources. This is because search requires vehicle mobility while classification restricts the vehicles to the vicinity of any objects found. The authors develop decision-making strategies to choose between these competing tasks and vehicle-motion-control laws to achieve the proposed management scheme. Deterministic Lyapunov-based, probabilistic Bayesian-based, and risk-based decision-mak...

  16. Protection of endangered intangible assets specific insight into the role of the law

    OpenAIRE

    Stajić Ljubomir

    2011-01-01

    There will always be states and corporations that will want and try to appropriate possessions of others without any intellectual or financial investments. Such a 'theft' is made easier by the fact that the owners of a certain property either have no awareness of its significance or tend to neglect the threats of a potential theft. For those, who naively believe that they don't possess property which will be 'attacked' by someone, and they don't want to know that it should be protected, and h...

  17. 76 FR 32391 - Notice of Receipt of Petition for Decision That Nonconforming 2007 Dodge Durango Multipurpose...

    Science.gov (United States)

    2011-06-06

    ... Transmission Braking Effect, 103 Windshield Defrosting and Defogging Systems, 104 Windshield Wiping and Washing..., 113 Hood Latch System, 114 Theft Protection, 116 Motor Vehicle Brake Fluids, 118 Power-Operated Window, Partition, and Roof Panel Systems, 120 Tire Selection and Rims for Motor Vehicles Other than Passenger Cars...

  18. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making t...

  19. Risk Perception and Communication in Commercial Reusable Launch Vehicle Operations

    Science.gov (United States)

    Hardy, Terry L.

    2005-12-01

    A number of inventors and entrepreneurs are currently attempting to develop and commercially operate reusable launch vehicles to carry voluntary participants into space. The operation of these launch vehicles, however, produces safety risks to the crew, to the space flight participants, and to the uninvolved public. Risk communication therefore becomes increasingly important to assure that those involved in the flight understand the risk and that those who are not directly involved understand the personal impact of RLV operations on their lives. Those involved in the launch vehicle flight may perceive risk differently from those non-participants, and these differences in perception must be understood to effectively communicate this risk. This paper summarizes existing research in risk perception and communication and applies that research to commercial reusable launch vehicle operations. Risk communication is discussed in the context of requirements of United States law for informed consent from any space flight participants on reusable suborbital launch vehicles.

  20. Android-based E-Traffic law enforcement system in Surakarta City

    Science.gov (United States)

    Yulianto, Budi; Setiono

    2018-03-01

    The urban advancement is always overpowered by the increasing number of vehicles as the need for movement of people and goods. This can lead to traffic problems if there is no effort on the implementation of traffic management and engineering, and traffic law enforcement. In this case, the Government of Surakarta City has implemented various policies and regulations related to traffic management and engineering in order to run traffic in an orderly, safe and comfortable manner according to the applicable law. However, conditions in the field shows that traffic violations still occurred frequently due to the weakness of traffic law enforcement in terms of human resources and the system. In this connection, a tool is needed to support traffic law enforcement, especially in relation to the reporting system of traffic violations. This study aims to develop an Android-based traffic violations reporting application (E-Traffic Law Enforcement) as part of the traffic law enforcement system in Surakarta City. The Android-apps records the location and time of the traffic violations incident along with the visual evidence of the infringement. This information will be connected to the database system to detect offenders and to do the traffic law enforcement process.

  1. Analisis Faktor – Faktor yang Mempengaruhi Jumlah Kejahatan Pencurian Kendaraan Bermotor (Curanmor) Menggunakan Model Geographically Weighted Poisson Regression (Gwpr)

    OpenAIRE

    Haris, Muhammad; Yasin, Hasbi; Hoyyi, Abdul

    2015-01-01

    Theft is an act taking someone else's property, partially or entierely, with intention to have it illegally. Motor vehicle theft is one of the most highlighted crime type and disturbing the communities. Regression analysis is a statistical analysis for modeling the relationships between response variable and predictor variable. If the response variable follows a Poisson distribution or categorized as a count data, so the regression model used is Poisson regression. Geographically Weighted Poi...

  2. 28 CFR 29.6 - Limited participation by states and localities permitted.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Limited participation by states and localities permitted. 29.6 Section 29.6 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT... locality need not authorize the stopping of motor vehicles under all sets of conditions specified under the...

  3. 49 CFR 544.6 - Contents of insurer reports.

    Science.gov (United States)

    2010-10-01

    ... thefts for vehicles manufactured in the 1983 or subsequent model years, subdivided into model year, model... manufactured in the 1983 or subsequent model years, subdivided into model year, model, make, and line, for this... vehicle superstructure, or other recovered parts, after the insurer had made a payment listed under...

  4. 49 CFR Appendix C to Part 591 - Power of Attorney and Agreement

    Science.gov (United States)

    2010-10-01

    ... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. C Appendix C to...

  5. Automated Vehicle Policy and Regulation: A State Perspective Workshop: Summary

    Energy Technology Data Exchange (ETDEWEB)

    Young, Stanley E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Levine, Aaron [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-06-01

    A workshop held on May 18, 2016, at the University of Maryland focused on key principles that should govern state policy decisions intended to ensure the safe operation of autonomous vehicles (AVs). The patchwork approach taken by early state adopters had primarily addressed only testing of these vehicles. As uncertainties in technology and business models play out, and in the absence of more suitable policies and regulations, states are relying on laws created for conventional vehicles to govern AV operations. The workshop addressed these challenges with three panel discussions that examined the underpinnings of policy development, factors affecting policy decisions, and the ultimate impact of AVs in a number of areas, including economic competitiveness; quality of mobility, particularly for disabled community; and energy use and emissions.

  6. Feedback control for a train-like vehicle

    International Nuclear Information System (INIS)

    Micaelli, A.

    1994-01-01

    This paper presents a feedback nonlinear control law for a train-like vehicle (TLV) used in nuclear power-station maintenance. The front cart is either manual or automated guided. The rear carts are feedback controlled. The control objective is to ensure that the rear carts track the path produced (on-line) by the front cart. This controller was experimentally tested on the TLV-prototype. (authors). 4 figs., 4 refs

  7. Vertical dynamics of the Maglev vehicle Transrapid

    International Nuclear Information System (INIS)

    Haegele, Nora; Dignath, Florian

    2009-01-01

    The Maglev vehicle Transrapid is levitated by magnetic forces which pull the vehicles levitation frames toward the guideway from below. The magnets possess poles with alternating fluxes which are part of the synchronous long stator linear motor. Although the Transrapid glides along its guideway without mechanical contact, this alternation as well as the loading and unloading of the guideway girders excite vibrations of the ground. In order to calculate the time behavior of the vibrational emissions, a simulation of the transfer of a Transrapid vehicle over several guideway girders is proposed. The equations of motion for the vehicle and the girders are calculated separately by the MBS software NEWEUL and assembled and numerically integrated in MATLAB/SIMULINK. The control law for the magnet forces is simplified by the characteristics of linear spring-damper elements. The controlled magnet forces travel along the guideway continuously and include the dynamic component due to the alternating fluxes and the geometry of the poles and stator. Results of a complete vehicle moving along a guideway consisting of several girders can be obtained within a few minutes of computation time. Therefore, the mechanism of excitations can be analyzed by numerical time integration in the full state space. The results are validated by measurements of the forces in the joints of the guideway girders. The vibrational emission along the Transrapid guideway differs from the vibrations of contact-afflicted vehicles as no impacts and fewer stochastic effects occur

  8. Vertical dynamics of the Maglev vehicle Transrapid

    Energy Technology Data Exchange (ETDEWEB)

