WorldWideScience

Sample records for deceptively simple random

  1. Lagrangian modelling of plankton motion: From deceptively simple random walks to Fokker-Planck and back again

    DEFF Research Database (Denmark)

    Visser, Andre

    2008-01-01

    The movement of plankton, either by turbulent mixing or their own inherent motility, can be simulated in a Lagrangian framework as a random walk. Validation of random walk simulations is essential. There is a continuum of mathematically valid stochastic integration schemes upon which random walk...

  2. Deceptively Simple: Unpacking the Notion of “Sharing”

    Directory of Open Access Journals (Sweden)

    Airi Lampinen

    2015-04-01

    Full Text Available This essay approaches social media by addressing the deceptively simple notion of “sharing.” While “sharing” is central to how activities taking place on social media get discussed, the word does not necessarily help us get our analytical work about social media done. It is at risk of turning into one of those words that mean little because we try to make them mean too many things at once. While it remains relevant to address and analyze discourses surrounding the notion of “sharing,” it is important to be critical about them. Sharing is not a monolith. Sharing is diverse. Sharing serves the economic interests of big corporations. Perhaps most importantly, referring to activities as “sharing” is political and value-laden.

  3. Deception, efficiency, and random groups - Psychology and the gradual origination of the random group design

    NARCIS (Netherlands)

    Dehue, T

    1997-01-01

    In the life sciences, psychology, and large parts of the other social sciences, the ideal experiment is a comparative experiment with randomly composed experimental and control groups. Historians and practitioners of these sciences generally attribute the invention of this "random group design" to

  4. Entropy estimates for simple random fields

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Justesen, Jørn

    1995-01-01

    We consider the problem of determining the maximum entropy of a discrete random field on a lattice subject to certain local constraints on symbol configurations. The results are expected to be of interest in the analysis of digitized images and two dimensional codes. We shall present some examples...... of binary and ternary fields with simple constraints. Exact results on the entropies are known only in a few cases, but we shall present close bounds and estimates that are computationally efficient...

  5. Anaplasma phagocytophilum: deceptively simple or simply deceptive?

    Czech Academy of Sciences Publication Activity Database

    Severo, M. S.; Stephens, K. D.; Kotsyfakis, Michalis; Pedra, J. H. F.

    2012-01-01

    Roč. 7, č. 6 (2012), s. 719-731 ISSN 1746-0913 Institutional support: RVO:60077344 Keywords : obligate intracellular bacterium * rickettsial agents * ticks * vector-borne diseases Subject RIV: GJ - Animal Vermins ; Diseases, Veterinary Medicine Impact factor: 4.018, year: 2012

  6. SCRAED - Simple and Complex Random Assignment in Experimental Designs

    OpenAIRE

    Alferes, Valentim R.

    2009-01-01

    SCRAED is a package of 37 self-contained SPSS syntax files that performs simple and complex random assignment in experimental designs. For between-subjects designs, SCRAED includes simple random assignment (no restrictions, forced equal sizes, forced unequal sizes, and unequal probabilities), block random assignment (simple and generalized blocks), and stratified random assignment (no restrictions, forced equal sizes, forced unequal sizes, and unequal probabilities). For within-subject...

  7. Unobtrusive Deception Detection

    NARCIS (Netherlands)

    Elkins, Aaron; Zafeiriou, Stefanos; Pantic, Maja; Burgoon, Judee; Calvo, Rafael; D' Mello, Sidney; Gratch, Jonathan; Kappas, Arvid

    In response to national security needs and human deception detection limitations paired with advances in sensor and computing technology research into automated deception detection has increased in recent years. These technologies rely on psychological and communication theories of deception to

  8. Rules of Deception

    DEFF Research Database (Denmark)

    Juhlin, Jonas

    In all wars, deception has been an important element for the military planners, on both the tactical level and the operational level. The good, effective deception operation is of great risk of conflicting with the current Laws of Armed Conflicts, which will be of great concern for the deception ......, the paper will discuss how the inclusion of mission specific rules of deception can greatly help define the boundaries, and give necessary guide lines for conducting deception operations within the laws of armed conflict....

  9. Asymptotic properties of a simple random motion

    International Nuclear Information System (INIS)

    Ravishankar, K.

    1988-01-01

    A random walker in R/sup N/ is considered. At each step the walker picks a point in R/sup N/ from a fixed finite set of destination points. Having chosen the point, the walker moves a fraction r (r < 1) of the distance toward the point along a straight line. Assuming that the successive destination points are chosen independently, it is shown that the asymptotic distribution of the walker's position has the same mean as the destination point distribution. An estimate is obtained for the fraction of time the walker stays within a ball centered at the mean value for almost every destination sequence. Examples show that the asymptotic distribution could have intricate structure

  10. Deception: Counterdeception and Counterintelligence

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    deception and support deception campaigns. While deception today relies on traditional basic principles, the authors recognize that it requires a fresh approach due to the roles played by information technologies such as social media. Their unique treatment of the perspectives of both the operations planner...... in deception for both both operational planners and intelligence analysts using a case-based approach. By reading and working through the exercises in this text, operations planners will learn how to build and conduct a deception campaign; and intelligence analysts will develop the ability to recognize...... when conducting intelligence analysis. Finally, it goes beyond existing books by dealing with multichannel deception across the political, military, economic, social, infrastructure, and information domains, with special emphasis on use of the rich modern environment for conveying information....

  11. An unbiased estimator of the variance of simple random sampling using mixed random-systematic sampling

    OpenAIRE

    Padilla, Alberto

    2009-01-01

    Systematic sampling is a commonly used technique due to its simplicity and ease of implementation. The drawback of this simplicity is that it is not possible to estimate the design variance without bias. There are several ways to circumvent this problem. One method is to suppose that the variable of interest has a random order in the population, so the sample variance of simple random sampling without replacement is used. By means of a mixed random - systematic sample, an unbiased estimator o...

  12. Least squares estimation in a simple random coefficient autoregressive model

    DEFF Research Database (Denmark)

    Johansen, S; Lange, T

    2013-01-01

    The question we discuss is whether a simple random coefficient autoregressive model with infinite variance can create the long swings, or persistence, which are observed in many macroeconomic variables. The model is defined by yt=stρyt−1+εt,t=1,…,n, where st is an i.i.d. binary variable with p...... we prove the curious result that View the MathML source. The proof applies the notion of a tail index of sums of positive random variables with infinite variance to find the order of magnitude of View the MathML source and View the MathML source and hence the limit of View the MathML source...

  13. Military Deception Reconsidered

    National Research Council Canada - National Science Library

    Martin, Charmaine L

    2008-01-01

    ...: focus, integration, timeliness, security, objective, and centralized control. However, I propose that operational advantage, consisting of surprise, information advantage and security, are essential elements of a successful military deception...

  14. Deception Detection in Videos

    OpenAIRE

    Wu, Zhe; Singh, Bharat; Davis, Larry S.; Subrahmanian, V. S.

    2017-01-01

    We present a system for covert automated deception detection in real-life courtroom trial videos. We study the importance of different modalities like vision, audio and text for this task. On the vision side, our system uses classifiers trained on low level video features which predict human micro-expressions. We show that predictions of high-level micro-expressions can be used as features for deception prediction. Surprisingly, IDT (Improved Dense Trajectory) features which have been widely ...

  15. Defining body deception and its role in peer based social comparison theories of body dissatisfaction.

    Science.gov (United States)

    Hildebrandt, Tom; Shiovitz, Rachel; Alfano, Lauren; Greif, Rebecca

    2008-09-01

    The purpose of the current study was to operationalize the phenomenon of body deception, describe its theoretical importance, and validate its existence in an experimental paradigm. The definition of body deception includes the intentional misrepresentation of information about appearance to others. The present study examined body deception in a controlled experimental study of male and female same-sex peer groups using a series of hierarchical linear models. Ninety male and 90 female undergraduates were randomized to an experimental same-sex peer group or individual control condition. The results suggested that both men and women used body deception among peers, but men's body deception was muscularity driven whereas women's was thinness driven. Body dissatisfaction was significantly predictive of the degree of body deception used by both genders and it was significantly related to peer group membership. An integrated model for the role of body deception in body image disturbance is proposed.

  16. Medicine, lies and deceptions.

    Science.gov (United States)

    Benn, P

    2001-04-01

    This article offers a qualified defence of the view that there is a moral difference between telling lies to one's patients, and deceiving them without lying. However, I take issue with certain arguments offered by Jennifer Jackson in support of the same conclusion. In particular, I challenge her claim that to deny that there is such a moral difference makes sense only within a utilitarian framework, and I cast doubt on the aptness of some of her examples of non-lying deception. But I argue that lies have a greater tendency to damage trust than does non-lying deception, and suggest that since many doctors do believe there is a moral boundary between the two types of deception, encouraging them to violate that boundary may have adverse general effects on their moral sensibilities.

  17. A simple model of global cascades on random networks

    Science.gov (United States)

    Watts, Duncan J.

    2002-04-01

    The origin of large but rare cascades that are triggered by small initial shocks is a phenomenon that manifests itself as diversely as cultural fads, collective action, the diffusion of norms and innovations, and cascading failures in infrastructure and organizational networks. This paper presents a possible explanation of this phenomenon in terms of a sparse, random network of interacting agents whose decisions are determined by the actions of their neighbors according to a simple threshold rule. Two regimes are identified in which the network is susceptible to very large cascadesherein called global cascadesthat occur very rarely. When cascade propagation is limited by the connectivity of the network, a power law distribution of cascade sizes is observed, analogous to the cluster size distribution in standard percolation theory and avalanches in self-organized criticality. But when the network is highly connected, cascade propagation is limited instead by the local stability of the nodes themselves, and the size distribution of cascades is bimodal, implying a more extreme kind of instability that is correspondingly harder to anticipate. In the first regime, where the distribution of network neighbors is highly skewed, it is found that the most connected nodes are far more likely than average nodes to trigger cascades, but not in the second regime. Finally, it is shown that heterogeneity plays an ambiguous role in determining a system's stability: increasingly heterogeneous thresholds make the system more vulnerable to global cascades; but an increasingly heterogeneous degree distribution makes it less vulnerable.

  18. Estimates of Inequality Indices Based on Simple Random, Ranked Set, and Systematic Sampling

    OpenAIRE

    Bansal, Pooja; Arora, Sangeeta; Mahajan, Kalpana K.

    2013-01-01

    Gini index, Bonferroni index, and Absolute Lorenz index are some popular indices of inequality showing different features of inequality measurement. In general simple random sampling procedure is commonly used to estimate the inequality indices and their related inference. The key condition that the samples must be drawn via simple random sampling procedure though makes calculations much simpler but this assumption is often violated in practice as the data does not always yield simple random ...

  19. Exploring the movement dynamics of deception

    Directory of Open Access Journals (Sweden)

    Nicholas D Duran

    2013-03-01

    Full Text Available Both the science and the everyday practice of detecting a lie rest on the same assumption: hidden cognitive states that the liar would like to remain hidden nevertheless influence observable behavior. This assumption has good evidence. The insights of professional interrogators, anecdotal evidence, and body language textbooks have all built up a sizeable catalogue of nonverbal cues that have been claimed to distinguish deceptive and truthful behavior. Typically, these cues are discrete, individual behaviors - a hand touching a mouth, the rise of a brow - that distinguish lies from truths solely in terms of their frequency or duration. Research to date has failed to establish any of these nonverbal cues as a reliable marker of deception. Here we argue that perhaps this is because simple tallies of behavior can miss out on the rich but subtle organization of behavior as it unfolds over time. Research in cognitive science from a dynamical systems perspective has shown that behavior is structured across multiple timescales, with more or less regularity and structure. Using tools that are sensitive to these dynamics, we analyzed body motion data from an experiment that put participants in a realistic situation of choosing, or not, to lie to an experimenter. Our analyses indicate that when being deceptive, continuous fluctuations of movement in the upper face, and somewhat in the arms, are characterized by dynamical properties of less stability, but greater complexity. For the upper face, these distinctions are present despite no apparent differences in the overall amount of movement between deception and truth. We suggest that these unique dynamical signatures of motion are indicative of both the cognitive demands inherent to deception and the need to respond adaptively in a social context.

  20. A simple consensus algorithm for distributed averaging in random ...

    Indian Academy of Sciences (India)

    Random geographical networks are realistic models for wireless sensor ... work are cheap, unreliable, with limited computational power and limited .... signal xj from node j, j does not need to transmit its degree to i in order to let i compute.

  1. Overcoming Deception in Evolution of Cognitive Behaviors

    DEFF Research Database (Denmark)

    Lehman, Joel; Miikkulainen, Risto

    2014-01-01

    When scaling neuroevolution to complex behaviors, cognitive capabilities such as learning, communication, and memory become increasingly important. However, successfully evolving such cognitive abilities remains difficult. This paper argues that a main cause for such difficulty is deception, i.......e. evolution converges to a behavior unrelated to the desired solution. More specifically, cognitive behaviors often require accumulating neural structure that provides no immediate fitness benefit, and evolution often thus converges to non-cognitive solutions. To investigate this hypothesis, a common...... evolutionary robotics T-Maze domain is adapted in three separate ways to require agents to communicate, remember, and learn. Indicative of deception, evolution driven by objective-based fitness often converges upon simple non- cognitive behaviors. In contrast, evolution driven to explore novel behaviors, i...

  2. Inter simple sequence repeats (ISSR) and random amplified ...

    African Journals Online (AJOL)

    21 of 30 random amplified polymorphic DNA (RAPD) primers produced 220 reproducible bands with average of 10.47 bands per primer and 80.12% of polymorphism. OPR02 primer showed the highest number of effective allele (Ne), Shannon index (I) and genetic diversity (H). Some of the cultivars had specific bands, ...

  3. Simple rANDom wALk simulation

    Energy Technology Data Exchange (ETDEWEB)

    2016-05-20

    SANDAL is a particle-mesh simulation mini-app. The simple simulated physics propagates a set of particles in a constant, 2D wind field with Gaussian turbulence. SANDAL demonstrates the feasibility of formulating a computational physics problem using an alternative, modern design. Specifically, it is implemented using relational tables and queries, rather than array-based data model. It also is implemented with functional language design and cloud deployment, Scala and Apache Spark, rather than Fortran and MPI+X.

  4. Deceptive Advertising: Unprotected and Unknown.

    Science.gov (United States)

    Ducoffe, Robert Hal

    The Supreme Court tentatively extended First Amendment protection to commercial speech, but left the issue of defining and regulating deceptive advertising to the Federal Trade Commission (FTC), which has employed tools such as the cease-and-desist order, affirmative disclosure, and corrective advertising. The FTC Act did not define deception, but…

  5. An alternative procedure for estimating the population mean in simple random sampling

    Directory of Open Access Journals (Sweden)

    Housila P. Singh

    2012-03-01

    Full Text Available This paper deals with the problem of estimating the finite population mean using auxiliary information in simple random sampling. Firstly we have suggested a correction to the mean squared error of the estimator proposed by Gupta and Shabbir [On improvement in estimating the population mean in simple random sampling. Jour. Appl. Statist. 35(5 (2008, pp. 559-566]. Later we have proposed a ratio type estimator and its properties are studied in simple random sampling. Numerically we have shown that the proposed class of estimators is more efficient than different known estimators including Gupta and Shabbir (2008 estimator.

  6. Statistical deception at work

    CERN Document Server

    Mauro, John

    2013-01-01

    Written to reveal statistical deceptions often thrust upon unsuspecting journalists, this book views the use of numbers from a public perspective. Illustrating how the statistical naivete of journalists often nourishes quantitative misinformation, the author's intent is to make journalists more critical appraisers of numerical data so that in reporting them they do not deceive the public. The book frequently uses actual reported examples of misused statistical data reported by mass media and describes how journalists can avoid being taken in by them. Because reports of survey findings seldom g

  7. Approximate design theory for a simple block design with random block effects

    OpenAIRE

    Christof, Karin

    1985-01-01

    Approximate design theory for a simple block design with random block effects / K. Christof ; F. Pukelsheim. - In: Linear statistical inference / ed. by T. Calinski ... - Berlin u. a. : Springer, 1985. - S. 20-28. - (Lecture notes in statistics ; 35)

  8. The ethics of deception in cyberspace

    OpenAIRE

    Rowe, Neil C.

    2008-01-01

    This paper appeared in the Handbook of Research on Technoethics, ed. R. Luppicini, Hershey, PA: Information Science Reference, 2008. We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on comput...

  9. Information asymmetry and deception.

    Science.gov (United States)

    Clots-Figueras, Irma; Hernán-González, Roberto; Kujal, Praveen

    2015-01-01

    Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (or investee). The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a non-binding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution.

  10. Information Asymmetry and Deception

    Directory of Open Access Journals (Sweden)

    Irma eClots Figueras

    2015-07-01

    Full Text Available Situations such as an entrepreneur overstating a project’s value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor can send a given amount of money to a trustee (or investee. The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a nonbinding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution.

  11. Web of Deception: Social Media and Implications for Military Deception

    Science.gov (United States)

    2012-12-01

    additional deception and OPSEC concerns. 35 Beyond just the open source intelligence ( OSINT ) that can be collected by other entities, there is also a...witting participants, in an effort to mislead or confuse the enemy. Just as the United States would be monitoring social media for OSINT , the...deception. Exploiting adversary use of social media OSINT through DISO is another lower threat avenue to examine as a starting point. As previously

  12. On the Runtime of Randomized Local Search and Simple Evolutionary Algorithms for Dynamic Makespan Scheduling

    DEFF Research Database (Denmark)

    Neumann, Frank; Witt, Carsten

    2015-01-01

    combinatorial optimization problem, namely makespan scheduling. We study the model of a strong adversary which is allowed to change one job at regular intervals. Furthermore, we investigate the setting of random changes. Our results show that randomized local search and a simple evolutionary algorithm are very...

  13. IS SELF-DECEPTION PRETENSE?

    Directory of Open Access Journals (Sweden)

    JOSÉ EDUARDO PORCHER

    2015-01-01

    Full Text Available I assess Tamar Gendler's (2007 account of self-deception according to which its characteristic state is not belief, but imaginative pretense. After giving an overview of the literature and presenting the conceptual puzzles engendered by the notion of self-deception, I introduce Gendler's account, which emerges as a rival to practically all extant accounts of self-deception. I object to it by first arguing that her argument for abandoning belief as the characteristic state of self-deception conflates the state of belief and the process of belief-formation when interpreting David Velleman's (2000 thesis that belief is an essentially truth-directed attitude. I then call attention to the fact that Velleman's argument for the identity of motivational role between belief and imagining, on which Gendler's argument for self-deception as pretense depends, conflates two senses of 'motivational role'-a stronger but implausible sense and a weaker but explanatorily irrelevant sense. Finally, I introduce Neil Van Leeuwen's (2009 argument to the effect that belief is the practical ground of all non-belief cognitive attitudes in circum-stances wherein the latter prompt action. I apply this framework to Gendler's account to ultimately show that imaginative pretense fails to explain the existence of voluntary actions which result from self-deception.

  14. Emergence of an optimal search strategy from a simple random walk.

    Science.gov (United States)

    Sakiyama, Tomoko; Gunji, Yukio-Pegio

    2013-09-06

    In reports addressing animal foraging strategies, it has been stated that Lévy-like algorithms represent an optimal search strategy in an unknown environment, because of their super-diffusion properties and power-law-distributed step lengths. Here, starting with a simple random walk algorithm, which offers the agent a randomly determined direction at each time step with a fixed move length, we investigated how flexible exploration is achieved if an agent alters its randomly determined next step forward and the rule that controls its random movement based on its own directional moving experiences. We showed that our algorithm led to an effective food-searching performance compared with a simple random walk algorithm and exhibited super-diffusion properties, despite the uniform step lengths. Moreover, our algorithm exhibited a power-law distribution independent of uniform step lengths.

  15. An Analysis of Trust in Deception Operations

    Science.gov (United States)

    2009-03-01

    presents an overview of deception, both from the military and academic perspectives. The importance of the adversarial mind to a successful deception is...to most literature on deception. This section will introduce both military and academic theories of deception and discuss their relevance to trust...claim, faking documentation, plagiarism , and purchasing one (p. 226). A doctorate is regarded as a valuable item for establishing reputational

  16. Random walks and a simple chirally invariant lattice Hamiltonian without fermion doubling

    International Nuclear Information System (INIS)

    Belyea, C.I.

    1992-01-01

    It is shown that there is a simple chirally-invariant lattice Hamiltonian for fermions which is doubling-free but non-Hermitian and which may be valuable in lattice Hamiltonian studies of quantum chromodynamics. A connection is established between the existence of random walk representations of spinor propagators and this doubling-free formulation, in analogy with Wilson fermions. 15 refs

  17. Experimental economics' inconsistent ban on deception.

    Science.gov (United States)

    Hersch, Gil

    2015-08-01

    According to what I call the 'argument from public bads', if a researcher deceived subjects in the past, there is a chance that subjects will discount the information that a subsequent researcher provides, thus compromising the validity of the subsequent researcher's experiment. While this argument is taken to justify an existing informal ban on explicit deception in experimental economics, it can also apply to implicit deception, yet implicit deception is not banned and is sometimes used in experimental economics. Thus, experimental economists are being inconsistent when they appeal to the argument from public bads to justify banning explicit deception but not implicit deception. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Deception and Retribution in Repeated Ultimatum Bargaining.

    Science.gov (United States)

    Boles; Croson; Murnighan

    2000-11-01

    This paper investigates the dynamics of deception and retribution in repeated ultimatum bargaining. Anonymous dyads exchanged messages and offers in a series of four ultimatum bargaining games that had prospects for relatively large monetary outcomes. Variations in each party's knowledge of the other's resources and alternatives created opportunities for deception. Revelation of prior unknowns exposed deceptions and created opportunities for retribution in subsequent interactions. Results showed that although proposers and responders chose deceptive strategies almost equally, proposers told more outright lies. Both were more deceptive when their private information was never revealed, and proposers were most deceptive when their potential profits were largest. Revelation of proposers' lies had little effect on their subsequent behavior even though responders rejected their offers more than similar offers from truthful proposers or proposers whose prior deceit was never revealed. The discussion and conclusions address the dynamics of deception and retribution in repeated bargaining interactions. Copyright 2000 Academic Press.

  19. Effects of Deceptive Advertising on Consumer Loyalty in Telecommunication Industry of Pakistan

    OpenAIRE

    Hasan, Syed Akif; Subhani, Muhammad Imtiaz

    2011-01-01

    This study is an attempt to interrogate the effects of deceptive advertising on consumer loyalty in telecommunication industry of Pakistan. Four variables, Call Charges (CC), Network Coverage (NC), Network Quality (NQ) and Customer Service (CS) were used to measure deception in Telecom Ads and then its effect on consumer loyalty while the consumer preference is used as the proxy of consumer loyalty. 10,000 random individuals from telecom industry were selected to conclude the results. Testing...

  20. STATISTICAL LANDMARKS AND PRACTICAL ISSUES REGARDING THE USE OF SIMPLE RANDOM SAMPLING IN MARKET RESEARCHES

    Directory of Open Access Journals (Sweden)

    CODRUŢA DURA

    2010-01-01

    Full Text Available The sample represents a particular segment of the statistical populationchosen to represent it as a whole. The representativeness of the sample determines the accuracyfor estimations made on the basis of calculating the research indicators and the inferentialstatistics. The method of random sampling is part of probabilistic methods which can be usedwithin marketing research and it is characterized by the fact that it imposes the requirementthat each unit belonging to the statistical population should have an equal chance of beingselected for the sampling process. When the simple random sampling is meant to be rigorouslyput into practice, it is recommended to use the technique of random number tables in order toconfigure the sample which will provide information that the marketer needs. The paper alsodetails the practical procedure implemented in order to create a sample for a marketingresearch by generating random numbers using the facilities offered by Microsoft Excel.

  1. Deceptive Business Practices: State Regulations.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    Although much has been done at the federal level to control deceptive advertising practices, many states have no criminal laws designed to regulate advertising, and several states recently repealed such laws. This paper examines states' efforts to balance the advertiser's freedom of speech with the consumer's need for information about products by…

  2. Deceptive Business Practices: Federal Regulations.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    Federal regulations to prevent deceptive advertising seek to balance the advertiser's freedom of speech with protection of the consumer. This paper discusses what the Federal Trade Commission (FTC) has done to regulate advertising and evaluates the adequacy of its controls. The commission uses cease-and-desist orders, affirmative disclosure,…

  3. Quenched Large Deviations for Simple Random Walks on Percolation Clusters Including Long-Range Correlations

    Science.gov (United States)

    Berger, Noam; Mukherjee, Chiranjib; Okamura, Kazuki

    2018-03-01

    We prove a quenched large deviation principle (LDP) for a simple random walk on a supercritical percolation cluster (SRWPC) on {Z^d} ({d ≥ 2}). The models under interest include classical Bernoulli bond and site percolation as well as models that exhibit long range correlations, like the random cluster model, the random interlacement and the vacant set of random interlacements (for {d ≥ 3}) and the level sets of the Gaussian free field ({d≥ 3}). Inspired by the methods developed by Kosygina et al. (Commun Pure Appl Math 59:1489-1521, 2006) for proving quenched LDP for elliptic diffusions with a random drift, and by Yilmaz (Commun Pure Appl Math 62(8):1033-1075, 2009) and Rosenbluth (Quenched large deviations for multidimensional random walks in a random environment: a variational formula. Ph.D. thesis, NYU, arXiv:0804.1444v1) for similar results regarding elliptic random walks in random environment, we take the point of view of the moving particle and prove a large deviation principle for the quenched distribution of the pair empirical measures of the environment Markov chain in the non-elliptic case of SRWPC. Via a contraction principle, this reduces easily to a quenched LDP for the distribution of the mean velocity of the random walk and both rate functions admit explicit variational formulas. The main difficulty in our set up lies in the inherent non-ellipticity as well as the lack of translation-invariance stemming from conditioning on the fact that the origin belongs to the infinite cluster. We develop a unifying approach for proving quenched large deviations for SRWPC based on exploiting coercivity properties of the relative entropies in the context of convex variational analysis, combined with input from ergodic theory and invoking geometric properties of the supercritical percolation cluster.

  4. Determination of the Trainability of Deception Detection Cues

    National Research Council Canada - National Science Library

    Ford, Christopher

    2004-01-01

    .... The officers were tested to determine their baseline deception detection abilities, then trained on the deception cues, Arousal, Emotion, Cognitive Effort, Communicator Tactics, and Memory Processes...

  5. Functional treatment versus plaster for simple elbow dislocations (FuncSiE: a randomized trial

    Directory of Open Access Journals (Sweden)

    Verleisdonk Egbert JMM

    2010-11-01

    Full Text Available Abstract Background Elbow dislocations can be classified as simple or complex. Simple dislocations are characterized by the absence of fractures, while complex dislocations are associated with fractures. After reduction of a simple dislocation, treatment options include immobilization in a static plaster for different periods of time or so-called functional treatment. Functional treatment is characterized by early active motion within the limits of pain with or without the use of a sling or hinged brace. Theoretically, functional treatment should prevent stiffness without introducing increased joint instability. The primary aim of this randomized controlled trial is to compare early functional treatment versus plaster immobilization following simple dislocations of the elbow. Methods/Design The design of the study will be a multicenter randomized controlled trial of 100 patients who have sustained a simple elbow dislocation. After reduction of the dislocation, patients are randomized between a pressure bandage for 5-7 days and early functional treatment or a plaster in 90 degrees flexion, neutral position for pro-supination for a period of three weeks. In the functional group, treatment is started with early active motion within the limits of pain. Function, pain, and radiographic recovery will be evaluated at regular intervals over the subsequent 12 months. The primary outcome measure is the Quick Disabilities of the Arm, Shoulder, and Hand score. The secondary outcome measures are the Mayo Elbow Performance Index, Oxford elbow score, pain level at both sides, range of motion of the elbow joint at both sides, rate of secondary interventions and complication rates in both groups (secondary dislocation, instability, relaxation, health-related quality of life (Short-Form 36 and EuroQol-5D, radiographic appearance of the elbow joint (degenerative changes and heterotopic ossifications, costs, and cost-effectiveness. Discussion The successful

  6. The Ethics of Military Deception

    Science.gov (United States)

    1998-06-05

    comment directly on the moral dimensions of military deception is the great Roman orator, Marcus Tullius Cicero (106-43 B.C.). Of paramount...action is to be commended, if what is 1 Marcus Tullius Cicero, De Officiis, I.xiii.40, trans. Walter Miller (Cambridge: Harvard University Press, 1913... Aurelius Augustinus (A.D. 354-430), later known as Saint Augustine, the Catholic bishop of Hippo in North Africa, is in many ways the pivotal

  7. Cooperation and deception in primates.

    Science.gov (United States)

    Hall, Katie; Brosnan, Sarah F

    2017-08-01

    Though competition and cooperation are often considered opposing forces in an arms race driving natural selection, many animals, including humans, cooperate in order to mitigate competition with others. Understanding others' psychological states, such as seeing and knowing, others' goals and intentions, and coordinating actions are all important for complex cooperation-as well as for predicting behavior in order to take advantage of others through tactical deception, a form of competition. We outline evidence of primates' understanding of how others perceive the world, and then consider how the evidence from both deception and cooperation fits this framework to give us a more complete understanding of the evolution of complex social cognition in primates. In experimental food competitions, primates flexibly manipulate group-mates' behavior to tactically deceive them. Deception can infiltrate cooperative interactions, such as when one takes an unfair share of meat after a coordinated hunt. In order to counter competition of this sort, primates maintain cooperation through partner choice, partner control, and third party punishment. Yet humans appear to stand alone in their ability to understand others' beliefs, which allows us not only to deceive others with the explicit intent to create a false belief, but it also allows us to put ourselves in others' shoes to determine when cheaters need to be punished, even if we are not directly disadvantaged by the cheater. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. When it pays to cheat: Examining how generalized food deception increases male and female fitness in a terrestrial orchid.

    Science.gov (United States)

    Walsh, Ryan P; Michaels, Helen J

    2017-01-01

    Experimental manipulations of floral nectar in food deceptive species can reveal insights into the evolutionary consequences of the deceptive strategy. When coupled to pollen tracking, the effects of the deceptive pollination syndrome on both male and female reproductive success may be quantified. Attraction of pollinators in deceit-pollinated species often relies on producing a conspicuous floral display which may increase visibility to pollinators, but in-turn may increase within plant selfing. To understand the role of deception in Orchidaceae reproduction we studied Cypripedium candidum. All species of the Cypripedium genus employ a generalized food deceptive pollination strategy and have been suggested as a model system for the study of pollinator deception. We conducted a nectar addition experiment that randomly assigned the four plants closest to a transect point to receive one of four histochemical dyes. Two individuals selected for nectar addition in each of altogether 25 blocks received 2μl of 25% sucrose solution in the labellum of each flower, while two others received no artificial nectar. Number of fruits produced, fruit mass and fruit abortion were scored at the end of the four-month experiment. Nectar addition increased (p<0.0001) self-pollination and pollen discounting by nearly 3x, while plants not receiving nectar had greater (p<0.0001) numbers of non-self pollinia deposited and lower rates of pollen discounting. There was a non-significant (p = 0.0645) trend for deceptive plants to set more fruit, while presence of nectar did not affect pollen export. This study demonstrates the adaptive advantages of food deception by showing a concurrent reduction in particular male and female functions when a food reward is restored to a deceptive flower. We found generalized food deception to not only decrease inbreeding depression in the system, but concurrently have no effect on pollinator attraction and fruit set when compared with rewarding flowers.

  9. When it pays to cheat: Examining how generalized food deception increases male and female fitness in a terrestrial orchid.

