21,199 research outputs found

    Young women's accounts of intimate partner violence during adolescence and subsequent recovery processes: An interpretative phenomenological analysis

    Get PDF
    This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2011 The British Psychological Society.Objective. Previous qualitative research into the experience of intimate partner violence (IPV) has largely focused upon mature women's accounts. The objectives of this interpretative phenomenological analysis (IPA) were to explore three young women's understandings of why they had been vulnerable to IPV in mid-to-late adolescence, their experiences of IPV, and their recovery processes. Design. This study followed guidelines for IPA, largely focusing upon shared aspects of the experience of IPV as narrated by three young women who considered that they had since recovered from the experience. Method. Semi-structured interviews explored participants’ retrospective understandings of how they had become entrapped in a long-term abusive relationship in adolescence, how IPV had affected them at the time, and the processes that they had found helpful to recover well-being. Findings. Participants largely attributed their vulnerability to IPV to feeling confused about feelings and relationships, disconnected, and powerless in early adolescence. IPV was described as escalating insidiously, rendering participants confined, anxious and powerless, ensnaring them in their partner's family, marginalized in their own families, and undermining their identities. Recovery processes began with pivotal moments. Participants described repairing identity through engaging in age-appropriate activities, extricating self from the partner's family, and rebuilding family relationships. Conclusions. Participants described experiences of IPV and recovery in adolescence that differed in some ways from those previously identified in adult women and were interpreted using theories of adolescent identity development and attachment

    Bi-Directional Relativistic Jets of the Radio Galaxy 1946+708: Constraints on the Hubble Constant

    Get PDF
    We present measurements of bi-directional motions in the jets of the radio galaxy 1946+708 at z=0.101. This is a Compact Symmetric Object with striking S-symmetry. Sensitive 15 GHz observations reveal a compact component at the center of symmetry with a strongly inverted spectrum, that we identify as the core. From five 4.9 GHz observations spread over 4 years we have determined the velocities of four compact jet components. If simple kinematic models can be applied then the inclination of the source and the bulk jet velocity can be directly determined for any assumed value of the Hubble constant. Conversely, the measurements already place constraints on the Hubble constant, and we show how further observations of 1946+708 can yield an increasingly accurate determination of H_0.Comment: in press at ApJ Letters, 12 page LaTex document includes 5 postscript figure

    The principles of integration in urban transport strategies

    Get PDF
    Integration as a principle in urban transport policy is frequently advocated but rarely defined. We suggest a range of types of integration, and highlight the problems in developing an effective integrated strategy, given the number of variables involved. We argue that integration should be designed to serve agreed objectives of transport policy, rather than being an objective in its own right. We then consider the principles for designing an effective integrated strategy. We define the concept of synergy, which is often advocated as a benefit of integration, and discuss whether it, and other aggregation benefits short of true synergy, are achievable. We then consider the alternative approach of using integration to overcome barriers, an approach which is likely to be in conflict with pursuit of synergy, but more likely to lead to readily implemented strategies. We then review a number of examples where these principles have been applied, and investigate them to assess whether synergy has been demonstrated. Generally we find little evidence of synergy in outcome indicators. We conclude with some more general guidance on approaches to integration

    Poisson point process models solve the "pseudo-absence problem" for presence-only data in ecology

    Full text link
    Presence-only data, point locations where a species has been recorded as being present, are often used in modeling the distribution of a species as a function of a set of explanatory variables---whether to map species occurrence, to understand its association with the environment, or to predict its response to environmental change. Currently, ecologists most commonly analyze presence-only data by adding randomly chosen "pseudo-absences" to the data such that it can be analyzed using logistic regression, an approach which has weaknesses in model specification, in interpretation, and in implementation. To address these issues, we propose Poisson point process modeling of the intensity of presences. We also derive a link between the proposed approach and logistic regression---specifically, we show that as the number of pseudo-absences increases (in a regular or uniform random arrangement), logistic regression slope parameters and their standard errors converge to those of the corresponding Poisson point process model. We discuss the practical implications of these results. In particular, point process modeling offers a framework for choice of the number and location of pseudo-absences, both of which are currently chosen by ad hoc and sometimes ineffective methods in ecology, a point which we illustrate by example.Comment: Published in at http://dx.doi.org/10.1214/10-AOAS331 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Effectiveness of anonymised information sharing and use in health service, police, and local government partnership for preventing violence related injury: experimental study and time series analysis