    Haegele, Nora [University of Stuttgart, Institute of Engineering and Computational Mechanics (Germany)], E-mail: Nora.Haegele@gmx.de; Dignath, Florian [ThyssenKrupp Transrapid, Basic Technologies (Germany)], E-mail: Florian.Dignath@ThyssenKrupp.com

    2009-04-15

    The Maglev vehicle Transrapid is levitated by magnetic forces which pull the vehicles levitation frames toward the guideway from below. The magnets possess poles with alternating fluxes which are part of the synchronous long stator linear motor. Although the Transrapid glides along its guideway without mechanical contact, this alternation as well as the loading and unloading of the guideway girders excite vibrations of the ground. In order to calculate the time behavior of the vibrational emissions, a simulation of the transfer of a Transrapid vehicle over several guideway girders is proposed. The equations of motion for the vehicle and the girders are calculated separately by the MBS software NEWEUL and assembled and numerically integrated in MATLAB/SIMULINK. The control law for the magnet forces is simplified by the characteristics of linear spring-damper elements. The controlled magnet forces travel along the guideway continuously and include the dynamic component due to the alternating fluxes and the geometry of the poles and stator. Results of a complete vehicle moving along a guideway consisting of several girders can be obtained within a few minutes of computation time. Therefore, the mechanism of excitations can be analyzed by numerical time integration in the full state space. The results are validated by measurements of the forces in the joints of the guideway girders. The vibrational emission along the Transrapid guideway differs from the vibrations of contact-afflicted vehicles as no impacts and fewer stochastic effects occur.

  9. Coordinated path-following and direct yaw-moment control of autonomous electric vehicles with sideslip angle estimation

    Science.gov (United States)

    Guo, Jinghua; Luo, Yugong; Li, Keqiang; Dai, Yifan

    2018-05-01

    This paper presents a novel coordinated path following system (PFS) and direct yaw-moment control (DYC) of autonomous electric vehicles via hierarchical control technique. In the high-level control law design, a new fuzzy factor is introduced based on the magnitude of longitudinal velocity of vehicle, a linear time varying (LTV)-based model predictive controller (MPC) is proposed to acquire the wheel steering angle and external yaw moment. Then, a pseudo inverse (PI) low-level control allocation law is designed to realize the tracking of desired external moment torque and management of the redundant tire actuators. Furthermore, the vehicle sideslip angle is estimated by the data fusion of low-cost GPS and INS, which can be obtained by the integral of modified INS signals with GPS signals as initial value. Finally, the effectiveness of the proposed control system is validated by the simulation and experimental tests.

  10. Evaluations by Criminal Law on Stealing One's Own Property in the Custody of Others%对盗窃在他人保管之下的本人财物行为的刑法评价

    Institute of Scientific and Technical Information of China (English)

    沈志民

    2012-01-01

    对盗窃在他人保管之下的本人财物行为如何定性,涉及财产罪保护法益范围、盗窃罪故意与非法占有目的内容以及《刑法》第91条第二款的理解等刑法理论问题。合法占有权并非一概都能对抗所有权,对盗窃在他人保管之下的本人财物行为,如果没有索赔或接受赔偿不能构成盗窃罪;反之,如果又进行索赔或接受赔偿的则构成盗窃罪。%How to define stealth of one' s own property in the custody of others arouse several theoretical issues of criminal law, such as the scope of interests protected in property crimes, the intention in the crime of stealth ; the content of possession with illegal purpose ; and the interpretation of the second paragraph in Article 91 of the Criminal Law. Since not all legal possession can be defensive against ownership, stealth of one's own property in the custody of others will not constitute crime of theft without claims for damages or acceptance of damages. Conversely, the crime of theft will be satisfied upon claims for damages or having accepted dama- ges.

  11. Mathematical model for studying cyclist kinematics in vehicle-bicycle frontal collisions

    Science.gov (United States)

    Condrea, OA; Chiru, A.; Chiriac, RL; Vlase, S.

    2017-10-01

    For the development of effective vehicle related safety solutions to improve cyclist protection, kinematic predictions are essential. The objective of the paper was the elaboration of a simple mathematical model for predicting cyclist kinematics, with the advantage of yielding simple results for relatively complicated impact situations. Thus, the use of elaborated math software is not required and the calculation time is shortened. The paper presents a modelling framework to determine cyclist kinematic behaviour for the situations in which a M1 category vehicle frontally hits the rear part of a bicycle. After the primary impact between the vehicle front bumper and the bicycle, the cyclist hits the vehicle’s bonnet, the windscreen or both the vehicle’s bonnet and the windscreen in short succession. The head-windshield impact is often the most severe impact, causing serious and potentially lethal injuries. The cyclist is represented by a rigid segment and the equations of motion for the cyclist after the primary impact are obtained by applying Newton’s second law of motion. The impact time for the contact between the vehicle and the cyclist is yielded afterwards by formulating and intersecting the trajectories for two points positioned on the cyclist’s head/body and the vehicle’s windscreen/bonnet while assuming that the cyclist’s equations of motion after the primary impact remain the same. Postimpact kinematics for the secondary impact are yielded by applying linear and angular momentum conservation laws.

  12. The Cost-Optimal Size of Future Reusable Launch Vehicles

    Science.gov (United States)

    Koelle, D. E.

    2000-07-01

    The paper answers the question, what is the optimum vehicle size — in terms of LEO payload capability — for a future reusable launch vehicle ? It is shown that there exists an optimum vehicle size that results in minimum specific transportation cost. The optimum vehicle size depends on the total annual cargo mass (LEO equivalent) enviseaged, which defines at the same time the optimum number of launches per year (LpA). Based on the TRANSCOST-Model algorithms a wide range of vehicle sizes — from 20 to 100 Mg payload in LEO, as well as launch rates — from 2 to 100 per year — have been investigated. It is shown in a design chart how much the vehicle size as well as the launch rate are influencing the specific transportation cost (in MYr/Mg and USS/kg). The comparison with actual ELVs (Expendable Launch Vehicles) and Semi-Reusable Vehicles (a combination of a reusable first stage with an expendable second stage) shows that there exists only one economic solution for an essential reduction of space transportation cost: the Fully Reusable Vehicle Concept, with rocket propulsion and vertical take-off. The Single-stage Configuration (SSTO) has the best economic potential; its feasibility is not only a matter of technology level but also of the vehicle size as such. Increasing the vehicle size (launch mass) reduces the technology requirements because the law of scale provides a better mass fraction and payload fraction — practically at no cost. The optimum vehicle design (after specification of the payload capability) requires a trade-off between lightweight (and more expensive) technology vs. more conventional (and cheaper) technology. It is shown that the the use of more conventional technology and accepting a somewhat larger vehicle is the more cost-effective and less risky approach.

  13. Compressed Natural Gas Vehicle Maintenance Facility Modification Handbook

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, K.; Melendez, M.; Gonzales, J.; Lynch, L.; Boale, B.; Kohout, J.

    2017-09-28

    To ensure the safety of personnel and facilities, vehicle maintenance facilities are required by law and by guidelines of the National Fire Protection Association (NFPA) and the International Fire Code (IFC) to exhibit certain design features. They are also required to be fitted with certain fire protection equipment and devices because of the potential for fire or explosion in the event of fuel leakage or spills. All fuels have an explosion or fire potential if specific conditions are present. This handbook covers the primary elements that must be considered when developing a CNG vehicle maintenance facility design that will protect against the ignition of natural gas releases. It also discusses specific protocols and training needed to ensure safety.