    Directory of Open Access Journals (Sweden)

    Ryan P Walsh

    Full Text Available Experimental manipulations of floral nectar in food deceptive species can reveal insights into the evolutionary consequences of the deceptive strategy. When coupled to pollen tracking, the effects of the deceptive pollination syndrome on both male and female reproductive success may be quantified. Attraction of pollinators in deceit-pollinated species often relies on producing a conspicuous floral display which may increase visibility to pollinators, but in-turn may increase within plant selfing.To understand the role of deception in Orchidaceae reproduction we studied Cypripedium candidum. All species of the Cypripedium genus employ a generalized food deceptive pollination strategy and have been suggested as a model system for the study of pollinator deception. We conducted a nectar addition experiment that randomly assigned the four plants closest to a transect point to receive one of four histochemical dyes. Two individuals selected for nectar addition in each of altogether 25 blocks received 2μl of 25% sucrose solution in the labellum of each flower, while two others received no artificial nectar. Number of fruits produced, fruit mass and fruit abortion were scored at the end of the four-month experiment.Nectar addition increased (p<0.0001 self-pollination and pollen discounting by nearly 3x, while plants not receiving nectar had greater (p<0.0001 numbers of non-self pollinia deposited and lower rates of pollen discounting. There was a non-significant (p = 0.0645 trend for deceptive plants to set more fruit, while presence of nectar did not affect pollen export.This study demonstrates the adaptive advantages of food deception by showing a concurrent reduction in particular male and female functions when a food reward is restored to a deceptive flower. We found generalized food deception to not only decrease inbreeding depression in the system, but concurrently have no effect on pollinator attraction and fruit set when compared with

  10. Online deception: prevalence, motivation, and emotion.

    Science.gov (United States)

    Caspi, Avner; Gorsky, Paul

    2006-02-01

    This research has three goals: first, to find out how prevalent online deception is within a sample of Israeli users, second, to explore the underlying motivations to deceive online, and third, to discover the emotions that accompany online deception. A web-based survey was distributed in 14 discussion groups, and the answers of 257 respondents were analyzed. It was found that, while most of the respondents believe that online deception is very widespread, only about one-third of them reported engaging in online deception. Frequent users deceive online more than infrequent users, young users more than old, and competent users more than non-competent. The most common motivations to deceive online were "play" on the one hand and privacy concerns on the other. Most people felt a sense of enjoyment while engaging in online deception. The results are discussed in light of a possible mechanism for changing personal moral standards.

  11. The Use of Deception in Public Health Behavioral Intervention Trials: A Case Study of Three Online Alcohol Trials

    Science.gov (United States)

    McCambridge, Jim; Kypri, Kypros; Bendtsen, Preben; Porter, John

    2013-01-01

    Some public health behavioral intervention research studies involve deception. A methodological imperative to minimize bias can be in conflict with the ethical principle of informed consent. As a case study, we examine the specific forms of deception used in three online randomized controlled trials evaluating brief alcohol interventions. We elaborate our own decision making about the use of deception in these trials, and present our ongoing findings and uncertainties. We discuss the value of the approach of pragmatism for examining these kinds of ethical issues that can arise in research on public health interventions. PMID:24161181

  12. Types of deception and underlying motivation: what people think

    NARCIS (Netherlands)

    Utz, S.

    2005-01-01

    In computer-mediated communication, there are various types of possible deception such as category deception (gender switching), attractiveness deception, or identity concealment. The present article argues that it is meaningful to differentiate among these types of deception. More specifically, it

  13. Orchid pollination by sexual deception: pollinator perspectives.

    Science.gov (United States)

    Gaskett, A C

    2011-02-01

    The extraordinary taxonomic and morphological diversity of orchids is accompanied by a remarkable range of pollinators and pollination systems. Sexually deceptive orchids are adapted to attract specific male insects that are fooled into attempting to mate with orchid flowers and inadvertently acting as pollinators. This review summarises current knowledge, explores new hypotheses in the literature, and introduces some new approaches to understanding sexual deception from the perspective of the duped pollinator. Four main topics are addressed: (1) global patterns in sexual deception, (2) pollinator identities, mating systems and behaviours, (3) pollinator perception of orchid deceptive signals, and (4) the evolutionary implications of pollinator responses to orchid deception, including potential costs imposed on pollinators by orchids. A global list of known and putative sexually deceptive orchids and their pollinators is provided and methods for incorporating pollinator perspectives into sexual deception research are provided and reviewed. At present, almost all known sexually deceptive orchid taxa are from Australia or Europe. A few sexually deceptive species and genera are reported for New Zealand and South Africa. In Central and Southern America, Asia, and the Pacific many more species are likely to be identified in the future. Despite the great diversity of sexually deceptive orchid genera in Australia, pollination rates reported in the literature are similar between Australian and European species. The typical pollinator of a sexually deceptive orchid is a male insect of a species that is polygynous, monandrous, haplodiploid, and solitary rather than social. Insect behaviours involved in the pollination of sexually deceptive orchids include pre-copulatory gripping of flowers, brief entrapment, mating, and very rarely, ejaculation. Pollinator behaviour varies within and among pollinator species. Deception involving orchid mimicry of insect scent signals is

  14. Informing consumers: Protection from deceptive advertising

    Directory of Open Access Journals (Sweden)

    Stanković Ljiljana

    2013-01-01

    Full Text Available It is widely accepted that only informed consumers are protected from potential violation of their consumer rights. Advertising represents one of the main ways of informing consumers, so it is of crutial importance for it to include adequate information that can facilitate decision making proces regarding the purchase. With aim of preventing violation of basic consumer rights, advertising is regulated by legislation, both on EU level and on national level in Republic of Serbia, and while so special attention is dedicated to defining advertising that can possibly lead to deception of consumers. Authors of this paper are focused on analysing legislation and theoretical explanations of deceptive advertising. Results of the research regarding advertising in Serbia and ability of consumers to protect themselves from deceptive advertising are presented. The main aim of the authors is to contribute to increasing level of consumers' self-protection through increasing level of their counciousness on deceptive advertising and its concequences.

  15. Are Celebrities Criminally Responsible For Deceptive Advertising?

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The State Administration for Industry and Commerce recently said it has suggested the addition of an article in the Advertising Law to make celebrities who represent fake products in deceptive advertising criminally responsible for their actions if it is confirmed

  16. The Utility of Military Deception During Counterinsurgency

    Science.gov (United States)

    2007-03-29

    ZAPU constituency was part of the Matabeles ( Zulu ) warrior class ( tribe ) that dominated the Shona tribes in pre-colonial times. Thus their...MILDEC is useful to counterinsurgents. In particular, the most effective deceptions in counterinsurgent history involve the prudent use of pseudo...In particular, the most effective deceptions in counterinsurgent history involve the prudent use of pseudo operators who are able to generate

  17. Making Activity Recognition Robust against Deceptive Behavior.

    Directory of Open Access Journals (Sweden)

    Sohrab Saeb

    Full Text Available Healthcare services increasingly use the activity recognition technology to track the daily activities of individuals. In some cases, this is used to provide incentives. For example, some health insurance companies offer discount to customers who are physically active, based on the data collected from their activity tracking devices. Therefore, there is an increasing motivation for individuals to cheat, by making activity trackers detect activities that increase their benefits rather than the ones they actually do. In this study, we used a novel method to make activity recognition robust against deceptive behavior. We asked 14 subjects to attempt to trick our smartphone-based activity classifier by making it detect an activity other than the one they actually performed, for example by shaking the phone while seated to make the classifier detect walking. If they succeeded, we used their motion data to retrain the classifier, and asked them to try to trick it again. The experiment ended when subjects could no longer cheat. We found that some subjects were not able to trick the classifier at all, while others required five rounds of retraining. While classifiers trained on normal activity data predicted true activity with ~38% accuracy, training on the data gathered during the deceptive behavior increased their accuracy to ~84%. We conclude that learning the deceptive behavior of one individual helps to detect the deceptive behavior of others. Thus, we can make current activity recognition robust to deception by including deceptive activity data from a few individuals.

  18. Markers of Deception in Italian Speech

    Directory of Open Access Journals (Sweden)

    Katelyn eSpence

    2012-10-01

    Full Text Available Lying is a universal activity and the detection of lying a universal concern. Presently, there is great interest in determining objective measures of deception. The examination of speech, in particular, holds promise in this regard; yet, most of what we know about the relationship between speech and lying is based on the assessment of English-speaking participants. Few studies have examined indicators of deception in languages other than English. The world’s languages differ in significant ways, and cross-linguistic studies of deceptive communications are a research imperative. Here we review some of these differences amongst the world’s languages, and provide an overview of a number of recent studies demonstrating that cross-linguistic research is a worthwhile endeavour. In addition, we report the results of an empirical investigation of pitch, response latency, and speech rate as cues to deception in Italian speech. True and false opinions were elicited in an audio-taped interview. A within subjects analysis revealed no significant difference between the average pitch of the two conditions; however, speech rate was significantly slower, while response latency was longer, during deception compared with truth-telling. We explore the implications of these findings and propose directions for future research, with the aim of expanding the cross-linguistic branch of research on markers of deception.

  19. The contribution of simple random sampling to observed variations in faecal egg counts.

    Science.gov (United States)

    Torgerson, Paul R; Paul, Michaela; Lewis, Fraser I

    2012-09-10

    It has been over 100 years since the classical paper published by Gosset in 1907, under the pseudonym "Student", demonstrated that yeast cells suspended in a fluid and measured by a haemocytometer conformed to a Poisson process. Similarly parasite eggs in a faecal suspension also conform to a Poisson process. Despite this there are common misconceptions how to analyse or interpret observations from the McMaster or similar quantitative parasitic diagnostic techniques, widely used for evaluating parasite eggs in faeces. The McMaster technique can easily be shown from a theoretical perspective to give variable results that inevitably arise from the random distribution of parasite eggs in a well mixed faecal sample. The Poisson processes that lead to this variability are described and illustrative examples of the potentially large confidence intervals that can arise from observed faecal eggs counts that are calculated from the observations on a McMaster slide. Attempts to modify the McMaster technique, or indeed other quantitative techniques, to ensure uniform egg counts are doomed to failure and belie ignorance of Poisson processes. A simple method to immediately identify excess variation/poor sampling from replicate counts is provided. Copyright © 2012 Elsevier B.V. All rights reserved.

  20. A simple heuristic for Internet-based evidence search in primary care: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Eberbach A

    2016-08-01

    Full Text Available Andreas Eberbach,1 Annette Becker,1 Justine Rochon,2 Holger Finkemeler,1Achim Wagner,3 Norbert Donner-Banzhoff1 1Department of Family and Community Medicine, Philipp University of Marburg, Marburg, Germany; 2Institute of Medical Biometry and Informatics, University of Heidelberg, Heidelberg, Germany; 3Department of Sport Medicine, Justus-Liebig-University of Giessen, Giessen, Germany Background: General practitioners (GPs are confronted with a wide variety of clinical questions, many of which remain unanswered. Methods: In order to assist GPs in finding quick, evidence-based answers, we developed a learning program (LP with a short interactive workshop based on a simple ­three-step-heuristic to improve their search and appraisal competence (SAC. We evaluated the LP ­effectiveness with a randomized controlled trial (RCT. Participants (intervention group [IG] n=20; ­control group [CG] n=31 rated acceptance and satisfaction and also answered 39 ­knowledge ­questions to assess their SAC. We controlled for previous knowledge in content areas covered by the test. Results: Main outcome – SAC: within both groups, the pre–post test shows significant (P=0.00 improvements in correctness (IG 15% vs CG 11% and confidence (32% vs 26% to find evidence-based answers. However, the SAC difference was not significant in the RCT. Other measures: Most workshop participants rated “learning atmosphere” (90%, “skills acquired” (90%, and “relevancy to my practice” (86% as good or very good. The ­LP-recommendations were implemented by 67% of the IG, whereas 15% of the CG already conformed to LP recommendations spontaneously (odds ratio 9.6, P=0.00. After literature search, the IG showed a (not significantly higher satisfaction regarding “time spent” (IG 80% vs CG 65%, “quality of information” (65% vs 54%, and “amount of information” (53% vs 47%.Conclusion: Long-standing established GPs have a good SAC. Despite high acceptance, strong

  1. A Simulation Study on the Performance of the Simple Difference and Covariance-Adjusted Scores in Randomized Experimental Designs

    Science.gov (United States)

    Petscher, Yaacov; Schatschneider, Christopher

    2011-01-01

    Research by Huck and McLean (1975) demonstrated that the covariance-adjusted score is more powerful than the simple difference score, yet recent reviews indicate researchers are equally likely to use either score type in two-wave randomized experimental designs. A Monte Carlo simulation was conducted to examine the conditions under which the…

  2. Group Performance in Military Scenarios Under Deceptive Conditions

    National Research Council Canada - National Science Library

    Hass, Michael

    2004-01-01

    ... (warnings of player deception) relate to perceptions of deception and task difficulty and in turn how these perceptions relate to the final group game scores in a cooperative effort with conflicting goals...

  3. A simple and efficient alternative to implementing systematic random sampling in stereological designs without a motorized microscope stage.

    Science.gov (United States)

    Melvin, Neal R; Poda, Daniel; Sutherland, Robert J

    2007-10-01

    When properly applied, stereology is a very robust and efficient method to quantify a variety of parameters from biological material. A common sampling strategy in stereology is systematic random sampling, which involves choosing a random sampling [corrected] start point outside the structure of interest, and sampling relevant objects at [corrected] sites that are placed at pre-determined, equidistant intervals. This has proven to be a very efficient sampling strategy, and is used widely in stereological designs. At the microscopic level, this is most often achieved through the use of a motorized stage that facilitates the systematic random stepping across the structure of interest. Here, we report a simple, precise and cost-effective software-based alternative to accomplishing systematic random sampling under the microscope. We believe that this approach will facilitate the use of stereological designs that employ systematic random sampling in laboratories that lack the resources to acquire costly, fully automated systems.

  4. Multifrequency OFDM SAR in Presence of Deception Jamming

    Directory of Open Access Journals (Sweden)

    Schuerger Jonathan

    2010-01-01

    Full Text Available Orthogonal frequency division multiplexing (OFDM is considered in this paper from the perspective of usage in imaging radar scenarios with deception jamming. OFDM radar signals are inherently multifrequency waveforms, composed of a number of subbands which are orthogonal to each other. While being employed extensively in communications, OFDM has not found comparatively wide use in radar, and, particularly, in synthetic aperture radar (SAR applications. In this paper, we aim to show the advantages of OFDM-coded radar signals with random subband composition when used in deception jamming scenarios. Two approaches to create a radar signal by the jammer are considered: instantaneous frequency (IF estimator and digital-RF-memory- (DRFM- based reproducer. In both cases, the jammer aims to create a copy of a valid target image via resending the radar signal at prescribed time intervals. Jammer signals are derived and used in SAR simulations with three types of signal models: OFDM, linear frequency modulated (LFM, and frequency-hopped (FH. Presented results include simulated peak side lobe (PSL and peak cross-correlation values for random OFDM signals, as well as simulated SAR imagery with IF and DRFM jammers'-induced false targets.

  5. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  6. Deception in Advertising: A Receiver Oriented Approach to Understanding.

    Science.gov (United States)

    Gardner, David M.

    The purpose of this paper is to examine deception in advertising from a behavioral perspective, and to attempt to formulate a definition that can guide both research and governmental regulation. Whether or not an advertisement is said to be "deceptive" depends on the definition of deception being used. The position advocated here is that…

  7. A new simple technique for improving the random properties of chaos-based cryptosystems

    Science.gov (United States)

    Garcia-Bosque, M.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Celma, S.

    2018-03-01

    A new technique for improving the security of chaos-based stream ciphers has been proposed and tested experimentally. This technique manages to improve the randomness properties of the generated keystream by preventing the system to fall into short period cycles due to digitation. In order to test this technique, a stream cipher based on a Skew Tent Map algorithm has been implemented on a Virtex 7 FPGA. The randomness of the keystream generated by this system has been compared to the randomness of the keystream generated by the same system with the proposed randomness-enhancement technique. By subjecting both keystreams to the National Institute of Standards and Technology (NIST) tests, we have proved that our method can considerably improve the randomness of the generated keystreams. In order to incorporate our randomness-enhancement technique, only 41 extra slices have been needed, proving that, apart from effective, this method is also efficient in terms of area and hardware resources.

  8. Response bias in judging deceptive movements

    NARCIS (Netherlands)

    Canal Bruland, R.; Schmidt, M.

    2009-01-01

    Two not mutually exclusive explanations, perceptual and motor expertise, account for the finding that experts outperform novices in recognizing deceptive actions from bodily (kinematic) cues. The aim of the present study was twofold: First, we sought to examine the impact of motor and perceptual

  9. 16 CFR 23.1 - Deception (general).

    Science.gov (United States)

    2010-01-01

    ... misrepresent the type, kind, grade, quality, quantity, metallic content, size, weight, cut, color, character..., distribution, or any other material aspect of an industry product. Note 1 to § 23.1: If, in the sale or..., the identity of the grading system used should be disclosed. Note 2 to § 23.1: To prevent deception...

  10. Hazard of deceptive advertising of athletic footwear.

    Science.gov (United States)

    Robbins, S; Waked, E

    1997-12-01

    Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.

  11. A simple method for analyzing data from a randomized trial with a missing binary outcome

    Directory of Open Access Journals (Sweden)

    Freedman Laurence S

    2003-05-01

    Full Text Available Abstract Background Many randomized trials involve missing binary outcomes. Although many previous adjustments for missing binary outcomes have been proposed, none of these makes explicit use of randomization to bound the bias when the data are not missing at random. Methods We propose a novel approach that uses the randomization distribution to compute the anticipated maximum bias when missing at random does not hold due to an unobserved binary covariate (implying that missingness depends on outcome and treatment group. The anticipated maximum bias equals the product of two factors: (a the anticipated maximum bias if there were complete confounding of the unobserved covariate with treatment group among subjects with an observed outcome and (b an upper bound factor that depends only on the fraction missing in each randomization group. If less than 15% of subjects are missing in each group, the upper bound factor is less than .18. Results We illustrated the methodology using data from the Polyp Prevention Trial. We anticipated a maximum bias under complete confounding of .25. With only 7% and 9% missing in each arm, the upper bound factor, after adjusting for age and sex, was .10. The anticipated maximum bias of .25 × .10 =.025 would not have affected the conclusion of no treatment effect. Conclusion This approach is easy to implement and is particularly informative when less than 15% of subjects are missing in each arm.

  12. Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.

    Science.gov (United States)

    Számadó, Szabolcs; Szalai, Ferenc; Scheuring, István

    2016-01-01

    Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.

  13. Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.

    Directory of Open Access Journals (Sweden)

    Szabolcs Számadó

    Full Text Available Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.

  14. A simple sample size formula for analysis of covariance in cluster randomized trials.

    NARCIS (Netherlands)

    Teerenstra, S.; Eldridge, S.; Graff, M.J.; Hoop, E. de; Borm, G.F.

    2012-01-01

    For cluster randomized trials with a continuous outcome, the sample size is often calculated as if an analysis of the outcomes at the end of the treatment period (follow-up scores) would be performed. However, often a baseline measurement of the outcome is available or feasible to obtain. An

  15. You can’t kid a kidder: Association between production and detection of deception in an interactive deception task

    Directory of Open Access Journals (Sweden)

    Gordon R.T. Wright

    2012-04-01

    Full Text Available Both the ability to deceive others, and the ability to detect deception, have long been proposed to confer an evolutionary advantage. Deception detection has been studied extensively, and the finding that typical individuals fare little better than chance in detecting deception is one of the more robust in the behavioral sciences. Surprisingly, little research has examined individual differences in lie-production ability. As a consequence, as far as we are aware, no previous study has investigated whether there exists an association between the ability to lie successfully and the ability to detect lies. Furthermore, only a minority of studies have examined deception as it naturally occurs; in a social, interactive setting. The present study therefore explored the relationship between these two facets of deceptive behavior by employing a novel competitive interactive deception task. For the first time, signal-detection theory was used to measure performance in both the detection and production of deception. A significant relationship was found between the deception-related abilities; those who could accurately detect a lie were able to produce statements that others found difficult to classify as deceptive or truthful. Furthermore, neither ability was related to measures of intelligence or emotional ability. We therefore suggest the existence of an underlying deception-general ability that varies across individuals.

  16. The Art of Deception and the Role of Intelligence Education

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    2016-01-01

    Is deception an art? And if so, what role might it have in military intelligence education? To offer some answers to the these questions, the paper draws upon the discovery phase of efforts to synchronize deception theory, research, practice, in order to develop a post-graduate military deception...... course for a military intelligence studies. In doing so, it reflects upon the recognition afforded from discovery to creativity, innovation, science, doctrine, and ethics, within the studies of deception and the construct of military deception itself. It follows with bridge building between theory...... and practice through the adaptive use of Boyds Observe-Orient-Decide-Act (OODA) and a target centric intelligence approach to explain the dynamics concerning military intelligence in warfighting. These initial findings suggest that deception, as part of a post-graduate military intelligence education, not only...

  17. Deception in medical and behavioral research: is it ever acceptable?

    Science.gov (United States)

    Wendler, D

    1996-01-01

    Ethicists argue that deception is unacceptable, whereas researchers regard it as a necessary part of (certain kinds of) research. This impasse could be resolved by establishing the specific conditions under which deception in medical and behavioral research can be tolerated. An approach based on a consideration of the "Ethical Principles of Psychologists and Code of Conduct," one of the few writings on this topic, would satisfy the needs of both parties. It takes the form of a requirement that subjects be informed of the use of deception before enrolling in a deceptive study. This "second order consent" approach to acceptable deception represents our best chance for reconciling respect for subjects with the occasional scientific need for deceptive research.

  18. Simple, Efficient Estimators of Treatment Effects in Randomized Trials Using Generalized Linear Models to Leverage Baseline Variables

    Science.gov (United States)

    Rosenblum, Michael; van der Laan, Mark J.

    2010-01-01

    Models, such as logistic regression and Poisson regression models, are often used to estimate treatment effects in randomized trials. These models leverage information in variables collected before randomization, in order to obtain more precise estimates of treatment effects. However, there is the danger that model misspecification will lead to bias. We show that certain easy to compute, model-based estimators are asymptotically unbiased even when the working model used is arbitrarily misspecified. Furthermore, these estimators are locally efficient. As a special case of our main result, we consider a simple Poisson working model containing only main terms; in this case, we prove the maximum likelihood estimate of the coefficient corresponding to the treatment variable is an asymptotically unbiased estimator of the marginal log rate ratio, even when the working model is arbitrarily misspecified. This is the log-linear analog of ANCOVA for linear models. Our results demonstrate one application of targeted maximum likelihood estimation. PMID:20628636

  19. Simple, efficient estimators of treatment effects in randomized trials using generalized linear models to leverage baseline variables.

    Science.gov (United States)

    Rosenblum, Michael; van der Laan, Mark J

    2010-04-01

    Models, such as logistic regression and Poisson regression models, are often used to estimate treatment effects in randomized trials. These models leverage information in variables collected before randomization, in order to obtain more precise estimates of treatment effects. However, there is the danger that model misspecification will lead to bias. We show that certain easy to compute, model-based estimators are asymptotically unbiased even when the working model used is arbitrarily misspecified. Furthermore, these estimators are locally efficient. As a special case of our main result, we consider a simple Poisson working model containing only main terms; in this case, we prove the maximum likelihood estimate of the coefficient corresponding to the treatment variable is an asymptotically unbiased estimator of the marginal log rate ratio, even when the working model is arbitrarily misspecified. This is the log-linear analog of ANCOVA for linear models. Our results demonstrate one application of targeted maximum likelihood estimation.

  20. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  1. The effect of Linkedin on deception in resumes.

    Science.gov (United States)

    Guillory, Jamie; Hancock, Jeffrey T

    2012-03-01

    This study explores how Linkedin shapes patterns of deception in resumes. The general self-presentation goal to appear favorably to others motivates deception when one's true characteristics are inconsistent with their desired impression. Because Linkedin makes resume claims public, deception patterns should be altered relative to traditional resumes. Participants (n=119) in a between-subjects experiment created resumes in one of three resume settings: a traditional (offline) resume, private Linkedin profiles, or publicly available Linkedin profiles. Findings suggest that the public nature of Linkedin resume claims affected the kinds of deception used to create positive impressions, but did not affect the overall frequency of deception. Compared with traditional resumes, Linkedin resumes were less deceptive about the kinds of information that count most to employers, namely an applicant's prior work experience and responsibilities, but more deceptive about interests and hobbies. The results stand in contrast to assumptions that Internet-based communication is more deceptive than traditional formats, and suggests that a framework that considers deception as a resource for self-presentation can account for the findings.

  2. Random blebbing motion: A simple model linking cell structural properties to migration characteristics

    Science.gov (United States)

    Woolley, Thomas E.; Gaffney, Eamonn A.; Goriely, Alain

    2017-07-01

    If the plasma membrane of a cell is able to delaminate locally from its actin cortex, a cellular bleb can be produced. Blebs are pressure-driven protrusions, which are noteworthy for their ability to produce cellular motion. Starting from a general continuum mechanics description, we restrict ourselves to considering cell and bleb shapes that maintain approximately spherical forms. From this assumption, we obtain a tractable algebraic system for bleb formation. By including cell-substrate adhesions, we can model blebbing cell motility. Further, by considering mechanically isolated blebbing events, which are randomly distributed over the cell, we can derive equations linking the macroscopic migration characteristics to the microscopic structural parameters of the cell. This multiscale modeling framework is then used to provide parameter estimates, which are in agreement with current experimental data. In summary, the construction of the mathematical model provides testable relationships between the bleb size and cell motility.

  3. Random blebbing motion: A simple model linking cell structural properties to migration characteristics.

    Science.gov (United States)

    Woolley, Thomas E; Gaffney, Eamonn A; Goriely, Alain

    2017-07-01

    If the plasma membrane of a cell is able to delaminate locally from its actin cortex, a cellular bleb can be produced. Blebs are pressure-driven protrusions, which are noteworthy for their ability to produce cellular motion. Starting from a general continuum mechanics description, we restrict ourselves to considering cell and bleb shapes that maintain approximately spherical forms. From this assumption, we obtain a tractable algebraic system for bleb formation. By including cell-substrate adhesions, we can model blebbing cell motility. Further, by considering mechanically isolated blebbing events, which are randomly distributed over the cell, we can derive equations linking the macroscopic migration characteristics to the microscopic structural parameters of the cell. This multiscale modeling framework is then used to provide parameter estimates, which are in agreement with current experimental data. In summary, the construction of the mathematical model provides testable relationships between the bleb size and cell motility.

  4. Evaluation of a Class of Simple and Effective Uncertainty Methods for Sparse Samples of Random Variables and Functions

    Energy Technology Data Exchange (ETDEWEB)

    Romero, Vicente [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bonney, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schroeder, Benjamin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Weirs, V. Gregory [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    When very few samples of a random quantity are available from a source distribution of unknown shape, it is usually not possible to accurately infer the exact distribution from which the data samples come. Under-estimation of important quantities such as response variance and failure probabilities can result. For many engineering purposes, including design and risk analysis, we attempt to avoid under-estimation with a strategy to conservatively estimate (bound) these types of quantities -- without being overly conservative -- when only a few samples of a random quantity are available from model predictions or replicate experiments. This report examines a class of related sparse-data uncertainty representation and inference approaches that are relatively simple, inexpensive, and effective. Tradeoffs between the methods' conservatism, reliability, and risk versus number of data samples (cost) are quantified with multi-attribute metrics use d to assess method performance for conservative estimation of two representative quantities: central 95% of response; and 10-4 probability of exceeding a response threshold in a tail of the distribution. Each method's performance is characterized with 10,000 random trials on a large number of diverse and challenging distributions. The best method and number of samples to use in a given circumstance depends on the uncertainty quantity to be estimated, the PDF character, and the desired reliability of bounding the true value. On the basis of this large data base and study, a strategy is proposed for selecting the method and number of samples for attaining reasonable credibility levels in bounding these types of quantities when sparse samples of random variables or functions are available from experiments or simulations.

  5. 14 CFR 399.81 - Unrealistic or deceptive scheduling.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unrealistic or deceptive scheduling. 399.81... Unrealistic or deceptive scheduling. (a) It is the policy of the Board to consider unrealistic scheduling of... to the advertising of scheduled performance, it is the policy of the Board to regard as an unfair or...

  6. Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated?

    Directory of Open Access Journals (Sweden)

    Sabine Ströfer

    Full Text Available Can deceitful intentions be discriminated from truthful ones? Previous work consistently demonstrated that deceiving others is accompanied by nervousness/stress and cognitive load. Both are related to increased sympathetic nervous system (SNS activity. We hypothesized that SNS activity already rises during intentions to lie and, consequently, cues to deception can be detected before stating an actual lie. In two experiments, controlling for prospective memory, we monitored SNS activity during lying, truth telling, and truth telling with the aim of lying at a later instance. Electrodermal activity (EDA was used as an indicator of SNS. EDA was highest during lying, and compared to the truth condition, EDA was also raised during the intention to deceive. Moreover, the switch from truth telling toward lying in the intention condition evoked higher EDA than switching toward non-deception related tasks in the lie or truth condition. These results provide first empirical evidence that increased SNS activity related to deception can be monitored before a lie is stated. This implies that cues to deception are already present during the mere intention to lie.

  7. A randomized controlled clinical trial evaluating quality of life when using a simple acupressure protocol in women with primary dysmenorrhea.

    Science.gov (United States)

    Bazarganipour, Fatemeh; Taghavi, Seyed-Abdolvahab; Allan, Helen; Hosseini, Nazafarin; Khosravi, Ahmad; Asadi, Rahimeh; Salari, Shohreh; Dehghani, Raziyeh; Jamshidi, Zahra; Rezaei, Marziyeh; Saberian, Mansoreh; Javedan, Fatemeh; Salari, Zahra; Miri, Fahimeh

    2017-10-01

    To evaluate a simple acupressure protocol in LIV3 and LI4 acupoints in women with primary dysmenorrhea. This paper reports a randomized, single blinded clinical trial. 90 young women with dysmenorrhea were recruited to three groups to receive 20min acupressure every day in either LIV3 or LI4, or placebo points. Acupressure was timed five days before menstruation for three successive menstrual cycles. On menstruation, each participant completed the Wong Baker faces pain scale, and the quality of life short form -12 (QOL SF-12). Intensity and duration of pain between the three groups in the second and third cycles during the intervention (pdysmenorrhea, and improve the QOL. Registration ID in IRCT: IRCT2016052428038N1. Copyright © 2017. Published by Elsevier Ltd.

  8. Simple CPR: A randomized, controlled trial of video self-instructional cardiopulmonary resuscitation training in an African American church congregation.

    Science.gov (United States)

    Todd, K H; Heron, S L; Thompson, M; Dennis, R; O'Connor, J; Kellermann, A L

    1999-12-01

    Despite the proven efficacy of cardiopulmonary resuscitation (CPR), only a small fraction of the population knows how to perform it. As a result, rates of bystander CPR and rates of survival from cardiac arrest are low. Bystander CPR is particularly uncommon in the African American community. Successful development of a simplified approach to CPR training could boost rates of bystander CPR and save lives. We conducted the following randomized, controlled study to determine whether video self-instruction (VSI) in CPR results in comparable or better performance than traditional CPR training. This randomized, controlled trial was conducted among congregational volunteers in an African American church in Atlanta, GA. Subjects were randomly assigned to receive either 34 minutes of VSI or the 4-hour American Heart Association "Heartsaver" CPR course. Two months after training, blinded observers used explicit criteria to assess CPR performance in a simulated cardiac arrest setting. A recording manikin was used to measure ventilation and chest compression characteristics. Participants also completed a written test of CPR-related knowledge and attitudes. VSI trainees displayed a comparable level of performance to that achieved by traditional trainees. Observers scored 40% of VSI trainees competent or better in performing CPR, compared with only 16% of traditional trainees (absolute difference 24%, 95% confidence interval 8% to 40%). Data from the recording manikin confirmed these observations. VSI trainees and traditional trainees achieved comparable scores on tests of CPR-related knowledge and attitudes. Thirty-four minutes of VSI can produce CPR of comparable quality to that achieved by traditional training methods. VSI provides a simple, quick, consistent, and inexpensive alternative to traditional CPR instruction, and may be used to extend CPR training to historically underserved populations.

  9. Effects of deception in social networks.

    Science.gov (United States)

    Iñiguez, Gerardo; Govezensky, Tzipe; Dunbar, Robin; Kaski, Kimmo; Barrio, Rafael A

    2014-09-07

    Honesty plays a crucial role in any situation where organisms exchange information or resources. Dishonesty can thus be expected to have damaging effects on social coherence if agents cannot trust the information or goods they receive. However, a distinction is often drawn between prosocial lies ('white' lies) and antisocial lying (i.e. deception for personal gain), with the former being considered much less destructive than the latter. We use an agent-based model to show that antisocial lying causes social networks to become increasingly fragmented. Antisocial dishonesty thus places strong constraints on the size and cohesion of social communities, providing a major hurdle that organisms have to overcome (e.g. by evolving counter-deception strategies) in order to evolve large, socially cohesive communities. In contrast, white lies can prove to be beneficial in smoothing the flow of interactions and facilitating a larger, more integrated network. Our results demonstrate that these group-level effects can arise as emergent properties of interactions at the dyadic level. The balance between prosocial and antisocial lies may set constraints on the structure of social networks, and hence the shape of society as a whole. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  10. The biology of deception: emotion and morphine.

