191,741 research outputs found

    AN ANALYSIS OF ID OF THE MAIN CHARACTER IN THE NOVEL “GONE GIRL” BY GILLIAN FLYNN:PSYCHOLOGICAL APPROACH

    Get PDF
    This study aims to analyze Amy's character in the Gone Girl novel written by Gillian Flynn. In conducting this research, the researcher used Freud's theory with psychological approach. In his theory, Freud introduced the structure of human personality, there are three namely id, ego and superego. The objective of this research is to find out Amy's Id in the novel Gone Girl. In analyzing this study, the researcher used a qualitative descriptive method as a data collection technique. From this study, the researcher concluded that Amy’s Id is more dominant than other Freud's three personality of structures. The pleasure principle which is the main goal of Id was very clearly carried out by Amy, Amy's desire to revenge her husband is the part of the pleasure principle itself, because Amy was satisfied and relieved at a successful compilation of revenge plans. For the sake of achieving her wish, Amy was even able to do the unexpected things, when Amy's killed Desi, so Amy could return to Nick, satisfied with the compilation of seeing her parents who worried of her, and lying to everyone, Amy said that Desi was the one kidnapped her all this time. &nbsp

    Developmental course of psychopathology in youths with and without intellectual disabilities

    Get PDF
    Background: We aimed to describe similarities and differences in the developmental course of psychopathology between children with and without intellectual disabilities (ID). Method: Multilevel growth curve analysis was used to analyse the developmental course of psychopathology, using the Child Behavior Checklist (CBCL), in two longitudinal multiple-birth-cohort samples of 6- to 18-year-old children with ID (N=978) and without ID (N=2,047) using three repeated measurements across a 6-year period. Results: Children with ID showed a higher level of problem behaviours across all ages compared to children without ID. A significant difference between the samples in the developmental courses was found for Aggressive Behaviour and Attention Problems, where children with ID showed a significantly larger decrease. Gender differences in the development of psychopathology were similar in both samples, except for Social Problems where males with ID showed a larger decrease in problem behaviour across time than females with ID and males and females without ID. Conclusion: Results indicate that children with ID continue to show a greater risk for psychopathology compared to typically developing children, although this higher risk is less pronounced at age 18 than it is at age 6 for Aggressive Behaviour. Contrary to our expectations, the developmental course of psychopathology in children with ID was quite similar from age 6 to 18 compared to children without ID. The normative developmental trajectories of psychopathology in children with ID, presented here, can serve as a yardstick against which development of childhood psychopathology can be detected as deviant. © 2007 The Authors Journal compilation © 2007 Association for Child and Adolescent Mental Health

    Invisible Trojan-horse attack

    Get PDF
    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Acin-Ribordy-Gisin (SARG04) QKD protocol at 1924nm versus that at 1536nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N.~Jain et al., New J. Phys. 16, 123030 (2014). However at 1924nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.Comment: 8 pages, 3 figures, due to problem in the compilation of bibliography, we are uploading a corrected versio

    Sampling for wood decay analyses of cable car trestles and houses at Svalbard. Field report

    Get PDF
    This report is a documentation of the field data collection and sampling at Svalbard in 2022 within the project ArcticAlpineDecay. The sampling methods are described and for each object sampling was performed documentation is provided, incl. location, Askeladden ID, map coordinate, photo documentation and illustration of sampling. Compilation of the results from the project will be published in peer review journals and in a final report from the project.Sampling for wood decay analyses of cable car trestles and houses at Svalbard. Field reportpublishedVersio

    Fake Run-Time Selection of Template Arguments in C++

    Full text link
    C++ does not support run-time resolution of template type arguments. To circumvent this restriction, we can instantiate a template for all possible combinations of type arguments at compile time and then select the proper instance at run time by evaluation of some provided conditions. However, for templates with multiple type parameters such a solution may easily result in a branching code bloat. We present a template metaprogramming algorithm called for_id that allows the user to select the proper template instance at run time with theoretical minimum sustained complexity of the branching code.Comment: Objects, Models, Components, Patterns (50th International Conference, TOOLS 2012
    • …
    corecore