  14. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  15. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Directory of Open Access Journals (Sweden)

    Manabi Paul

    Full Text Available Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  16. Semi-active control of tracked vehicle suspension incorporating magnetorheological dampers

    Science.gov (United States)

    Ata, W. G.; Salem, A. M.

    2017-05-01

    In past years, the application of magnetorheological (MR) and electrorheological dampers in vehicle suspension has been widely studied, mainly for the purpose of vibration control. This paper presents theoretical study to identify an appropriate semi-active control method for MR-tracked vehicle suspension. Three representative control algorithms are simulated including the skyhook, hybrid and fuzzy-hybrid controllers. A seven degrees-of-freedom tracked vehicle suspension model incorporating MR dampers has been adopted for comparison between the performance of the three controllers. The model differential equations are derived based on Newton's second law of motion and the proposed control methods are developed. The performance of each control method under bump and sinusoidal road profiles for different vehicle speeds is simulated and compared with the performance of the conventional suspension system in time and frequency domains. The results show that the performance of tracked vehicle suspension with MR dampers is substantially improved. Moreover, the fuzzy-hybrid controller offers an excellent integrated performance in reducing the body accelerations as well as wheel bounce responses compared with the classical skyhook and hybrid controllers.

  17. Prototipe Critting Badot (Car Security System Monitoring Based On STNK)

    OpenAIRE

    Nasruloh, Agan; Kurniawan, Deny; Subekti, Massus

    2017-01-01

    The crime of burglary vehicle accompanied also by forgery vehicle registration certificate of vehicle number.For it, needed CRITING BADOT (Car Security System Monitoring Based On Stnk), an apparatus capable of preventing motor vehicle theft by means of technology RFID and SMS Gateway, blends the ignition and vehicle registration into a single entity, change the key of the car being contact id card, capable of being on the monitoring of the position the car.This tool requires the driver to be ...

  18. Numerical calculation on infrared characteristics of the special vehicle exhaust system

    Science.gov (United States)

    Feng, Yun-song; Li, Xiao-xia; Jin, Wei

    2017-10-01

    For mastery of infrared radiation characteristics and flow field of the special vehicle exhaust system, first, a physical model of the special vehicle exhaust system is established with the Gambit, and the mathematical model of flow field is determined. Secondly, software Fluent6.3 is used to simulated the 3-D exterior flow field of the special vehicle exhaust system, and the datum of flow field, such as temperature, pressure and density, are obtained. Thirdly, based on the plume temperature, the special vehicle exhaust space is divided. The exhaust is equivalent to a gray-body. A calculating model of the vehicle exhaust infrared radiation is established, and the exhaust infrared radiation characteristics are calculated by the software MATLAB, then the spatial distribution curves are drawn. Finally, the numerical results are analyzing, and the basic laws of the special vehicle exhaust infrared radiation are explored. The results show that with the increase of the engine speed, the temperature of the exhaust pipe wall of the special vehicle increases, and the temperature and pressure of the exhaust gas flow field increase, which leads to the enhancement of the infrared radiation intensity

  19. Risk and resilience in the Nigerian oil sector: The economic effects of pipeline sabotage and theft

    International Nuclear Information System (INIS)

    Yeeles, Adam; Akporiaye, Alero

    2016-01-01

    Political unrest in the Niger Delta has long been viewed as a hurdle for extracting maximum value from Nigeria's oil resources. Recently, investors and policymakers have laid blame for sector under-performance on pipeline sabotage and theft, and sounded the alarm for an impending ‘oil crisis’. However, our understanding of the economic effects of social action against oil companies is incomplete. Rigorous analysis has not heretofore been offered as evidence for such dire futures. Despite the obvious risk of pipeline interdiction, price dynamics and aggregate production respond minimally to pipeline interdiction. Based on quantitative analysis of the relationship among price, production and pipeline interdiction from multiple data sources covering different time intervals (monthly data from 2005 to 2014 and annual data from 1999 to 2013), we find no evidence of significant effects of pipeline interdiction on production and a weak relationship between pipeline interdiction and Bonny light crude prices. Reported losses in product are substantial, but there is no evidence of statistically significant impacts on price or production in the aggregate. Explanations for this counterintuitive result are cast in terms of sector resilience. The implications of this finding for producer risk and the likelihood of an impending ‘oil crisis’ are discussed. - Highlights: • We examine the impact of pipeline sabotage and theft on the Nigerian oil economy. • Econometric analysis of production, price and pipeline interdiction over different time intervals. • Aggregate price and production are impacted minimally by pipeline interdiction. • Oil sector business risk is high, but production is resilient to interruptions from social and political unrest.

  20. Nuclear-industry employee protection provisions of federal law

    International Nuclear Information System (INIS)

    Fidell, E.R.; Marcoux, W.C.

    1982-01-01

    Legislation enacted by Congress in 1978 to provide protection for those employed in the construction or operation of civil nuclear projects who express concerns to employers or others about the propriety of procedures in their places of employment from the standpoint of safety is summarized. The authors describe some recent and anticipated developments in the implementation of the law and offer practical suggestions for the avoidance of particular problems under the law. They counsel that the prudent utility company or other firm involved with nuclear energy will see the statute as another reason for facilitating the flow of bona fide safety concerns rather than as a vehicle for the expression of generalized complaints by malcontents and a convenient shield for substandard performers in the work force

  1. A Model of Active Roll Vehicle Suspension

    Directory of Open Access Journals (Sweden)

    I. Čech

    2010-01-01

    Full Text Available This paper describes active suspension with active roll for four-wheel vehicle (bus by means of an in-series pump actuator with doubled hydropneumatic springs. It also gives full control law with no sky-craping. Lateral stiffness and solid axle geometry in the mechanical model are not neglected. Responses to lateral input as well as responses to statistical unevennesses show considerable improvement of passengers comfort and safety when cornering.

  2. Simulation of speed control in acceleration mode of a heavy duty vehicle; Ogatasha no kasokuji ni okeru shasoku seigyo simulation

    Energy Technology Data Exchange (ETDEWEB)

    Endo, S; Ukawa, H [Isuzu Advanced Engineering Center, Ltd., Tokyo (Japan); Sanada, K; Kitagawa, A [Tokyo Institute of Technology, Tokyo (Japan)

    1997-10-01

    A control law of speed of a heavy duty vehicle in acceleration mode is presented, which is an extended version of a control law in deceleration mode proposed by the authors. The control law is based on constant acceleration strategy. Using the control law, target velocity and target distance can be performed. Both control laws for acceleration and deceleration mode can be represented by a unified mathematical formulae. Some simulation results are shown to demonstrate the control performance. 7 refs., 9 figs., 2 tabs.

  3. Robust adaptive multivariable higher-order sliding mode flight control for air-breathing hypersonic vehicle with actuator failures

    Directory of Open Access Journals (Sweden)

    Peng Li

    2016-10-01

    Full Text Available This article proposes an adaptive multivariable higher-order sliding mode control for the longitudinal model of an air-breathing vehicle under system uncertainties and actuator failures. Firstly, a fast finite-time control law is designed for a chain of integrators. Secondly, based on the input/output feedback linearization technique, the system uncertainty and external disturbances are modeled as additive certainty and the actuator failures are modeled as multiplicative uncertainty. By using the proposed fast finite-time control law, a robust multivariable higher-order sliding mode control is designed for the air-breathing hypersonic vehicle with actuator failures. Finally, adaptive laws are proposed for the adaptation of the parameters in the robust multivariable higher-order sliding mode control. Thus, the bounds of the uncertainties are not needed in the control system design. Simulation results show the effectiveness of the proposed robust adaptive multivariable higher-order sliding mode control.

