342 research outputs found

    Social Communication Patterns of Attention-Deficit-Disordered Boys

    Get PDF
    This study was designed to compare the social communication patterns of attention-deficit-disordered (ADD) and normal boys. This was accomplished by employing a TV Talk Show social role-playing procedure in which the task required different strategies for the roles of host and guest. Groups of ADD and normal elementary-age boys were formed, and each boy was paired with a normal classmate. Measures of communication competence were coded from videotapes made of subject and partner social interactions while performing both roles. Results indicated that the ADD boys, in contrast to the control group, failed to modulate their social communication behaviors as task demands shifted. Additionally, the behavior of the ADD boys resulted in their normal partners\u27\u27 altering their response patterns in order to maintain the equilibrium in the dyadic interaction. These results suggest that the social behavior of ADD children is relatively independent of environmental requirements and may contribute to the inappropriate responding of others

    Accounting Profession in Canada, Second Edition Revised; Professional Accounting in Foreign Country Series

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1673/thumbnail.jp

    Calculation of nonzero-temperature Casimir forces in the time domain

    Full text link
    We show how to compute Casimir forces at nonzero temperatures with time-domain electromagnetic simulations, for example using a finite-difference time-domain (FDTD) method. Compared to our previous zero-temperature time-domain method, only a small modification is required, but we explain that some care is required to properly capture the zero-frequency contribution. We validate the method against analytical and numerical frequency-domain calculations, and show a surprising high-temperature disappearance of a non-monotonic behavior previously demonstrated in a piston-like geometry.Comment: 5 pages, 2 figures, submitted to Physical Review A Rapid Communicatio

    Phase Conjugation and Negative Refraction Using Nonlinear Active Metamaterials

    Full text link
    We present experimental demonstration of phase conjugation using nonlinear metamaterial elements. Active split-ring resonators loaded with varactor diodes are demonstrated theoretically to act as phase-conjugating or time-reversing discrete elements when parametrically pumped and illuminated with appropriate frequencies. The metamaterial elements were fabricated and shown experimentally to produce a time reversed signal. Measurements confirm that a discrete array of phase-conjugating elements act as a negatively-refracting time reversal RF lens only 0.12λ\lambda thick

    The development of Assembly Square : a study of economic planning in Somerville, Massachusetts

    Get PDF
    Thesis (M.C.P.)--Massachusetts Institute of Technology, Dept. of Urban Studies and Planning, 1984.MICROFICHE COPY AVAILABLE IN ARCHIVES AND ROTCH.Bibliography: leaves 81-85.by Steven Richard Landau.M.C.P

    Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

    Get PDF
    For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just “Ma Bell” to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice. In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA) which mandated a standardized lawful intercept interface on all local phone switches. Since its passage, technology has continued to progress, and in the face of new forms of communication—Skype, voice chat during multiplayer online games, instant messaging, etc.—law enforcement is again experiencing problems. The FBI has called this “Going Dark”: their loss of access to suspects’ communication. According to news reports, law enforcement wants changes to the wiretap laws to require a CALEA-like interface in Internet software. CALEA, though, has its own issues: it is complex software specifically intended to create a security hole—eavesdropping capability—in the already-complex environment of a phone switch. It has unfortunately made wiretapping easier for everyone, not just law enforcement. Congress failed to heed experts’ warnings of the danger posed by this mandated vulnerability, and time has proven the experts right. The so-called “Athens Affair,” where someone used the built-in lawful intercept mechanism to listen to the cell phone calls of high Greek officials, including the Prime Minister, is but one example. In an earlier work, we showed why extending CALEA to the Internet would create very serious problems, including the security problems it has visited on the phone system. In this paper, we explore the viability and implications of an alternative method for addressing law enforcements need to access communications: legalized hacking of target devices through existing vulnerabilities in end-user software and platforms. The FBI already uses this approach on a small scale; we expect that its use will increase, especially as centralized wiretapping capabilities become less viable. Relying on vulnerabilities and hacking poses a large set of legal and policy questions, some practical and some normative. Among these are: (1) Will it create disincentives to patching? (2) Will there be a negative effect on innovation? (Lessons from the so-called “Crypto Wars” of the 1990s, and in particular the debate over export controls on cryptography, are instructive here.) (3) Will law enforcement’s participation in vulnerabilities purchasing skew the market? (4) Do local and even state law enforcement agencies have the technical sophistication to develop and use exploits? If not, how should this be handled? A larger FBI role? (5) Should law enforcement even be participating in a market where many of the sellers and other buyers are themselves criminals? (6) What happens if these tools are captured and repurposed by miscreants? (7) Should we sanction otherwise illegal network activity to aid law enforcement? (8) Is the probability of success from such an approach too low for it to be useful? As we will show, these issues are indeed challenging. We regard the issues raised by using vulnerabilities as, on balance, preferable to adding more complexity and insecurity to online systems

    Next-to-leading order spin-orbit and spin(a)-spin(b) Hamiltonians for n gravitating spinning compact objects