    Science.gov (United States)

    Stefano, G B; Fricchione, G L

    1995-01-01

    The biology of deception suggests that denial-like processes are at the core of the cognitive coping. In this regard, with cognitive ability, one associates or assumes that this process occurs by way of a 'rational' mind. Such a detailed cognitive process as being rational would also lead, counter intuitively, to inactivity and or major delays in conclusion reaching. Thus, our perceived rationality may also be a deceptive behavioral response. Of equal noteworthyness, man is also 'emotional'. We surmise that emotion represents the pre-cognitive short-cut to overcome this potential for excessive rationality. In this light, we may explain certain psychiatric disorders such as obsessive-compulsive behavior as emotional extremes dealing with cognitive habits used to bind anxiety operating most probably at the pre-cognitive level. Given recent discoveries in neuroimmunology and an understanding of naturally occurring morphine as both an immune and neurological down-regulatory substance we hypothesize that abnormalities associated with emotional extremes may be due, in part, to morphinergic imbalances.

  11. The slow decay and quick revival of self-deception

    Science.gov (United States)

    Chance, Zoë; Gino, Francesca; Norton, Michael I.; Ariely, Dan

    2015-01-01

    People demonstrate an impressive ability to self-deceive, distorting misbehavior to reflect positively on themselves—for example, by cheating on a test and believing that their inflated performance reflects their true ability. But what happens to self-deception when self-deceivers must face reality, such as when taking another test on which they cannot cheat? We find that self-deception diminishes over time only when self-deceivers are repeatedly confronted with evidence of their true ability (Study 1); this learning, however, fails to make them less susceptible to future self-deception (Study 2). PMID:26347666

  12. The Slow Decay and Quick Revival of Self-Deception

    Directory of Open Access Journals (Sweden)

    Zoe eChance

    2015-08-01

    Full Text Available People demonstrate an impressive ability to self-deceive, distorting misbehavior to reflect positively on themselves—for example, by cheating on a test and believing that their inflated performance reflects their true ability. But what happens to self-deception when self-deceivers must face reality, such as when taking another test on which they cannot cheat? We find that self-deception diminishes over time only when self-deceivers are repeatedly confronted with evidence of their true ability (Study 1; this learning, however, fails to make them less susceptible to future self-deception (Study 2.

  13. Multitrait, Random Regression, or Simple Repeatability Model in High-Throughput Phenotyping Data Improve Genomic Prediction for Wheat Grain Yield.

    Science.gov (United States)

    Sun, Jin; Rutkoski, Jessica E; Poland, Jesse A; Crossa, José; Jannink, Jean-Luc; Sorrells, Mark E

    2017-07-01

    High-throughput phenotyping (HTP) platforms can be used to measure traits that are genetically correlated with wheat ( L.) grain yield across time. Incorporating such secondary traits in the multivariate pedigree and genomic prediction models would be desirable to improve indirect selection for grain yield. In this study, we evaluated three statistical models, simple repeatability (SR), multitrait (MT), and random regression (RR), for the longitudinal data of secondary traits and compared the impact of the proposed models for secondary traits on their predictive abilities for grain yield. Grain yield and secondary traits, canopy temperature (CT) and normalized difference vegetation index (NDVI), were collected in five diverse environments for 557 wheat lines with available pedigree and genomic information. A two-stage analysis was applied for pedigree and genomic selection (GS). First, secondary traits were fitted by SR, MT, or RR models, separately, within each environment. Then, best linear unbiased predictions (BLUPs) of secondary traits from the above models were used in the multivariate prediction models to compare predictive abilities for grain yield. Predictive ability was substantially improved by 70%, on average, from multivariate pedigree and genomic models when including secondary traits in both training and test populations. Additionally, (i) predictive abilities slightly varied for MT, RR, or SR models in this data set, (ii) results indicated that including BLUPs of secondary traits from the MT model was the best in severe drought, and (iii) the RR model was slightly better than SR and MT models under drought environment. Copyright © 2017 Crop Science Society of America.

  14. Estimating Genetic Conformism of Korean Mulberry Cultivars Using Random Amplified Polymorphic DNA and Inter-Simple Sequence Repeat Profiling

    Directory of Open Access Journals (Sweden)

    Sunirmal Sheet

    2018-03-01

    Full Text Available Apart from being fed to silkworms in sericulture, the ecologically important Mulberry plant has been used for traditional medicine in Asian countries as well as in manufacturing wine, food, and beverages. Germplasm analysis among Mulberry cultivars originating from South Korea is crucial in the plant breeding program for cultivar development. Hence, the genetic deviations and relations among 8 Morus alba plants, and one Morus lhou plant, of different cultivars collected from South Korea were investigated using 10 random amplified polymorphic DNA (RAPD and 10 inter-simple sequence repeat (ISSR markers in the present study. The ISSR markers exhibited a higher polymorphism (63.42% among mulberry genotypes in comparison to RAPD markers. Furthermore, the similarity coefficient was estimated for both markers and found to be varying between 0.183 and 0.814 for combined pooled data of ISSR and RAPD. The phenogram drawn using the UPGMA cluster method based on combined pooled data of RAPD and ISSR markers divided the nine mulberry genotypes into two divergent major groups and the two individual independent accessions. The distant relationship between Dae-Saug (SM1 and SangchonJo Sang Saeng (SM5 offers a possibility of utilizing them in mulberry cultivar improvement of Morus species of South Korea.

  15. 14 CFR 257.4 - Unfair and deceptive practice.

    Science.gov (United States)

    2010-01-01

    ... violation of 49 U.S.C. 41712 unless, in conjunction with such holding out or sale, carriers and ticket... Unfair and deceptive practice. The holding out or sale of scheduled passenger air transportation...

  16. 75 FR 23565 - Unfair or Deceptive Acts or Practices; Amendment

    Science.gov (United States)

    2010-05-04

    ... are subsumed within, though not identical to, the protections of the Credit CARD Act and the Board's... protection, Credit, Credit cards, Deception, Intergovernmental relations, Savings associations, Trade... ``Prohibited Consumer Credit Practices'' to avoid duplication and inconsistency with the Credit Card...

  17. Assessment of Psychophysiological Detection of Deception (PDD) Pretest

    National Research Council Canada - National Science Library

    2007-01-01

    The Defense Academy for Credibility Assessment (DACA) Research Division contracted with Battelle to conduct scientific research to determine the relationship between the content of the Psychophysiological Detection of Deception (PDD...

  18. Managing Uncertainity: Soviet Views on Deception, Surprise, and Control

    National Research Council Canada - National Science Library

    Hull, Andrew

    1989-01-01

    .... In the first two cases (deception and surprise), the emphasis is on how the Soviets seek to sow uncertainty in the minds of the enemy and how the Soviets then plan to use that uncertainty to gain military advantage...

  19. The Art of Darkness Deception and Urban Operations

    National Research Council Canada - National Science Library

    Gerwehr, Scott

    2000-01-01

    .... Both the battle on friendly urban terrain and the employment of deception might be fairly characterized as asymmetric strategies, aimed at reducing an opponent's strengths and exposing his weaknesses...

  20. Web Of Deception: Misinformation On The Internet | Chete ...

    African Journals Online (AJOL)

    Web Of Deception: Misinformation On The Internet. ... Parodies/spoofs, malicious misinformation, promotion of false products on commercial sites, ... greatly reduced since most people do not believe every information they read on the internet, ...

  1. Second thoughts about privacy, safety and deception

    Science.gov (United States)

    Sorell, Tom; Draper, Heather

    2017-07-01

    In this paper, we point out some difficulties with interpreting three of five principles formulated at a retreat on robot ethics sponsored by the Arts and Humanities Council and the Engineering and Physical Sciences Research Council. We also attempt to iron out some conflicts between the principles. Some of the difficulties arise from the way that the autonomy of robot users - their capacity to live by their own choices - can be a goal in the design of care robots. We discuss (a) problems for Principle 2 that arise from competing legal and philosophical understandings of privacy; (b) a tension between privacy and safety (Principles 2 and 3) and (c) some scepticism about the application of Principle 4, which addresses robot design that might result in the deception of vulnerable users.

  2. Deception Detection, Transmission, & Modality in Age & Sex

    Directory of Open Access Journals (Sweden)

    Charlotte Dorothy Sweeney

    2014-06-01

    Full Text Available This study is the first to create and use spontaneous (i.e. unrehearsed pro-social lies in an ecological setting. Creation of the stimuli involved fifty-one older adult and forty-four college student senders who lied authentically in that their lies were spontaneous in the service of protecting a research assistant. In the main study, seventy-seven older adult and eighty-four college raters attempted to detect lies in the older adult and college senders in three modalities: audio, visual, and audiovisual. Raters of both age groups were best at detecting lies in the audiovisual and worst in the visual modalities. Overall, college students were better detectors than older adults. There was an age-matching effect for college students but not for older adults. Older adult males were the hardest to detect. The older the adult was the worse the ability to detect deception.

  3. Human Deception Detection from Whole Body Motion Analysis

    Science.gov (United States)

    2015-12-01

    associated with incentivized deception, an initial reward /punishment protocol was designed to apply a level of stakes/significance to the checkpoint...questionnaire asking them about their emotions and deception strategy . Once completed, the participants removed all the markers and changed into their... Sony MiniDV Handycam® Camcorder, Model # DCR-HC38. All camera footage were saved to MiniDV tape and then transferred to a PC for processing. Once

  4. The Makara of Hizballah: Deception in the 2006 Summer War

    Science.gov (United States)

    2007-06-01

    another example of the interaction between information activities. The use of the internet covers over into the realm of computer network operations...the Internet and home computers . Furthermore, the individual can use technology to network with others to counter deceptive acts by an opponent...use of information technologies greatly enhanced their ability to wield deception. Finally, this paper will address the interrelation of various

  5. Measuring cues for stand-off deception detection based on full-body nonverbal features in body-worn cameras

    Science.gov (United States)

    Bouma, Henri; Burghouts, Gertjan; den Hollander, Richard; van der Zee, Sophie; Baan, Jan; ten Hove, Johan-Martijn; van Diepen, Sjaak; van den Haak, Paul; van Rest, Jeroen

    2016-10-01

    Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support. However, psychological research has shown that humans can hardly perform better than random guessing. Deception detection is a multi-disciplinary research area with an interest from different fields, such as psychology and computer science. In the last decade, several developments have helped to improve the accuracy of lie detection (e.g., with a concealed information test, increasing the cognitive load, or measurements with motion capture suits) and relevant cues have been discovered (e.g., eye blinking or fiddling with the fingers). With an increasing presence of mobile phones and bodycams in society, a mobile, stand-off, automatic deception detection methodology based on various cues from the whole body would create new application opportunities. In this paper, we study the feasibility of measuring these visual cues automatically on different parts of the body, laying the groundwork for stand-off deception detection in more flexible and mobile deployable sensors, such as body-worn cameras. We give an extensive overview of recent developments in two communities: in the behavioral-science community the developments that improve deception detection with a special attention to the observed relevant non-verbal cues, and in the computer-vision community the recent methods that are able to measure these cues. The cues are extracted from several body parts: the eyes, the mouth, the head and the fullbody pose. We performed an experiment using several state-of-the-art video-content-analysis (VCA) techniques to assess the quality of robustly measuring these visual cues.

  6. Self-deception as pseudo-rational regulation of belief.

    Science.gov (United States)

    Michel, Christoph; Newen, Albert

    2010-09-01

    Self-deception is a special kind of motivational dominance in belief-formation. We develop criteria which set paradigmatic self-deception apart from related phenomena of auto-manipulation such as pretense and motivational bias. In self-deception rational subjects defend or develop beliefs of high subjective importance in response to strong counter-evidence. Self-deceivers make or keep these beliefs tenable by putting prima-facie rational defense-strategies to work against their established standards of rational evaluation. In paradigmatic self-deception, target-beliefs are made tenable via reorganizations of those belief-sets that relate relevant data to target-beliefs. This manipulation of the evidential value of relevant data goes beyond phenomena of motivated perception of data. In self-deception belief-defense is pseudo-rational. Self-deceivers will typically apply a dual standard of evaluation that remains intransparent to the subject. The developed model of self-deception as pseudo-rational belief-defense is empirically anchored. So, we hope to put forward a promising candidate. Copyright © 2010 Elsevier Inc. All rights reserved.

  7. From Tactical to Strategic Deception Detection: Application of Psychological Synthesis

    Directory of Open Access Journals (Sweden)

    Iain Reid

    2017-03-01

    Full Text Available Deception detection has ubiquitously focussed upon detecting deceit in the individual, whether in national security, forensic or business-related environments. In contrast an understanding of how to identify deception committed by multiple individuals or groups challenging strategic interests has been neglected. In this article - to enhance understanding of practitioners working across security, intelligence and forensic areas - a process of psychological synthesis is advocated. Psychological synthesis incorporates a multitude of approaches reflecting contextual requirements towards deception detection across verbal/linguistic behavior, non-verbal behavior, online interactions and intelligence analysis approaches. These combined with in-depth understanding of individuals’ cultures, personality and manner of presentation can be understood in challenging environments. Juxtaposed to these factors psychological synthesis considers how intelligence, surveillance and evidence may be used in detecting deception and identifying links between individuals engaging in deception and related activities. An illustration of how such an approach may work is provided through a scenario of a terrorist incident and how a tailored deception detection approach may seek to counter such a threat.

  8. A randomized clinical trial comparing hydrocolloid, phenytoin and simple dressings for the treatment of pressure ulcers [ISRCTN33429693

    Directory of Open Access Journals (Sweden)

    Khedmat Hossein

    2004-12-01

    Full Text Available Abstract Background Pressure sores are important and common complications of spinal cord injury. Many preventive and therapeutic approaches have been tried and new trials are evolving. One relatively recent method is application of a hydrocolloid dressing (HD. In this study we compared the therapeutic effects of HD on pressure ulcer healing with two other topical applications, phenytoin cream (PC and simple dressing (SD. Methods Ninety-one stage I and stage II pressure ulcers of 83 paraplegic male victims of the Iran-Iraq war were randomly allocated to three treatment groups. Mean age and weight of the participants were 36.64 ± 6.04 years and 61.12 ± 5.08 kg, respectively. All the patients were managed in long term care units or in their homes for 8 weeks by a team of general practitioners and nurses, and the ulcer status was recorded as "Complete healing", "Partial healing", "Without improvement" and "Worsening". Results Complete healing of ulcers, regardless of location and stage, was better in the HD group than the PC [23/31(74.19% vs 12/30(40%; difference: 34.19%, 95% CI = 10.85–57.52, (P 0.05]. We performed a second analysis considering only one ulcer per patient (i.e. 83 ulcers in 83 patients. This "per patient" analysis showed that complete ulcer healing in the HD group was better than in the PC [20/28(71.4% vs 11/28 (39.3%; difference: 32.1%, 95% CI = 7.4–56.7, (P Conclusion We deduced that HD is the most effective method investigated for treating stage I and II pressure ulcers in young paraplegic men.

  9. Note on an Identity Between Two Unbiased Variance Estimators for the Grand Mean in a Simple Random Effects Model.

    Science.gov (United States)

    Levin, Bruce; Leu, Cheng-Shiun

    2013-01-01

    We demonstrate the algebraic equivalence of two unbiased variance estimators for the sample grand mean in a random sample of subjects from an infinite population where subjects provide repeated observations following a homoscedastic random effects model.

  10. Neural correlates of self-deception and impression-management.

    Science.gov (United States)

    Farrow, Tom F D; Burgess, Jenny; Wilkinson, Iain D; Hunter, Michael D

    2015-01-01

    Self-deception and impression-management comprise two types of deceptive, but generally socially acceptable behaviours, which are common in everyday life as well as being present in a number of psychiatric disorders. We sought to establish and dissociate the 'normal' brain substrates of self-deception and impression-management. Twenty healthy participants underwent fMRI scanning at 3T whilst completing the 'Balanced Inventory of Desirable Responding' test under two conditions: 'fake good', giving the most desirable impression possible and 'fake bad' giving an undesirable impression. Impression-management scores were more malleable to manipulation via 'faking' than self-deception scores. Response times to self-deception questions and 'fake bad' instructions were significantly longer than to impression-management questions and 'fake good' instructions respectively. Self-deception and impression-management manipulation and 'faking bad' were associated with activation of medial prefrontal cortex (mPFC) and left ventrolateral prefrontal cortex (vlPFC). Impression-management manipulation was additionally associated with activation of left dorsolateral prefrontal cortex and left posterior middle temporal gyrus. 'Faking bad' was additionally associated with activation of right vlPFC, left temporo-parietal junction and right cerebellum. There were no supra-threshold activations associated with 'faking good'. Our neuroimaging data suggest that manipulating self-deception and impression-management and more specifically 'faking bad' engages a common network comprising mPFC and left vlPFC. Shorter response times and lack of dissociable neural activations suggests that 'faking good', particularly when it comes to impression-management, may be our most practiced 'default' mode. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Supporting the improvement and management of prescribing for urinary tract infections (SIMPle): protocol for a cluster randomized trial

    Science.gov (United States)

    2013-01-01

    Background The overuse of antimicrobials is recognized as the main selective pressure driving the emergence and spread of antimicrobial resistance in human bacterial pathogens. Urinary tract infections (UTIs) are among the most common infections presented in primary care and empirical antimicrobial treatment is currently recommended. Previous research has identified that a substantial proportion of Irish general practitioners (GPs) prescribe antimicrobials for UTIs that are not in accordance with the Guidelines for Antimicrobial Prescribing in Primary Care in Ireland. The aim of this trial is to design, implement and evaluate the effectiveness of a complex intervention on GP antimicrobial prescribing and adult (18 years of age and over) patients’ antimicrobial consumption when presenting with a suspected UTI. Methods/design The Supporting the Improvement and Management of Prescribing for urinary tract infections (SIMPle) study is a three-armed intervention with practice-level randomization. Adult patients presenting with suspected UTIs in primary care will be included in the study. The intervention integrates components for both GPs and patients. For GPs the intervention includes interactive workshops, audit and feedback reports and automated electronic prompts summarizing recommended first-line antimicrobial treatment and, for one intervention arm, a recommendation to consider delayed antimicrobial treatment. For patients, multimedia applications and information leaflets are included. Thirty practices will be recruited to the study; laboratory data indicate that 2,038 patients will be prescribed an antimicrobial in the study. The primary outcome is a change in prescribing of first-line antimicrobials for UTIs in accordance with the Guidelines for Antimicrobial Prescribing in Primary Care in Ireland. The study will take place over 15 months with a six-month intervention period. Data will be collected through a remote electronic anonymized data-extraction system

  12. NEW APPROACHES IN DECEPTION DETECTION II. ACTIVE INTERVIEWING STRATEGIES AND CONTEXTUAL INFORMATION

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2015-05-01

    Full Text Available Meta-analytical evidence shows that behavioural indicators of deception are scant, poorly diagnostic and inconsistent. This has yielded a shift in deception detection research. Rather than passively scrutinising the communication sender to find tell-tale behavioural indicators of deception, the deception judge needs to (a adopt an active role by using interviewing techniques specifically designed to detect deception, or (b focus on contextual (rather than behavioural deception cues. In the previous paper (Masip & Herrero, 2015a, we reviewed the antecedents of this change in focus, as well as the theoretical grounding of the new approaches. Here we describe specific interviewing strategies for detecting deception, as well as the (still scant research on contextual deception indicia. In doing this, we hope to offer the reader a detailed perspective on the recent developments in this specific area of psychology and law.

  13. Deception Detection in a Computer-Mediated Environment: Gender, Trust, and Training Issues

    National Research Council Canada - National Science Library

    Dziubinski, Monica

    2003-01-01

    .... This research draws on communication and deception literature to develop a conceptual model proposing relationships between deception detection abilities in a computer-mediated environment, gender, trust, and training...

  14. Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence

    OpenAIRE

    Pawlick, Jeffrey; Zhu, Quanyan

    2017-01-01

    Deception plays a critical role in many interactions in communication and network security. Game-theoretic models called "cheap talk signaling games" capture the dynamic and information asymmetric nature of deceptive interactions. But signaling games inherently model undetectable deception. In this paper, we investigate a model of signaling games in which the receiver can detect deception with some probability. This model nests traditional signaling games and complete information Stackelberg ...

  15. Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks.

    Science.gov (United States)

    Li, Yunji; Wu, QingE; Peng, Li

    2018-01-23

    In this paper, a synthesized design of fault-detection filter and fault estimator is considered for a class of discrete-time stochastic systems in the framework of event-triggered transmission scheme subject to unknown disturbances and deception attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring deception attacks. To achieve a fault-detection residual is only sensitive to faults while robust to disturbances, a coordinate transformation approach is exploited. This approach can transform the considered system into two subsystems and the unknown disturbances are removed from one of the subsystems. The gain of fault-detection filter is derived by minimizing an upper bound of filter error covariance. Meanwhile, system faults can be reconstructed by the remote fault estimator. An recursive approach is developed to obtain fault estimator gains as well as guarantee the fault estimator performance. Furthermore, the corresponding event-triggered sensor data transmission scheme is also presented for improving working-life of the wireless sensor node when measurement information are aperiodically transmitted. Finally, a scaled version of an industrial system consisting of local PC, remote estimator and wireless sensor node is used to experimentally evaluate the proposed theoretical results. In particular, a novel fault-alarming strategy is proposed so that the real-time capacity of fault-detection is guaranteed when the event condition is triggered.

  16. Large deviation principle for one-dimensional random walk in dynamic random environment : attractive spin-flips and simple symmetric exclusion

    NARCIS (Netherlands)

    Avena, L.; Hollander, den W.Th.F.; Redig, F.H.J.

    2009-01-01

    Consider a one-dimensional shift-invariant attractive spin-ip system in equilibrium, constituting a dynamic random environment, together with a nearest-neighbor random walk that on occupied sites has a local drift to the right but on vacant sites has a local drift to the left. In [2] we proved a law

  17. Large deviation principle for one-dimensional random walk in dynamic random environment: attractive spin-flips and simple symmetric exclusion

    NARCIS (Netherlands)

    Avena, L.; Hollander, den W.Th.F.; Redig, F.H.J.

    2010-01-01

    Consider a one-dimensional shift-invariant attractive spin-flip system in equilibrium, constituting a dynamic random environment, together with a nearest-neighbor random walk that on occupied sites has a local drift to the right but on vacant sites has a local drift to the left. In previous work we

  18. Action simulation plays a critical role in deceptive action recognition.

    Science.gov (United States)

    Tidoni, Emmanuele; Borgomaneri, Sara; di Pellegrino, Giuseppe; Avenanti, Alessio

    2013-01-09

    The ability to infer deceptive intents from nonverbal behavior is critical for social interactions. By combining single-pulse and repetitive transcranial magnetic stimulation (TMS) in healthy humans, we provide both correlational and causative evidence that action simulation is actively involved in the ability to recognize deceptive body movements. We recorded motor-evoked potentials during a faked-action discrimination (FAD) task: participants watched videos of actors lifting a cube and judged whether the actors were trying to deceive them concerning the real weight of the cube. Seeing faked actions facilitated the observers' motor system more than truthful actions in a body-part-specific manner, suggesting that motor resonance was sensitive to deceptive movements. Furthermore, we found that TMS virtual lesion to the anterior node of the action observation network, namely the left inferior frontal cortex (IFC), reduced perceptual sensitivity in the FAD task. In contrast, no change in FAD task performance was found after virtual lesions to the left temporoparietal junction (control site). Moreover, virtual lesion to the IFC failed to affect performance in a difficulty-matched spatial-control task that did not require processing of spatiotemporal (acceleration) and configurational (limb displacement) features of seen actions, which are critical to detecting deceptive intent in the actions of others. These findings indicate that the human IFC is critical for recognizing deceptive body movements and suggest that FAD relies on the simulation of subtle changes in action kinematics within the motor system.

  19. When deception influences memory: the implication of theory of mind.

    Science.gov (United States)

    El Haj, Mohamad; Antoine, Pascal; Nandrino, Jean Louis

    2017-07-01

    When deceiving, one should remember to whom a falsified story was previously told; otherwise he or she may include inconsistencies, and the deception will probably be discovered. Bearing this in mind, we investigated the potential relationship between deception and the ability to remember to whom a piece of information was previously told (i.e., destination memory). Forty-one adults were given a destination memory task in which they had to decide to whom proverbs had previously been told. They were also given a questionnaire about deception (e.g., "I sometimes tell lies if I have to) and a cognitive theory of mind task in which they had to predict the behaviour of protagonists who hold a mistaken belief about the state of the world. Results showed a positive correlation between deception and destination memory (p theory of mind ability (p theory of mind) results in better processing of the target and consequently better destination memory. By showing the involvement of deception and theory of mind in destination memory, our findings emphasize the memory variations in social and interpersonal interactions.

  20. 75 FR 68560 - Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based Swaps

    Science.gov (United States)

    2010-11-08

    ... 3235-AK77 Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based... fraud, manipulation, and deception in connection with the offer, purchase or sale of any security-based... measured and reasonable means to prevent fraud, manipulation, and deception in connection with security...

  1. Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children

    Science.gov (United States)

    Babkirk, Sarah; Saunders, Lauren V.; Solomon, Beylul; Kessel, Ellen M.; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A.

    2015-01-01

    The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function (EF) and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to…

  2. Deceptive body movements reverse spatial cueing in soccer.

    Directory of Open Access Journals (Sweden)

    Michael J Wright

    Full Text Available The purpose of the experiments was to analyse the spatial cueing effects of the movements of soccer players executing normal and deceptive (step-over turns with the ball. Stimuli comprised normal resolution or point-light video clips of soccer players dribbling a football towards the observer then turning right or left with the ball. Clips were curtailed before or on the turn (-160, -80, 0 or +80 ms to examine the time course of direction prediction and spatial cueing effects. Participants were divided into higher-skilled (HS and lower-skilled (LS groups according to soccer experience. In experiment 1, accuracy on full video clips was higher than on point-light but results followed the same overall pattern. Both HS and LS groups correctly identified direction on normal moves at all occlusion levels. For deceptive moves, LS participants were significantly worse than chance and HS participants were somewhat more accurate but nevertheless substantially impaired. In experiment 2, point-light clips were used to cue a lateral target. HS and LS groups showed faster reaction times to targets that were congruent with the direction of normal turns, and to targets incongruent with the direction of deceptive turns. The reversed cueing by deceptive moves coincided with earlier kinematic events than cueing by normal moves. It is concluded that the body kinematics of soccer players generate spatial cueing effects when viewed from an opponent's perspective. This could create a reaction time advantage when anticipating the direction of a normal move. A deceptive move is designed to turn this cueing advantage into a disadvantage. Acting on the basis of advance information, the presence of deceptive moves primes responses in the wrong direction, which may be only partly mitigated by delaying a response until veridical cues emerge.

  3. Deception in research: distinctions and solutions from the perspective of utilitarianism.

    Science.gov (United States)

    Pittenger, David J

    2002-01-01

    The use of deception in psychological research continues to be a controversial topic. Using Rawls's explication of utilitarianism, I attempt to demonstrate how professional organizations, such as the American Psychological Association, can provide more specific standards that determine the permissibility of deception in research. Specifically, I argue that researchers should examine the costs and benefits of creating and applying specific rules governing deception. To that end, I offer 3 recommendations. First, that researchers who use deception provide detailed accounts of the procedures they used to minimize the harm created by deception in their research reports. Second, that the American Psychological Association offer a definition of deception that describes techniques commonly used in research. Finally, I recommend that the informed consent procedure be revised to indicate that the researcher may use deception as part of the study.

  4. "Playing Hooky" Health Messages: Apprehension, Impression Management, and Deception.

    Science.gov (United States)

    Barrett, Ashley; Murphy, Melissa; Blackburn, Kate

    2018-03-01

    This study investigates playing hooky in higher education classrooms and associates this behavior with students' communicative dispositions, instructor perceptions, and language use. We define "playing hooky" as students skipping class and explaining their absence to their instructor with deceptive health messages. The purpose of Study 1, an online survey (N = 177), is to further understand the characteristics of students who engage in this type of deceptive health communication. Study 1 measures communication apprehension and perceived instructor credibility in students who had played hooky from class and those who had not. Findings reveal that students who communicate playing hooky health messages (a) reported more instructor communication apprehension and (b) perceived the instructors with whom they had played hooky to be less credible. Study 2 uses facework theory and MEH analysis to reveal the different linguistic strategies students use to communicate (a) truthful health messages (N = 165) and (b) deceptive heath messages (N = 82) to their instructor following an absence. Results demonstrate that students' facework strategies are more geared toward saving instructors' negative face in the deceptive health message condition. Implications of both studies are offered.

  5. Group Performance in Military Scenarios Under Deceptive Conditions

    National Research Council Canada - National Science Library

    Hass, Michael

    2004-01-01

    .... The analysis of the post-game surveys showed support for participants in games using a face-to-face communication method to have lower perceptions of deception and task difficulty when compared to games using real-time plain text chat.

  6. A Cognitive Model for Exposition of Human Deception and Counterdeception

    Science.gov (United States)

    1987-10-01

    sampled from 160 documents representing over 40 disciplines. The areas of magic, mentalism, paranormal phenomena, and confidence games are particularly...Skeptical Inquirer, the (formerly the Zetetic) ( Paranormal phenomena); P.O. Box 29, Kensington Station, Buffalo, NY. . . Military Deception...happening, is perceived as unlikely (and perhaps paranormal ) because of a failure to realize the very large . number of opportunities for matches. A

  7. Cognitive Biases and Nonverbal Cue Availability in Detecting Deception

    Science.gov (United States)

    Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E.

    2008-01-01

    In potentially deceptive situations, people rely on mental shortcuts to help process information. These heuristic judgments are often biased and result in inaccurate assessments of sender veracity. Four such biases--truth bias, visual bias, demeanor bias, and expectancy violation bias--were examined in a judgment experiment that varied nonverbal…

  8. Deception studies manipulating centrally acting performance modifiers: a review.

    Science.gov (United States)

    Williams, Emily L; Jones, Hollie S; Sparks, Sandy; Marchant, David C; Micklewright, Dominic; McNaughton, Lars R

    2014-07-01

    Athletes anticipatorily set and continuously adjust pacing strategies before and during events to produce optimal performance. Self-regulation ensures maximal effort is exerted in correspondence with the end point of exercise, while preventing physiological changes that are detrimental and disruptive to homeostatic control. The integration of feedforward and feedback information, together with the proposed brain's performance modifiers is said to be fundamental to this anticipatory and continuous regulation of exercise. The manipulation of central, regulatory internal and external stimuli has been a key focus within deception research, attempting to influence the self-regulation of exercise and induce improvements in performance. Methods of manipulating performance modifiers such as unknown task end point, deceived duration or intensity feedback, self-belief, or previous experience create a challenge within research, as although they contextualize theoretical propositions, there are few ecological and practical approaches which integrate theory with practice. In addition, the different methods and measures demonstrated in manipulation studies have produced inconsistent results. This review examines and critically evaluates the current methods of how specific centrally controlled performance modifiers have been manipulated, within previous deception studies. From the 31 studies reviewed, 10 reported positive effects on performance, encouraging future investigations to explore the mechanisms responsible for influencing pacing and consequently how deceptive approaches can further facilitate performance. The review acts to discuss the use of expectation manipulation not only to examine which methods of deception are successful in facilitating performance but also to understand further the key components used in the regulation of exercise and performance.

  9. The neural basis of deception in strategic interactions.

    Science.gov (United States)

    Volz, Kirsten G; Vogeley, Kai; Tittgemeyer, Marc; von Cramon, D Yves; Sutter, Matthias

    2015-01-01

    Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ), the dorsal anterior cingulate cortex (ACC), the (pre)cuneus (CUN), and the anterior frontal gyrus (aFG) when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth-when the sender does not expect the receiver to believe her (true) message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender's veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not.

  10. The Neural Basis of Deception in Strategic Interactions

    Directory of Open Access Journals (Sweden)

    Kirsten G Volz

    2015-02-01

    Full Text Available Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ, the dorsal anterior cingulate cortex (ACC, the (precuneus (CUN, and the anterior frontal gyrus (aFG when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth—when the sender does not expect the receiver to believe her (true message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender’s veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not.