  4. Autonomous aerial vehicles : guidance, control, signal and image processing platform

    International Nuclear Information System (INIS)

    Al-Jarrah, M.; Adiansyah, S.; Marji, Z. M.; Chowdhury, M. S.

    2011-01-01

    The use of unmanned systems is gaining momentum in civil applications after successful use by the armed forces around the globe. Autonomous aerial vehicles are important for providing assistance in monitoring highways, power grid lines, borders, and surveillance of critical infrastructures. It is envisioned that cargo shipping will be completely handled by UAVs by the 2025. Civil use of unmanned autonomous systems brings serious challenges. The need for cost effectiveness, reliability, operation simplicity, safety, and cooperation with human and with other agents are among these challenges. Aerial vehicles operating in the civilian aerospace is the ultimate goal which requires these systems to achieve the reliability of manned aircraft while maintaining their cost effectiveness. In this presentation the development of an autonomous fixed and rotary wing aerial vehicle will be discussed. The architecture of the system from the mission requirements to low level auto pilot control laws will be discussed. Trajectory tracking and path following guidance and control algorithms commonly used and their implementation using of the shelf low cost components will be presented. Autonomous takeo? landing is a key feature that was implemented onboard the vehicle to complete its degree of autonomy. This is implemented based on accurate air-data system designed and fused with sonar measurements, INS/GPS measurements, and vector field method guidance laws. The outcomes of the proposed research is that the AUS-UAV platform named MAZARI is capable of autonomous takeoff and landing based on a pre scheduled flight path using way point navigation and sensor fusion of the inertial navigation system (INS) and global positioning system (GPS). Several technologies need to be mastered when developing a UAV. The navigation task and the need to fuse sensory information to estimate the location of the vehicle is critical to successful autonomous vehicle. Currently extended Kalman filtering is

  5. Collection of laws and ordinances concerning regulation of atomic energy, 1989 edition. 1989 ed.

    International Nuclear Information System (INIS)

    1989-01-01

    The collection of the laws and ordinances concerning the regulation of atomic energy, 1989 edition, was published by the Nuclear Safety Bureau, Science and Technology Agency. First, the abbreviated expressions of 56 laws and ordinances are shown. The contents are divided into Part 1: Fundamental laws and ordinances, Part 2: Regulation of nuclear source materials, nuclear fuel materials and nuclear reactors, Part 3: Prevention of radiation injuries due to radioactive isotopes and others, and Part 4: Related laws and ordinances. In Part 1, Atomic Energy Fundamental Act, Act of Institution of Atomic Energy Commission and Nuclear Safety Commission of Japan, Law Concerning the Technical Standard for Prevention of Radiation Injuries and 9 others are included. In Part 2, Law Concerning Regulation of Nuclear Source Materials, Nuclear Fuel Materials and Nuclear Reactors and 45 others are included. In Part 3, Law Concerning Prevention of Radiation Injuries Due to Radioisotopes and Others and 25 others are included. In Part 4, Electricity Enterprises Act, Road Transport and Vehicles Act, Ships' Safety Law, Labor Safety and Hygiene Law, Japan Atomic Energy Research Institute Law and 29 others are included. The contents are those as of November 30, 1988. (Kako, I.)

  6. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    OpenAIRE

    Grover Kearns

    2010-01-01

    Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting stu...

  7. 49 CFR 509.2 - Display.

    Science.gov (United States)

    2010-10-01

    ...-0039 Part 566 2127-0043 Consolidated owners' manual requirements for vehicles and equipment (§§ 571.126... Theft Prevention Standard and Labeling Requirements (parts 541, 565, 567 and § 571.115) 2127-0510...

  8. The bioethics and law paradox: an argument to maintain separateness with a hint of togetherness.

    Science.gov (United States)

    Werren, Julia

    2007-10-01

    This article analyses how bioethics and law interact and work together. The first half of the article provides definitions of both ethics and bioethics. The article then considers a number of different bioethical standpoints to demonstrate the variance of views in relation to bioethics. In addition, the first half of the article focuses on the different regulatory possibilities in regard to bioethical contexts. This demonstrates that law is of central importance to bioethics. This part also shows that even though law and ethics are often used simultaneously to achieve bioethical goals, law and ethics cannot be used interchangeably. Thus, even though it is somewhat inevitable that law will be used in the pursuit of the goals of bioethics, bioethics and bioethical principle should not be merely a vehicle for law-makers to utilise. The second half of the article focuses on the issues of autonomy and consent to demonstrate how law and ethics have developed in one of the foundation areas of bioethics.

  9. Railway equipment with which vehicles are kept in a hovering position

    Energy Technology Data Exchange (ETDEWEB)

    Guenther, C

    1977-04-07

    The invention concerns the suspension of the emergency element at the vehicle of a magnetically levitated railway. On loss of the magnetic field keeping the vehicle hovering, the emergency elements are suspended on the rail arrangement. The suspension should limit the impact of the emergency elements to the smallest possible physical force. According to the invention the suspension consists of a spring-damper combination with a linear spring characteristic and a damper with a square law characteristic. The conditions which the spring constants, damper parameters and maximum spring force must satisfy, are laid down in suitable formulae.

  10. Regulation on the transport of nuclear fuel materials by vehicles

    International Nuclear Information System (INIS)

    1984-01-01

    The regulations applying to the transport of nuclear fuel materials by vehicles, mentioned in the law for the regulations of nuclear source materials, nuclear fuel materials and reactors. The transport is for outside of the factories and the site of enterprises by such modes of transport as rail, trucks, etc. Covered are the following: definitions of terms, places of fuel materials handling, loading methods, limitations on mix loading with other cargo, radiation dose rates concerning the containers and the vehicles, transport indexes, signs and indications, limitations on train linkage during transport by rail, security guards, transport of empty containers, etc. together with ordinary rail cargo and so on. (Mori, K.)

  11. Regulations concerning the transport of nuclear fuel materials outside the works or the enterprise

    International Nuclear Information System (INIS)

    1979-01-01

    The regulations are defined under the law for the regulations of nuclear source materials, nuclear fuel materials and reactors and the order for execution of the law. Basic concepts and terms are explained, such as: vehicle transport; easy transport; nuclear fuel material load, exclusive loading, employee, accumulative dose and exposure dose. Technical standards of vehicle transport are specified in detail on nucler fuel materials as nuclear fuel load, L,A, EM and BU type of load, nuclear fuel load of fission substances, the second and third type of fission load and materials contaminated by nuclear fuel substances to be carried not as nuclear fuel loads. Special exceptional measures to such transport and technical standards of easy transport are also designated. The application for confirmation of the transport shall be filed to the Director General of Science and Technology Agency according to the form attached with documents explaining nuclear fuel materials to be transferred, the vessel of such materials and construction, material and method of production of such a vessel, safety of nuclear materials contained, etc. Measures in dangerous situations shall be taken to fight a fire or prohibit the entrance of persons other than the staff concerned. Reports shall be presented in 10 days to the Director, when theft, loss or irregular leaking of nuclear fuel materials or personal troubles occur on the way. (Okada, K.)

