349,610 research outputs found

    Disproportionate Minority Processing of Females: A Comparison of Native, Black and White Juveniles

    Get PDF
    An examination of four years of statewide female juvenile referral data showed that Native girls are referred in disproportionate numbers and tend to have lengthier records. Underage drinking was one of the most frequent referral reasons. Because many of the Native females were from rural communities, the disproportionate referrals may be a factor of the smallness of the communities, in which misbehavior is more readily noticed. Examination of a subset of files for girls with multiple referrals showed that the actual behavior was often not particularly grave and that many of the girls with multiple referrals came from very unstable backgrounds.This study was made possible by a gift from Cook Inlet Region, Inc. and was conducted in collaboration with the Alaska Division of Family and Youth Services.Abstract / [Introduction] / Research Methodology / Girls in the Larger Data Set / Conclusion / Bibliography / Appendix: Referrals of Female Habitual Offenders (5 or more referrals

    Melaena with Peutz-Jeghers syndrome: a case report

    Get PDF
    Introduction: Peutz-Jeghers syndrome (PJS) is a rare familial disorder characterised by mucocutaneous pigmentation, gastrointestinal and extragastrointestinal hamartomatous polyps and an increased risk of malignancy. Peutz-Jeghers polyps in the bowel may result in intussusception. This complication usually manifests with abdominal pain and signs of intestinal obstruction. Case Presentation: We report the case of a 24-year-old Caucasian male who presented with melaena. Pigmentation of the buccal mucosa was noted but he was pain-free and examination of the abdomen was unremarkable. Upper gastrointestinal endoscopy revealed multiple polyps. An urgent abdominal computed tomography (CT) scan revealed multiple small bowel intussusceptions. Laparotomy was undertaken on our patient, reducing the intussusceptions and removing the polyps by enterotomies. Bowel resection was not needed. Conclusion: Melaena in PJS needs to be urgently investigated through a CT scan even in the absence of abdominal pain and when clinical examination of the abdomen shows normal findings. Although rare, the underlying cause could be intussusception, which if missed could result in grave consequences

    Cybersquatting: The Latest Challenge in Federal Trademark Protection

    Get PDF
    The explosion in Internet technology in the past decade has drawn the Lanham Act into the realm of electronic commerce. Trademark owners seeking to register domain names have recently found themselves entwined in a number of disputes, such as disputes involving claims to multiple domain names and disputes over whether the domain name registration system is fairly administered. One important legal issue that has recently come to the fore is over the practice of cybersquatting. Today, courts must contend with the cybersquatter, a speculator who reserves trademarks as Internet domain names for the sole purpose of selling or licensing them back to trademark owners willing to pay a considerable price for their use. Complicating matters, the most potent weapons in the Government\u27s anticybersquatting arsenal--the Anticybersquatting Consumer Protection Act (ACPA) and Federal Trademark Dilution Act (FTDA)--each give rise to grave constitutional concerns

    Preliminary soilwater conductivity analysis to date clandestine burials of homicide victims

    Get PDF
    This study reports on a new geoscientific method to estimate the post-burial interval (PBI) and potential post-mortem interval (PMI) date of homicide victims in clandestine graves by measuring decomposition fluid conductivities. Establishing PBI/PMI dates may be critical for forensic investigators to establish time-lines to link or indeed rule out suspects to a crime. Regular in situ soilwater analysis from a simulated clandestine grave (which contained a domestic buried pig carcass) in a semi-rural environment had significantly elevated conductivity measurements when compared to background values. A temporal rapid increase of the conductivity of burial fluids was observed until one-year post-burial, after this values slowly increased until two years (end of the current study period). Conversion of x-axis from post-burial days to 'accumulated degree days' (ADDs) corrected for both local temperature variations and associated depth of burial and resulted in an improved fit for multiple linear regression analyses. ADD correction also allowed comparison with a previous conductivity grave study on a different site with a different soil type and environment; this showed comparable results with a similar trend observed. A separate simulated discovered burial had a conductivity estimated PBI date that showed 12% error from its actual burial date. Research is also applicable in examining illegal animal burials; time of burial and waste deposition. Further research is required to extend the monitoring period, to use human cadavers and to repeat this with other soil types and depositional environments

    Evocative computing – creating meaningful lasting experiences in connecting with the past

    Get PDF
    We present an approach – evocative computing – that demonstrates how ‘at hand’ technologies can be ‘picked up’ and used by people to create meaningful and lasting experiences, through connecting and interacting with the past. The approach is instantiated here through a suite of interactive technologies configured for an indoor-outdoor setting that enables groups to explore, discover and research the history and background of a public cemetery. We report on a two-part study where different groups visited the cemetery and interacted with the digital tools and resources. During their activities serendipitous uses of the technology led to connections being made between personal memo-ries and ongoing activities. Furthermore, these experiences were found to be long-lasting; a follow-up study, one year later, showed them to be highly memorable, and in some cases leading participants to take up new directions in their work. We discuss the value of evocative computing for enriching user experiences and engagement with heritage practices