    Full text link
    We derive the post-Newtonian next-to-leading order conservative spin-orbit and spin(a)-spin(b) gravitational interaction Hamiltonians for arbitrary many compact objects. The spin-orbit Hamiltonian completes the knowledge of Hamiltonians up to and including 2.5PN for the general relativistic three-body problem. The new Hamiltonians include highly nontrivial three-body interactions, in contrast to the leading order consisting of two-body interactions only. This may be important for the study of effects like Kozai resonances in mergers of black holes with binary black holes.Comment: 13 pages, 1 Mathematica source file, v2: submitted version, v3: published version, some minor correction

    Hydrodynamic description of transport in strongly correlated electron systems

    Full text link
    We develop a hydrodynamic description of the resistivity and magnetoresistance of an electron liquid in a smooth disorder potential. This approach is valid when the electron-electron scattering length is sufficiently short. In a broad range of temperatures, the dissipation is dominated by heat fluxes in the electron fluid, and the resistivity is inversely proportional to the thermal conductivity, Îş\kappa. This is in striking contrast with the Stokes flow, in which the resistance is independent of Îş\kappa and proportional to the fluid viscosity. We also identify a new hydrodynamic mechanism of spin magnetoresistance

    Quantum mechanism of light transmission by the intermediate filaments in some specialized optically transparent cells

    Get PDF
    Some very transparent cells in the optical tract of vertebrates, such as the lens fiber cells, possess certain types of specialized intermediate filaments (IFs) that have essential significance for their transparency. The exact mechanism describing why the IFs are so important for transparency is unknown. Recently, transparency was described also in the retinal Muller cells (MCs). We report that the main processes of the MCs contain bundles of long specialized IFs, each about 10 nm in diameter; most likely, these filaments are the channels providing light transmission to the photoreceptor cells in mammalian and avian retinas. We interpret the transmission of light in such channels using the notions of quantum confinement, describing energy transport in structures with electroconductive walls and diameter much smaller than the wavelength of the respective photons. Model calculations produce photon transmission efficiency in such channels exceeding 0.8, in optimized geometry. We infer that protein molecules make up the channels, proposing a qualitative mechanism of light transmission by such structures. The developed model may be used to describe light transmission by the IFs in any transparent cells. (C) 2016 Society of Photo-Optical Instrumentation Engineers (SPIE)PR NASA EPSCoR (NASA) [NNX13AB22A]; NIH [G12 MD007583]; Russian Science Foundation [16-14-10159]info:eu-repo/semantics/publishedVersio

    Long-Term Economic Development Impacts of Highway Projects: Findings from a National Database of Pre/Post Case Studies

    Get PDF
    ABSTRACT Highway projects can have a wide range of different economic development effects, depending on the type of project, objective, location, surrounding conditions and local business context. Yet most empirical analysis of highway economic impacts to date has been based on highly aggregate statistical studies, anecdotal observations or theoretical predictions. A national database of pre/post case studies offers the potential to more systematically observe and document the nature of local and regional economic impacts, and provide insight into factors affecting them. Real world observations can also serve as a useful complement to model predictions, and also provide a basis for refining them. Accordingly, the Strategic Highway Research Program funded 100 pre/post case studies of the economic impacts of highway and highway/intermodal projects, and assembled them to provide the start for a national database of observed impacts. This paper summarizes findings from the initial analysis of that database, presenting findings on the range of observed job impacts and land development impacts, and factors affecting the nature of those results. Landau, Weisbrod and Winston page 1 INTRODUCTION There are many reasons why pre/post case studies of transportation projects and their economic impacts can be useful --either individually or as a pooled source of data. (1) For policy accountability, they can provide a form of audit assessment of the consequences of past investments. (2) For public information, they can be useful for communications to government officials and the general public regarding the nature of impacts that can actually result from transportation projects. (3) For impact prediction, they can aid initial sketch planning processes by defining the range of likely impacts (for early stage considerations, before further modeling is undertaken). (4) For research, they can provide a rich base of data for further statistical analysis, and those results can also be used to further improve the accuracy of predictive models. (5) For planning, they can be used to identify the types of local factors that need attention to maximize economic impact opportunities and minimize barriers to them. (6) And for public hearings, information on real world experience can be helpful to establish a range of reasonable expectations regarding local impacts, which typically are far less than either the fears of project opponents or the hopes of project proponents. Unfortunately, relatively few pre/post case studies have been conducted on a systematic basis. Reasons likely include the cost of designing, collecting and analyzing such information, as well as fear of embarrassment if outcomes are found to fall short of expectations for project investment that have already been made. To overcome these limitations and enable the advantages noted above, the US Strategic Highway Research Program (SHRP) funded development of 100 pre/post case studies of the economic development and land development impacts of highway and highway/intermodal projects, along with development of a database and web tool for viewing and using their findings. The project sought to include all major project types, spanning all regions of the continental US and both urban and rural settings. It also included a small number of available English language studies from Canada and abroad, in a format that would enable continuing expansion over time. The full results of that effort are provided in a final report and the TPICS (transportation project impact case studies) web too
    • …
    corecore