  12. Ordinance concerning the filing of transport of nuclear fuel materials

    International Nuclear Information System (INIS)

    1979-01-01

    The ordinance is defined under the law for the regulations of nuclear source materials, nuclear fuel materials and reactors and the order for execution of the law. Any person who reports the transport of nuclear fuel materials shall file four copies of a notification according to the form attached to the public safety commission of the prefecture in charge of the dispatching place. When the transportation extends over the area in charge of another public safety commission, the commission which has received the notice shall report without delay date and route of the transport, kind and quantity of nuclear fuel materials and other necessary matters to the commission concerned and hear from the latter opinions on the items informed. The designation by the ordinance includes speed of the vehicle loaded with nuclear fuel materials, disposition of an accompanying car, arrangement of the line of the loaded vehicle and accompanying and other escorting cars, location of the parking, place of unloading and temporary storage, etc. Reports concerning troubles and measures taken shall be filed in ten days to the public safety commission which has received the notification, when accidents occur on the way, such as: theft or loss of nuclear fuel materials; traffic accident; irregular leaking of nuclear fuel materials and personal trouble by the transport. (Okada, K.)

  13. Control Relevant Modeling and Design of Scramjet-Powered Hypersonic Vehicles

    Science.gov (United States)

    Dickeson, Jeffrey James

    This report provides an overview of scramjet-powered hypersonic vehicle modeling and control challenges. Such vehicles are characterized by unstable non-minimum phase dynamics with significant coupling and low thrust margins. Recent trends in hypersonic vehicle research are summarized. To illustrate control relevant design issues and tradeoffs, a generic nonlinear 3DOF longitudinal dynamics model capturing aero-elastic-propulsive interactions for wedge-shaped vehicle is used. Limitations of the model are discussed and numerous modifications have been made to address control relevant needs. Two different baseline configurations are examined over a two-stage to orbit ascent trajectory. The report highlights how vehicle level-flight static (trim) and dynamic properties change over the trajectory. Thermal choking constraints are imposed on control system design as a direct consequence of having a finite FER margin. The implication of this state-dependent nonlinear FER margin constraint, the right half plane (RHP) zero, and lightly damped flexible modes, on control system bandwidth (BW) and FPA tracking has been discussed. A control methodology has been proposed that addresses the above dynamics while providing some robustness to modeling uncertainty. Vehicle closure (the ability to fly a trajectory segment subject to constraints) is provided through a proposed vehicle design methodology. The design method attempts to use open loop metrics whenever possible to design the vehicle. The design method is applied to a vehicle/control law closed loop nonlinear simulation for validation. The 3DOF longitudinal modeling results are validated against a newly released NASA 6DOF code.

  14. Motorcycle crashes potentially preventable by three crash avoidance technologies on passenger vehicles.

    Science.gov (United States)

    Teoh, Eric R

    2018-07-04

    The objective of this study was to identify and quantify the motorcycle crash population that would be potential beneficiaries of 3 crash avoidance technologies recently available on passenger vehicles. Two-vehicle crashes between a motorcycle and a passenger vehicle that occurred in the United States during 2011-2015 were classified by type, with consideration of the functionality of 3 classes of passenger vehicle crash avoidance technologies: frontal crash prevention, lane maintenance, and blind spot detection. Results were expressed as the percentage of crashes potentially preventable by each type of technology, based on all known types of 2-vehicle crashes and based on all crashes involving motorcycles. Frontal crash prevention had the largest potential to prevent 2-vehicle motorcycle crashes with passenger vehicles. The 3 technologies in sum had the potential to prevent 10% of fatal 2-vehicle crashes and 23% of police-reported crashes. However, because 2-vehicle crashes with a passenger vehicle represent fewer than half of all motorcycle crashes, these technologies represent a potential to avoid 4% of all fatal motorcycle crashes and 10% of all police-reported motorcycle crashes. Refining the ability of passenger vehicle crash avoidance systems to detect motorcycles represents an opportunity to improve motorcycle safety. Expanding the capabilities of these technologies represents an even greater opportunity. However, even fully realizing these opportunities can affect only a minority of motorcycle crashes and does not change the need for other motorcycle safety countermeasures such as helmets, universal helmet laws, and antilock braking systems.

  15. Lead theft--a study of the "uniqueness" of lead from church roofs.

    Science.gov (United States)

    Bond, John W; Hainsworth, Sarah V; Lau, Tien L

    2013-07-01

    In the United Kingdom, theft of lead is common, particularly from churches and other public buildings with lead roofs. To assess the potential to distinguish lead from different sources, 41 samples of lead from 24 church roofs in Northamptonshire, U.K, have been analyzed for relative abundance of trace elements and isotopes of lead using X-ray fluorescence (XRF) and inductively coupled plasma mass spectrometry, respectively. XRF revealed the overall presence of 12 trace elements with the four most abundant, calcium, phosphorus, silicon, and sulfur, showing a large weight percentage standard error of the mean of all samples suggesting variation in the weight percentage of these elements between different church roofs. Multiple samples from the same roofs, but different lead sheets, showed much lower weight percentage standard errors of the mean suggesting similar trace element concentrations. Lead isotope ratios were similar for all samples. Factors likely to affect the occurrence of these trace elements are discussed. © 2013 American Academy of Forensic Sciences.

  16. H∞ control of railway vehicle suspension with MR damper using scaled roller rig

    International Nuclear Information System (INIS)

    Shin, Yu-Jeong; You, Won-Hee; Hur, Hyun-Moo; Park, Joon-Hyuk

    2014-01-01

    In this paper, a magneto-rheological (MR) damper was applied to the secondary suspension to reduce the vibration of a car body. The control performance of the MR damper was verified by numerical analysis with a 1/5 scale railway vehicle model in accordance with the similarity law. The analysis results were then validated in tests. In particular, the objective of the study was to understand how the control performance affected the dynamic characteristics of a railway vehicle and to systematically analyze the relationship between control performance and dynamic characteristics depending on various running speeds. To achieve this, experimental results for the dynamic characteristics of the scaled MR damper designed for the 1/5 scale railway vehicle model were applied to the railway vehicle model. The H ∞ control method was applied to the controller. The means of designing the railway vehicle body vibration controller and the effectiveness of its results were studied. (paper)

  17. Intelligent behaviors through vehicle-to-vehicle and vehicle-to-infrastructure communication

    Science.gov (United States)

    Garcia, Richard D.; Sturgeon, Purser; Brown, Mike

    2012-06-01

    The last decade has seen a significant increase in intelligent safety devices on private automobiles. These devices have both increased and augmented the situational awareness of the driver and in some cases provided automated vehicle responses. To date almost all intelligent safety devices have relied on data directly perceived by the vehicle. This constraint has a direct impact on the types of solutions available to the vehicle. In an effort to improve the safety options available to a vehicle, numerous research laboratories and government agencies are investing time and resources into connecting vehicles to each other and to infrastructure-based devices. This work details several efforts in both the commercial vehicle and the private auto industries to increase vehicle safety and driver situational awareness through vehicle-to-vehicle and vehicle-to-infrastructure communication. It will specifically discuss intelligent behaviors being designed to automatically disable non-compliant vehicles, warn tractor trailer vehicles of unsafe lane maneuvers such as lane changes, passing, and merging, and alert drivers to non-line-of-sight emergencies.

  18. Guidance Law and Neural Control for Hypersonic Missile to Track Targets

    Directory of Open Access Journals (Sweden)

    Wenxing Fu

    2016-01-01

    Full Text Available Hypersonic technology plays an important role in prompt global strike. Because the flight dynamics of a hypersonic vehicle is nonlinear, uncertain, and highly coupled, the controller design is challenging, especially to design its guidance and control law during the attack of a maneuvering target. In this paper, the sliding mode control (SMC method is used to develop the guidance law from which the desired flight path angle is derived. With the desired information as control command, the adaptive neural control in discrete time is investigated ingeniously for the longitudinal dynamics of the hypersonic missile. The proposed guidance and control laws are validated by simulation of a hypersonic missile against a maneuvering target. It is demonstrated that the scheme has good robustness and high accuracy to attack a maneuvering target in the presence of external disturbance and missile model uncertainty.