  11. Action Simulation Plays a Critical Role in Deceptive Action Recognition

    NARCIS (Netherlands)

    Tidoni, Emmanuele; Borgomaneri, Sara; Di Pellegrino, Giuseppe; Avenanti, Alessio

    2013-01-01

    The ability to infer deceptive intents from nonverbal behavior is critical for social interactions. By combining single-pulse and repetitive transcranial magnetic stimulation (TMS) in healthy humans, we provide both correlational and causative evidence that action simulation is actively involved in

  12. Plagiarism and Source Deception Detection Based on Syntax Analysis

    Directory of Open Access Journals (Sweden)

    Eman Salih Al-Shamery

    2017-02-01

    Full Text Available In this research, the shingle algorithm with Jaccard method are employed as a new approach to detect deception in sources in addition to detect plagiarism . Source deception occurs as a result of taking a particular text from a source and relative it to another source, while plagiarism occurs in the documents as a result of taking part or all of the text belong to another research, this approach is based on Shingle algorithm with Jaccard coefficient , Shingling is an efficient way to compare the set of shingle in the files that contain text which are used as a feature to measure the syntactic similarity of the documents and it will work with Jaccard coefficient that measures similarity between sample sets . In this proposed system, text will be checked whether it contains syntax plagiarism or not and gives a percentage of similarity with other documents , As well as research sources will be checked to detect deception in source , by matching it with available sources from Turnitin report of the same research by using shingle algorithm with Jaccard coefficient. The motivations of this work is to discovery of literary thefts that occur on the researches , especially what students are doing in their researches , also discover the deception that occurs in the sources.

  13. Games Con Men Play: The Semiosis of Deceptive Interaction.

    Science.gov (United States)

    Hankiss, Agnes

    1980-01-01

    Analyzes some of the most frequent deceptive interactions as rendered through case histories of male con artists and their victims taken from police records. Discusses the recurrent elements in both the con-games strategies and victims' way of interpreting those strategies. (JMF)

  14. Mechanisms and evolution of deceptive pollination in orchids

    Czech Academy of Sciences Publication Activity Database

    Jersáková, Jana; Johnson, S.D.; Kindlmann, Pavel

    2006-01-01

    Roč. 81, - (2006), s. 219-235 ISSN 1464-7931 Institutional research plan: CEZ:AV0Z60870520 Keywords : cross-pollination * floral deception * geitonogamy * inbreeding * nectar * Orchidaceae * pollinaria * reward * self-pollination Subject RIV: EF - Botanics Impact factor: 5.565, year: 2006

  15. Deception in experiments: revisiting the arguments in its defense

    Czech Academy of Sciences Publication Activity Database

    Hertwig, R.; Ortmann, Andreas

    2008-01-01

    Roč. 18, č. 1 (2008), s. 59-92 ISSN 1050-8422 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : deception * experimental control * research ethics Subject RIV: AH - Economics Impact factor: 0.512, year: 2008

  16. An Examination of Behavioral Responses to Stereotypical Deceptive Displays.

    Science.gov (United States)

    Huddleston, Bill M.

    A study investigated whether receivers who detect senders behaving deceitfully will automatically become more resistent to the message being presented. By developing predictions derived from the Elaboration Likelihood Model (ELM), the study hypothesized that only noninvolved receivers would respond negatively to deceptive nonverbal cues in a…

  17. Historic hydrovolcanism at Deception Island (Antarctica): implications for eruption hazards

    Science.gov (United States)

    Pedrazzi, Dario; Németh, Károly; Geyer, Adelina; Álvarez-Valero, Antonio M.; Aguirre-Díaz, Gerardo; Bartolini, Stefania

    2018-01-01

    Deception Island (Antarctica) is the southernmost island of the South Shetland Archipelago in the South Atlantic. Volcanic activity since the eighteenth century, along with the latest volcanic unrest episodes in the twentieth and twenty-first centuries, demonstrates that the volcanic system is still active and that future eruptions are likely. Despite its remote location, the South Shetland Islands are an important touristic destination during the austral summer. In addition, they host several research stations and three summer field camps. Deception Island is characterised by a Quaternary caldera system with a post-caldera succession and is considered to be part of an active, dispersed (monogenetic), volcanic field. Historical post-caldera volcanism on Deception Island involves monogenetic small-volume (VEI 2-3) eruptions such forming cones and various types of hydrovolcanic edifices. The scientific stations on the island were destroyed, or severely damaged, during the eruptions in 1967, 1969, and 1970 mainly due to explosive activity triggered by the interaction of rising (or erupting) magma with surface water, shallow groundwater, and ice. We conducted a detailed revision (field petrology and geochemistry) of the historical hydrovolcanic post-caldera eruptions of Deception Island with the aim to understand the dynamics of magma-water interaction, as well as characterise the most likely eruptive scenarios from future eruptions. We specifically focused on the Crimson Hill (estimated age between 1825 and 1829), and Kroner Lake (estimated age between 1829 and 1912) eruptions and 1967, 1969, and 1970 events by describing the eruption mechanisms related to the island's hydrovolcanic activity. Data suggest that the main hazards posed by volcanism on the island are due to fallout, ballistic blocks and bombs, and subordinate, dilute PDCs. In addition, Deception Island can be divided into five areas of expected activity due to magma-water interaction, providing additional

  18. Spontaneous innovation for future deception in a male chimpanzee.

    Directory of Open Access Journals (Sweden)

    Mathias Osvath

    Full Text Available BACKGROUND: The ability to invent means to deceive others, where the deception lies in the perceptually or contextually detached future, appears to require the coordination of sophisticated cognitive skills toward a single goal. Meanwhile innovation for a current situation has been observed in a wide range of species. Planning, on the one hand, and the social cognition required for deception on the other, have been linked to one another, both from a co-evolutionary and a neuroanatomical perspective. Innovation and deception have also been suggested to be connected in their nature of relying on novelty. METHODOLOGY/PRINCIPAL FINDINGS: We report on systematic observations suggesting innovation for future deception by a captive male chimpanzee (Pan troglodytes. As an extension of previously described behaviour--caching projectiles for later throwing at zoo visitors--the chimpanzee, again in advance, manufactured concealments from hay, as well as used naturally occurring concealments. All were placed near the visitors' observation area, allowing the chimpanzee to make throws before the crowd could back off. We observed what was likely the first instance of this innovation. Further observations showed that the creation of future-oriented concealments became the significantly preferred strategy. What is more, the chimpanzee appeared consistently to combine two deceptive strategies: hiding projectiles and inhibiting dominance display behaviour. CONCLUSIONS/SIGNIFICANCE: The findings suggest that chimpanzees can represent the future behaviours of others while those others are not present, as well as take actions in the current situation towards such potential future behaviours. Importantly, the behaviour of the chimpanzee produced a future event, rather than merely prepared for an event that had been reliably re-occurring in the past. These findings might indicate that the chimpanzee recombined episodic memories in perceptual simulations.

  19. Spontaneous innovation for future deception in a male chimpanzee.

    Science.gov (United States)

    Osvath, Mathias; Karvonen, Elin

    2012-01-01

    The ability to invent means to deceive others, where the deception lies in the perceptually or contextually detached future, appears to require the coordination of sophisticated cognitive skills toward a single goal. Meanwhile innovation for a current situation has been observed in a wide range of species. Planning, on the one hand, and the social cognition required for deception on the other, have been linked to one another, both from a co-evolutionary and a neuroanatomical perspective. Innovation and deception have also been suggested to be connected in their nature of relying on novelty. We report on systematic observations suggesting innovation for future deception by a captive male chimpanzee (Pan troglodytes). As an extension of previously described behaviour--caching projectiles for later throwing at zoo visitors--the chimpanzee, again in advance, manufactured concealments from hay, as well as used naturally occurring concealments. All were placed near the visitors' observation area, allowing the chimpanzee to make throws before the crowd could back off. We observed what was likely the first instance of this innovation. Further observations showed that the creation of future-oriented concealments became the significantly preferred strategy. What is more, the chimpanzee appeared consistently to combine two deceptive strategies: hiding projectiles and inhibiting dominance display behaviour. The findings suggest that chimpanzees can represent the future behaviours of others while those others are not present, as well as take actions in the current situation towards such potential future behaviours. Importantly, the behaviour of the chimpanzee produced a future event, rather than merely prepared for an event that had been reliably re-occurring in the past. These findings might indicate that the chimpanzee recombined episodic memories in perceptual simulations.

  20. A Prospective Randomized Study on Operative Treatment for Simple Distal Tibial Fractures-Minimally Invasive Plate Osteosynthesis Versus Minimal Open Reduction and Internal Fixation.

    Science.gov (United States)

    Kim, Ji Wan; Kim, Hyun Uk; Oh, Chang-Wug; Kim, Joon-Woo; Park, Ki Chul

    2018-01-01

    To compare the radiologic and clinical results of minimally invasive plate osteosynthesis (MIPO) and minimal open reduction and internal fixation (ORIF) for simple distal tibial fractures. Randomized prospective study. Three level 1 trauma centers. Fifty-eight patients with simple and distal tibial fractures were randomized into a MIPO group (treatment with MIPO; n = 29) or a minimal group (treatment with minimal ORIF; n = 29). These numbers were designed to define the rate of soft tissue complication; therefore, validation of superiority in union time or determination of differences in rates of delayed union was limited in this study. Simple distal tibial fractures treated with MIPO or minimal ORIF. The clinical outcome measurements included operative time, radiation exposure time, and soft tissue complications. To evaluate a patient's function, the American Orthopedic Foot and Ankle Society ankle score (AOFAS) was used. Radiologic measurements included fracture alignment, delayed union, and union time. All patients acquired bone union without any secondary intervention. The mean union time was 17.4 weeks and 16.3 weeks in the MIPO and minimal groups, respectively. There was 1 case of delayed union and 1 case of superficial infection in each group. The radiation exposure time was shorter in the minimal group than in the MIPO group. Coronal angulation showed a difference between both groups. The American Orthopedic Foot and Ankle Society ankle scores were 86.0 and 86.7 in the MIPO and minimal groups, respectively. Minimal ORIF resulted in similar outcomes, with no increased rate of soft tissue problems compared to MIPO. Both MIPO and minimal ORIF have high union rates and good functional outcomes for simple distal tibial fractures. Minimal ORIF did not result in increased rates of infection and wound dehiscence. Therapeutic Level II. See Instructions for Authors for a complete description of levels of evidence.

  1. Use of electronic healthcare records in large-scale simple randomized trials at the point of care for the documentation of value-based medicine.

    Science.gov (United States)

    van Staa, T-P; Klungel, O; Smeeth, L

    2014-06-01

    A solid foundation of evidence of the effects of an intervention is a prerequisite of evidence-based medicine. The best source of such evidence is considered to be randomized trials, which are able to avoid confounding. However, they may not always estimate effectiveness in clinical practice. Databases that collate anonymized electronic health records (EHRs) from different clinical centres have been widely used for many years in observational studies. Randomized point-of-care trials have been initiated recently to recruit and follow patients using the data from EHR databases. In this review, we describe how EHR databases can be used for conducting large-scale simple trials and discuss the advantages and disadvantages of their use. © 2014 The Association for the Publication of the Journal of Internal Medicine.

  2. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Science.gov (United States)

    2010-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and...; deceptive use of a color additive for which a regulation has issued. The Commissioner shall refuse to issue... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...

  3. Exact two-point resistance, and the simple random walk on the complete graph minus N edges

    International Nuclear Information System (INIS)

    Chair, Noureddine

    2012-01-01

    An analytical approach is developed to obtain the exact expressions for the two-point resistance and the total effective resistance of the complete graph minus N edges of the opposite vertices. These expressions are written in terms of certain numbers that we introduce, which we call the Bejaia and the Pisa numbers; these numbers are the natural generalizations of the bisected Fibonacci and Lucas numbers. The correspondence between random walks and the resistor networks is then used to obtain the exact expressions for the first passage and mean first passage times on this graph. - Highlights: ► We obtain exact formulas for the two-point resistance of the complete graph minus N edges. ► We obtain also the total effective resistance of this graph. ► We modified Schwatt’s formula on trigonometrical power sum to suit our computations. ► We introduced the generalized bisected Fibonacci and Lucas numbers: the Bejaia and the Pisa numbers. ► The first passage and mean first passage times of the random walks have exact expressions.

  4. Exact two-point resistance, and the simple random walk on the complete graph minus N edges

    Energy Technology Data Exchange (ETDEWEB)

    Chair, Noureddine, E-mail: n.chair@ju.edu.jo

    2012-12-15

    An analytical approach is developed to obtain the exact expressions for the two-point resistance and the total effective resistance of the complete graph minus N edges of the opposite vertices. These expressions are written in terms of certain numbers that we introduce, which we call the Bejaia and the Pisa numbers; these numbers are the natural generalizations of the bisected Fibonacci and Lucas numbers. The correspondence between random walks and the resistor networks is then used to obtain the exact expressions for the first passage and mean first passage times on this graph. - Highlights: Black-Right-Pointing-Pointer We obtain exact formulas for the two-point resistance of the complete graph minus N edges. Black-Right-Pointing-Pointer We obtain also the total effective resistance of this graph. Black-Right-Pointing-Pointer We modified Schwatt's formula on trigonometrical power sum to suit our computations. Black-Right-Pointing-Pointer We introduced the generalized bisected Fibonacci and Lucas numbers: the Bejaia and the Pisa numbers. Black-Right-Pointing-Pointer The first passage and mean first passage times of the random walks have exact expressions.

  5. A simple strategy for subcloning and amplifying random multimegabase subchromosomal acentric DNA fragments as double minute chromosomes

    International Nuclear Information System (INIS)

    Hahn, P.J.; Giddings, L.; Lane, M.J.

    1989-01-01

    Restriction mapping of relatively large genomes (e.g. human) utilizing randomly generated DNA segments requires high mapping redundancy to successfully organize 'contigs' to represent the entire genome. The number of independent DNA segment maps required is dependent on the average size of a mapping segment; the larger the segment, the fewer required. The authors have developed a strategy for subcloning intact multimegabase subchromosomal fragments as double minute chromosomes. Such fragments could serve as primary mapping elements or as adjunct (linking) fragments to rapidly connect already existent contigs generated using yeast artificial chromosomes or cosmids. They present several lines of evidence supporting the viability of this approach. (1) X-ray treated EMT-6 mouse cells (7.5 Gr.) which are selected over several months with increasing levels of methotrexate (MTX) contain highly amplified circular DNA molecules (double minutes) which include the dihydrofolate reductase (DHFR) gene in a size range between 1,000 and 3,500 kilobases as determined by pulsed-field gel electrophoresis and these acentric chromosomal fragments have been stably maintained in culture for at least a year. (2) Preliminary data based on experiments involving fusion of X-irradiated Chinese Hamster Ovary (CH0 DG44) cells containing randomly inserted cotransfected Neomycin resistance and DHFR genes to mouse EMT-6 cells shows that the linked genes can be readily cotransferred as acentric subchromosomal fragment(s) suitable for gene amplification. (3) The studies of CHO cells with cell fusion transferred X-ray induced chromosomal fragments containing the natural CHO DHFR gene suggest that transferred chromosome fragments undergo gene amplification much more readily than nonfragmented endogenous DHFR genes

  6. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O' Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  7. Strategic Interviewing to Detect Deception: Cues to Deception across Repeated Interviews

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2016-11-01

    Full Text Available Previous deception research on repeated interviews found that liars are not less consistent than truth tellers, presumably because liars use a repeat strategy to be consistent across interviews. The goal of this study was to design an interview procedure to overcome this strategy. Innocent participants (truth tellers and guilty participants (liars had to convince an interviewer that they had performed several innocent activities rather than committing a mock crime. The interview focused on the innocent activities (alibi, contained specific central and peripheral questions, and was repeated after one week without forewarning. Cognitive load was increased by asking participants to reply quickly. The liars’ answers in replying to both central and peripheral questions were significantly less accurate, less consistent, and more evasive than the truth tellers’ answers. Logistic regression analyses yielded classification rates ranging from around 70% (with consistency as the predictor variable, 85% (with evasive answers as the predictor variable, to over 90% (with an improved measure of consistency that incorporated evasive answers as the predictor variable, as well as with response accuracy as the predictor variable. These classification rates were higher than the interviewers’ accuracy rate (54%.

  8. Cognitive simplicity and self-deception are crucial in martyrdom and suicide terrorism.

    Science.gov (United States)

    Fink, Bernhard; Trivers, Robert

    2014-08-01

    Suicide attacks and terrorism are characterized by cognitive simplicity, which is related to self-deception. In justifying violence in pursuit of ideologically and/or politically driven commitment, people with high religious commitment may be particularly prone to mechanisms of self-deception. Related megalomania and glorious self-perception are typical of self-deception, and are thus crucial in the emergence and expression of (suicide) terrorism.

  9. Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model

    OpenAIRE

    Sporer, Siegfried L.

    2016-01-01

    Deception and Cognitive Load: Expanding our Horizon with a Working Memory ModelAbstractRecently, studies on deception and its detection have increased dramatically. Many of these studies rely on the cognitive load approach as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies...

  10. Misleading or Falsification? Inferring Deceptive Strategies and Types in Online News and Social Media

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Jang, Jin Yea

    2018-04-27

    Deceptive information in online news and social media has had dramatic effect on our society in recent years. This study is the first to gain deeper insights into writers' intent behind digital misinformation by analyzing psycholinguistic signals: moral foundations and connotations extracted from different types of deceptive news ranging from strategic disinformation to propaganda and hoaxes. To ensure consistency of our findings and generalizability across domains, we experiment with data from: (1) confirmed cases of disinformation in news summaries, (2) {propaganda}, hoax, and disinformation news pages, and (3) social media news. We first contrast lexical markers of biased language, syntactic and stylistic signals, and connotations across deceptive news types including disinformation, propaganda, and hoaxes, and {deceptive} strategies including misleading or falsification. We then incorporate these insights to build machine learning and deep learning predictive models to infer deception strategies and deceptive news types. Our experimental results demonstrate that unlike earlier work on deception detection, content combined with biased language markers, moral foundations, and connotations leads to better predictive performance of deception strategies compared to syntactic and stylistic signals (as reported in earlier work on deceptive reviews). Falsification strategy is easier to identify than misleading strategy. Disinformation is more difficult to predict than to propaganda or hoaxes. Deceptive news types (disinformation, propaganda, and hoaxes), unlike deceptive strategies (falsification and misleading), are more salient, and thus easier to identify in tweets than in news reports. Finally, our novel connotation analysis across deception types provides deeper understanding of writers' perspectives and therefore reveals the intentions behind digital misinformation.

  11. The efficacy of electroacupuncture for the treatment of simple female stress urinary incontinence - comparison with pelvic floor muscle training: study protocol for a multicenter randomized controlled trial.

    Science.gov (United States)

    Su, Tongsheng; Zhou, Jing; Liu, Zhishun; Chen, Yuelai; Zhang, Wei; Chu, Haoran; Luo, Qiong; Lu, Jin; An, Junming; Liu, Baoyan

    2015-02-08

    Previous research has shown that electroacupuncture therapy has a potential therapeutic effect for simple female stress urinary incontinence. In this study, pelvic floor muscle training, the first-line treatment for stress urinary incontinence in women based on meta-analysis of numerous randomized control trials and recommended by international clinical practice, is used as a control group to demonstrate whether electroacupuncture therapy is a better method for female stress urinary incontinence. A randomized controlled trial has been designed to evaluate the therapeutic benefit of electroacupuncture for female stress urinary incontinence compared with pelvic floor muscle training. The safety of electroacupuncture and patient compliance will also be evaluated. Untoward reaction to the electroacupuncture, including a broken needle, fainting on acupuncture, or pain during acupuncture, will be recorded and the therapy will be stopped if an untoward reaction occurs. After we have received full ethical approval and patient consent, participants will be randomized to receive a series of 24 electroacupuncture or pelvic floor muscle training interventions. The frequency and amount of leakage will be measured as the primary outcome parameters. Secondary outcome parameters include the 1-hour pad test, the short-form of the International Consultation on Incontinence Questionnaire, patient subjective effectiveness evaluation, weekly usage of pad, and usage of specialty therapy for female stress urinary incontinence. This trial will help to determine whether electroacupuncture is a more effective treatment than pelvic floor muscle training for patients with female stress urinary incontinence. ClinicalTrials.gov NCT01940432 (12 September 2013).

  12. A game theoretic investigation of deception in network security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Grosu, Daniel

    2010-12-03

    We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. Finally, we discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network.

  13. The Role of Power and Negotiation in Online Deception

    Directory of Open Access Journals (Sweden)

    Chad Albrecht

    2006-12-01

    Full Text Available The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception.  By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet on the communication process that takes place between perpetrator and victim. Finally, the article discusses some of the major tactics employed to appeal to each power type in predominant fraud forms, as well exploring future types of fraud.

  14. Robot Lies in Health Care: When Is Deception Morally Permissible?

    Science.gov (United States)

    Matthias, Andreas

    2015-06-01

    Autonomous robots are increasingly interacting with users who have limited knowledge of robotics and are likely to have an erroneous mental model of the robot's workings, capabilities, and internal structure. The robot's real capabilities may diverge from this mental model to the extent that one might accuse the robot's manufacturer of deceiving the user, especially in cases where the user naturally tends to ascribe exaggerated capabilities to the machine (e.g. conversational systems in elder-care contexts, or toy robots in child care). This poses the question, whether misleading or even actively deceiving the user of an autonomous artifact about the capabilities of the machine is morally bad and why. By analyzing trust, autonomy, and the erosion of trust in communicative acts as consequences of deceptive robot behavior, we formulate four criteria that must be fulfilled in order for robot deception to be morally permissible, and in some cases even morally indicated.

  15. Cortical network during deception detection by functional neuroimaging

    International Nuclear Information System (INIS)

    Saito, Keiichi

    2008-01-01

    We examined the coherence of cortical network during deception detection. First, we performed combined EEG-MRI experiments during the Guilty Knowledge Test (GKT) using number cards which has been used to model deception and 5 right-handed healthy participants performed the experiment. The superior frontal gyrus, the anterior cingulate cortex and the inferior parietal lobule were activated and the P 300 event-related brain potential (300-450 ms) was detected at only 'Lie' card. Secondary, we measured magnetoencephalography (MEG) data during GKT and the other 5 right-handed healthy subjects participated in the next experiment. The coherence between the superior frontal gyrus and the inferior parietal lobule showed significant differences between 'Lie' card and 'truth' cards during P 300 emerging. This results indicates that the coherence of cortical network is useful for GKT. (author)

  16. Communication, compassion, and computers: Adolescents' and adults' evaluations of online and face-to-face deception.

    Science.gov (United States)

    O'Rourke, Sean; Eskritt, Michelle; Bosacki, Sandra

    2018-06-01

    We explored Canadian adolescents', emergent adults', and adults' understandings of deception in computer mediated communication (CMC) compared to face to face (FtF). Participants between 13 and 50 years read vignettes of different types of questionable behaviour that occurred online or in real life, and were asked to judge whether deception was involved, and the acceptability of the behaviour. Age groups evaluated deception similarly; however, adolescents held slightly different views from adults about what constitutes deception, suggesting that the understanding of deception continues to develop into adulthood. Furthermore, CMC behaviour was rated as more deceptive than FtF in general, and participants scoring higher on compassion perceived vignettes to be more deceptive. This study is a step towards better understanding the relationships between perceptions of deception across adolescence into adulthood, mode of communication, and compassion, and may have implications for how adults communicate with youth about deception in CMC and FtF contexts. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  17. Deception Recognition: Rethinking the Operational Commander’s Approach

    Science.gov (United States)

    2010-10-27

    Understanding this cultural relativism gives us insight into intent. Social norms tend to be tacitly established and maintained through body...the concept of ―face‖ in dealing with people in a personal or professional relationship is first and foremost in the Chinese culture . The western... morality ,‖5 the operational commander can be and usually is directly affected by both political deception and MILDEC and must be able to recognize and

  18. Discerning truth from deception: The sincere witness profile

    Directory of Open Access Journals (Sweden)

    Fiorella Giusberti

    2009-01-01

    Full Text Available During the last twenty years, we have assisted to a growing interest in the detection of verbal cues under deception. In this context, we focused our attention on the truth vs. deception topic in adults. In particular, we were interested in discrepant findings concerning some verbal indicators. The aim of the present study was to investigate whether different experimental designs may yield different results regarding the presence or absence of CBCA criteria. Forty participants were shown a video of a robbery and were asked to give a truthful and a deceitful statement of the criminal event. The participants’ performances were recorded in order to analyze content of the reports. Results showed more changes in verbal behaviour under within-subjects design compared to between-subjects one, though the presence/absence of some criteria was the same across the two statistical procedures. The different results yielded by between- and within-subjects analyses can provide some hints as regards the discrepancy in deception literature on verbal cues. Implications for applied settings are discussed.

  19. Deception and price in a market with asymmetric information

    Directory of Open Access Journals (Sweden)

    Kimmo Eriksson

    2007-02-01

    Full Text Available In markets with asymmetric information, only sellers have knowledge about the quality of goods. Sellers may of course make a declaration of the quality, but unless there are sanctions imposed on false declarations or reputations are at stake, such declarations are tantamount to cheap talk. Nonetheless, in an experimental study we find that most people make honest declarations, which is in line with recent findings that lies damaging another party are costly in terms of the liar's utility. Moreover, we find in this experimental market that deceptive sellers offer lower prices than honest sellers, which could possibly be explained by the same wish to limit the damage to the other party. However, when the recipient of the offer is a social tie we find no evidence for lower prices of deceptive offers, which seems to indicate that the rationale for the lower price in deceptive offers to strangers is in fact profit-seeking (by making the deal more attractive rather than moral.

  20. Subarray-based FDA radar to counteract deceptive ECM signals

    Science.gov (United States)

    Abdalla, Ahmed; Wang, Wen-Qin; Yuan, Zhao; Mohamed, Suhad; Bin, Tang

    2016-12-01

    In recent years, the frequency diverse array (FDA) radar concept has attracted extensive attention, as it may benefit from a small frequency increment, compared to the carrier frequency across the array elements and thereby achieve an array factor that is a function of the angle, the time, and the range which is superior to the conventional phase array radar (PAR). However, limited effort on the subject of FDA in electronic countermeasure scenarios, especially in the presence of mainbeam deceptive jamming, has been published. Basic FDA is not desirable for anti-jamming applications, due to the range-angle coupling response of targets. In this paper, a novel method based on subarrayed FDA signal processing is proposed to counteract deceptive ECM signals. We divide the FDA array into multiple subarrays, each of which employs a distinct frequency increment. As a result, in the subarray-based FDA, the desired target can be distinguished at subarray level in joint range-angle-Doppler domain by utilizing the fact that the jammer generates false targets with the same ranges to each subarray without reparations. The performance assessment shows that the proposed solution is effective for deceptive ECM targets suppression. The effectiveness is verified by simulation results.

  1. Modulation of financial deprivation on deception and its neural correlates.

    Science.gov (United States)

    Sun, Peng; Ling, Xiaoli; Zheng, Li; Chen, Jia; Li, Lin; Liu, Zhiyuan; Cheng, Xuemei; Guo, Xiuyan

    2017-11-01

    Deception is a universal phenomenon in human society and plays an important role in everyday life. Previous studies have revealed that people might have an internalized moral norm of keeping honest and the deceptive behavior was reliably correlated with activation in executive brain regions of prefrontal cortices to over-ride intuitive honest responses. Using functional magnetic resonance imaging, this study sought to investigate how financial position modulated the neural responses during deceptive decision. Twenty-one participants were scanned when they played a series of adapted Dictator Game with different partners after a ball-guess game. Specifically, participants gained or lost money in the ball-guess game, and had opportunities to get more financial gains through cheating in the following adapted Dictator Game. Behavioral results indicated that participants did not cheat to the full extent; instead they were more likely to lie after losing money compared with gaining money. At the neural level, weaker activities in the dorsolateral prefrontal cortices were observed when participants lied after losing money than gaining money. Together, our data indicated that, people really had an internalized norm of keeping honest, but it would be lenient when people feel financial deprivation. And suppressing the truthful response originating from moral norm of keeping honest was associated with increased level of activation in the dorsolateral prefrontal cortices, but this association became weaker when people were under financial deprivation.

  2. Pollinator-Driven Speciation in Sexually Deceptive Orchids

    Directory of Open Access Journals (Sweden)

    Shuqing Xu

    2012-01-01

    Full Text Available Pollinator-mediated selection has been suggested to play a major role for the origin and maintenance of the species diversity in orchids. Sexually deceptive orchids are one of the prime examples for rapid, pollinator-mediated plant radiations, with many species showing little genetic differentiation, lack of postzygotic barriers, but strong prezygotic reproductive isolation. These orchids mimic mating signals of female insects and employ male insects as pollinators. This kind of sexual mimicry leads to highly specialised pollination and provides a good system for investigating the process of pollinator-driven speciation. Here, we summarise the knowledge of key processes of speciation in this group of orchids and conduct a meta-analysis on traits that contribute to species differentiation, and thus potentially to speciation. Our study suggests that pollinator shift through changes in floral scent is predominant among closely related species in sexually deceptive orchids. Such shifts can provide a mechanism for pollinator-driven speciation in plants, if the resulting floral isolation is strong. Furthermore, changes in floral scent in these orchids are likely controlled by few genes. Together these factors suggest speciation in sexually deceptive orchids may happen rapidly and even in sympatry, which may explain the remarkable species diversity observed in this plant group.

  3. Analysis of genetic diversity of Sclerotinia sclerotiorum from eggplant by mycelial compatibility, random amplification of polymorphic DNA (RAPD and simple sequence repeat (SSR analyses

    Directory of Open Access Journals (Sweden)

    Fatih Mehmet Tok

    2016-09-01

    Full Text Available The genetic diversity and pathogenicity/virulence among 60 eggplant Sclerotinia sclerotiorum isolates collected from six different geographic regions of Turkey were analysed using mycelial compatibility groupings (MCGs, random amplified polymorphic DNA (RAPD and simple sequence repeat (SSR polymorphism. By MCG tests, the isolates were classified into 22 groups. Out of 22 MCGs, 36% were represented each by a single isolate. The isolates showed great variability for virulence regardless of MCG and geographic origin. Based on the results of RAPD and SSR analyses, 60 S. sclerotiorum isolates representing 22 MCGs were grouped in 2 and 3 distinct clusters, respectively. Analyses using RAPD and SSR markers illustrated that cluster groupings or genetic distance of S. sclerotiorum populations from eggplant were not distinctly relative to the MCG, geographical origin and virulence diversity. The patterns obtained revealed a high heterogeneity of genetic composition and suggested the occurrence of clonal and sexual reproduction of S. sclerotiorum on eggplant in the areas surveyed.

  4. Consumers' behavioural intentions after experiencing deception or cognitive disonance caused by deceptive packaging, package downsizing or slack filling

    OpenAIRE

    Wilkins, SJK; Beckenuyte, C; Butt, MM

    2016-01-01

    Purpose – The purpose of this study is to discover the extent to which consumers are aware of air filling in food packaging, the extent to which deceptive packaging and slack filling – which often result from package downsizing – lead to cognitive dissonance, and the extent to which feelings of cognitive dissonance and being deceived lead consumers to engage in negative post purchase behaviours. Design/methodology/approach – The study analysed respondents’ reactions to a series of images of a...

  5. The effect of prosthetic rehabilitation and simple dietary counseling on food intake and oral health related quality of life among the edentulous individuals: A randomized controlled trial.

    Science.gov (United States)

    Amagai, Noriko; Komagamine, Yuriko; Kanazawa, Manabu; Iwaki, Maiko; Jo, Ayami; Suzuki, Hiroyuki; Minakuchi, Shunsuke

    2017-10-01

    To investigate the combined effect of complete denture renewal and simple dietary advice. A randomized controlled trial was performed with edentulous patients who required new complete dentures. All participants received complete denture treatment. In addition, the intervention group received dietary advice in a pamphlet form, while the control group received advice pertaining to the care and maintenance of the dentures. The advice was given by dentists for each group. The participants' food intake was assessed at baseline and 3 months after intervention using a diet history questionnaire and an oral health related quality of life assessment measured using the Japanese version of the Oral Health Impact Profile for edentulous people (OHIP-EDENT-J). Among 70 participants who were randomized, 62 participants finished all parts of this trial. At baseline, there was no significant difference in the food intake between the two groups. At the 3-month assessment, the intervention group showed significantly greater intake of chicken (P=0.013), fish with bones (P=0.012), and carrots and pumpkins (P=0.025) compared to the control group. However, at baseline and at the 3-month assessment, there was no significant difference in the OHIP-EDENT-J scores between the groups, but the OHIP-EDENT-J scores significantly improved for both groups at the 3-month assessment. There were more significant improved dimensions of OHIP-EDENT-J in the intervention group than in the control group at the 3-month assessment. Simple dietary advice combined with complete denture treatment could improve food intake of edentulous patients. The present study suggests that brief dietary advice provided by dentists can improve food intake of edentulous elderly. This simply diet advice is much easier compared to customized forms, might enable normal dentists provide patients it. The result of this study broadens possibility of nutritional counseling in daily clinical practice. Copyright © 2017 Elsevier Ltd

  6. A randomized controlled trial of two simple mind-body programs, Kirtan Kriya meditation and music listening, for adults with subjective cognitive decline: Feasibility and acceptability.

