191,741 research outputs found
AN ANALYSIS OF ID OF THE MAIN CHARACTER IN THE NOVEL “GONE GIRL” BY GILLIAN FLYNN:PSYCHOLOGICAL APPROACH
This study aims to analyze Amy's character in the Gone Girl novel written by Gillian Flynn. In conducting this research, the researcher used Freud's theory with psychological approach. In his theory, Freud introduced the structure of human personality, there are three namely id, ego and superego. The objective of this research is to find out Amy's Id in the novel Gone Girl. In analyzing this study, the researcher used a qualitative descriptive method as a data collection technique. From this study, the researcher concluded that Amy’s Id is more dominant than other Freud's three personality of structures. The pleasure principle which is the main goal of Id was very clearly carried out by Amy, Amy's desire to revenge her husband is the part of the pleasure principle itself, because Amy was satisfied and relieved at a successful compilation of revenge plans. For the sake of achieving her wish, Amy was even able to do the unexpected things, when Amy's killed Desi, so Amy could return to Nick, satisfied with the compilation of seeing her parents who worried of her, and lying to everyone, Amy said that Desi was the one kidnapped her all this time.
 
Developmental course of psychopathology in youths with and without intellectual disabilities
Background: We aimed to describe similarities and differences in the developmental course of psychopathology between children with and without intellectual disabilities (ID). Method: Multilevel growth curve analysis was used to analyse the developmental course of psychopathology, using the Child Behavior Checklist (CBCL), in two longitudinal multiple-birth-cohort samples of 6- to 18-year-old children with ID (N=978) and without ID (N=2,047) using three repeated measurements across a 6-year period. Results: Children with ID showed a higher level of problem behaviours across all ages compared to children without ID. A significant difference between the samples in the developmental courses was found for Aggressive Behaviour and Attention Problems, where children with ID showed a significantly larger decrease. Gender differences in the development of psychopathology were similar in both samples, except for Social Problems where males with ID showed a larger decrease in problem behaviour across time than females with ID and males and females without ID. Conclusion: Results indicate that children with ID continue to show a greater risk for psychopathology compared to typically developing children, although this higher risk is less pronounced at age 18 than it is at age 6 for Aggressive Behaviour. Contrary to our expectations, the developmental course of psychopathology in children with ID was quite similar from age 6 to 18 compared to children without ID. The normative developmental trajectories of psychopathology in children with ID, presented here, can serve as a yardstick against which development of childhood psychopathology can be detected as deviant. © 2007 The Authors Journal compilation © 2007 Association for Child and Adolescent Mental Health
Invisible Trojan-horse attack
We demonstrate the experimental feasibility of a Trojan-horse attack that
remains nearly invisible to the single-photon detectors employed in practical
quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We
perform a detailed numerical comparison of the attack performance against
Scarani-Acin-Ribordy-Gisin (SARG04) QKD protocol at 1924nm versus that at
1536nm. The attack strategy was proposed earlier but found to be unsuccessful
at the latter wavelength, as reported in N.~Jain et al., New J. Phys. 16,
123030 (2014). However at 1924nm, we show experimentally that the noise
response of the detectors to bright pulses is greatly reduced, and show by
modeling that the same attack will succeed. The invisible nature of the attack
poses a threat to the security of practical QKD if proper countermeasures are
not adopted.Comment: 8 pages, 3 figures, due to problem in the compilation of
bibliography, we are uploading a corrected versio
Sampling for wood decay analyses of cable car trestles and houses at Svalbard. Field report
This report is a documentation of the field data collection and sampling at Svalbard in 2022 within the project ArcticAlpineDecay. The sampling methods are described and for each object sampling was performed documentation is provided, incl. location, Askeladden ID, map coordinate, photo documentation and illustration of sampling. Compilation of the results from the project will be published in peer review journals and in a final report from the project.Sampling for wood decay analyses of cable car trestles and houses at Svalbard. Field reportpublishedVersio
Fake Run-Time Selection of Template Arguments in C++
C++ does not support run-time resolution of template type arguments. To
circumvent this restriction, we can instantiate a template for all possible
combinations of type arguments at compile time and then select the proper
instance at run time by evaluation of some provided conditions. However, for
templates with multiple type parameters such a solution may easily result in a
branching code bloat. We present a template metaprogramming algorithm called
for_id that allows the user to select the proper template instance at run time
with theoretical minimum sustained complexity of the branching code.Comment: Objects, Models, Components, Patterns (50th International Conference,
TOOLS 2012
- …