  19. Comparative Emissions Testing of Vehicles Aged on E0, E15 and E20 Fuels

    Energy Technology Data Exchange (ETDEWEB)

    Vertin, K.; Glinsky, G.; Reek, A.

    2012-08-01

    The Energy Independence and Security Act passed into law in December 2007 has mandated the use of 36 billion ethanol equivalent gallons per year of renewable fuel by 2022. A primary pathway to achieve this national goal is to increase the amount of ethanol blended into gasoline. This study is part of a multi-laboratory test program coordinated by DOE to evaluate the effect of higher ethanol blends on vehicle exhaust emissions over the lifetime of the vehicle.

  20. Advances in Integrated Vehicle Thermal Management and Numerical Simulation

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2017-10-01

    Full Text Available With the increasing demands for vehicle dynamic performance, economy, safety and comfort, and with ever stricter laws concerning energy conservation and emissions, vehicle power systems are becoming much more complex. To pursue high efficiency and light weight in automobile design, the power system and its vehicle integrated thermal management (VITM system have attracted widespread attention as the major components of modern vehicle technology. Regarding the internal combustion engine vehicle (ICEV, its integrated thermal management (ITM mainly contains internal combustion engine (ICE cooling, turbo-charged cooling, exhaust gas recirculation (EGR cooling, lubrication cooling and air conditioning (AC or heat pump (HP. As for electric vehicles (EVs, the ITM mainly includes battery cooling/preheating, electric machines (EM cooling and AC or HP. With the rational effective and comprehensive control over the mentioned dynamic devices and thermal components, the modern VITM can realize collaborative optimization of multiple thermodynamic processes from the aspect of system integration. Furthermore, the computer-aided calculation and numerical simulation have been the significant design methods, especially for complex VITM. The 1D programming can correlate multi-thermal components and the 3D simulating can develop structuralized and modularized design. Additionally, co-simulations can virtualize simulation of various thermo-hydraulic behaviors under the vehicle transient operational conditions. This article reviews relevant researching work and current advances in the ever broadening field of modern vehicle thermal management (VTM. Based on the systematic summaries of the design methods and applications of ITM, future tasks and proposals are presented. This article aims to promote innovation of ITM, strengthen the precise control and the performance predictable ability, furthermore, to enhance the level of research and development (R&D.

  1. Full drive-by-wire dynamic control for four-wheel-steer all-wheel-drive vehicles

    Science.gov (United States)

    Fahimi, Farbod

    2013-03-01

    Most of the controllers introduced for four-wheel-steer (4WS) vehicles are derived with the assumption that the longitudinal speed of the vehicle is constant. However, in real applications, the longitudinal speed varies, and the longitudinal, lateral, and yaw dynamics are coupled. In this paper, the longitudinal dynamics of the vehicle as well as its lateral and yaw motions are controlled simultaneously. This way, the effect of driving/braking forces of the tires on the lateral and yaw motions of the vehicle are automatically included in the control laws. To address the dynamic parameter uncertainty of the vehicle, a chatter-free variable structure controller is introduced. Elimination of chatter is achieved by introducing a dynamically adaptive boundary layer thickness. It is shown via simulations that the proposed control approach performs more robustly than the controllers developed based on dynamic models, in which longitudinal speed is assumed to be constant, and only lateral speed and yaw rate are used as system states. Furthermore, this approach supports all-wheel-drive vehicles. Front-wheel-drive or rear-wheel-drive vehicles are also supported as special cases of an all-wheel-drive vehicle.

  2. Simulation model of the F/A-18 high angle-of-attack research vehicle utilized for the design of advanced control laws

    Science.gov (United States)

    Strickland, Mark E.; Bundick, W. Thomas; Messina, Michael D.; Hoffler, Keith D.; Carzoo, Susan W.; Yeager, Jessie C.; Beissner, Fred L., Jr.

    1996-01-01

    The 'f18harv' six degree-of-freedom nonlinear batch simulation used to support research in advanced control laws and flight dynamics issues as part of NASA's High Alpha Technology Program is described in this report. This simulation models an F/A-18 airplane modified to incorporate a multi-axis thrust-vectoring system for augmented pitch and yaw control power and actuated forebody strakes for enhanced aerodynamic yaw control power. The modified configuration is known as the High Alpha Research Vehicle (HARV). The 'f18harv' simulation was an outgrowth of the 'f18bas' simulation which modeled the basic F/A-18 with a preliminary version of a thrust-vectoring system designed for the HARV. The preliminary version consisted of two thrust-vectoring vanes per engine nozzle compared with the three vanes per engine actually employed on the F/A-18 HARV. The modeled flight envelope is extensive in that the aerodynamic database covers an angle-of-attack range of -10 degrees to +90 degrees, sideslip range of -20 degrees to +20 degrees, a Mach Number range between 0.0 and 2.0, and an altitude range between 0 and 60,000 feet.

  3. A Descriptive Analysis of Care Provided by Law Enforcement Prior to EMS Arrival in the United States.

    Science.gov (United States)

    Klassen, Aaron B; Core, S Brent; Lohse, Christine M; Sztajnkrycer, Matthew D

    2018-04-01

    Study Objectives Law enforcement is increasingly viewed as a key component in the out-of-hospital chain of survival, with expanded roles in cardiac arrest, narcotic overdose, and traumatic bleeding. Little is known about the nature of care provided by law enforcement prior to the arrival of Emergency Medical Services (EMS) assets. The purpose of the current study was to perform a descriptive analysis of events reported to a national EMS database. This study was a descriptive analysis of the 2014 National Emergency Medical Services Information System (NEMSIS) public release research data set, containing EMS emergency response data from 41 states. Code E09_02 1200 specifically identifies care provided by law enforcement prior to EMS arrival. A total of 25,835,729 unique events were reported. Of events in which pre-arrival care was documented, 2.0% received prior aid by law enforcement. Patients receiving law enforcement care prior to EMS arrival were more likely to be younger (52.8 [SD=23.3] years versus 58.7 [SD=23.3] years), male (54.8% versus 46.7%), and white (80.3% versus 77.5%). Basic Life Support (BLS) EMS response was twice as likely in patients receiving prior aid by law enforcement. Multiple-casualty incidents were five times more likely with prior aid by law enforcement. Compared with prior aid by other services, law enforcement pre-arrival care was more likely with motor vehicle accidents, firearm assaults, knife assaults, blunt assaults, and drug overdoses, and less likely at falls and childbirths. Cardiac arrest was significantly more common in patients receiving prior aid by law enforcement (16.5% versus 2.6%). Tourniquet application and naloxone administration were more common in the law enforcement prior aid group. Where noted, law enforcement pre-arrival care occurs in 2.0% of EMS patient encounters. The majority of cases involve cardiac arrest, motor vehicle accidents, and assaults. Better understanding of the nature of law enforcement care is

  4. Nuclear Energy Law and Arbo Law/Safety Law

    International Nuclear Information System (INIS)

    Eijnde, J.G. van den

    1986-01-01

    The legal aspects of radiation protection in the Netherlands are described. Radiation protection is regulated mainly in the Nuclear Energy Law. The Arbo Law also has some sections about radiation protection. The interaction between both laws is discussed. (Auth.)