    Science.gov (United States)

    Innes, Kim E; Selfe, Terry Kit; Khalsa, Dharma Singh; Kandati, Sahiti

    2016-06-01

    In this randomized controlled trial (RCT), we assessed the feasibility and acceptability of two simple home-based relaxation programs in adults experiencing subjective cognitive decline, a strong predictor of Alzheimer's disease. Sixty participants were randomized to a beginner Kirtan Kriya meditation (KK) program or a music listening (ML) program. Participants were asked to practice 12min daily for the first 12 weeks, then as often as they liked for the following 3 months. Participants underwent assessments at baseline, 12 weeks, and 6 months to evaluate changes in key outcomes. Feasibility and acceptability were evaluated by measuring recruitment and retention rates, assessment visit attendance, practice adherence, and treatment expectancy; exit questionnaires completed at 12 weeks and 6 months provided additional data regarding participant experience with the study, perceived barriers to and facilitators of practice, reasons for drop-out, and views regarding the assigned intervention. Fifty-three participants (88%) completed the 6 month study. Adherence in both groups was excellent, with participants completing 93% (91% KK, 94% ML) of sessions on average in the first 12 weeks, and 71% (68% KK, 74% ML) during the 3 month, practice-optional, follow-up period. At week 12, over 80% of participants indicated they were likely to continue practicing following study completion. Responses to both structured and open-ended exit questionnaire items also suggested high satisfaction with both programs. Findings of this RCT of a beginner meditation practice and a simple ML program suggest that both programs were well accepted and the practices are feasible in adults with early memory loss. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Explicit instructions increase cognitive costs of deception in predictable social context

    Directory of Open Access Journals (Sweden)

    Marcel eFalkiewicz

    2015-12-01

    Full Text Available Convincing participants to deceive remains one of the biggest and most important challenges of laboratory-based deception research. The simplest and most prevalent method involves explicitly instructing participants to lie or tell the truth before presenting each task item. The usual finding of such experiments is increased cognitive load associated with deceptive responses, explained by necessity to inhibit default and automatic honest responses. However, explicit instructions are usually coupled with the absence of social context in the experimental task. Context plays a key role in social cognition by activating prior knowledge, which facilitates behaviors consistent with the latter. We hypothesized that in the presence of social context, both honest and deceptive responses can be produced on the basis of prior knowledge, without reliance on truth and without additional cognitive load during deceptive responses. In order to test the hypothesis, we have developed Speed-Dating Task (SDT, which is based on a real-life social event. In SDT, participants respond both honestly and deceptively to questions in order to appear similar to each of the dates. The dates are predictable and represent well-known categories (i.e. atheist or conservative. In one condition participants rely on explicit instructions preceding each question (external cue. In the second condition no explicit instructions are present, so the participants need to adapt based on prior knowledge about the category the dates belong to (internal cue. With internal cues, reaction times are similar for both honest and deceptive responses. However, in the presence of external cues, reaction times are longer for deceptive than honest responses, suggesting that deceptive responses are associated with increased cognitive load. Compared to internal cues, deception costs were higher when external cues were present. However, the effect was limited to the first part of the experiment, only

  8. Learning from simple ebooks, online cases or classroom teaching when acquiring complex knowledge. A randomized controlled trial in respiratory physiology and pulmonology.

    Science.gov (United States)

    Worm, Bjarne Skjødt

    2013-01-01

    E-learning is developing fast because of the rapid increased use of smartphones, tablets and portable computers. We might not think of it as e-learning, but today many new e-books are in fact very complex electronic teaching platforms. It is generally accepted that e-learning is as effective as classroom teaching methods, but little is known about its value in relaying contents of different levels of complexity to students. We set out to investigate e-learning effects on simple recall and complex problem-solving compared to classroom teaching. 63 nurses specializing in anesthesiology were evenly randomized into three groups. They were given internet-based knowledge tests before and after attending a teaching module about respiratory physiology and pulmonology. The three groups was either an e-learning group with eBook teaching material, an e-learning group with case-based teaching or a group with face-to-face case-based classroom teaching. After the module the students were required to answer a post-test. Time spent and the number of logged into the system was also measured. For simple recall, all methods were equally effective. For problem-solving, the eCase group achieved a comparable knowledge level to classroom teaching, while textbook learning was inferior to both (p<0.01). The textbook group also spent the least amount of time on acquiring knowledge (33 minutes, p<0.001), while the eCase group spent significantly more time on the subject (53 minutes, p<0.001) and logged into the system significantly more (2.8 vs 1.6, p<0.001). E-learning based cases are an effective tool for teaching complex knowledge and problem-solving ability, but future studies using higher-level e-learning are encouraged.Simple recall skills, however, do not require any particular learning method.

  9. Detection of deception based on fMRI activation patterns underlying the production of a deceptive response and receiving feedback about the success of the deception after a mock murder crime

    Science.gov (United States)

    Cui, Qian; Vanman, Eric J.; Wei, Dongtao; Yang, Wenjing; Jia, Lei

    2014-01-01

    The ability of a deceiver to track a victim’s ongoing judgments about the truthfulness of the deceit can be critical for successful deception. However, no study has yet investigated the neural circuits underlying receiving a judgment about one’s lie. To explore this issue, we used a modified Guilty Knowledge Test in a mock murder situation to simultaneously record the neural responses involved in producing deception and later when judgments of that deception were made. Producing deception recruited the bilateral inferior parietal lobules (IPLs), right ventral lateral prefrontal (VLPF) areas and right striatum, among which the activation of the right VLPF contributed mostly to diagnosing the identities of the participants, correctly diagnosing 81.25% of ‘murderers’ and 81.25% of ‘innocents’. Moreover, the participant’s response when their deception was successful uniquely recruited the right middle frontal gyrus, bilateral IPLs, bilateral orbitofrontal cortices, bilateral middle temporal gyrus and left cerebellum, among which the right IPL contributed mostly to diagnosing participants’ identities, correctly diagnosing 93.75% of murderers and 87.5% of innocents. This study shows that neural activity associated with being a successful liar (or not) is a feasible indicator for detecting lies and may be more valid than neural activity associated with producing deception. PMID:23946002

  10. How Tactile and Function Information Affect Young Children's Ability to Understand the Nature of Food-Appearing, Deceptive Objects

    Science.gov (United States)

    Krause, Christina Miles

    2008-01-01

    Preschool children's (N = 64) ability to use tactile information and function cues on less-realistic and more-realistic food-appearing, deceptive objects was examined before and after training on the function of deceptive objects. They also responded to appearance and reality questions about deceptive objects. Half of the children (F-S:…

  11. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    Science.gov (United States)

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  12. An examination of motor and perceptual contributions to the recognition of deception from others' actions

    NARCIS (Netherlands)

    Canal Bruland, R.; van der Kamp, J.; van Kesteren, J.

    2010-01-01

    Most empirical studies thus far have confounded motor and perceptual experience when examining their contributions to the recognition of deceptive and non-deceptive intentions from another person's movements. In the present study, we manipulated viewing perspective as an additional demarcation to

  13. Teachers' Beliefs about Cues to Deception and the Ability to Detect Deceit

    Science.gov (United States)

    Ulatowska, Joanna

    2017-01-01

    This study aimed to test beliefs about cues to deception and the ability to detect lies in a group of teachers with different teaching experience. Their results were compared with the results of non-teachers matched in age and with the results of educational studies and psychology students. Both the beliefs of deception indicators and overall…

  14. In Defense of Children's Lies: On Ethics and Methods of Studying Children's Communication of Deception.

    Science.gov (United States)

    Feldman, Robert S.

    Studies of children's deceptive behavior have scientific merit and can be carried out in an ethically defensible manner. Many arguments against studies requiring children to deceive others in an experimental context are relatively easy to refute. It is true, though, that the debriefing phase of deception studies presents ethical problems,…

  15. Use of "um" in the Deceptive Speech of a Convicted Murderer

    Science.gov (United States)

    Villar, Gina; Arciuli, Joanne; Mallard, David

    2012-01-01

    Previous studies have demonstrated a link between language behaviors and deception; however, questions remain about the role of specific linguistic cues, especially in real-life high-stakes lies. This study investigated use of the so-called filler, "um," in externally verifiable truthful versus deceptive speech of a convicted murderer. The data…

  16. How to Trick Your Opponent: A Review Article on Deceptive Actions in Interactive Sports

    Directory of Open Access Journals (Sweden)

    Iris Güldenpenning

    2017-05-01

    Full Text Available Performing deceptive actions is a wide-spread phenomenon in sports and it is of considerable practical relevance to know whether or not a fake or a disguised action decreases the opponents’ performance. Therefore, research on deceptive actions for various sport disciplines (e.g., cricket, rugby, martial arts, soccer, and basketball has been conducted. This research is scattered, both across time and scientific disciplines. Here, we aim to systematically review the empirical work on deceptive actions in interactive sports and want to give an overview about several issues investigated in the last decades. Three main topics of the detected literature were discussed here: (1 the role of expertise for the recognition of deceptive actions, (2 the cognitive mechanisms underlying the processing of deceptive actions, and (3 the pros and cons of in situ research designs. None of these themes seems to be settled and therefore, they should be considered in future research agendas.

  17. Analysis of cause-specific failure endpoints using simple proportions: an example from a randomized controlled clinical trial in early breast cancer

    International Nuclear Information System (INIS)

    Panzarella, Tony; Meakin, J. William

    1998-01-01

    Purpose: To describe a statistically valid method for analyzing cause-specific failure data based on simple proportions, that is easy to understand and apply, and outline under what conditions its implementation is well-suited. Methods and Materials: In the comparison of treatment groups, time to first failure (in any site) was analyzed first, followed by an analysis of the pattern of first failure, preferably at the latest complete follow-up time common to each group. Results: A retrospective analysis of time to contralateral breast cancer in 777 early breast cancer patients was undertaken. Patients previously treated by mastectomy plus radiation therapy to the chest wall and regional nodal areas were randomized to receive further radiation and prednisone (R+P), radiation alone (R), or no further treatment (NT). Those randomized to R+P had a statistically significantly delayed time to first failure compared to the group randomized to NT (p = 0.0008). Patients randomized to R also experienced a delayed time to first failure compared to NT, but the difference was not statistically significant (p 0.14). At 14 years from the date of surgery (the latest common complete follow-up time) the distribution of first failures was statistically significantly different between R+P and NT (p = 0.005), but not between R and NT (p = 0.09). The contralateral breast cancer first failure rate at 14 years from surgery was 7.2% for NT, 4.6% for R, and 3.7% for R+P. The corresponding Kaplan-Meier estimates were 13.2%, 8.2%, and 5.4%, respectively. Conclusion: Analyzing cause-specific failure data using methods developed for survival endpoints is problematic. We encourage the use of the two-step analysis strategy described when, as in the example presented, competing causes of failure are not likely to be statistically independent, and when a treatment comparison at a single time-point is clinically relevant and feasible; that is, all patients have complete follow-up to this point

  18. Presence of Spotters Improves Bench Press Performance: A Deception Study.

    Science.gov (United States)

    Sheridan, Andrew; Marchant, David C; Williams, Emily L; Jones, Hollie S; Hewitt, Phil A; Sparks, S Andy

    2017-10-24

    Sheridan, A, Marchant, DC, Williams, EL, Jones, HS, Hewitt, PA, and Sparks, SA. Presence of spotters improves bench press performance: a deception study. J Strength Cond Res XX(X): 000-000, 2017-Resistance exercise is a widely used method of physical training in both recreational exercise and athletic populations. The use of training partners and spotters during resistance exercise is widespread, but little is known about the effect of the presence of these individuals on exercise performance. The purpose of the current study was to investigate the effect of spotter presence on bench press performance. Twelve recreationally trained participants (age, 21.3 ± 0.8 years, height, 1.82 ± 0.1 m, and weight, 84.8 ± 11.1 kg) performed 2 trials of 3 sets to failure at 60% of 1 repetition maximum on separate occasions. The 2 trials consisted of spotters being explicitly present or hidden from view (deception). During the trials, total repetitions (reps), total weight lifted, ratings of perceived exertion (RPE), and self-efficacy were measured. Total reps and weight lifted were significantly greater with spotters (difference = 4.5 reps, t = 5.68, p < 0.001 and difference = 209.6 kg, t = 5.65, p < 0.001, respectively). Although RPE and local RPE were significantly elevated in the deception trials (difference = 0.78, f = 6.16, p = 0.030 and difference = 0.81, f = 5.89, p = 0.034, respectively), self-efficacy was significantly reduced (difference = 1.58, f = 26.90, p < 0.001). This study demonstrates that resistance exercise is improved by the presence of spotters, which is facilitated by reduced RPE and increased self-efficacy. This has important implications for athletes and clients, who should perform resistance exercise in the proximity of others, to maximize total work performed.

  19. Effects of a simple home-based exercise program on fall prevention in older adults: A 12-month primary care setting, randomized controlled trial.

    Science.gov (United States)

    Boongird, Chitima; Keesukphan, Prasit; Phiphadthakusolkul, Soontraporn; Rattanasiri, Sasivimol; Thakkinstian, Ammarin

    2017-11-01

    To investigate the effects of a simple home-based exercise program on falls, physical functioning, fear of falling and quality of life in a primary care setting. Participants (n = 439), aged ≥65 years with mild-to-moderate balance dysfunction were randomly assigned to an exercise (n = 219) or control (n = 220) group. The program consisted of five combined exercises, which progressed in difficulty, and a walking plan. Controls received fall prevention education. Physical functioning and other outcomes were measured at 3- and 6-month follow-up visits. Falls were monitored with fall diaries and phone interviews at 3, 6, 9, and 12 months respectively. The 12 months of the home-based exercise program showed the incidence of falls was 0.30 falls per person year in the exercise group, compared with 0.40 in the control group. The estimated incidence rate ratio was 0.75 (95% CI 0.55-1.04), which was not statistically significant. The fear of falling (measured by the Thai fall efficacy scale) was significantly lower in the exercise than control group (24.7 vs 27.0, P = 0.003). Also, the trend of program adherence increased in the exercise group. (29.6% to 56.8%). This simple home-based exercise program showed a reduction in fear of falling and a positive trend towards exercise adherence. Further studies should focus on factors associated with exercise adherence, the benefits of increased home visits and should follow participants longer in order to evaluate the effects of the program. Geriatr Gerontol Int 2017; 17: 2157-2163. © 2017 Japan Geriatrics Society.

  20. Between reality and deception: the anamorphosis in visual communication

    Directory of Open Access Journals (Sweden)

    Helena Ferreira

    2016-06-01

    Full Text Available This article aims to reflect on the use of anamorphosis in the context of the graphic and visual communication by presenting a brief evolution of anamorphosis in visual communication, from its origin to the present time, through the analysis of historical and contemporary examples of anamorphic representations used in art and design. This is a reflection on the potential of the mechanism of anamorphosis as a vehicle of visual communication based on perceptive game between reality and deception. Thus, we propose the possibility of this perceptual mechanism to fit in a more comprehensive history, the history of visuality.

  1. Learning from simple ebooks, online cases or classroom teaching when acquiring complex knowledge. A randomized controlled trial in respiratory physiology and pulmonology.

    Directory of Open Access Journals (Sweden)

    Bjarne Skjødt Worm

    Full Text Available BACKGROUND AND AIMS: E-learning is developing fast because of the rapid increased use of smartphones, tablets and portable computers. We might not think of it as e-learning, but today many new e-books are in fact very complex electronic teaching platforms. It is generally accepted that e-learning is as effective as classroom teaching methods, but little is known about its value in relaying contents of different levels of complexity to students. We set out to investigate e-learning effects on simple recall and complex problem-solving compared to classroom teaching. METHODS: 63 nurses specializing in anesthesiology were evenly randomized into three groups. They were given internet-based knowledge tests before and after attending a teaching module about respiratory physiology and pulmonology. The three groups was either an e-learning group with eBook teaching material, an e-learning group with case-based teaching or a group with face-to-face case-based classroom teaching. After the module the students were required to answer a post-test. Time spent and the number of logged into the system was also measured. RESULTS: For simple recall, all methods were equally effective. For problem-solving, the eCase group achieved a comparable knowledge level to classroom teaching, while textbook learning was inferior to both (p<0.01. The textbook group also spent the least amount of time on acquiring knowledge (33 minutes, p<0.001, while the eCase group spent significantly more time on the subject (53 minutes, p<0.001 and logged into the system significantly more (2.8 vs 1.6, p<0.001. CONCLUSIONS: E-learning based cases are an effective tool for teaching complex knowledge and problem-solving ability, but future studies using higher-level e-learning are encouraged.Simple recall skills, however, do not require any particular learning method.

  2. Using G-Theory to Enhance Evidence of Reliability and Validity for Common Uses of the Paulhus Deception Scales.

    Science.gov (United States)

    Vispoel, Walter P; Morris, Carrie A; Kilinc, Murat

    2018-01-01

    We applied a new approach to Generalizability theory (G-theory) involving parallel splits and repeated measures to evaluate common uses of the Paulhus Deception Scales based on polytomous and four types of dichotomous scoring. G-theory indices of reliability and validity accounting for specific-factor, transient, and random-response measurement error supported use of polytomous over dichotomous scores as contamination checks; as control, explanatory, and outcome variables; as aspects of construct validation; and as indexes of environmental effects on socially desirable responding. Polytomous scoring also provided results for flagging faking as dependable as those when using dichotomous scoring methods. These findings argue strongly against the nearly exclusive use of dichotomous scoring for the Paulhus Deception Scales in practice and underscore the value of G-theory in demonstrating this. We provide guidelines for applying our G-theory techniques to other objectively scored clinical assessments, for using G-theory to estimate how changes to a measure might improve reliability, and for obtaining software to conduct G-theory analyses free of charge.

  3. Self-deception in terminal patients: belief system at stake

    Directory of Open Access Journals (Sweden)

    Luis E Echarte

    2016-02-01

    Full Text Available A substantial minority of patients with terminal illness hold unrealistically hopeful beliefs about the severity of their disease or the nature of its treatment, considering therapy as curative rather than palliative. We propose that this attitude may be understood as self-deception, following the current psychological theories about this topic. In this article we suggest that the reason these patients deceive themselves is to preserve their belief systems. According to some philosophical accounts, the human belief system (HBS is constituted as a web with a few stable central nodes –deep seated beliefs– intimately related with the self. We hypothesize that the mind may possess defensive mechanisms, mostly non-conscious, that reject certain sensory inputs (e.g., a fatal diagnosis that may undermine deep-seated beliefs. This interpretation is in line with the theory of cognitive dissonance. Following this reasoning, we also propose that HBS-related self-deception would entail a lower cognitive load than that associated with confronting the truth: whereas the latter would engage a myriad of high cognitive functions to re-configure crucial aspects of the self, including the setting of plans, goals, or even a behavioral output, the former would be mostly non-conscious. Overall, we believe that our research supports the hypothesis that in cases of terminal illness, (self-deceiving requires less effort than accepting the truth.

  4. Registered Report: Measuring Unconscious Deception Detection by Skin Temperature

    Directory of Open Access Journals (Sweden)

    Anna Elisabeth Van 't Veer

    2014-05-01

    Full Text Available Findings from the deception detection literature suggest that although people are not skilled in consciously detecting a liar, they may intuit that something about the person telling a lie is off. In the current proposal, we argue that observing a liar influences the observer’s physiology even though the observer may not be consciously aware of being lied to (i.e., the observers’ direct deception judgment does not accurately differentiate between liars and truth-tellers. To test this hypothesis, participants’ finger temperature will be measured while they watch videos of persons who are either honest or dishonest about their identity. We hypothesize that skin temperature will be lower when observing a liar than when observing a truth-teller. Additionally, we test whether perceiving a liar influences finger skin temperature differently when an individual is, or is not, alerted to the possibility of deceit. We do this by varying participants’ awareness of the fact that they might be lied to. Next to measuring physiological responses to liars and truth-tellers, self-reported direct and indirect veracity judgments (i.e., trustworthiness and liking of the target persons will be assessed. We hypothesize that indirect veracity judgments will better distinguish between liars and truth-tellers than direct veracity judgments.

  5. When Pinocchio’s nose does not grow: Belief regarding lie detectability modulates production of deception.

    Directory of Open Access Journals (Sweden)

    Kamila Ewa Sip

    2013-02-01

    Full Text Available Does the brain activity underlying the production of deception differ depending on whether or not one believes their deception can be detected? To address this question, we had participants commit a mock theft in a laboratory setting, and then interrogated them while they underwent functional MRI (fMRI scanning. Crucially, during some parts of the interrogation participants believed a lie detector was activated, whereas in other parts they were told it was switched off. We were thus able to examine the neural activity associated with the contrast between producing true versus false claims, as well as the independent contrast between believing that deception could and could not be detected. We found increased activation in the right amygdala and inferior frontal gyrus (IFG, as well as the left posterior cingulate cortex (PCC, during the production of false (compared to true claims. Importantly, there was a significant interaction between the effects of deception and belief in the left temporal pole and right hippocampus/parahippocampal gyrus, where activity increased during the production of deception when participants believed their false claims could be detected, but not when they believed the lie detector was switched off. As these regions are associated with binding socially complex perceptual input and memory retrieval, we conclude that producing deceptive behavior in a context in which one believes this deception can be detected is associated with a cognitively taxing effort to reconcile contradictions between one’s actions and recollections.

  6. When Pinocchio's nose does not grow: belief regarding lie-detectability modulates production of deception

    Science.gov (United States)

    Sip, Kamila E.; Carmel, David; Marchant, Jennifer L.; Li, Jian; Petrovic, Predrag; Roepstorff, Andreas; McGregor, William B.; Frith, Christopher D.

    2013-01-01

    Does the brain activity underlying the production of deception differ depending on whether or not one believes their deception can be detected? To address this question, we had participants commit a mock theft in a laboratory setting, and then interrogated them while they underwent functional MRI (fMRI) scanning. Crucially, during some parts of the interrogation participants believed a lie-detector was activated, whereas in other parts they were told it was switched-off. We were thus able to examine the neural activity associated with the contrast between producing true vs. false claims, as well as the independent contrast between believing that deception could and could not be detected. We found increased activation in the right amygdala and inferior frontal gyrus (IFG), as well as the left posterior cingulate cortex (PCC), during the production of false (compared to true) claims. Importantly, there was a significant interaction between the effects of deception and belief in the left temporal pole and right hippocampus/parahippocampal gyrus, where activity increased during the production of deception when participants believed their false claims could be detected, but not when they believed the lie-detector was switched-off. As these regions are associated with binding socially complex perceptual input and memory retrieval, we conclude that producing deceptive behavior in a context in which one believes this deception can be detected is associated with a cognitively taxing effort to reconcile contradictions between one's actions and recollections. PMID:23382715

  7. Children's reasoning about deception and defiance as ways of resisting parents' and teachers' directives.

    Science.gov (United States)

    Gingo, Matthew

    2017-09-01

    This research presented 8-, 10-, and 12-year-olds (N = 120) with hypothetical situations depicting comparably aged children engaging in defiance and deception to circumvent authorities' directives that they disagreed with. The nature of the situations varied in terms of domain (personal, moral, or prudential) and type of authority figure (parent or teacher). Evaluations and justifications for the legitimacy of the directives, defiance, and deception were examined, as were general evaluations of deception. Across domains, increased age was associated with decreased acceptance of directives, and increased acceptance of defiance and deception. Participants judged that defiance and deception were legitimate ways to resist immoral directives. Directives about personal acts were also widely rejected, particularly teachers' directives. Defiance and deception were seen by some as legitimate ways to resist unwarranted control over children's personal choices. Prudential directives were widely accepted, whereas defiance and deception in those situations was generally rejected. Results indicate that children value honesty and authority but sometimes prioritize moral and personal considerations when deciding whether or not to lie. Findings are discussed in terms of the ways children coordinate multiple competing rules and motivations when making moral judgments about honesty. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Digging in the Dark Triad: A Replication of ``Machiavellianism and Dating: Deception and Intimacy''

    Directory of Open Access Journals (Sweden)

    Durand, Guillaume

    2016-10-01

    Full Text Available The present study is a replication and an extension of Dussault, Hojjat, and Boone (2013. Machiavellianism and dating: Deception and intimacy. Social Behavior and Personality: an international journal, 41(2, 283-294. The results support the positive association between Machiavellianism and the use of deceptive dating strategies, but fail to detect a correlation between Machiavellianism and perceived intimacy. The extension to the Dark Triad reveals that psychopathy is a stronger predictor than Machiavellianism to assess deceptive dating strategies, and supports a relationship between higher degrees of narcissism and history of intimate behaviors.

  9. What if I get busted? Deception, choice and decision-making in social interaction

    DEFF Research Database (Denmark)

    Sip, Kamila Ewa; Skewes, Joshua; Agustus, Jennifer L Marchant

    2012-01-01

    Deception is an essentially social act, yet little is known about how social consequences affect the decision to deceive. In this study, participants played a computerized game of deception without constraints on whether or when to attempt to deceive their opponent. Participants were questioned...... by an opponent outside the scanner about their knowledge of the content of a display. Importantly, questions were posed so that, in some conditions, it was possible to be deceptive, while in other conditions it was not. To simulate a realistic interaction, participants could be confronted about their claims...... findings suggest the decision to deceive is affected by the potential risk of social confrontation rather than the claim itself....

  10. The contribution of self-deceptive enhancement to display rules in the United States and Japan.

    Science.gov (United States)

    Chung, Joanne M

    2012-03-01

    Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings highlight the role of self-deceptive enhancement in contributing to expressive display rules and support the point of view that socially desirable responding is a reflection of one's personality and culture rather than a statistical nuisance.

  11. The SimpleMix study with biphasic insulin aspart 30: a randomized controlled trial investigating patient-driven titration versus investigator-driven titration.

    Science.gov (United States)

    Gao, Yan; Luquez, Cecilia; Lynggaard, Helle; Andersen, Henning; Saboo, Banshi

    2014-12-01

    The study aimed to confirm the efficacy, through non-inferiority, of patient-driven versus investigator-driven titration of biphasic insulin aspart 30 (BIAsp 30) in terms of glycemic control assessed by HbA1c change. SimpleMix was a 20 week, open-label, randomized, two-armed, parallel-group, multicenter study in five countries (Argentina, China, India, Poland, and the UK). Patients with type 2 diabetes were randomized into either patient-driven or investigator-driven BIAsp 30 titration groups. Non-inferiority of patient-driven vs. investigator-driven titration based on change in HbA1c from baseline to week 20 could not be demonstrated. Mean (SE) estimated change from baseline to week 20 was -0.72 (0.08)% in the patient-driven group and -0.97 (0.08)% in the investigator-driven group; estimated difference 0.25% (95% CI: 0.04; 0.46). Estimated mean change (SE) in fasting plasma glucose from baseline to week 20 was similar between groups: -0.94 (0.21) mmol/L for patient-driven and -1.07 (0.22) mmol/L for investigator-driven (difference non-significant). Both treatment arms were well tolerated, and hypoglycemic episode rates were similar between groups, with a rate ratio of 0.77 (95% CI: 0.54; 1.09; p = 0.143) for all hypoglycemic episodes and 0.78 (95% CI: 0.42; 1.43; p = 0.417) for nocturnal hypoglycemic episodes. Non-inferiority of patient-driven versus investigator-driven titration with regard to change from baseline to end-of-treatment HbA1c could not be confirmed. It is possible that a clinic visit 12 weeks after intensification of treatment with BIAsp 30 in patients with type 2 diabetes inadequately treated with basal insulin may benefit patient-driven titration of BIAsp 30. A limitation of the study was the relatively small number of patients recruited in each country, which does not allow country-specific analyses to be performed. Overall, treatment with BIAsp 30 was well tolerated in both treatment groups.

  12. The Beneficial Effects of Cognitive Training With Simple Calculation and Reading Aloud (SCRA) in the Elderly Postoperative Population: A Pilot Randomized Controlled Trial.

    Science.gov (United States)

    Kulason, Kay; Nouchi, Rui; Hoshikawa, Yasushi; Noda, Masafumi; Okada, Yoshinori; Kawashima, Ryuta

    2018-01-01

    Background: There has been little research conducted regarding cognitive treatments for the elderly postsurgical population. Patients aged ≥60 years have an increased risk of postoperative cognitive decline, a condition in which cognitive functions are negatively affected. This cognitive decline can lead to a decline in quality of life. In order to maintain a high quality of life, the elderly postsurgical population may benefit from treatment to maintain and/or improve their cognitive functions. This pilot study investigates the effect of simple calculation and reading aloud (SCRA) cognitive training in elderly Japanese postsurgical patients. Methods: Elderly patients undergoing non-cardiovascular thoracic surgery under general anesthesia were recruited ( n = 12). Subjects were randomly divided into two groups-one that receives 12 weeks of SCRA intervention, and a waitlisted control group. Before and after the intervention, we measured cognitive function [Mini-Mental Status Exam-Japanese (MMSE-J), Frontal Assessment Battery (FAB), computerized Cogstate Brief Battery (CBB)] and emotional state [General Health Questionnaire-12 (GHQ-12), Geriatric Depression Scale (GDS), Quality of Life Scale-5 (QOL-5)]. Results: Group difference analyses using ANCOVA with permutation test showed that the intervention SCRA group had a significant improvement in FAB motor programming sub-score, GDS, and QOL-5 compared to the control group. Within-group analyses using Wilcoxon signed-rank test to compare baseline and follow-up showed that the SCRA intervention group total FAB scores, FAB motor programming sub-scores, and QOL-5 scores were significantly improved. Discussion: This pilot study showed that there are important implications for the beneficial effects of SCRA intervention on cognitive function and emotional state in the postoperative elderly population; however, further investigations are necessary to reach any conclusions. Trial registration: This study was registered with

  13. The Beneficial Effects of Cognitive Training With Simple Calculation and Reading Aloud (SCRA in the Elderly Postoperative Population: A Pilot Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Kay Kulason

    2018-03-01

    Full Text Available Background: There has been little research conducted regarding cognitive treatments for the elderly postsurgical population. Patients aged ≥60 years have an increased risk of postoperative cognitive decline, a condition in which cognitive functions are negatively affected. This cognitive decline can lead to a decline in quality of life. In order to maintain a high quality of life, the elderly postsurgical population may benefit from treatment to maintain and/or improve their cognitive functions. This pilot study investigates the effect of simple calculation and reading aloud (SCRA cognitive training in elderly Japanese postsurgical patients.Methods: Elderly patients undergoing non-cardiovascular thoracic surgery under general anesthesia were recruited (n = 12. Subjects were randomly divided into two groups—one that receives 12 weeks of SCRA intervention, and a waitlisted control group. Before and after the intervention, we measured cognitive function [Mini-Mental Status Exam-Japanese (MMSE-J, Frontal Assessment Battery (FAB, computerized Cogstate Brief Battery (CBB] and emotional state [General Health Questionnaire-12 (GHQ-12, Geriatric Depression Scale (GDS, Quality of Life Scale-5 (QOL-5].Results: Group difference analyses using ANCOVA with permutation test showed that the intervention SCRA group had a significant improvement in FAB motor programming sub-score, GDS, and QOL-5 compared to the control group. Within-group analyses using Wilcoxon signed-rank test to compare baseline and follow-up showed that the SCRA intervention group total FAB scores, FAB motor programming sub-scores, and QOL-5 scores were significantly improved.Discussion: This pilot study showed that there are important implications for the beneficial effects of SCRA intervention on cognitive function and emotional state in the postoperative elderly population; however, further investigations are necessary to reach any conclusions.Trial registration: This study was

  14. 16 CFR 424.1 - Unfair or deceptive acts or practices.

    Science.gov (United States)

    2010-01-01

    ... ADVERTISING AND MARKETING PRACTICES § 424.1 Unfair or deceptive acts or practices. In connection with the sale... advertisement, if those stores do not have the advertised products in stock and readily available to customers...

  15. Effects of deceptive packaging and product involvement on purchase intention: an elaboration likelihood model perspective.