    Get PDF
    Objective: To evaluate the effectiveness of anonymised information sharing to prevent injury related to violence. Design: Experimental study and time series analysis of a prototype community partnership between the health service, police, and local government partners designed to prevent violence. Setting: Cardiff, Wales, and 14 comparison cities designated "most similar" by the Home Office in England and Wales. Intervention After a 33 month development period, anonymised data relevant to violence prevention (precise violence location, time, days, and weapons) from patients attending emergency departments in Cardiff and reporting injury from violence were shared over 51 months with police and local authority partners and used to target resources for violence prevention. Main outcome measures: Health service records of hospital admissions related to violence and police records of woundings and less serious assaults in Cardiff and other cities after adjustment for potential confounders. Results: Information sharing and use were associated with a substantial and significant reduction in hospital admissions related to violence. In the intervention city (Cardiff) rates fell from seven to five a month per 100 000 population compared with an increase from five to eight in comparison cities (adjusted incidence rate ratio 0.58, 95% confidence interval 0.49 to 0.69). Average rate of woundings recorded by the police changed from 54 to 82 a month per 100 000 population in Cardiff compared with an increase from 54 to 114 in comparison cities (adjusted incidence rate ratio 0.68, 0.61 to 0.75). There was a significant increase in less serious assaults recorded by the police, from 15 to 20 a month per 100 000 population in Cardiff compared with a decrease from 42 to 33 in comparison cities (adjusted incidence rate ratio 1.38, 1.13 to 1.70). Conclusion: An information sharing partnership between health services, police, and local government in Cardiff, Wales, altered policing and other strategies to prevent violence based on information collected from patients treated in emergency departments after injury sustained in violence. This intervention led to a significant reduction in violent injury and was associated with an increase in police recording of minor assaults in Cardiff compared with similar cities in England and Wales where this intervention was not implemented

    BlackWatch:increasing attack awareness within web applications

    Get PDF
    Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of security. Whilst prevention is an essential part of the security process, developers must also implement a level of attack awareness into their web applications. Being able to detect when an attack is occurring provides applications with the ability to execute responses against malicious users in an attempt to slow down or deter their attacks. This research seeks to improve web application security by identifying malicious behaviour from within the context of web applications using our tool BlackWatch. The tool is a Python-based application which analyses suspicious events occurring within client web applications, with the objective of identifying malicious patterns of behaviour. This approach avoids issues typically encountered with traditional web application firewalls. Based on the results from a preliminary study, BlackWatch was effective at detecting attacks from both authenticated, and unauthenticated users. Furthermore, user tests with developers indicated BlackWatch was user friendly, and was easy to integrate into existing applications. Future work seeks to develop the BlackWatch solution further for public release

    Space VLBI Observations Show Tb>1012KT_b > 10^{12} K in the Quasar NRAO 530

    Get PDF
    We present here space-based VLBI observations with VSOP and a southern hemisphere ground array of the gamma-ray blazar NRAO 530 at 1.6 GHz and 5 GHz. The brightness temperature of the core at 1.6 GHz is 5×10115 \times 10^{11} K. The size is near the minimum observable value in the direction of NRAO~530 due to interstellar scattering. The 5 GHz data show a single component with a brightness temperature of 3×1012\sim 3 \times 10^{12} K, significantly in excess of the inverse Compton limit and of the equipartition brightness temperature limit (Readhead 1994). This is strong evidence for relativistic motion in a jet requiring model-dependent Doppler boosting factors in the range 6 to 60. We show that a simple homogeneous sphere probably does not model the emission region accurately. We favor instead an inhomogeneous jet model with a Doppler boosting factor of 15.Comment: 12 pages, 2 figures. Accepted for publication in ApJ Letter

    Status and capabilities of sonic boom simulators

    Get PDF
    The current status and capabilities of sonic boom simulators which might be used in future studies of the effects of sonic boom on people, animals, or structures is summarized. The list of candidate simulators is based on a literature search which was confined to the United States and Canada. Some of the simulators are fully operational, others could be made operational with a modest investment, and still others would require a major investment. For the sake of the completeness, some simulators which were the subject of a previous review, but which no longer exist, are also included herein

    Detection of Optical Synchrotron Emission from the Radio Jet of 3C279

    Get PDF
    We report the detection of optical and ultraviolet emission from the kiloparsec scale jet of the well-known quasar 3C~279. A bright knot, discovered in archival V and U band {\it Hubble Space Telescope} Faint Object Camera images, is coincident with a peak in the radio jet \sim0.6\arcsec from the nucleus. The detection was also confirmed in Wide Field Planetary Camera-2 images. Archival Very Large Array and MERLIN radio data are also analyzed which help to show that the high-energy optical/UV continuum, and spectrum, are consistent with a synchrotron origin from the same population of relativistic electrons responsible for the radio emission.Comment: 6 pages, 3 figs. accepted for publication in ApJL with minor revision

    Mining Sequences of Developer Interactions in Visual Studio for Usage Smells

    Get PDF
    In this paper, we present a semi-automatic approach for mining a large-scale dataset of IDE interactions to extract usage smells, i.e., inefficient IDE usage patterns exhibited by developers in the field. The approach outlined in this paper first mines frequent IDE usage patterns, filtered via a set of thresholds and by the authors, that are subsequently supported (or disputed) using a developer survey, in order to form usage smells. In contrast with conventional mining of IDE usage data, our approach identifies time-ordered sequences of developer actions that are exhibited by many developers in the field. This pattern mining workflow is resilient to the ample noise present in IDE datasets due to the mix of actions and events that these datasets typically contain. We identify usage patterns and smells that contribute to the understanding of the usability of Visual Studio for debugging, code search, and active file navigation, and, more broadly, to the understanding of developer behavior during these software development activities. Among our findings is the discovery that developers are reluctant to use conditional breakpoints when debugging, due to perceived IDE performance problems as well as due to the lack of error checking in specifying the conditional
    corecore