    Conventional ageing and sexing methods based on teeth and dry bone morphology in the person’s identification (victims of red terror in 1946)

    Get PDF
    Human skeletal remains exhumated from the post-war multiple grave in Southern Estonia were anthropologically analysed. Conventional ageing and sexing methods were used to esimate biological sex and age at death of buried people. The blind test was carried out by two independent researchers; the obtained results were compared with historic data concerning the chronological age at death and the sex of buried people

    The role of multilingualism in selected text types

    Get PDF
    The paper deals with the role of multilingualism in selected text types. The reflections on forms of multilingualism and occasions for using multiple languages in a text lead to the creation of a typologythat distinguishes between obligatory and optional use of multiple languages in text types. The obligatory multilingualism is constitutive in dictionaries, textbooks and teaching materials. Optional multilingualism, which was examined using the example of German advertising texts and grave inscriptions from Germany and Denmark, reinforces the main function of the text.The paper deals with the role of multilingualism in selected text types. The reflections on forms of multilingualism and occasions for using multiple languages in a text lead to the creation of a typologythat distinguishes between obligatory and optional use of multiple languages in text types. The obligatory multilingualism is constitutive in dictionaries, textbooks and teaching materials. Optional multilingualism, which was examined using the example of German advertising texts and grave inscriptions from Germany and Denmark, reinforces the main function of the text

    Large-scale inference and graph theoretical analysis of gene-regulatory networks in B. stubtilis

    Full text link
    We present the methods and results of a two-stage modeling process that generates candidate gene-regulatory networks of the bacterium B. subtilis from experimentally obtained, yet mathematically underdetermined microchip array data. By employing a computational, linear correlative procedure to generate these networks, and by analyzing the networks from a graph theoretical perspective, we are able to verify the biological viability of our inferred networks, and we demonstrate that our networks' graph theoretical properties are remarkably similar to those of other biological systems. In addition, by comparing our inferred networks to those of a previous, noisier implementation of the linear inference process [17], we are able to identify trends in graph theoretical behavior that occur both in our networks as well as in their perturbed counterparts. These commonalities in behavior at multiple levels of complexity allow us to ascertain the level of complexity to which our process is robust to noise.Comment: 22 pages, 4 figures, accepted for publication in Physica A (2006

    Secure and efficient application monitoring and replication

    Get PDF
    Memory corruption vulnerabilities remain a grave threat to systems software written in C/C++. Current best practices dictate compiling programs with exploit mitigations such as stack canaries, address space layout randomization, and control-flow integrity. However, adversaries quickly find ways to circumvent such mitigations, sometimes even before these mitigations are widely deployed. In this paper, we focus on an "orthogonal" defense that amplifies the effectiveness of traditional exploit mitigations. The key idea is to create multiple diversified replicas of a vulnerable program and then execute these replicas in lockstep on identical inputs while simultaneously monitoring their behavior. A malicious input that causes the diversified replicas to diverge in their behavior will be detected by the monitor; this allows discovery of previously unknown attacks such as zero-day exploits. So far, such multi-variant execution environments (MVEEs) have been held back by substantial runtime overheads. This paper presents a new design, ReMon, that is non-intrusive, secure, and highly efficient. Whereas previous schemes either monitor every system call or none at all, our system enforces cross-checking only for security critical system calls while supporting more relaxed monitoring policies for system calls that are not security critical. We achieve this by splitting the monitoring and replication logic into an in-process component and a cross-process component. Our evaluation shows that ReMon offers same level of security as conservative MVEEs and run realistic server benchmarks at near-native speeds

    An early Anglo-Saxon cemetery at Quarrington, near Sleaford, Lincolnshire : report on excavations, 2000-2001

    Get PDF
    [FIRST PARAGRAPH] The early Anglo-Saxon cemeteries in the Kesteven part of Lincolnshire form two distinct distribution patterns (Fig.1): a north-south line along, or just to the west of, the limestone edge between the former Roman towns of Lincoln and Ancaster, of which the best known is an outlier near its southern tip, the large mixed-rite site at Loveden Hill; and a cluster in the south-east, of which the best known are Ruskington and Sleaford, essentially inhumation cemeteries but with a handful of cremations each (Leahy 1993; 1999). This paper reports on the excavation of a small inhumation burial site just 2.5km west-south-west of the Sleaford cemetery and now in the civil parish of Sleaford, but formerly in the parish of Quarrington (Fig.2). An Anglo-Saxon burial site has been known from near here since the early nineteenth century, when urned cremations and accompanying inhumations were discovered during gravel digging (Yerburgh 1825; Trollope 1872, pp.98-100; Meaney 1964, pp.160-61; Lincolnshire Historic Environment Record, no.60375). Recently, an Anglo-Saxon settlement of the sixth to eighth centuries has been excavated at Town Road, Quarrington, 1.1km to the east (Taylor 2003). The interrelationship of these three Anglo-Saxon sites is a matter for discussion (below), but it is proposed that the nineteenthcentury discoveries now be known as Quarrington I and the new burial area as Quarrington II
    corecore