    Science.gov (United States)

    Lammers, H B

    2000-04-01

    From an Elaboration Likelihood Model perspective, it was hypothesized that postexposure awareness of deceptive packaging claims would have a greater negative effect on scores for purchase intention by consumers lowly involved rather than highly involved with a product (n = 40). Undergraduates who were classified as either highly or lowly (ns = 20 and 20) involved with M&Ms examined either a deceptive or non-deceptive package design for M&Ms candy and were subsequently informed of the deception employed in the packaging before finally rating their intention to purchase. As anticipated, highly deceived subjects who were low in involvement rated intention to purchase lower than their highly involved peers. Overall, the results attest to the robustness of the model and suggest that the model has implications beyond advertising effects and into packaging effects.

  16. Theodramatic Rehearsal: Fighting Self-Deception through the Dramatic Imagination

    Directory of Open Access Journals (Sweden)

    Brett Vaden

    2014-03-01

    Full Text Available This paper seeks to appropriate the insights of dramatic theology for Christian psychology and soul care. According to Kevin Vanhoozer, Scripture is the ‘script’ for human beings’ fitting participation in the acts and deeds of God in the world (i.e., ‘theodrama’. Keeping with this dramatic paradigm, the author will explore what ‘rehearsal’ might entail by drawing from a branch of psychotherapy called ‘psychodrama.’ The main question to be addressed in this appropriation of dramatic theology is, “How might dramatic rehearsal combat self-deception?” The author will only begin to answer this question, but in the attempt it is hoped that further reflection and clarity will be induced.

  17. Mad Men’s Deceptive (Critique Of Creativity

    Directory of Open Access Journals (Sweden)

    Julie Robert

    2012-09-01

    Full Text Available This article analyses Mad Men’s relationship to creativity. Considering popular, industry-specific and scholarly understandings, it uses close readings of the show and its narratological techniques to demonstrate how these potentially contradictory concepts and practices of creativity overlap in the show’s fourth season. The points at which these understandings collide become sources of tension between characters and are marked by narrative gaps that conceal deceptive creativity. The conflicts centre on three primary debates: a the role of alcohol in the creative process, b industry-specific norms of creativity, and c the popular perception that creativity is about expression. Consequently, this article approaches questions about creativity using the show’s own partially elided debates and undermines widely-held romantic beliefs about the creative ‘type’ and the what exactly it means to sell creativity in a corporate setting.

  18. Random walk on random walks

    NARCIS (Netherlands)

    Hilário, M.; Hollander, den W.Th.F.; Sidoravicius, V.; Soares dos Santos, R.; Teixeira, A.

    2014-01-01

    In this paper we study a random walk in a one-dimensional dynamic random environment consisting of a collection of independent particles performing simple symmetric random walks in a Poisson equilibrium with density ¿¿(0,8). At each step the random walk performs a nearest-neighbour jump, moving to

  19. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Science.gov (United States)

    2010-01-01

    ... misrepresentation as to source or origin (e.g., “Colorado Blue Spruce,” “Arizona Cypress,” “Black Hills Spruce... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is...

  20. A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

    OpenAIRE

    Pawlick, Jeffrey; Colbert, Edward; Zhu, Quanyan

    2017-01-01

    Cyber attacks on both databases and critical infrastructure have threatened public and private sectors. Meanwhile, ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this paper, we survey 24 articles from 200...

  1. Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    OpenAIRE

    Huang, TonTon Hsien-De; Yu, Chia-Mu; Kao, Hung-Yu

    2017-01-01

    The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake ads that tricks users to install unnecessary apps via either alluring or daunting texts and pictur...

  2. The contribution of self-deceptive enhancement to display rules in the United States and Japan

    OpenAIRE

    Chung, Joanne M.

    2012-01-01

    Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings hig...

  3. Federal Trade Commission's authority to regulate marketing to children: deceptive vs. unfair rulemaking.

    Science.gov (United States)

    Pomeranz, Jennifer L

    2011-01-01

    Food and beverage marketing directed at children is of increasing concern to the public health and legal communities. The new administration at the Federal Trade Commission and abundant science on the topic make it a particularly opportune time for the government to reconsider regulating marketing directed at youth. This Article analyzes the Commission's authority to regulate food and beverage marketing directed at children under its jurisdiction over unfair and deceptive acts and practices to determine which avenue is most viable. The author finds that the Federal Trade Commission has the authority to regulate deceptive marketing practices directed at vulnerable populations. Although the Commission can issue individual orders, its remedial power to initiate rules would better address the pervasiveness of modern marketing practices. The Commission does not currently have the power to regulate unfair marketing to children; however, even if Congress reinstated this authority, the Commission's authority over deceptive marketing may be preferable to regulate these practices. Deceptive communications are not protected by the First Amendment and the deceptive standard matches the science associated with marketing to children. The Federal Trade Commission has the authority to initiate rulemaking in the realm of food and beverage marketing to children as deceptive communications in interstate commerce, in violation of the Federal Trade Commission Act. However, to effectuate this process, Congress would need to grant the Commission the authority to do so under the Administrative Procedures Act.

  4. Temporal view of the costs and benefits of self-deception

    Science.gov (United States)

    Chance, Zoë; Norton, Michael I.; Gino, Francesca; Ariely, Dan

    2011-01-01

    Researchers have documented many cases in which individuals rationalize their regrettable actions. Four experiments examine situations in which people go beyond merely explaining away their misconduct to actively deceiving themselves. We find that those who exploit opportunities to cheat on tests are likely to engage in self-deception, inferring that their elevated performance is a sign of intelligence. This short-term psychological benefit of self-deception, however, can come with longer-term costs: when predicting future performance, participants expect to perform equally well—a lack of awareness that persists even when these inflated expectations prove costly. We show that although people expect to cheat, they do not foresee self-deception, and that factors that reinforce the benefits of cheating enhance self-deception. More broadly, the findings of these experiments offer evidence that debates about the relative costs and benefits of self-deception are informed by adopting a temporal view that assesses the cumulative impact of self-deception over time. PMID:21383150

  5. Examining well-being, anxiety, and self-deception in university students

    Directory of Open Access Journals (Sweden)

    Zachariah Sheridan

    2015-12-01

    Full Text Available This study examined the combined influence of six positive psychology variables (optimism, hope, self-efficacy, grit, gratitude, and subjective life satisfaction, termed covitality, in relation to buffering individuals against anxiety symptoms. In addition, the influence of self-deception was examined to test whether this construct had an influence on the reporting of these positive psychology variables. A total of 268 individuals (203 females and 65 males with a mean age of 22.2 years (SD = 7.4 years from one Queensland university took part in the study. The participants completed an online questionnaire, which included a battery of positive psychological measures, plus a measure of anxiety and self-deception. The results indicated that the covitality constructs had a moderation effect on anxiety. In a regression analysis, the six covitality constructs explained an additional 24.5% of the variance in anxiety, after controlling for self-deception. Further analyses revealed that those higher in self-deception scored higher in self-efficacy and all positive covitality measures and lower in anxiety, than those lower in self-deception. These findings illustrate the importance of considering the role that self-deception might play in the reporting of positive psychology variables.

  6. Simple machines

    CERN Document Server

    Graybill, George

    2007-01-01

    Just how simple are simple machines? With our ready-to-use resource, they are simple to teach and easy to learn! Chocked full of information and activities, we begin with a look at force, motion and work, and examples of simple machines in daily life are given. With this background, we move on to different kinds of simple machines including: Levers, Inclined Planes, Wedges, Screws, Pulleys, and Wheels and Axles. An exploration of some compound machines follows, such as the can opener. Our resource is a real time-saver as all the reading passages, student activities are provided. Presented in s

  7. Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty

    Directory of Open Access Journals (Sweden)

    Jennifer M. C. Vendemia

    2005-01-01

    Full Text Available Deception research has focused on identifying peripheral nervous system markers while ignoring cognitive mechanisms underlying those markers. Cognitive theorists argue that the process of deception may involve such constructs as attentional capture, working memory load, or perceived incongruity with memory, while psychophysiologists argue for stimulus salience, arousal, and emotion. Three studies were conducted to assess reaction time (RT in relation to deception, response congruity, and preparedness to deceive. Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. Findings indicate that deceptive responses have a longer RT than truthful responses, and that this relationship remains constant across response type and preparedness to deceive. The authors use these findings in preliminary support of a comprehensive cognitive model of deception.

  8. Random magnetism

    International Nuclear Information System (INIS)

    Tahir-Kheli, R.A.

    1975-01-01

    A few simple problems relating to random magnetic systems are presented. Translational symmetry, only on the macroscopic scale, is assumed for these systems. A random set of parameters, on the microscopic scale, for the various regions of these systems is also assumed. A probability distribution for randomness is obeyed. Knowledge of the form of these probability distributions, is assumed in all cases [pt

  9. DU weaponry: a view on facts and deceptions

    International Nuclear Information System (INIS)

    Joksimovich, V.

    2002-01-01

    The paper summarizes the results of literature research conducted by the author on the use of depleted uranium (DU) weaponry. The research was initiated during the NATO bombing of Yugoslavia in 1999 with an objective of searching for facts in the presence of massive deceptions staged by the huge propaganda machinery of DU weaponry use proponents. The U.S. made use of DU penetrators in the Persian Gulf war as well as in the Balkan wars both in Bosnia and Kosovo. Brief science and history backgrounds are provided including overviews of DU uses and abuses in these three wars. The U.S./NATO public pronouncements have been centered around the theme that there has been no proven link between DU and cancers. In the author's view, these types of carefully word engineered statements are motivated by possible compensation and cleanup claims rather than supported by hard data and sound science. Since underlying causes of so called Gulf and Balkan syndromes have not been found despite a decade elapsed since conclusion of the Persian Gulf War, the DU must continue to be a front-line suspect. From the standpoint of public health and safety, it is prudent and responsible to call for a moratorium. DU use in the Kosovo war, which was not sanctioned by the UN Security Council, was reckless in the extreme. (author)

  10. New sophistry: self-deception in the nursing academy.

    Science.gov (United States)

    Garrett, Bernard M

    2016-07-01

    In this essay, I advance an argument against the expansion and acceptance of postmodern metaphysical antirealist ideologies in the development of nursing theory in North America. I suggest mystical theoretical explanations of care, the rejection of empirical epistemology, and a return to divinity in nursing represent an intellectual dead end, as these ideas do little to help resolve real-world health issues and also negate the need for the academic discrimination of bad ideas. I examine some of the philosophical foundations of nursing theory and deconstruct some of the more preternatural theories that have become established as the dominant conventional wisdom in the academy. It is argued that this can be characterized as a form of self-deception, and overall has had a negative impact on advancement of the nursing profession and public health care. Reasons behind the widespread acceptance of these irrational theoretical stances in nursing and the ongoing support for mystical therapeutic interventions are explored. © 2016 John Wiley & Sons Ltd.

  11. Deception and Manipulation: The Arms of Leishmania, a Successful Parasite

    Science.gov (United States)

    Cecílio, Pedro; Pérez-Cabezas, Begoña; Santarém, Nuno; Maciel, Joana; Rodrigues, Vasco; Cordeiro da Silva, Anabela

    2014-01-01

    Leishmania spp. are intracellular parasitic protozoa responsible for a group of neglected tropical diseases, endemic in 98 countries around the world, called leishmaniasis. These parasites have a complex digenetic life cycle requiring a susceptible vertebrate host and a permissive insect vector, which allow their transmission. The clinical manifestations associated with leishmaniasis depend on complex interactions between the parasite and the host immune system. Consequently, leishmaniasis can be manifested as a self-healing cutaneous affliction or a visceral pathology, being the last one fatal in 85–90% of untreated cases. As a result of a long host–parasite co-evolutionary process, Leishmania spp. developed different immunomodulatory strategies that are essential for the establishment of infection. Only through deception and manipulation of the immune system, Leishmania spp. can complete its life cycle and survive. The understanding of the mechanisms associated with immune evasion and disease progression is essential for the development of novel therapies and vaccine approaches. Here, we revise how the parasite manipulates cell death and immune responses to survive and thrive in the shadow of the immune system. PMID:25368612

  12. Deception and Manipulation: the arms of Leishmania, a successful parasite

    Directory of Open Access Journals (Sweden)

    Pedro eCecílio

    2014-10-01

    Full Text Available Leishmania spp. are intracellular parasitic protozoa responsible for a group of neglected tropical diseases, endemic in 98 countries around the world, called leishmaniasis. These parasites have a complex digenetic life cycle requiring a susceptible vertebrate host and a permissive insect vector, which allow their transmission. The clinical manifestations associated with leishmaniasis depend on complex interactions between the parasite and the host immune system. Consequently, leishmaniasis can be manifested as a self-healing cutaneous affliction or a visceral pathology, being the last one fatal in 85-90% of untreated cases. As a result of a long host-parasite co-evolutionary process, Leishmania spp. developed different immunomodulatory strategies that are essential for the establishment of infection. Only through deception and manipulation of the immune system, Leishmania spp. can complete its life cycle and survive. The understanding of the mechanisms associated with immune evasion and disease progression is essential for the development of novel therapies and vaccine approaches. Here, we revise how the parasite manipulates cell death and immune responses to survive and thrive in the shadow of the immune system.

  13. Effects of Disfluency in Online Interpretation of Deception.

    Science.gov (United States)

    Loy, Jia E; Rohde, Hannah; Corley, Martin

    2017-05-01

    A speaker's manner of delivery of an utterance can affect a listener's pragmatic interpretation of the message. Disfluencies (such as filled pauses) influence a listener's off-line assessment of whether the speaker is truthful or deceptive. Do listeners also form this assessment during the moment-by-moment processing of the linguistic message? Here we present two experiments that examined listeners' judgments of whether a speaker was indicating the true location of the prize in a game during fluent and disfluent utterances. Participants' eye and mouse movements were biased toward the location named by the speaker during fluent utterances, whereas the opposite bias was observed during disfluent utterances. This difference emerged rapidly after the onset of the critical noun. Participants were similarly sensitive to disfluencies at the start of the utterance (Experiment 1) and in the middle (Experiment 2). Our findings support recent research showing that listeners integrate pragmatic information alongside semantic content during the earliest moments of language processing. Unlike prior work which has focused on pragmatic effects in the interpretation of the literal message, here we highlight disfluency's role in guiding a listener to an alternative non-literal message. Copyright © 2016 Cognitive Science Society, Inc.

  14. Adult smokers' responses to "corrective statements" regarding tobacco industry deception.

    Science.gov (United States)

    Kollath-Cattano, Christy L; Abad-Vivero, Erika N; Thrasher, James F; Bansal-Travers, Maansi; O'Connor, Richard J; Krugman, Dean M; Berg, Carla J; Hardin, James W

    2014-07-01

    To inform consumers, U.S. Federal Courts have ordered the tobacco industry to disseminate "corrective statements" (CSs) about their deception regarding five topics: smoker health effects, nonsmoker health effects, cigarette addictiveness, design of cigarettes to increase addiction, and relative safety of light cigarettes. To determine how smokers from diverse backgrounds respond to the final, court-mandated wording of these CSs. Data were analyzed from an online consumer panel of 1,404 adult smokers who evaluated one of five CS topics (n=280-281) by reporting novelty, relevance, anger at the industry, and motivation to quit because of the CS. Logistic and linear regression models assessed main and interactive effects of race/ethnicity, gender, education, and CS topic on these responses. Data were collected in January 2013 and analyzed in March 2013. Thirty percent to 54% of participants reported that each CS provided novel information, and novelty was associated with greater relevance, anger at the industry, and motivation to quit because of the message. African Americans and Latinos were more likely than non-Hispanic whites to report that CSs were novel, and they had stronger responses to CSs across all indicators. Compared to men, women reported that CSs were more relevant and motivated them to quit. This study suggests that smokers would value and respond to CSs, particularly smokers from groups that suffer from tobacco-related health disparities. Copyright © 2014. Published by Elsevier Inc.

  15. How children with head injury represent real and deceptive emotion in short narratives.

    Science.gov (United States)

    Dennis, M; Barnes, M A; Wilkinson, M; Humphreys, R P

    1998-02-15

    Narratives are not only about events, but also about the emotions those events elicit. Understanding a narrative involves not just the affective valence of implied emotional states, but the formation of an explicit mental representation of those states. In turn, this representation provides a mechanism that particularizes emotion and modulates its display, which then allows emotional expression to be modified according to particular contexts. This includes understanding that a character may feel an emotion but inhibit its display or even express a deceptive emotion. We studied how 59 school-aged children with head injury and 87 normally-developing age-matched controls understand real and deceptive emotions in brief narratives. Children with head injury showed less sensitivity than controls to how emotions are expressed in narratives. While they understood the real emotions in the text, and could recall what provoked the emotion and the reason for concealing it, they were less able than controls to identify deceptive emotions. Within the head injury group, factors such as an earlier age at head injury and frontal lobe contusions were associated with poor understanding of deceptive emotions. The results are discussed in terms of the distinction between emotions as felt and emotions as a cognitive framework for understanding other people's actions and mental states. We conclude that children with head injury understand emotional communication, the spontaneous externalization of real affect, but not emotive communication, the conscious, strategic modification of affective signals to influence others through deceptive facial expressions.

  16. A search for the volcanomagnetic signal at Deception volcano (South Shetland I., Antarctica

    Directory of Open Access Journals (Sweden)

    J. M. Ibáñez

    1997-06-01

    Full Text Available After the increase in seismic activity detected during the 1991-1992 summer survey at Deception Island, the continuous measurement of total magnetic intensity was included among the different techniques used to monitor this active volcano. The Polish geomagnetic observatory Arctowski, located on King George Island, served as a reference station, and changes in the differences between the daily mean values at both stations were interpreted as indicators of volcanomagnetic effects at Deception. A magnetic station in continuous recording mode was also installed during the 1993-1994 and 1994-1995 surveys. During the latter, a second magnetometer was deployed on Deception Island, and a third one in the vicinity of the Spanish Antarctic Station on Livingston Island (at a distance of 35 km and was used as a reference station. The results from the first survey suggest that a small magma injection, responsible for the seismic re-activation, could produce a volcanomagnetic effect, detected as a slight change in the difference between Deception and Arctowski. On the other hand, a long term variation starting at that moment seems to indicate a thermomagnetic effect. However the short register period of only two stations do not allow the sources to be modelled. The future deployment of a magnetic array during the austral summer surveys, throughout the volcano, and of a permanent geomagnetic observatory at Livingston I. is aimed at further observations of magnetic transients of volcanic origin at Deception Island.

  17. Stimulating the Right Temporoparietal Junction with tDCS Decreases Deception in Moral Hypocrisy and Unfairness

    Directory of Open Access Journals (Sweden)

    Honghong Tang

    2017-11-01

    Full Text Available Self-centered and other-regarding concerns play important roles in decisions of deception. To investigate how these two motivations affect deception in fairness related moral hypocrisy, we modulated the brain activity in the right temporoparietal junction (rTPJ, the key region for decision making involved in self-centered and other-regarding concerns. After receiving brain stimulation with transcranial direct current stimulation (tDCS, participants finished a modified dictator game. In the game, they played as proposers to make allocations between themselves and recipients and had a chance to deceive by misreporting their totals for allocations. Results show that deception in moral hypocrisy was decreased after anodal stimulation than sham and cathodal stimulation, only when participants know that their reported totals (appearing fair would be revealed to recipients rather than being unrevealed. Anodal stimulation also increased offers to recipients than cathodal stimulation regardless of the revelation of reported totals. These findings suggest that enhancing the activity of rTPJ decreased deception caused by impression management rather than self-deception in moral hypocrisy and unfairness through facilitating other-regarding concerns and weakening non-material self-centered motivations. They provide causal evidence for the role of rTPJ in both other-regarding concerns and non-material self-centered motivations, shedding light on the way to decrease moral hypocrisy.

  18. A Mosaic of Geothermal and Marine Features Shapes Microbial Community Structure on Deception Island Volcano, Antarctica

    Directory of Open Access Journals (Sweden)

    Amanda G. Bendia

    2018-05-01

    Full Text Available Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, and geochemistry in polar marine volcanoes. Thereby, we collected surface sediment samples associated with fumaroles and glaciers at two sites on Deception, with temperatures ranging from 0 to 98°C. Sequencing of the 16S rRNA gene was performed to assess the composition and diversity of Bacteria and Archaea. Our results revealed that Deception harbors a combination of taxonomic groups commonly found both in cold and geothermal environments of continental Antarctica, and also groups normally identified at deep and shallow-sea hydrothermal vents, such as hyperthermophilic archaea. We observed a clear separation in microbial community structure across environmental gradients, suggesting that microbial community structure is strongly niche driven on Deception. Bacterial community structure was significantly associated with temperature, pH, salinity, and chemical composition; in contrast, archaeal community structure was strongly associated only with temperature. Our work suggests that Deception represents a peculiar “open-air” laboratory to elucidate central questions regarding molecular adaptability, microbial evolution, and biogeography of extremophiles in polar regions.

  19. Recurrence of random walks with long-range steps generated by fractional Laplacian matrices on regular networks and simple cubic lattices

    Science.gov (United States)

    Michelitsch, T. M.; Collet, B. A.; Riascos, A. P.; Nowakowski, A. F.; Nicolleau, F. C. G. A.

    2017-12-01

    We analyze a Markovian random walk strategy on undirected regular networks involving power matrix functions of the type L\\frac{α{2}} where L indicates a ‘simple’ Laplacian matrix. We refer to such walks as ‘fractional random walks’ with admissible interval 0walk. From these analytical results we establish a generalization of Polya’s recurrence theorem for fractional random walks on d-dimensional infinite lattices: The fractional random walk is transient for dimensions d > α (recurrent for d≤slantα ) of the lattice. As a consequence, for 0walk is transient for all lattice dimensions d=1, 2, .. and in the range 1≤slantα walk is transient only for lattice dimensions d≥slant 3 . The generalization of Polya’s recurrence theorem remains valid for the class of random walks with Lévy flight asymptotics for long-range steps. We also analyze the mean first passage probabilities, mean residence times, mean first passage times and global mean first passage times (Kemeny constant) for the fractional random walk. For an infinite 1D lattice (infinite ring) we obtain for the transient regime 0walk is generated by the non-diagonality of the fractional Laplacian matrix with Lévy-type heavy tailed inverse power law decay for the probability of long-range moves. This non-local and asymptotic behavior of the fractional random walk introduces small-world properties with the emergence of Lévy flights on large (infinite) lattices.

  20. Randomized controlled trial of changes in dietary carbohydrate/fat ratio and simple vs complex carbohydrates on body weight and blood lipids: the CARMEN study. The Carbohydrate Ratio Management in European National diets.

    Science.gov (United States)

    Saris, W H; Astrup, A; Prentice, A M; Zunft, H J; Formiguera, X; Verboeket-van de Venne, W P; Raben, A; Poppitt, S D; Seppelt, B; Johnston, S; Vasilaras, T H; Keogh, G F

    2000-10-01

    To investigate the long-term effects of changes in dietary carbohydrate/fat ratio and simple vs complex carbohydrates. Randomized controlled multicentre trial (CARMEN), in which subjects were allocated for 6 months either to a seasonal control group (no intervention) or to one of three experimental groups: a control diet group (dietary intervention typical of the average national intake); a low-fat high simple carbohydrate group; or a low-fat high complex carbohydrate group. Three hundred and ninety eight moderately obese adults. The change in body weight was the primary outcome; changes in body composition and blood lipids were secondary outcomes. Body weight loss in the low-fat high simple carbohydrate and low-fat high complex carbohydrate groups was 0.9 kg (P Fat mass changed by -1.3kg (Plow-fat high simple carbohydrate, low-fat high complex carbohydrate and control diet groups, respectively. Changes in blood lipids did not differ significantly between the dietary treatment groups. Our findings suggest that reduction of fat intake results in a modest but significant reduction in body weight and body fatness. The concomitant increase in either simple or complex carbohydrates did not indicate significant differences in weight change. No adverse effects on blood lipids were observed. These findings underline the importance of this dietary change and its potential impact on the public health implications of obesity.

  1. Simple prostatectomy

    Science.gov (United States)

    ... Han M, Partin AW. Simple prostatectomy: open and robot-assisted laparoscopic approaches. In: Wein AJ, Kavoussi LR, ... M. is also a founding member of Hi-Ethics and subscribes to the principles of the Health ...

  2. Simple unification

    International Nuclear Information System (INIS)

    Ponce, W.A.; Zepeda, A.

    1987-08-01

    We present the results obtained from our systematic search of a simple Lie group that unifies weak and electromagnetic interactions in a single truly unified theory. We work with fractionally charged quarks, and allow for particles and antiparticles to belong to the same irreducible representation. We found that models based on SU(6), SU(7), SU(8) and SU(10) are viable candidates for simple unification. (author). 23 refs

  3. Gotcha! Findings from an exploratory investigation on the dangers of using deceptive practices in the mail-order business

    NARCIS (Netherlands)

    Vanhamme, J.; Lindgreen, A.

    2001-01-01

    This exploratory investigation examines the impact of some Belgian mail-order companies' deceptive practices - specifically, the use of gifts - on long-term relationships with their customers. The results support the premise that the use of deceptive gifts first elicits negative surprise and,

  4. 17 CFR 240.10b-3 - Employment of manipulative and deceptive devices by brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... deceptive devices by brokers or dealers. 240.10b-3 Section 240.10b-3 Commodity and Securities Exchanges... Contrivances § 240.10b-3 Employment of manipulative and deceptive devices by brokers or dealers. (a) It shall be unlawful for any broker or dealer, directly or indirectly, by the use of any means or...

  5. Deception Detection: The Relationship of Levels of Trust and Perspective Taking in Real-Time Online and Offline Communication Environments.

    Science.gov (United States)

    Friend, Catherine; Fox Hamilton, Nicola

    2016-09-01

    Where humans have been found to detect lies or deception only at the rate of chance in offline face-to-face communication (F2F), computer-mediated communication (CMC) online can elicit higher rates of trust and sharing of personal information than F2F. How do levels of trust and empathetic personality traits like perspective taking (PT) relate to deception detection in real-time CMC compared to F2F? A between groups correlational design (N = 40) demonstrated that, through a paired deceptive conversation task with confederates, levels of participant trust could predict accurate detection online but not offline. Second, participant PT abilities could not predict accurate detection in either conversation medium. Finally, this study found that conversation medium also had no effect on deception detection. This study finds support for the effects of the Truth Bias and online disinhibition in deception, and further implications in law enforcement are discussed.

  6. Temporal trends and bioavailability assessment of heavy metals in the sediments of Deception Bay, Queensland, Australia.

    Science.gov (United States)

    Brady, James P; Ayoko, Godwin A; Martens, Wayde N; Goonetilleke, Ashantha

    2014-12-15

    Thirteen sites in Deception Bay, Queensland, Australia were sampled three times over a period of 7 months and assessed for contamination by a range of heavy metals, primarily As, Cd, Cr, Cu, Pb and Hg. Fraction analysis, enrichment factors and Principal Components Analysis-Absolute Principal Component Scores (PCA-APCS) analysis were conducted in order to identify the potential bioavailability of these elements of concern and their sources. Hg and Te were identified as the elements of highest enrichment in Deception Bay while marine sediments, shipping and antifouling agents were identified as the sources of the Weak Acid Extractable Metals (WE-M), with antifouling agents showing long residence time for mercury contamination. This has significant implications for the future of monitoring and regulation of heavy metal contamination within Deception Bay. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Authority, Autonomy, and Deception: Evaluating the Legitimacy of Parental Authority and Adolescent Deceit.

    Science.gov (United States)

    Gingo, Matthew; Roded, Alona D; Turiel, Elliot

    2017-12-01

    This research examined adolescents' judgments about lying to avoid parental control over different types of activities. Participants (N = 66, M age  = 16.38, 73% European American) were interviewed about hypothetical situations describing adolescents who defied parental directives and lied about their defiance. Judgments about the legitimacy of parents' directives and protagonists' deception differed by types of parent relationship with adolescents (mutual or unilateral). Directives were least accepted, and deception was most accepted, in the context of unilateral relationships. Judgments also differed by domain of the action (personal, prudential, or conventional). Participants were least accepting of parental directives, and most accepting of deception about personal activities. Findings indicate that adolescents value honesty and parental authority, but sometimes give priority to concerns with autonomy and mutuality. © 2017 The Authors. Journal of Research on Adolescence © 2017 Society for Research on Adolescence.

  8. Perceptual training effects on anticipation of direct and deceptive 7-m throws in handball.

    Science.gov (United States)

    Alsharji, Khaled E; Wade, Michael G

    2016-01-01

    We examined the effectiveness of perceptual training on the performance of handball goalkeepers when anticipating the direction of both direct and deceptive 7-m throws. Skilled goalkeepers were assigned equally to three matched-ability groups based on their pre-test performance: a perceptual training group (n = 14) received video-based perceptual training, a placebo training group (n = 14) received video-based regular training and a control group received no training. Participants in the perceptual training group significantly improved their performance compared to both placebo and control groups; however, anticipation of deceptive throws improved less than for direct throws. The results confirm that although anticipating deception in handball is a challenging task for goalkeepers, task-specific perceptual training can minimise its effect and improve performance.

  9. Two simple strategies (adding a logo or a senior faculty's signature) failed to improve patient participation rates in a cohort study: randomized trial

    NARCIS (Netherlands)

    van Wonderen, Karina E.; Mohrs, Jacob; Jff, Machteld I.; Bindels, Patrick J. E.; ter Riet, Gerben

    2008-01-01

    Background: Patient participation in research studies is often difficult to achieve, and efforts to increase participation rates fail frequently. Given the paucity of evidence on interventions aimed at improving patient participation, we conducted a randomized trial. Objectives: The first was to

  10. Use of electronic healthcare records in large-scale simple randomized trials at the point of care for the documentation of value-based medicine

    NARCIS (Netherlands)

    Van Staa, T.-P.; Klungel, O.; Smeeth, L.

    A solid foundation of evidence of the effects of an intervention is a prerequisite of evidence-based medicine. The best source of such evidence is considered to be randomized trials, which are able to avoid confounding. However, they may not always estimate effectiveness in clinical practice.

  11. Simulating Pre-Asymptotic, Non-Fickian Transport Although Doing Simple Random Walks - Supported By Empirical Pore-Scale Velocity Distributions and Memory Effects

    Science.gov (United States)

    Most, S.; Jia, N.; Bijeljic, B.; Nowak, W.

    2016-12-01

    Pre-asymptotic characteristics are almost ubiquitous when analyzing solute transport processes in porous media. These pre-asymptotic aspects are caused by spatial coherence in the velocity field and by its heterogeneity. For the Lagrangian perspective of particle displacements, the causes of pre-asymptotic, non-Fickian transport are skewed velocity distribution, statistical dependencies between subsequent increments of particle positions (memory) and dependence between the x, y and z-components of particle increments. Valid simulation frameworks should account for these factors. We propose a particle tracking random walk (PTRW) simulation technique that can use empirical pore-space velocity distributions as input, enforces memory between subsequent random walk steps, and considers cross dependence. Thus, it is able to simulate pre-asymptotic non-Fickian transport phenomena. Our PTRW framework contains an advection/dispersion term plus a diffusion term. The advection/dispersion term produces time-series of particle increments from the velocity CDFs. These time series are equipped with memory by enforcing that the CDF values of subsequent velocities change only slightly. The latter is achieved through a random walk on the axis of CDF values between 0 and 1. The virtual diffusion coefficient for that random walk is our only fitting parameter. Cross-dependence can be enforced by constraining the random walk to certain combinations of CDF values between the three velocity components in x, y and z. We will show that this modelling framework is capable of simulating non-Fickian transport by comparison with a pore-scale transport simulation and we analyze the approach to asymptotic behavior.

  12. Extended Research on Detection of Deception Using Volatile Organic Compound (VOC) Emissions

    Energy Technology Data Exchange (ETDEWEB)

    Center for Human Reliability Studies

    2006-06-01

    A system that captures and analyzes volatile organic compound (VOC) emissions from skin surfaces may offer a viable alternative method to the polygraph instrument currently in use for detecting deception in U.S. government settings. Like the involuntary autonomic central nervous system response data gathered during polygraph testing, VOC emissions from the skin may provide data that can be used to detect stress caused by deception. Detecting VOCs, then, may present a noninvasive, non-intrusive method for observing, recording, and quantifying evidence of stress or emotional change.

  13. Looking for truth and finding lies: the prospects for a nascent neuroimaging of deception.

    Science.gov (United States)

    Spence, Sean A; Kaylor-Hughes, Catherine J

    2008-01-01

    Lying is ubiquitous and has acquired many names. In 'natural experiments', both pathological lying and truthfulness implicate prefrontal cortices. Recently, the advent of functional neuroimaging has allowed investigators to study deception in the non-pathological state. Prefrontal cortices are again implicated, although the regions identified vary across experiments. Forensic application of such technology (to the detection of deceit) requires the solution of tractable technical problems. Whether we 'should' detect deception remains an ethical problem: one for societies to resolve. However, such a procedure would only appear to be ethical when subjects volunteer to participate, as might occur during the investigation of alleged miscarriages of justice. We demonstrate how this might be approached.