  5. Risky behavior of drivers of motorized two wheeled vehicles in India.

    Science.gov (United States)

    Dandona, Rakhi; Kumar, G Anil; Dandona, Lalit

    2006-01-01

    Motorized two-wheeled vehicles (MTV) account for a large proportion of road traffic in India and the riders of these vehicles have a high risk of road traffic injuries. We report on the availability of drivers licenses, use of a helmet, driver behavior, and condition of vehicles for MTV drivers in Hyderabad, a city in India Drivers of a MTV aged >16 years were interviewed at petrol filling stations There were 4,183 MTV drivers who participated in the study. Four hundred sixty one (11%; 95% CI 9.7-12.3%) drivers had not obtained a drivers license and 798 (21.4%) had obtained a license without taking the mandatory driving test. Two thousand nine hundred twenty (69.8%; 95% CI 67.9-71.7%) drivers reported no/very occasional use of a helmet, the significant predictors of which included that those driving borrowed a MTV (odds ratio 7.90; 95% CI 3.40-18.40) or driving moped/scooterette/scooter as compared with motorcycle (3.32; 2.76-3.98), lower education (3.10; 2.66-3.61), age >45 years (2.41; 1.63-3.57), and males (1.57; 1.16-2.13). Two thousand five hundred and eight (59.9%) drivers reported committing a traffic law violation at least once within the last 3 months. Overall, 1,222 (29.2%) drivers reported ever being caught by traffic police for a traffic law violation with data on violations available for 1,205 of these drivers, of whom 680 (56.4%) paid a fine, 310 (25.7%) paid by bribe, and 215 (17.8%) made no payment. The proportion of those who did not make payment for committed violation was significantly higher among females (46.8%) than males (16.3%). Two thousand fifty two (49%) of all MTVs had no rearview mirror These data suggest the need to enact and enforce policy interventions for improving the drivers license system, mandatory use of a helmet, effective traffic law enforcement, and ensuring good vehicle condition to reduce the risk factors that potentially contribute to mortality and morbidity in road traffic crashes in MTV drivers in Indian cities.

  6. VEHICLES REGISTERED IN THE FRENCH SPECIAL SERIES '431K' AND '431CD'

    CERN Multimedia

    Service des Relations avec les Pays Hôtes

    2000-01-01

    1.\tDrivingOnly members of the CERN personnel and members of their families (spouses, children, parents and parents-in-law) holding a valid special card issued by the French Ministry for Foreign Affairs (herein after 'MAE') are entitled to drive vehicles registered in the special series '431 K' or '431 CD'.Such authorisation is therefore granted to neither French citizens nor permanent residents of France (holding an 'FR' or 'AR' 'attestation de fonctions' issued by the MAE).You are reminded that the French authorities make no exceptions to this rule and that any infringement thereof can have legal consequences.2.\tRegistrationa)\tTime limitMembers of the personnel taking up residence in France must complete the formalities for the registration of their vehicles in France as soon as they receive their special card from the MAE.b)\tTypes of vehicleContrary to their former practice, the French authorities do not allow certain vehicles (e.g. motor caravans) to be registered in the special...

  7. ADMINISTRATIVE CIRCULAR NO. 20 USE OF PRIVATE VEHICLES FOR OFFICIAL DUTY - INSURANCE

    CERN Multimedia

    Human Resources Division - Tel. 73634

    2002-01-01

    Administrative Circular No. 20 on the use of private vehicles for official duty is shortly to be revised with a view to making certain procedures more flexible. CERN no longer requires members of the personnel to take out optional private insurances (insurance for official journeys, legal assistance insurance) in the case of duty travel for the Organization, since the associated risks are covered by CERN's own insurance. Pending the above mentioned revision, members of the personnel may continue to use their private vehicles for official duty in accordance with the others provisions laid down in the Circular Reminder: Owners of private vehicles must of course be insured by the normal compulsory car insurance required by the laws of the Host States when driving on and off the CERN sites.

  8. Unsustainable and unjust

    African Journals Online (AJOL)

    apartheid to ameliorate the effects of unjust security detention laws, were simply ... analysis of data informing criminal justice system law reform in ... serious offence, or the court simply thinks it is in the interests of ...... theft, or any offence referred to in Part 1 to 4, or Section. 17, 20 or 21 (in ... curb violent crime must be taken.

  9. 76 FR 8400 - National Highway Traffic Safety Administration

    Science.gov (United States)

    2011-02-14

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety Administration (NHTSA) Department of Transportation (DOT). ACTION: Grant of petition for exemption. SUMMARY: This...

  10. Pre-flight physical simulation test of HIMES reentry test vehicle

    Science.gov (United States)

    Kawaguchi, Jun'ichiro; Inatani, Yoshifumi; Yonemoto, Koichi; Hosokawa, Shigeru

    ISAS is now developing a small reentry test vehicle, which is 2m long with a 1.5m wing span and weighs about 170 kg, for the purpose of exploring high angle-of-attack aerodynamic attitude control issue in supersonic and hypersonic speed. The flight test, employing 'Rockoon' launch system, is planned as a preliminary design verification for a fully reusable winged rocket named HIMES (Highly Maneuverable Experimental Space) vehicle. This paper describes the results of preflight ground test using a motion table system. This ground system test is called 'physical simulation' aimed at: (1) functional verification of side-jet system, aerodynamic surface actuators, battery and onboard avionics; and (2) guidance and control law evaluation, in total hardware-in-the-loop system. The pressure of side-jet nozzles was measured to provide exact thrust characteristics of reaction control. The dynamics of vehicle motion was calculated in real-time by the ground simulation computer.

  11. Improving Vehicle Ride and Handling Using LQG CNF Fusion Control Strategy for an Active Antiroll Bar System

    Directory of Open Access Journals (Sweden)

    N. Zulkarnain

    2014-01-01

    Full Text Available This paper analyses a comparison of performance for an active antiroll bar (ARB system using two types of control strategy. First of all, the LQG control strategy is investigated and then a novel LQG CNF fusion control method is developed to improve the performances on vehicle ride and handling for an active antiroll bar system. However, the ARB system has to balance the trade-off between ride and handling performance, where the CNF consists of a linear feedback law and a nonlinear feedback law. Typically, the linear feedback is designed to yield a quick response at the initial stage, while the nonlinear feedback law is used to smooth out overshoots in the system output when it approaches the target reference. The half car model is combined with a linear single track model with roll dynamics which are used for the analysis and simulation of ride and handling. The performances of the control strategies are compared and the simulation results show the LQG CNF fusion improves the performances in vehicle ride and handling.

  12. Spatio-temporal optimal law enforcement using Stackelberg games

    International Nuclear Information System (INIS)

    Naja, R.; Mouawad, N.; Ghandour, A.

    2017-01-01

    Every year, road accidents claim the lives of around 1.2 million worldwide (USDOT-NHTSA,2012). Deploying speed traps helps bounding vehicles speed and reducing collisions. Nevertheless, deterministic speed traps deployment in both spatial and temporal domains, allow drivers to learn and anticipate covered areas. In thispaper, we present a novel framework that provides randomized speed traps deployment schedule. It uses game theory in order to model drivers and law enforcers behavior. In this context, Stackelberg security game is used to derive best strategies to deploy. The game optimal solution maximizes law enforcer utility. This research work aims to optimize the deployment of speed traps on Lebanese highways according to the accidents probability input data. This work complements the near real time accident map provided by the Lebanese National Council for Scientific Research and designs an optimal speed trap map targeting Lebanese highways.(author)

  13. PROTECTING CRITICAL DATABASES – TOWARDS A RISK BASED ...

    African Journals Online (AJOL)

    njotim

    LLB, (Vista University), LLM Cum Laude: Information Technology Law, ... information14 by or between governments, businesses or individual ICT users, thus .... web user into surrendering private information that will be used for identity theft ...

