7,989 research outputs found

    Organic chemistry of cometary dust as derived from PUMA 1 data

    Get PDF
    Onboard the Halley Fly-By spacecrafts Vega 1, Vega 2, and Giotto were the dust impact mass spectrometers PUMA 1, PUMA 2, and PIA respectively. PUMA 1 was the most sensitive instrument among them. From its data the occurrence of masslines greater than 60 Daltons could be shown to be statistically significant. An analysis of these masslines lead to a scenario, which could explain the masslines as fragment ions from larger molecules which characterize the chemical nature of cometary organic matter as: (1) highly unsaturated hydrocarbons; (2) some of them containing oxygen; (3) less containing nitrogen; and (4) a few containing oxygen and nitrogen as heteroatoms. From the properties of the spectrometer, also some physical parameters of the dust particles could be inferred, such as their density and structure

    Electronic integration of the uk-1 international ionosphere satellite

    Get PDF
    Electronic integration of international ionosphere satellit

    Declines in prevalence of adolescent substance use disorders and delinquent behaviors in the USA: A unitary trend?

    Get PDF
    AbstractBackgroundDownward trends in a number of adolescent risk behaviors including violence, crime, and drug use have been observed in the USA in recent years. It is unknown whether these are separate trends or whether they might relate to a general reduction in propensity to engage in such behaviors. Our objectives were to quantify trends in substance use disorders (SUDs) and delinquent behaviors over the 2003–2014 period and to determine whether they might reflect a single trend in an Externalizing-like trait.MethodsWe analyzed data from 12 to 17 year old participants from the National Survey on Drug Use and Health, a representative survey of the household dwelling population of the USA, across the 2003–2014 period (N = 210 599). Outcomes included past-year prevalence of six categories of substance use disorder and six categories of delinquent behavior.ResultsTrend analysis suggested a net decline of 49% in mean number of SUDs and a 34% decline in delinquent behaviors over the 12-year period. Item Response Theory models were consistent with the interpretation that declines in each set of outcomes could be attributed to changes in mean levels of a latent, Externalizing-like trait.ConclusionsOur findings suggest that declines in SUDs and some delinquent behaviors reflect a single trend related to an Externalizing-like trait. Identifying the factors contributing to this trend may facilitate continued improvement across a spectrum of adolescent risk behaviors.</jats:sec

    Keys to Profitable Management of Broiler Breeders.

    Get PDF
    4 p

    Emotional disorders: Cluster 4 of the proposed meta-structure for DSM-V and ICD-11

    Get PDF
    Background The extant major psychiatric classifications DSM-IV, and ICD-10, are atheoretical and largely descriptive. Although this achieves good reliability, the validity of a medical diagnosis would be greatly enhanced by an understanding of risk factors and clinical manifestations. In an effort to group mental disorders on the basis of aetiology, five clusters have been proposed. This paper considers the validity of the fourth cluster, emotional disorders, within that proposal.Method We reviewed the literature in relation to 11 validating criteria proposed by a Study Group of the DSM-V Task Force, as applied to the cluster of emotional disorders.Results An emotional cluster of disorders identified using the 11 validators is feasible. Negative affectivity is the defining feature of the emotional cluster. Although there are differences between disorders in the remaining validating criteria, there are similarities that support the feasibility of an emotional cluster. Strong intra-cluster co-morbidity may reflect the action of common risk factors and also shared higher-order symptom dimensions in these emotional disorders.Conclusion Emotional disorders meet many of the salient criteria proposed by the Study Group of the DSM-V Task Force to suggest a classification cluster.</p

    The Genetic and Environmental Sources of Resemblance Between Normative Personality and Personality Disorder Traits

    Get PDF
    Recent work has suggested a high level of congruence between normative personality, most typically represented by the big five factors, and abnormal personality traits. In 2,293 Norwegian adult twins ascertained from a population-based registry, the authors evaluated the degree of sharing of genetic and environmental influences on normative personality, assessed by the Big Five Inventory (BFI), and personality disorder traits (PDTs), assessed by the Personality Inventory for DSM-S-Norwegian Brief Form (PID-5NBF). For four of the five BFI dimensions, the strongest genetic correlation was observed with the expected PID-5-NBF dimension (e.g., neuroticism with negative affectivity [+], conscientiousness with disinhibition [-]). However, neuroticism, conscientiousness, and agreeableness had substantial genetic correlations with other PID-S-NBF dimensions (e.g., neuroticism with compulsivity [+], agreeableness with detachment [-]). Openness had no substantial genetic correlations with any PID-5-NBF dimension. The proportion of genetic risk factors shared in aggregate between the BFI traits and the PID-5-NBF dimensions was quite high for conscientiousness and neuroticism, relatively robust for extraversion and agreeableness, but quite low for openness. Of the six PID-S-NBF dimensions, three (negative affectivity, detachment, and disinhibition) shared, in aggregate, most of their genetic risk factors with normative personality traits. Genetic factors underlying psychoticism, antagonism, and compulsivity were shared to a lesser extent, suggesting that they are influenced by etiological factors not well indexed by the BFI

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users
    • …
    corecore