  14. A functional MRI study of deception among offenders with antisocial personality disorders.

    Science.gov (United States)

    Jiang, W; Liu, H; Liao, J; Ma, X; Rong, P; Tang, Y; Wang, W

    2013-08-06

    Deceit is a core feature of antisocial personality disorder (ASPD), and the study of deception in ASPD has important implications for identifying the underlying mechanism of ASPD. A great deal of functional neuroimaging literature has described the neural correlates of deception in healthy volunteers, but there have been few imaging studies examining people with ASPD. The neural correlates of lie-telling in ASPD, and which specific brain activities are related to the capacity to lie, are unclear. In this study, 32 offenders who satisfied the Personality Diagnostic Questionaire-4 and PDI-IV (Personality Disorder Interview) criteria for ASPD were divided into three groups based on their capacity for deception, which was evaluated based on the deceitfulness criterion of the PDI-IV ASPD. All offenders underwent functional magnetic resonance imaging (fMRI) while responding to questions in a truthful, inverse, or deceitful manner. We primarily created contrasts in the brain activities between truth-telling and lie-telling, and then computed the Pearson's correlation coefficients between activities contrasts of individual, i.e. BOLD (blood-oxygen-level-dependent) strength during deception minus that during truth-telling, and the capacity for deception. Our results indicated that the bilateral dorsolateral prefrontal cortex extending to the middle frontal gyrus, the left inferior parietal lobule, and the bilateral anterior cingulate gyrus/medial superior frontal gyrus were associated with deception among people with ASPD. As the capacity for deception increased, the contrasted brain activities of the above regions decreased. This study found that truthful and untruthful communications of ASPD subjects can be differentiated in terms of brain BOLD activities, and more importantly, this study is the first to use fMRI to discover that BOLD activities during deception are correlated with the capacity to lie. The latter finding might challenge the diagnostic accuracy of lie

  15. Learning from simple ebooks, online cases or classroom teaching when acquiring complex knowledge. A randomized controlled trial in respiratory physiology and pulmonology

    DEFF Research Database (Denmark)

    Worm, Bjarne Skjødt

    2013-01-01

    E-learning is developing fast because of the rapid increased use of smartphones, tablets and portable computers. We might not think of it as e-learning, but today many new e-books are in fact very complex electronic teaching platforms. It is generally accepted that e-learning is as effective...... as classroom teaching methods, but little is known about its value in relaying contents of different levels of complexity to students. We set out to investigate e-learning effects on simple recall and complex problem-solving compared to classroom teaching....

  16. Simple, low-cost group-counselling programme vs treatment as usual for patients with newly notified occupational hand eczema-Exploratory analyses of effects on knowledge, behaviour and personal resources of the randomized PREVEX clinical trial

    DEFF Research Database (Denmark)

    Fisker, Maja H; Agner, Tove; Sørensen, Jennifer A

    2018-01-01

    and knowledge regarding skin protection and care, as well as personal resources, in patients with occupational hand eczema. METHODS: PREVEX is an individually randomized clinical trial investigating the 1-year effects of a simple, low-cost group-counselling programme vs treatment as usual for patients...... with notified occupational hand eczema. Exploratory outcomes were behaviour, knowledge, self-efficacy, and self-evaluated skin care ability. RESULTS: In total, 1668 patients with notified occupational skin disease were invited to participate, of whom 769 were randomized and 756 were analysed: intervention group...... (n = 376) vs control group (n = 380). Behaviour was improved and the knowledge score increased in the intervention group as compared with the control group (respectively: estimate 0.08; 95%CI: 0.02-0.19; P = .01; and estimate 0.49; 95%CI: 0.28-0.70; P 

  17. How do incentives lead to deception in advisors-client interactions? Explicit and implicit strategies of self-interested deception.

    Directory of Open Access Journals (Sweden)

    Barbara eMackinger

    2012-12-01

    Full Text Available When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information and to implicit strategic behavior (bias in information processing: evaluation and memory. In Study 1 explicit strategic behavior could be identified: Self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: Self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: When accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information, and to higher implicit strategic behavior (devaluated and remembered less conflicting information. Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients self-interested, but they are influenced unconsciously by biased information processing—a tendency which even increased with

  18. How do incentives lead to deception in advisor-client interactions? Explicit and implicit strategies of self-interested deception.

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors' motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor's self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients "self-interested," but they are influenced unconsciously by biased information processing - a tendency which even increased with high

  19. How Do Incentives Lead to Deception in Advisor–Client Interactions? Explicit and Implicit Strategies of Self-Interested Deception

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients “self-interested,” but they are influenced unconsciously by biased information processing – a tendency which even increased with high

  20. DOES THE INFERIOR FRONTAL SULCUS PLAY A FUNCTIONAL ROLE IN DECEPTION? A NEURONAVIGATED THETA-BURST TRANSCRANIAL MAGNETIC STIMULATION STUDY

    Directory of Open Access Journals (Sweden)

    Bruno eVerschuere

    2012-10-01

    Full Text Available Background. By definition, lying involves withholding the truth. Response inhibition may therefore be the cognitive function at the heart of deception. Neuroimaging research has shown that the same brain region that is activated during response inhibition tasks, namely the inferior frontal region, is also activated during deception paradigms. This led to the hypothesis that the inferior frontal region is the neural substrate critically involved in withholding the truth. Objective. We critically examine the functional necessity of the inferior frontal region in withholding the truth during deception. Method. We experimentally manipulated the neural activity level in right inferior frontal sulcus (IFS by means of neuronavigated continuous theta burst stimulation (cTBS. Individual structural magnetic resonance brain images (MRI were used to allow precise stimulation in each participant. Twenty-six participants answered autobiographical questions truthfully or deceptively before and after sham and real cTBS. Results. Deception was reliably associated with more errors, longer and more variable response times than truth telling. Despite the potential role of IFS in deception as suggested by neuroimaging data, the cTBS-induced disruption of right IFS did not affect response times or error rates, when compared to sham stimulation. Conclusions. The present findings do not support the hypothesis that the right inferior frontal sulcus is critically involved in deception.

  1. Two syringe spinal anesthesia technique for cesarean section: A controlled randomized study of a simple way to achieve more satisfactory block and less hypotension.

    Science.gov (United States)

    Keera, Amr Aly Ismail; Elnabtity, Ali Mohamed Ali

    2016-01-01

    Multiple trials have been tried to prevent hypotension during spinal anesthesia. However, the drug choice and mode of administration is still a matter of debate. To compare the outcome of spinal injection of hyperbaric bupivacaine and fentanyl separately to standard injection of mixed fentanyl with hyperbaric bupivacaine. A randomized, controlled clinical trial. One hundred twenty-four parturient scheduled for elective cesarean section were randomly allocated into two groups, each 62 parturient: Group M received spinal anesthesia using 10 mg bupivacaine 0.5% premixed with 25 μg fentanyl in the same syringe and Group S received 25 μg fentanyl in one syringe and 10 mg bupivacaine 0.5% without barbotage in a second syringe. Patients with intraoperative pain that was controllable without the need for a shift to general anesthesia was significantly lower in Group S (3.2%) than in Group M (16.1%). The frequency of hypotension was significantly lower in Group S compared to Group M (P 0.05). There was no significant difference in the time till occurrence of hypotension, duration of hypotension, mean dose of ephedrine used for the treatment of hypotension and frequency of patients developed itching between the groups (P > 0.05). Separate intrathecal injection of fentanyl and hyperbaric bupivacaine provided a significant improvement in the quality of sensory block and significant reduction of the frequency of hypotension compared to injection of mixed medications.

  2. On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-Mediated Communication

    Science.gov (United States)

    Hancock, Jeffrey T.; Curry, Lauren E.; Goorha, Saurabh; Woodworth, Michael

    2008-01-01

    This study investigated changes in both the liar's and the conversational partner's linguistic style across truthful and deceptive dyadic communication in a synchronous text-based setting. An analysis of 242 transcripts revealed that liars produced more words, more sense-based words (e.g., seeing, touching), and used fewer self-oriented but more…

  3. By Force or by Fraud: Optimizing U.S. Information Strategy With Deception

    Science.gov (United States)

    2016-06-01

    WITH DECEPTION Ryan Q. Flaherty Major, United States Army B.S., Sacred Heart University, 2001 M.B.A., Sacred Heart University, 2004...to hide their religious agenda of establishing an Islamic Republic under the cloak of Lebanese nationalism.163 B. UNITY OF EFFORT State Unity of

  4. 48 CFR 2152.203-70 - Misleading, deceptive, or unfair advertising.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Misleading, deceptive, or unfair advertising. 2152.203-70 Section 2152.203-70 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL EMPLOYEES GROUP LIFE INSURANCE FEDERAL ACQUISITION REGULATION CLAUSES AND FORMS PRECONTRACT PROVISIONS AND CONTRACT...

  5. Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective

    Science.gov (United States)

    Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li

    2017-01-01

    Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD)…

  6. Prokaryotic communities and operating metabolisms in the surface and the permafrost of Deception Island (Antarctica)

    NARCIS (Netherlands)

    Blanco, Yolanda; Prieto-Ballesteros, Olga; Gómez, Manuel J.; Moreno-Paz, Mercedes; García-Villadangos, Miriam; Rodríguez-Manfredi, José Antonio; Cruz-Gil, Patricia; Sánchez-Román, Mónica; Rivas, Luis A.; Parro, Victor

    In this study we examined the microbial community composition and operating metabolisms on the surface and in the permafrost of Deception Island, (Antarctica) with an on site antibody microarray biosensor. Samples (down to a depth of 4.2m) were analysed with LDChip300 (Life Detector Chip), an

  7. 14 CFR 399.80 - Unfair and deceptive practices of ticket agents.

    Science.gov (United States)

    2010-01-01

    ... (AVIATION PROCEEDINGS) POLICY STATEMENTS STATEMENTS OF GENERAL POLICY Policies Relating to Enforcement § 399.80 Unfair and deceptive practices of ticket agents. It is the policy of the Board to regard any of... are available, when such discounts or reductions are not specific in the lawful tariffs of the air...

  8. Isolation and characterization of Campylobacter spp. from Antarctic fur seals (Arctocephalus gazella) at Deception Island, Antarctica.

    Science.gov (United States)

    García-Peña, F J; Pérez-Boto, D; Jiménez, C; San Miguel, E; Echeita, A; Rengifo-Herrera, C; García-Párraga, D; Ortega-Mora, L M; Pedraza-Díaz, S

    2010-09-01

    The presence of Campylobacter spp. was investigated in 41 Antarctic fur seals (Arctocephalus gazella) and 9 Weddell seals (Leptonychotes weddellii) at Deception Island, Antarctica. Infections were encountered in six Antarctic fur seals. The isolates, the first reported from marine mammals in the Antarctic region, were identified as Campylobacter insulaenigrae and Campylobacter lari.

  9. 17 CFR 240.10b-5 - Employment of manipulative and deceptive devices.

    Science.gov (United States)

    2010-04-01

    ... fraud or deceit upon any person, in connection with the purchase or sale of any security. (Sec. 10; 48... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Employment of manipulative and deceptive devices. 240.10b-5 Section 240.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  10. Non-invasive brain stimulation in the detection of deception: scientific challenges and ethical consequences.

    Science.gov (United States)

    Luber, Bruce; Fisher, Carl; Appelbaum, Paul S; Ploesser, Marcus; Lisanby, Sarah H

    2009-01-01

    Tools for noninvasive stimulation of the brain, such as transcranial magnetic stimulation (TMS) and transcranial direct current stimulation (tDCS), have provided new insights in the study of brain-behavior relationships due to their ability to directly alter cortical activity. In particular, TMS and tDCS have proven to be useful tools for establishing causal relationships between behavioral and brain imaging measures. As such, there has been interest in whether these tools may represent novel technologies for deception detection by altering a person's ability to engage brain networks involved in conscious deceit. Investigation of deceptive behavior using noninvasive brain stimulation is at an early stage. Here we review the existing literature on the application of noninvasive brain stimulation in the study of deception. Whether such approaches could be usefully applied to the detection of deception by altering a person's ability to engage brain networks involved in conscious deceit remains to be validated. Ethical and legal consequences of the development of such a technology are discussed. Copyright 2009 John Wiley & Sons, Ltd.

  11. Destination memory and deception: when I lie to Barack Obama about the moon.

    Science.gov (United States)

    Haj, Mohamad El; Saloppé, Xavier; Nandrino, Jean Louis

    2018-05-01

    This study investigates whether deceivers demonstrate high memory of the person to whom lies have been told (i.e., high destination memory). Participants were asked to tell true information (e.g., the heart is a vital organ) and false information (e.g., the moon is bigger than the sun) to pictures of famous people (e.g., Barack Obama) and, in a subsequent recognition test, they had to remember to whom each type of information had previously been told. Participants were also assessed on a deception scale to divide them into two populations (i.e., those with high vs. those with low deception). Participants with high tendency to deceive demonstrated similar destination memory for both false and true information, whereas those with low deception demonstrated higher destination memory for lies than for true information. Individuals with a high tendency to deceive seem to keep track of the destination of both true information and lies to be consistent in their future social interactions, and thus to avoid discovery of their deception. However, the inconsistency between deceiving and the moral standard of individuals with a low tendency to deceive may result in high destination memory in these individuals.

  12. The use of the truth and deception in dementia care amongst general hospital staff.

    Science.gov (United States)

    Turner, Alex; Eccles, Fiona; Keady, John; Simpson, Jane; Elvish, Ruth

    2017-08-01

    Deceptive practice has been shown to be endemic in long-term care settings. However, little is known about the use of deception in dementia care within general hospitals and staff attitudes towards this practice. This study aimed to develop understanding of the experiences of general hospital staff and explore their decision-making processes when choosing whether to tell the truth or deceive a patient with dementia. This qualitative study drew upon a constructivist grounded theory approach to analyse data gathered from semi-structured interviews with a range of hospital staff. A model, grounded in participant experiences, was developed to describe their decision-making processes. Participants identified particular triggers that set in motion the need for a response. Various mediating factors influenced how staff chose to respond to these triggers. Overall, hospital staff were reluctant to either tell the truth or to lie to patients. Instead, 'distracting' or 'passing the buck' to another member of staff were preferred strategies. The issue of how truth and deception are defined was identified. The study adds to the growing research regarding the use of lies in dementia care by considering the decision-making processes for staff in general hospitals. Various factors influence how staff choose to respond to patients with dementia and whether deception is used. Similarities and differences with long-term dementia care settings are discussed. Clinical and research implications include: opening up the topic for further debate, implementing staff training about communication and evaluating the impact of these processes.

  13. Worthless donations: male deception and female counter play in a nuptial gift-giving spider.

    Science.gov (United States)

    Albo, Maria J; Winther, Gudrun; Tuni, Cristina; Toft, Søren; Bilde, Trine

    2011-11-14

    In nuptial gift-giving species, benefits of acquiring a mate may select for male deception by donation of worthless gifts. We investigated the effect of worthless gifts on mating success in the spider Pisaura mirabilis. Males usually offer an insect prey wrapped in silk; however, worthless gifts containing inedible items are reported. We tested male mating success in the following experimental groups: protein enriched fly gift (PG), regular fly gift (FG), worthless gift (WG), or no gift (NG). Males that offered worthless gifts acquired similar mating success as males offering nutritional gifts, while males with no gift experienced reduced mating success. The results suggest that strong selection on the nuptial gift-giving trait facilitates male deception by donation of worthless gifts. Females terminated matings faster when males offered worthless donations; this demonstrate a cost of deception for the males as shorter matings lead to reduced sperm transfer and thus give the deceiving males a disadvantage in sperm competition. We propose that the gift wrapping trait allows males to exploit female foraging preference by disguising the gift content thus deceiving females into mating without acquiring direct benefits. Female preference for a genuine prey gift combined with control over mating duration, however, counteracts the male deception.

  14. 48 CFR 1652.203-70 - Misleading, deceptive, or unfair advertising.

    Science.gov (United States)

    2010-10-01

    ... unfair advertising. 1652.203-70 Section 1652.203-70 Federal Acquisition Regulations System OFFICE OF... CLAUSES Texts of FEHBP Clauses 1652.203-70 Misleading, deceptive, or unfair advertising. As prescribed in... Unfair Advertising (JAN 1991) (a) The Carrier agrees that any advertising material, including that...

  15. When Worldviews Collide: What Linguistic Style Matching and Distal Language Reveal about Deception in Political Discourse

    Science.gov (United States)

    Booker, Lucille M.

    2012-01-01

    Political discourse is an observable, measurable, and testable manifestation of political worldviews. However, when worldviews collide, notions of truth and of lies are put to the test. The challenge for researchers is how to establish confidence in their analysis. Despite the growing interest in deception research from a diversity of fields and…

  16. Are computers effective lie detectors? A meta-analysis of linguistic cues to deception.

    Science.gov (United States)

    Hauch, Valerie; Blandón-Gitlin, Iris; Masip, Jaume; Sporer, Siegfried L

    2015-11-01

    This meta-analysis investigates linguistic cues to deception and whether these cues can be detected with computer programs. We integrated operational definitions for 79 cues from 44 studies where software had been used to identify linguistic deception cues. These cues were allocated to six research questions. As expected, the meta-analyses demonstrated that, relative to truth-tellers, liars experienced greater cognitive load, expressed more negative emotions, distanced themselves more from events, expressed fewer sensory-perceptual words, and referred less often to cognitive processes. However, liars were not more uncertain than truth-tellers. These effects were moderated by event type, involvement, emotional valence, intensity of interaction, motivation, and other moderators. Although the overall effect size was small, theory-driven predictions for certain cues received support. These findings not only further our knowledge about the usefulness of linguistic cues to detect deception with computers in applied settings but also elucidate the relationship between language and deception. © 2014 by the Society for Personality and Social Psychology, Inc.

  17. Catching a Deceiver in the Act: Processes Underlying Deception in an Interactive Interview Setting

    NARCIS (Netherlands)

    Ströfer, Sabine; Ufkes, Elze Gooitzen; Noordzij, Matthijs Leendert; Giebels, Ellen

    2016-01-01

    Lying is known to evoke stress and cognitive load. Both form cues to deception and lead to an increase in sympathetic nervous system (SNS) activity. But in reality, deceivers stick to the truth most the time and only lie occasionally. The present study therefore examined in an interactive suspect

  18. Observations of volcanic earthquakes and tremor at Deception Island - Antarctica

    Directory of Open Access Journals (Sweden)

    J. Morales

    1999-06-01

    Full Text Available Deception Island - South Shetlands, Antarctica is site of active volcanism. Since 1988 field surveys have been carried out with the aim of seismic monitoring, and in 1994 a seismic array was set up near the site of the Spanish summer base in order to better constrain the source location and spectral properties of the seismic events related to the volcanic activity. The array was maintained during the Antarctic summer of 1995 and the last field survey was carried out in 1996. Data show the existence of three different groups (or families of seismic events: 1 long period events, with a quasi-monochromatic spectral content (1-3 Hz peak frequency and a duration of more than 50 s, often occurring in small swarms lasting from several minutes to some day; 2 volcanic tremor, with a spectral shape similar to the long period events but with a duration of several minutes (2-10; 3 hybrid events, with a waveform characterised by the presence of a high frequency initial phase, followed by a low frequency phase with characteristics similar to those of the long period events. The high frequency phase of the hybrid events was analysed using polarisation techniques, showing the presence of P waves. This phase is presumably located at short epicentral distances and shallow source depth. All the analysed seismic events show back-azimuths between 120 and 330 degrees from north (corresponding to zones of volcanic activity showing no seismic activity in the middle of the caldera. Particle motion, Fourier spectral and spectrogram analysis show that the low frequency part of the three groups of the seismic signals have similar patterns. Moreover careful observations show that the high frequency phase which characterises the hybrid events is present in the long period and in the tremor events, even with lower signal to noise ratios. This evidence suggests that long period events are events in which the high frequency part is simply difficult to observe, due to a very

  19. Hemodynamic changes following injection of local anesthetics with different concentrations of epinephrine during simple tooth extraction: A prospective randomized clinical trial.

    Science.gov (United States)

    Abu-Mostafa, Nedal; Al-Showaikhat, Fatimah; Al-Shubbar, Fatimah; Al-Zawad, Kawther; Al-Zawad, Fatimah

    2015-10-01

    Presence of epinephrine in local anesthetic cartridge increases the duration of local anesthesia (LA), decreases the risk of toxicity, and provides hemostasis. However, the unfavorable effects are increasing heart rate (HR) and raising blood pressure (BP). The aim was to evaluate hemodynamic changes in the BP, HR, and oxygen saturation (SpO2) of normal patients undergoing tooth extraction using LA with various epinephrine concentrations. A prospective randomized clinical trial was conducted on 120 patients who were divided randomly into 3 parallel groups according to the LA received. Group 1: lidocaine 2% with epinephrine 1:80,000 (L80). Group 2: articaine 4% with epinephrine 1:100,000 (A100). Group 3: articaine 4% with epinephrine 1:200,000 (A200). normal patients whose BP extraction. Systolic blood pressure (SBP) significantly increased after injection of L80 and continued after extraction to be significant than pre-injection. SBP significantly increased after injection of A100 then decreased after extraction. In the group of A200, SBP insignificantly decreased after injection then increased after extraction. The increasing of SBP between time point 1and 2 was significantly higher in G1 than G3 (p=0.014). Diastolic blood pressure decreased after LA in the 3 groups; however it was significant only with L80, then increased after extraction for all. The changings of DBP, HR and SpO2 after anesthesia and extraction showed no significant difference among the three groups. However, A200 had significant lesser effect on SBP than L80 and the least effect on other parameters. Therefore, A200 is considered safer than L80 and A100 and is recommended for LA before teeth extraction in normal patient. Local anesthesia, lidocaine, epinephrine 1:80,000, articaine, epinephrine 1:100,000, epinephrine 1:200,000, tooth extraction.

  20. Emotional Intelligence and Mismatching Expressive and Verbal Messages: A Contribution to Detection of Deception

    Science.gov (United States)

    Wojciechowski, Jerzy; Stolarski, Maciej; Matthews, Gerald

    2014-01-01

    Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI). However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test) that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception. PMID:24658500

  1. Emotional intelligence and mismatching expressive and verbal messages: a contribution to detection of deception.

    Directory of Open Access Journals (Sweden)

    Jerzy Wojciechowski

    Full Text Available Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI. However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception.

  2. Enhancing cognitive and social-emotional development through a simple-to-administer mindfulness-based school program for elementary school children: a randomized controlled trial.

    Science.gov (United States)

    Schonert-Reichl, Kimberly A; Oberle, Eva; Lawlor, Molly Stewart; Abbott, David; Thomson, Kimberly; Oberlander, Tim F; Diamond, Adele

    2015-01-01

    The authors hypothesized that a social and emotional learning (SEL) program involving mindfulness and caring for others, designed for elementary school students, would enhance cognitive control, reduce stress, promote well-being and prosociality, and produce positive school outcomes. To test this hypothesis, 4 classes of combined 4th and 5th graders (N = 99) were randomly assigned to receive the SEL with mindfulness program versus a regular social responsibility program. Measures assessed executive functions (EFs), stress physiology via salivary cortisol, well-being (self-reports), prosociality and peer acceptance (peer reports), and math grades. Relative to children in the social responsibility program, children who received the SEL program with mindfulness (a) improved more in their cognitive control and stress physiology; (b) reported greater empathy, perspective-taking, emotional control, optimism, school self-concept, and mindfulness, (c) showed greater decreases in self-reported symptoms of depression and peer-rated aggression, (d) were rated by peers as more prosocial, and (e) increased in peer acceptance (or sociometric popularity). The results of this investigation suggest the promise of this SEL intervention and address a lacuna in the scientific literature-identifying strategies not only to ameliorate children's problems but also to cultivate their well-being and thriving. Directions for future research are discussed.

  3. Deceptive but Not Honest Manipulative Actions Are Associated with Increased Interaction between Middle and Inferior Frontal gyri

    Directory of Open Access Journals (Sweden)

    Maxim Kireev

    2017-08-01

    Full Text Available The prefrontal cortex is believed to be responsible for execution of deceptive behavior and its involvement is associated with greater cognitive efforts. It is also generally assumed that deception is associated with the inhibition of default honest actions. However, the precise neurophysiological mechanisms underlying this process remain largely unknown. The present study was aimed to use functional magnetic resonance imaging to reveal the underlying functional integration within the prefrontal cortex during the task which requires that subjects to deliberately mislead an opponent through the sequential execution of deceptive and honest claims. To address this issue, we performed psychophysiological interaction (PPI analysis, which allows for statistical assessment of changes in functional relationships between active brain areas in changing psychological contexts. As a result the whole brain PPI-analysis established that both manipulative honest and deceptive claiming were associated with an increase in connectivity between the left middle frontal gyrus and right temporo-parietal junction (rTPJ. Taking into account the role played by rTPJ in processes associated with the theory of mind the revealed data can reflect possible influence of socio-cognitive context on the process of selecting manipulative claiming regardless their honest or deceptive nature. Direct comparison between deceptive and honest claims revealed pattern enhancement of coupling between the left middle frontal gyrus and the left inferior frontal gyrus. This finding provided evidence that the execution of deception relies to a greater extent on higher-order hierarchically-organized brain mechanisms of executive control required to select between two competing deceptive or honest task sets.

  4. Reading aloud and solving simple arithmetic calculation intervention (Learning therapy improves inhibition, verbal episodic memory, focus attention, and processing speed in healthy elderly people: Evidence from a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Rui eNouchi

    2016-05-01

    Full Text Available BackgroundPrevious reports have described that simple cognitive training using reading aloud and solving simple arithmetic calculations, so-called learning therapy, can improve executive functions and processing speed in the older adults. Nevertheless, it is not well-known whether learning therapy improve a wide range of cognitive functions or not. We investigated the beneficial effects of learning therapy on various cognitive functions in healthy older adults.MethodsWe used a single-blinded intervention with two groups (learning therapy group: LT and waiting list control group: WL. Sixty-four elderly were randomly assigned to LT or WL. In LT, participants performed reading Japanese aloud and solving simple calculations training tasks for 6 months. WL did not participate in the intervention. We measured several cognitive functions before and after 6 months intervention periods.ResultsCompared to WL, results revealed that LT improved inhibition performance in executive functions (Stroop: LT (Mean = 3.88 vs. WL (Mean = 1.22, adjusted p =.013 and reverse Stroop LT (Mean = 3.22 vs. WL (Mean = 1.59, adjusted p =.015, verbal episodic memory (logical memory: LT (Mean = 4.59 vs. WL (Mean = 2.47, adjusted p =.015, focus attention(D-CAT: LT (Mean = 2.09 vs. WL (Mean = -0.59, adjusted p =.010 and processing speed compared to the waiting list control group (digit symbol coding: LT (Mean = 5.00 vs. WL (Mean = 1.13, adjusted p =.015 and symbol search: LT (Mean = 3.47 vs. WL (Mean = 1.81, adjusted p =.014.DiscussionThis RCT can showed the benefit of learning therapy on inhibition of executive functions, verbal episodic memory, focus attention, and processing speed in healthy elderly people. Our results were discussed under overlapping hypothesis.Trial registrationThis trial was registered in The University Hospital Medical Information Network Clinical Trials Registry (UMIN000006998.

  5. Waving the Red Flag: FTC Regulation of Deceptive Weight-Loss Advertising 1951-2009.

    Science.gov (United States)

    Lellis, Julie C

    2016-01-01

    This article documents the historical role of the Federal Trade Commission (FTC) in regulating deceptive weight-loss advertising, which the commission began to prioritize in the 1990s after a dramatic rise in complaints. It also includes the results of a content analysis of more than 150 FTC complaints filed between 1951 and 2009, which were used to analyze trends in advertising content, liability for deceptive practices, and outcomes. Regulatory efforts may not have curbed the use of bogus weight-loss claims, which have only increased over time. The FTC has made attempts to apply broad liability, but advertisers and corporate leaders continue to be named most frequently over other respondents, including advertising agencies, media outlets, and product endorsers. Although the number of complaints that result in financial penalties is increasing, the FTC lacks systematic and specific policies to adequately deter advertisers and address what continues to be a growing problem.

  6. Joseph Jastrow, the psychology of deception, and the racial economy of observation.

    Science.gov (United States)

    Pettit, Michael

    2007-01-01

    This article reconstructs the recurring themes in the career of Joseph Jastrow, both inside and outside the laboratory. His psychology of deception provides the bridge between his experimental and popular pursuits. Furthermore, Jastrow's career illustrates the complex ways in which scientific psychology and pragmatist philosophy operated within the constraints of a moral economy deeply marked by notions of "race." Psychological investigations of deception were grafted onto two of the human sciences' leading tools: the evolutionary narrative and the statistical analysis of populations. Such associations abetted the racialization of the acts of deceiving and being deceived. These connections also were used to craft moral lessons about how individuals ought to behave in relationship to the aggregate population and natural selection's endowment.

  7. The fundamental attribution error in detecting deception: the boy-who-cried-wolf effect.

    Science.gov (United States)

    O'Sullivan, Maureen

    2003-10-01

    Most people are unable to detect accurately when others are lying. Many explanations for this inability have been suggested but the cognitive heuristics involved in lie detection have received little attention. The present study offers evidence from two experiments, based on two different groups of observers, judging two different kinds of lies, presented in two different testing situations, that the fundamental attribution error significantly undermines the ability to detect honesty and deception accurately. Trait judgments of trustworthiness were highly correlated with state judgments of truthfulness, leading, as predicted, to positive correlations with honest detection accuracy and negative correlations with deception detection accuracy. More accurate lie detectors were significantly more likely than less accurate lie detectors to separate state and trait judgments of honesty. The effect of other biases, such as the halo effect and the truthfulness bias, also are examined. Implications for future research and practice are discussed.

  8. A Mosaic of Geothermal and Marine Features Shapes Microbial Community Structure on Deception Island Volcano, Antarctica

    OpenAIRE

    Amanda G. Bendia; Camila N. Signori; Diego C. Franco; Rubens T. D. Duarte; Brendan J. M. Bohannan; Vivian H. Pellizari

    2018-01-01

    Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, an...

  9. Modelling the Antecedent and Consequence of Consumer Perceived Deception in Loan Services

    OpenAIRE

    Mbawuni Joseph; Simon Gyasi Nimako

    2015-01-01

    This paper assesses the antecedent and consequence of consumer perceived deception (CPD) on consumer trust, satisfaction, attitude recommendation and intentions to acquire future loans from financial service providers. The proposed research model was tested using data from a survey of 371 loan customers of leading financial service providers in Ghana. Data were analysed using SmartPLS 2.0 for Partial Least Squares Structural Equation Modelling. The results show high information quality could ...

  10. Detecting deception in movement: the case of the side-step in rugby.

    Directory of Open Access Journals (Sweden)

    Sébastien Brault

    Full Text Available Although coordinated patterns of body movement can be used to communicate action intention, they can also be used to deceive. Often known as deceptive movements, these unpredictable patterns of body movement can give a competitive advantage to an attacker when trying to outwit a defender. In this particular study, we immersed novice and expert rugby players in an interactive virtual rugby environment to understand how the dynamics of deceptive body movement influence a defending player's decisions about how and when to act. When asked to judge final running direction, expert players who were found to tune into prospective tau-based information specified in the dynamics of 'honest' movement signals (Centre of Mass, performed significantly better than novices who tuned into the dynamics of 'deceptive' movement signals (upper trunk yaw and out-foot placement (p<.001. These findings were further corroborated in a second experiment where players were able to move as if to intercept or 'tackle' the virtual attacker. An analysis of action responses showed that experts waited significantly longer before initiating movement (p<.001. By waiting longer and picking up more information that would inform about future running direction these experts made significantly fewer errors (p<.05. In this paper we not only present a mathematical model that describes how deception in body-based movement is detected, but we also show how perceptual expertise is manifested in action expertise. We conclude that being able to tune into the 'honest' information specifying true running action intention gives a strong competitive advantage.