  14. Consumption of alcoholic beverages, driving vehicles, a balance of dry law, Brazil 2007-2013

    Directory of Open Access Journals (Sweden)

    Deborah Carvalho Malta

    2014-08-01

    Full Text Available The study analyzes the trend in frequency of adults who drive under the influence of alcohol in major Brazilian cities after the passing of laws, which prohibit drunk driving. Data from the Surveillance System for Risk and Protective Factors for Chronic Diseases by Telephone Survey (VIGITEL between 2007 and 2013 were analyzed. The frequency of adults who drove after abusive alcohol consumption was reduced by 45.0% during this period (2.0% in 2007 to 1.1% in 2013. Between 2007 and 2008 (-0.5% and between 2012 and 2013 (-0.5%, significant reductions were observed in the years immediately after the publication of these laws that prohibit drunk driving. These improvements towards the control of drunk driving show a change in the Brazilian population’s lifestyle.

  15. Modeling road traffic fatalities in India: Smeed's law, time invariance and regional specificity

    Directory of Open Access Journals (Sweden)

    Raj V. Ponnaluri

    2012-07-01

    Full Text Available Mathematical formulations linking road traffic fatalities to vehicle ownership, regional population, and economic growth continue to be developed against the backdrop of Smeed and Andreassen models. Though a few attempts were made, Smeed's law has not been fully tested in India. Using the 1991–2009 panel data from all states, this work (a developed the generalized Smeed and Andreassen models; (b evaluated if traffic fatalities were impacted by structural changes; and (c examined if – in relation to the generalized model – the individual (time and regional models are more relevant for application. Seven models (Smeed: original, generalized, time-variant, state-variant; and Andreassen: generalized, time-variant, state-variant were developed and tested for fit with the actual data. Results showed that the per vehicle fatality rate closely resembled Smeed's formulation. Chow-test yielded a significant F-stat, suggesting that the models for four pre-defined time-blocks are structurally different from the 19-year generalized model. The counterclockwise rotation of the log-linear form also suggested lower fatality rates. While the new government policies, reduced vehicle operating speeds, better healthcare, and improved vehicle technology could be the factors, further research is required to understand the reasons for fatality rate reductions. The intercept and gradients of the time-series models showed high stability and varied only slightly in comparison to the 19-year generalized models, thus suggesting that the latter are pragmatic for application. Regional formulations, however, indicate that they may be more relevant for studying trends and tendencies. This research illustrates the robustness of Smeed's law, and provides evidence for time-invariance but state-specificity.

  16. Nonlinear Cascade Strategy for Longitudinal Control of Electric Vehicle.

    Science.gov (United States)

    El Majdoub, K; Giri, F; Ouadi, H; Chaoui, F Z

    2014-01-01

    The problem of controlling the longitudinal motion of front-wheels electric vehicle (EV) is considered making the focus on the case where a single dc motor is used for both front wheels. Chassis dynamics are modelled applying relevant fundamental laws taking into account the aerodynamic effects and the road slope variation. The longitudinal slip, resulting from tire deformation, is captured through Kiencke's model. Despite its highly nonlinear nature the complete model proves to be utilizable in longitudinal control design. The control objective is to achieve a satisfactory vehicle speed regulation in acceleration/deceleration stages, despite wind speed and other parameters uncertainty. An adaptive controller is developed using the backstepping design technique. The obtained adaptive controller is shown to meet its objectives in presence of the changing aerodynamics efforts and road slope.

  17. Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller

    Science.gov (United States)

    Husni, M.; Siahaan, D. O.; Ciptaningtyas, H. T.; Studiawan, H.; Aliarham, Y. P.

    2016-04-01

    Incident of oil leakage and theft in oil tank often happens. To prevent it, the liquid volume insides the tank needs to be monitored continuously. Aim of the study is to calculate the liquid volume inside oil tank on any road condition and send the volume data and location data to the user. This research use some ultrasonic sensors (to monitor the fluid height), Bluetooth modules (to sent data from the sensors to the Arduino microcontroller), Arduino Microcontroller (to calculate the liquid volume), and also GPS/GPRS/GSM Shield module (to get location of vehicle and sent the data to the Server). The experimental results show that the accuracy rate of monitoring liquid volume inside tanker while the vehicle is in the flat road is 99.33% and the one while the vehicle is in the road with elevation angle is 84%. Thus, this system can be used to monitor the tanker position and the liquid volume in any road position continuously via web application to prevent illegal theft.

  18. ELECTROMAGNETIC BIOSPHERE POLLUTION BY MOTOR TRANSPORT (VEHICLES, ELECTRIC VEHICLES, HYBRID VEHICLES

    Directory of Open Access Journals (Sweden)

    S. Selivanov

    2009-01-01

    Full Text Available The physics of the electromagnetic field is considered. The analysis of electromagnetic radiation on the human-being, the origin of which is the vehicle the electric vehicle, the hybrid vehicle is being considered. The monitoring of electromagnetic radiation of vehicles is carried out.

  19. The Rise of Self-Driving Cars: Is the Private International Law Framework for non-contractual obligations posing a bump in the road?

    Directory of Open Access Journals (Sweden)

    Jan De Bruyne

    2018-02-01

    Full Text Available This article focusses on some implications related to the commercialisation of self-driving or autonomous cars. Such vehicles are no longer a mere futuristic idea. They could soon be available on the market. Society in general and the applicable rules in particular will undergo a transformation following the introduction of autonomous vehicles. Despite the many benefits, self-driving cars also pose several challenges. These do not only relate to technical aspects but also to the influence of the autonomisation of traffic on infrastructure and employment in different sectors. More importantly, several legal challenges will need to be addressed as well before society will be able to fully enjoy the benefits of self-driving cars. The question as to who should be held liable for damage caused by self-driving car has already been addressed in academia. Less attention has been devoted to the relationship between autonomous vehicles and the existing private international law rules in the European Union. Although the application of the current jurisdictional and conflict of laws rules does not present problems, the membership of some EU Member States of the 1971 Hague Traffic Accidents Convention and/or the 1973 Hague Products Liability Convention impedes the harmonisation of conflict of laws rules in non-contractual matters as envisaged by the Rome II Regulation. In cases concerning liability arising from traffic accidents and in product liability cases, different Member States courts sometimes apply a different national law. This reduces foreseeability and legal certainty.

  20. Fault-Tolerant Region-Based Control of an Underwater Vehicle with Kinematically Redundant Thrusters

    Directory of Open Access Journals (Sweden)

    Zool H. Ismail

    2014-01-01

    Full Text Available This paper presents a new control approach for an underwater vehicle with a kinematically redundant thruster system. This control scheme is derived based on a fault-tolerant decomposition for thruster force allocation and a region control scheme for the tracking objective. Given a redundant thruster system, that is, six or more pairs of thrusters are used, the proposed redundancy resolution and region control scheme determine the number of thruster faults, as well as providing the reference thruster forces in order to keep the underwater vehicle within the desired region. The stability of the presented control law is proven in the sense of a Lyapunov function. Numerical simulations are performed with an omnidirectional underwater vehicle and the results of the proposed scheme illustrate the effectiveness in terms of optimizing the thruster forces.