  11. The application of fractional Mel cepstral coefficient in deceptive speech detection.

    Science.gov (United States)

    Pan, Xinyu; Zhao, Heming; Zhou, Yan

    2015-01-01

    The inconvenience operation of EEG P300 or functional magnetic resonance imaging (FMRI) will be overcome, when the deceptive information can be effectively detected from speech signal analysis. In this paper, the fractional Mel cepstral coefficient (FrCC) is proposed as the speech character for deception detection. The different fractional order can reveal various personalities of the speakers. The linear discriminant analysis (LDA) model (which has the ability of global optimal vector mapping) is introduced, and the performance of FrCC and MFCC in deceptive detection is compared when all the data are mapped to low dimensional. Then, the hidden Markov model (HMM) is introduced as a long-term signal analysis tool. Twenty-five male and 25 female participants are involved in the experiment. The results show that the clustering effect of optimal fractional order FrCC is better than that of MFCC. The average accuracy for male and female speaker is 59.9% and 56.2%, respectively, by using the FrCC under the LDA model. When MFCC is used, the accuracy is reduced by 3.2% and 5.9%, respectively, for male and female. The accuracy can be increased to 71.0% and 70.2% for male and female speakers when HMM is used. Moreover, some individual accuracy is increased over 20%, or even more than 85%, when FrCC is introduced. The results show that the deceptive information is indeed hidden in the speech signals. Therefore, speech-based psychophysiology calculating may be a valuable research field.

  12. Toward a Robust Method of Presenting a Rich, Interconnected Deceptive Network Topology

    Science.gov (United States)

    2015-03-01

    SDN Software - Defined Networking SNOS Systemic Network Obfuscation System SSH Secure Shell TCP Transmission Control Protocol TTL time to...same DeTracer functionality directly on routers. One particularly interesting research area would be the use of Software - Defined Networking ( SDN ) to...Hughes, “Employing deceptive dynamic network topology through software - defined networking ,” M.S. thesis, Dept. Comput. Sci., Naval

  13. Deception Detection: Accuracy Levels Among International Military Officers Using Content and Contextual Questioning Methods

    Science.gov (United States)

    2016-12-01

    deception than any one method on its own. This research project focuses on students at the Naval Postgraduate School (NPS) in Monterey, CA, to...international military officers were also limited on the type of contextual questioning methods and scenarios. These scenarios were not a very good ...research received participation from 52 students . Although the sample size was small, proportionally, 24% is a good response rate for lab research

  14. A sacred command of reason? Deceit, deception, and dishonesty in nurse education.

    Science.gov (United States)

    Rolfe, Gary

    2016-07-01

    Kant (Grounding for the Metaphysics of Morals. Hackett, Indianapolis, 1797) described honesty as 'a sacred command of reason' which should be obeyed at all times and at any cost. This study inquires into the practice of dishonesty, deception, and deceit by universities in the UK in the pursuit of quality indicators such as league table positions, Research Excellence Framework (REF) scores, and student satisfaction survey results. Deception occurs when the metrics which inform these tables and surveys are manipulated to suggest an improvement in quality when, in fact, the raised scores are merely the result of clever strategic planning. Deceit occurs when these manipulated scores are deliberately and knowingly presented as real improvements in research and educational quality. It might be argued that, within the context of the artificial ivory tower world of academe, this is a game played by almost every academic in every higher education institution with no real losers and little wider consequence. However, this study suggests that some of the strategies employed by institutions to improve their scores without directly addressing the issue of quality can, in certain practice-based disciplines such as nursing, result in dire consequences for practitioners and service users. It concludes with a number of suggestions taken from personal experience to resolve the tension between the contractual demands placed on nurse academics by their employers and the moral and practical obligations of their professional body, most notably the use of subversion. The conclusion, contra Kant, is that the most effective strategy against dishonesty and deception is often more dishonesty and deception. © 2016 John Wiley & Sons Ltd.

  15. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management

    OpenAIRE

    Qiang Luo; Qiang Luo; Yina Ma; Yina Ma; Meghana A. Bhatt; Meghana A. Bhatt; P. Read Montague; P. Read Montague; P. Read Montague; Jianfeng Feng; Jianfeng Feng; Jianfeng Feng; Jianfeng Feng; Jianfeng Feng

    2017-01-01

    Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent...

  16. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management.

    Science.gov (United States)

    Luo, Qiang; Ma, Yina; Bhatt, Meghana A; Montague, P Read; Feng, Jianfeng

    2017-01-01

    Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN), which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition.

  17. Deception and Cognitive Load: Expanding our Horizon with a Working Memory Model

    Directory of Open Access Journals (Sweden)

    Siegfried Ludwig Sporer

    2016-04-01

    Full Text Available Deception and Cognitive Load: Expanding our Horizon with a Working Memory ModelAbstractRecently, studies on deception and its detection have increased dramatically. Many of these studies rely on the cognitive load approach as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes. Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley's (2000, 2007, 2012 working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009, the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed. Predictions regarding several moderator variables and methods to investigate them are proposed.

  18. Sex, Lies and fMRI—Gender Differences in Neural Basis of Deception

    Science.gov (United States)

    Falkiewicz, Marcel; Szeszkowski, Wojciech; Grabowska, Anna; Szatkowska, Iwona

    2012-01-01

    Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants’ subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG). Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization. PMID:22952631

  19. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management

    Directory of Open Access Journals (Sweden)

    Qiang Luo

    2017-11-01

    Full Text Available Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN, which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition.

  20. Sex, lies and fMRI--gender differences in neural basis of deception.

    Directory of Open Access Journals (Sweden)

    Artur Marchewka

    Full Text Available Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants' subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG. Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization.

  1. Improvements in Cycling Time Trial Performance Are Not Sustained Following the Acute Provision of Challenging and Deceptive Feedback

    Directory of Open Access Journals (Sweden)

    Hollie S Jones

    2016-09-01

    Full Text Available TThe provision of performance-related feedback during exercise is acknowledged as an influential external cue used to inform pacing decisions. The provision of this feedback in a challenging or deceptive context allows research to explore how feedback can be used to improve performance and influence perceptual responses. However, the effects of deception on both acute and residual responses have yet to be explored, despite potential application for performance enhancement. Therefore, this study investigated the effects of challenging and deceptive feedback on perceptual responses and performance in self-paced cycling time trials (TT and explored whether changes in performance are sustained in a subsequent TT following the disclosure of the deception.Seventeen trained male cyclists were assigned to either an accurate or deceptive feedback group and performed four 16.1 km cycling TTs; 1 and 2 ride-alone baseline TTs where a fastest baseline (FBL performance was identified, 3 a TT against a virtual avatar representing 102% of their FBL performance (PACER, and 4 a subsequent ride-alone TT (SUB. The deception group, however, were initially informed that the avatar accurately represented their FBL, but prior to SUB were correctly informed of the nature of the avatar. Affect, self-efficacy and RPE were measured every quartile. Both groups performed PACER faster than FBL and SUB (p < 0.05 and experienced lower affect (p = 0.016, lower self-efficacy (p = 0.011, and higher RPE (p < 0.001 in PACER than FBL. No significant differences were found between FBL and SUB for any variable. The presence of the pacer rather than the manipulation of performance beliefs acutely facilitates TT performance and perceptual responses. Revealing that athletes’ performance beliefs were falsely negative due to deceptive feedback provision has no effect on subsequent perceptions or performance. A single experiential exposure may not be sufficient to produce meaningful

  2. Simple stochastic simulation.

    Science.gov (United States)

    Schilstra, Maria J; Martin, Stephen R

    2009-01-01

    Stochastic simulations may be used to describe changes with time of a reaction system in a way that explicitly accounts for the fact that molecules show a significant degree of randomness in their dynamic behavior. The stochastic approach is almost invariably used when small numbers of molecules or molecular assemblies are involved because this randomness leads to significant deviations from the predictions of the conventional deterministic (or continuous) approach to the simulation of biochemical kinetics. Advances in computational methods over the three decades that have elapsed since the publication of Daniel Gillespie's seminal paper in 1977 (J. Phys. Chem. 81, 2340-2361) have allowed researchers to produce highly sophisticated models of complex biological systems. However, these models are frequently highly specific for the particular application and their description often involves mathematical treatments inaccessible to the nonspecialist. For anyone completely new to the field to apply such techniques in their own work might seem at first sight to be a rather intimidating prospect. However, the fundamental principles underlying the approach are in essence rather simple, and the aim of this article is to provide an entry point to the field for a newcomer. It focuses mainly on these general principles, both kinetic and computational, which tend to be not particularly well covered in specialist literature, and shows that interesting information may even be obtained using very simple operations in a conventional spreadsheet.

  3. The effectiveness of a clinical and home-based physical activity program and simple lymphatic drainage in the prevention of breast cancer-related lymphedema: A prospective randomized controlled study.

    Science.gov (United States)

    Dönmez, Ayşe Arıkan; Kapucu, Sevgisun

    2017-12-01

    To investigate the effectiveness of a clinical and home-based, nurse-led physical activity program (PAP) and simple lymphatic drainage (SLD) in the prevention of breast cancer-related lymphedema. A total of 52 breast cancer patients were randomized to either a PAP and SLD program (n = 25) or a control group (n = 27). Patients in both groups were also provided training for lymphedema. The PAP and SLD were administered through home visits by the investigators, twice a week for six weeks, in the intervention group. The control group did not undergo intervention. The circumference of the upper extremity, symptom severity, and physical function were measured in both groups. The upper extremity circumference increased by about two times from the baseline, in the control group, especially in the sixth week (p breast cancer surgery, starting from before surgery and continuing until after, to prevent breast cancer-related lymphedema. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. An object cue is more effective than a word in ERP-based detection of deception.

    Science.gov (United States)

    Cutmore, Tim R H; Djakovic, Tatjana; Kebbell, Mark R; Shum, David H K

    2009-03-01

    Recent studies of deception have used a form of the guilty knowledge test along with the oddball P300 event-related potential (ERP) to uncover hidden memories. These studies typically have used words as the cuing stimuli. In the present study, a mock crime was enacted by participants to prime their episodic memory and different memory cue types (Words, Pictures of Objects and Faces) were created to investigate their relative efficacy in identifying guilt. A peak-to peak (p-p) P300 response was computed for rare known non-guilty item (target), rare guilty knowledge item (probe) and frequently presented unknown items (irrelevant). Difference in this P300 measure between the probe and irrelevant was the key dependent variable. Object cues were found to be the most effective, particularly at the parietal site. A bootstrap procedure commonly used to detect deception in individual participants by comparing their probe and irrelevant P300 p-p showed the object cues to provide the best discrimination. Furthermore, using all three of the cue types together provided high detection accuracy (94%). These results confirm prior findings on the utility of ERPs for detecting deception. More importantly, they provide support for the hypothesis that direct cueing with a picture of the crime object may be more effective than using a word (consistent with the picture superiority effect reported in the literature). Finally, a face cue (e.g., crime victim) may also provide a useful probe for detection of guilty knowledge but this stimulus form needs to be chosen with due caution.

  5. Evolutionary relationships among pollinators and repeated pollinator sharing in sexually deceptive orchids.

    Science.gov (United States)

    Phillips, R D; Brown, G R; Dixon, K W; Hayes, C; Linde, C C; Peakall, R

    2017-09-01

    The mechanism of pollinator attraction is predicted to strongly influence both plant diversification and the extent of pollinator sharing between species. Sexually deceptive orchids rely on mimicry of species-specific sex pheromones to attract their insect pollinators. Given that sex pheromones tend to be conserved among related species, we predicted that in sexually deceptive orchids, (i) pollinator sharing is rare, (ii) closely related orchids use closely related pollinators and (iii) there is strong bias in the wasp lineages exploited by orchids. We focused on species that are pollinated by sexual deception of thynnine wasps in the distantly related genera Caladenia and Drakaea, including new field observations for 45 species of Caladenia. Specialization was extreme with most orchids using a single pollinator species. Unexpectedly, seven cases of pollinator sharing were found, including two between Caladenia and Drakaea, which exhibit strikingly different floral morphology. Phylogenetic analysis of pollinators using four nuclear sequence loci demonstrated that although orchids within major clades primarily use closely related pollinator species, up to 17% of orchids within these clades are pollinated by a member of a phylogenetically distant wasp genus. Further, compared to the total diversity of thynnine wasps within the study region, orchids show a strong bias towards exploiting certain genera. Although these patterns may arise through conservatism in the chemical classes used in sex pheromones, apparent switches between wasp clades suggest unexpected flexibility in floral semiochemical production. Alternatively, wasp sex pheromones within lineages may exhibit greater chemical diversity than currently appreciated. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  6. Transcriptome and proteome data reveal candidate genes for pollinator attraction in sexually deceptive orchids.

    Science.gov (United States)

    Sedeek, Khalid E M; Qi, Weihong; Schauer, Monica A; Gupta, Alok K; Poveda, Lucy; Xu, Shuqing; Liu, Zhong-Jian; Grossniklaus, Ueli; Schiestl, Florian P; Schlüter, Philipp M

    2013-01-01

    Sexually deceptive orchids of the genus Ophrys mimic the mating signals of their pollinator females to attract males as pollinators. This mode of pollination is highly specific and leads to strong reproductive isolation between species. This study aims to identify candidate genes responsible for pollinator attraction and reproductive isolation between three closely related species, O. exaltata, O. sphegodes and O. garganica. Floral traits such as odour, colour and morphology are necessary for successful pollinator attraction. In particular, different odour hydrocarbon profiles have been linked to differences in specific pollinator attraction among these species. Therefore, the identification of genes involved in these traits is important for understanding the molecular basis of pollinator attraction by sexually deceptive orchids. We have created floral reference transcriptomes and proteomes for these three Ophrys species using a combination of next-generation sequencing (454 and Solexa), Sanger sequencing, and shotgun proteomics (tandem mass spectrometry). In total, 121 917 unique transcripts and 3531 proteins were identified. This represents the first orchid proteome and transcriptome from the orchid subfamily Orchidoideae. Proteome data revealed proteins corresponding to 2644 transcripts and 887 proteins not observed in the transcriptome. Candidate genes for hydrocarbon and anthocyanin biosynthesis were represented by 156 and 61 unique transcripts in 20 and 7 genes classes, respectively. Moreover, transcription factors putatively involved in the regulation of flower odour, colour and morphology were annotated, including Myb, MADS and TCP factors. Our comprehensive data set generated by combining transcriptome and proteome technologies allowed identification of candidate genes for pollinator attraction and reproductive isolation among sexually deceptive orchids. This includes genes for hydrocarbon and anthocyanin biosynthesis and regulation, and the development of

  7. When is Deceptive Message Production More Effortful than Truth-Telling? A Baker's Dozen of Moderators.

    Science.gov (United States)

    Burgoon, Judee K

    2015-01-01

    Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker's dozen of moderators that may alter the degree of cognitive difficulty associated with producing deceptive messages. Among sender-related factors are memory processes, motivation, incentives, and consequences. Lying increases activation of a network of brain regions related to executive memory, suppression of unwanted behaviors, and task switching that is not observed with truth-telling. High motivation coupled with strong incentives or the risk of adverse consequences also prompts more cognitive exertion-for truth-tellers and deceivers alike-to appear credible, with associated effects on performance and message production effort, depending on the magnitude of effort, communicator skill, and experience. Factors related to message and communication context include discourse genre, type of prevarication, expected response length, communication medium, preparation, and recency of target event/issue. These factors can attenuate the degree of cognitive taxation on senders so that truth-telling and deceiving are similarly effortful. Factors related to the interpersonal relationship among interlocutors include whether sender and receiver are cooperative or adversarial and how well-acquainted they are with one another. A final consideration is whether the unit of analysis is the utterance, turn at talk, episode, entire interaction, or series of interactions. Taking these factors into account should produce a more nuanced answer to the question of when deception is more difficult than truth-telling.

  8. Equating Efficiency with Reduction: A Self-Deception in Energy Policy

    DEFF Research Database (Denmark)

    Wilhite, Harold; Nørgaard, Jørgen

    2004-01-01

    power, mobility and so on). The policy makers at the centre of the policy discourse on energy sustainability suffer from a form for self-deception which revolves around the equation of ‘efficiency’ with ‘reduction’ and ‘sustainability’, i.e., the untenable contention that technological and market...... and infrastructure for homes, businesses, transport, health and public services, so that it is neither ethical nor even practical to argue for restrictions in overall energy growth in these and other developing countries. This places the onus for deep reductions in energy use on Europe, North America and the other...

  9. A Deceptive Initiation: An Ecological Paradigm in Howard O’Hagan’s Tay John

    Directory of Open Access Journals (Sweden)

    Sergiy Yakovenko

    2017-11-01

    Full Text Available Howard O’Hagan’s novel Tay John has been widely discussed as a modernist work of deconstruction that undermines the established concepts of broadly understood mythology, narrative, and gender. In this article, I focus on one of the previously neglected aspects of the novel’s mythological drama – the clash of the pre-modern and modern ecological epistemai, which unfolds as an originary event of entering into modernity. I argue that the dramatic irony of a recoded indigenous myth introduces the aboriginal Shuswaps to the colonialist perception of the environment, deceptively making them hostages of their own beliefs and thereby drastically changing their temporal-spatial continuum.

  10. Multicenter prospective randomized study comparing the technique of using a bovine pericardium biological prosthesis reinforcement in parietal herniorrhaphy (Tutomesh TUTOGEN) with simple parietal herniorrhaphy, in a potentially contaminated setting.

    Science.gov (United States)

    Nedelcu, Marius; Verhaeghe, Pierre; Skalli, Mehdi; Champault, Gerard; Barrat, Christophe; Sebbag, Hugues; Reche, Fabian; Passebois, Laurent; Beyrne, Daniel; Gugenheim, Jean; Berdah, Stephane; Bouayed, Amine; Michel Fabre, Jean; Nocca, David

    2016-03-01

    The use of parietal synthetic prosthetic reinforcement material in potentially contaminated settings is not recommended, as there is a risk that the prosthesis may become infected. Thus, simple parietal herniorrhaphy, is the conventional treatment, even though there is a significant risk that the hernia may recur. Using new biomaterials of animal origin presently appears to offer a new therapeutic solution, but their effectiveness has yet to be demonstrated. The purpose of this multicenter prospective randomized single-blind study was to compare the surgical treatment of inguinal hernia or abdominal incisional hernia by simple parietal herniorrhaphy without prosthetic reinforcement (Group A), with Tutomesh TUTOGEN biological prosthesis reinforcement parietal herniorrhaphy (Group B), in a potentially contaminated setting. We examined early postoperative complications in the first month after the operation, performed an assessment after one year of survival without recurrence and analyzed the quality of life and pain of the patients (using SF-12 health status questionnaire and Visual Analog Pain Scale) at 1, 6, and 12 months, together with an economic impact study. Hundred and thirty four patients were enrolled between January 2009 and October 2010 in 20 French hospitals. The groups were comparable with respect to their enrollment characteristics, their history, types of operative indications and procedures carried out. At one month post-op, the rate of infectious complications (n(A) = 11(18.33%) vs. n(B) = 12(19.05%), p = 0.919) was not significantly different between the two groups. The assessment after one year of survival without recurrence revealed that survival was significantly greater in Group B (Group A recurrence: 10, Group B: 3; p = 0.0475). No difference in the patients' quality of life was demonstrated at 1, 6, or 12 months. However, at the 1 month follow-up, the "perceived health" rating seemed better in the group with Tutomesh (p

  11. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  12. Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model.

    Science.gov (United States)

    Sporer, Siegfried L

    2016-01-01

    Recently, studies on deception and its detection have increased dramatically. Many of these studies rely on the "cognitive load approach" as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley's (2000, 2007, 2012) working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal, and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009), the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed). Predictions regarding several moderator variables and methods to investigate them are proposed.

  13. Multiple shifts to different pollinators fuelled rapid diversification in sexually deceptive Ophrys orchids.

    Science.gov (United States)

    Breitkopf, Hendrik; Onstein, Renske E; Cafasso, Donata; Schlüter, Philipp M; Cozzolino, Salvatore

    2015-07-01

    Episodes of rapid speciation provide unique insights into evolutionary processes underlying species radiations and patterns of biodiversity. Here we investigated the radiation of sexually deceptive bee orchids (Ophrys). Based on a time-calibrated phylogeny and by means of ancestral character reconstruction and divergence time estimation, we estimated the tempo and mode of this radiation within a state-dependent evolutionary framework. It appears that, in the Pleistocene, the evolution of Ophrys was marked by episodes of rapid diversification coinciding with shifts to different pollinator types: from wasps to Eucera bees to Andrena and other bees. An abrupt increase in net diversification rate was detected in three clades. Among these, two phylogenetically distant lineages switched from Eucera to Andrena and other bees in a parallel fashion and at about the same time in their evolutionary history. Lack of early radiation associated with the evolution of the key innovation of sexual deception suggests that Ophrys diversification was mainly driven by subsequent ecological opportunities provided by the exploitation of novel pollinator groups, encompassing many bee species slightly differing in their sex pheromone communication systems, and by spatiotemporal fluctuations in the pollinator mosaic. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  14. Caldera unrest detected with seawater temperature anomalies at Deception Island, Antarctic Peninsula

    Science.gov (United States)

    Berrocoso, M.; Prates, G.; Fernández-Ros, A.; Peci, L. M.; de Gil, A.; Rosado, B.; Páez, R.; Jigena, B.

    2018-04-01

    Increased thermal activity was detected to coincide with the onset of volcano inflation in the seawater-filled caldera at Deception Island. This thermal activity was manifested in pulses of high water temperature that coincided with ocean tide cycles. The seawater temperature anomalies were detected by a thermometric sensor attached to the tide gauge (bottom pressure sensor). This was installed where the seawater circulation and the locations of known thermal anomalies, fumaroles and thermal springs, together favor the detection of water warmed within the caldera. Detection of the increased thermal activity was also possible because sea ice, which covers the entire caldera during the austral winter months, insulates the water and thus reduces temperature exchange between seawater and atmosphere. In these conditions, the water temperature data has been shown to provide significant information about Deception volcano activity. The detected seawater temperature increase, also observed in soil temperature readings, suggests rapid and near-simultaneous increase in geothermal activity with onset of caldera inflation and an increased number of seismic events observed in the following austral summer.

  15. Deceptive vibratory communication: pupae of a beetle exploit the freeze response of larvae to protect themselves.

    Science.gov (United States)

    Kojima, Wataru; Ishikawa, Yukio; Takanashi, Takuma

    2012-10-23

    It is argued that animal signals may have evolved so as to manipulate the response of receivers in a way that increases the fitness of the signallers. In deceptive communication, receivers incur costs by responding to false signals. Recently, we reported that pupae of the soil-inhabiting Japanese rhinoceros beetle Trypoxylus dichotoma produce vibratory signals to deter burrowing larvae, thereby protecting themselves. In the present study, monitoring of vibrations associated with larval movement revealed that T. dichotoma larvae remained motionless for ca 10 min when pupal vibratory signals were played back transiently (freeze response). Furthermore, pupal signals of T. dichotoma elicited a freeze response in three other scarabaeid species, whose pupae do not produce vibratory signals. This indicates that the freeze response to certain types of vibration evolved before the divergence of these species and has been evolutionarily conserved, presumably because of the fitness advantage in avoiding predators. Pupae of T. dichotoma have probably exploited pre-existing anti-predator responses of conspecific larvae to protect themselves by emitting deceptive vibratory signals.

  16. Simple Kidney Cysts

    Science.gov (United States)

    ... Solitary Kidney Your Kidneys & How They Work Simple Kidney Cysts What are simple kidney cysts? Simple kidney cysts are abnormal, fluid-filled ... that form in the kidneys. What are the kidneys and what do they do? The kidneys are ...

  17. The Myth of Offenders' Deception on Self-Report Measure Predicting Recidivism: Example from the Self-Appraisal Questionnaire (SAQ)

    Science.gov (United States)

    Loza, Wagdy; Loza-Fanous, Amel; Heseltine, Karen

    2007-01-01

    Two studies were conducted to investigate the vulnerability of the Self-Appraisal Questionnaire (SAQ) to deception and self-presentation biases. The SAQ is a self-report measure used to predict recidivism and guide institutional and program assignments. In the first study, comparisons were made between 429 volunteer offenders who completed the SAQ…

  18. Relational Aggression, Physical Aggression and Deception during Early Childhood: A Multimethod, Multi-Informant Short-Term Longitudinal Study

    Science.gov (United States)

    Ostrov, Jamie M.; Ries, Emily E.; Stauffacher, Kirstin; Godleski, Stephanie A.; Mullins, Adam D.

    2008-01-01

    A short-term longitudinal study examined relational and physical aggression and deceptive behavior among 120 preschool-aged children (M = 44.36 months old, SD = 11.07). Multiple informants and methods (i.e., observational, teacher reports) were used. Evidence for discriminant validity of the observations of aggression subtypes was found. For…

  19. A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases

    Science.gov (United States)

    Humpherys, Sean LaMarc

    2010-01-01

    Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification…

  20. Effect of nectar supplementation on male and female components of pollination success in the deceptive orchid Dactylorhiza sambucina

    Czech Academy of Sciences Publication Activity Database

    Jersáková, Jana; Johnson, S.D.; Kindlmann, Pavel; Pupin, A.C.

    2008-01-01

    Roč. 33, - (2008), s. 300-306 ISSN 1146-609X R&D Projects: GA MŠk(CZ) LC06073 Institutional research plan: CEZ:AV0Z60870520 Keywords : Dactylorhiza sambucina * Deception * Nectar supplementation * Pollination * Pollen removal and deposition Subject RIV: EH - Ecology, Behaviour Impact factor: 1.456, year: 2008

  1. 16 CFR 301.43 - Use of deceptive trade or corporate names, trademarks or graphic representations prohibited.

    Science.gov (United States)

    2010-01-01

    ..., trademarks or graphic representations prohibited. 301.43 Section 301.43 Commercial Practices FEDERAL TRADE... Regulations § 301.43 Use of deceptive trade or corporate names, trademarks or graphic representations prohibited. No person shall use in labeling, invoicing or advertising any fur or fur product a trade name...

  2. When deception becomes easy : The effects of task switching and goal neglect on the truth proportion effect

    NARCIS (Netherlands)

    van Bockstaele, B.; Wilhelm, C.; Meijer, E.; Debey, E.; Verschuere, B.

    2015-01-01

    Lying is typically more cognitively demanding than truth telling. Yet, recent cognitive models of lying propose that lying can be just as easy as truth telling, depending on contextual factors. In line with this idea, research has shown that the cognitive cost of deception decreases when people

  3. The Biosynthesis of Unusual Floral Volatiles and Blends Involved in Orchid Pollination by Deception: Current Progress and Future Prospects

    Directory of Open Access Journals (Sweden)

    Darren C. J. Wong

    2017-11-01

    Full Text Available Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems.

  4. The Biosynthesis of Unusual Floral Volatiles and Blends Involved in Orchid Pollination by Deception: Current Progress and Future Prospects.

    Science.gov (United States)

    Wong, Darren C J; Pichersky, Eran; Peakall, Rod

    2017-01-01

    Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen) in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few) by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems.

  5. Self-Deception in the Classroom: Educational Manifestations of Sartre's Concept of Bad Faith

    Science.gov (United States)

    Blenkinsop, Sean; Waddington, Tim

    2014-01-01

    This article explores an important section of Jean-Paul Sartre's famous early work, "Being and Nothingness." In that section Sartre proposes that part of the human condition is to actively engage in a particular kind of self-deception he calls bad faith. Bad faith is recognized by the obvious inconsistency between the purported…

  6. “Time for Some Traffic Problems": Enhancing E-Discovery and Big Data Processing Tools with Linguistic Methods for Deception Detection

    Directory of Open Access Journals (Sweden)

    Erin Smith Crabb

    2014-09-01

    Full Text Available Linguistic deception theory provides methods to discover potentially deceptive texts to make them accessible to clerical review. This paper proposes the integration of these linguistic methods with traditional e-discovery techniques to identify deceptive texts within a given author’s larger body of written work, such as their sent email box. First, a set of linguistic features associated with deception are identified and a prototype classifier is constructed to analyze texts and describe the features’ distributions, while avoiding topic-specific features to improve recall of relevant documents. The tool is then applied to a portion of the Enron Email Dataset to illustrate how these strategies identify records, providing an example of its advantages and capability to stratify the large data set at hand.

  7. Interference and deception detection technology of satellite navigation based on deep learning

    Science.gov (United States)

    Chen, Weiyi; Deng, Pingke; Qu, Yi; Zhang, Xiaoguang; Li, Yaping

    2017-10-01

    Satellite navigation system plays an important role in people's daily life and war. The strategic position of satellite navigation system is prominent, so it is very important to ensure that the satellite navigation system is not disturbed or destroyed. It is a critical means to detect the jamming signal to avoid the accident in a navigation system. At present, the detection technology of jamming signal in satellite navigation system is not intelligent , mainly relying on artificial decision and experience. For this issue, the paper proposes a method based on deep learning to monitor the interference source in a satellite navigation. By training the interference signal data, and extracting the features of the interference signal, the detection sys tem model is constructed. The simulation results show that, the detection accuracy of our detection system can reach nearly 70%. The method in our paper provides a new idea for the research on intelligent detection of interference and deception signal in a satellite navigation system.

  8. Liar, liar, working memory on fire: Investigating the role of working memory in childhood verbal deception.

    Science.gov (United States)

    Alloway, Tracy Packiam; McCallum, Fiona; Alloway, Ross G; Hoicka, Elena

    2015-09-01

    The aim of the current study was to investigate the role of working memory in verbal deception in children. We presented 6- and 7-year-olds with a temptation resistance paradigm; they played a trivia game and were then given an opportunity to peek at the final answers on the back of a card. Measures of both verbal and visuospatial working memory were included. The good liars performed better on the verbal working memory test in both processing and recall compared with the bad liars. However, there was no difference in visuospatial working scores between good liars and bad liars. This pattern suggests that verbal working memory plays a role in processing and manipulating the multiple pieces of information involved in lie-telling. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. It pays to cheat: tactical deception in a cephalopod social signalling system.

    Science.gov (United States)

    Brown, Culum; Garwood, Martin P; Williamson, Jane E

    2012-10-23

    Signals in intraspecific communication should be inherently honest; otherwise the system is prone to collapse. Theory predicts, however, that honest signalling systems are susceptible to invasion by cheats, the extent of which is largely mediated by fear of reprisal. Cuttlefish facultatively change their shape and colour, an ability that evolved to avoid predators and capture prey. Here, we show that this ability is tactically employed by male mourning cuttlefish (Sepia plangon) to mislead conspecifics during courtship in a specific social context amenable to cheating 39 per cent of the time, while it was never employed in other social contexts. Males deceive rival males by displaying male courtship patterns to receptive females on one side of the body, and simultaneously displaying female patterns to a single rival male on the other, thus preventing the rival from disrupting courtship. The use of tactical deception in such a complex communication network indicates that sociality has played a key role in the cognitive evolution of cephalopods.

  10. Radiocarbon and thermoluminescence dating of quaternary sediments in Deception Bay, southeast Queensland: some problems encountered

    International Nuclear Information System (INIS)

    Cotter, M.M.

    1999-01-01

    Full text: Radiocarbon and Thermoluminescence dating of sediment facies were utilised to develop a chronometric framework for the quaternary coastal evolution of Deception Bay southeast Queensland (Cotter 1996). This chronometric framework was developed in the context of a broader geoarchaeological and palaeogeographical investigation of the indigenous cultural landscape of the area. The TL analysis confirmed the presence of previously undated Pleistocene sands within the study area. However in the course of dating one sedimentary sequence, conventional radiocarbon analysis of Notispisula sheldls produced an age of 5190± 90 years BP (Beta-85415) whilst an overlying sandy unit (shown by particle size analysis and SEM surface textural analysis to be aeolian transported) subject to TL-dating produced an age of 14,900 ± 3300 years BP (W1942). This poster highlights the considerations made in order to reconcile this obvious anomaly. In effect, previously obtained radiometric data within the study area (Flood 1981; Hall 1996), in conjunction with an examination of the adequacy of the sampled materials for radiocarbon and TL age determinations point to the TL determination being in error. Similar anomalies have been shown to occur elsewhere in southeast Queensland (Tejan-Kella et al. 1990) explanations for which have been related to selective rather than total bleaching of Holocene sands (Prescott personal communication). Re-dating of the sand sequence using the selective bleach method is required to examine whether the dating anomaly shown for Deception Bay parallels selective bleaching effects determined for other sequences within southeast Queensland. Unfortunately this is beyond the scope and funds of this geoarchaeological study

  11. Crustal Structure Picture of Deception Island [western Bransfield Strait] From Gravimetric and Magnetic Data.

    Science.gov (United States)

    Catalán, M.; Carbó, A.; Martín, Davila; Muñoz, A.; Agudo, L.

    Bransfield Strait constitutes a marginal basin that separates the South Shetland archipielago from the Antarctic Peninsula. Since the beginning of its geological record, due to the presence of several submarine and above sea surface volcanoes, eruptions could be appointed easily. All these aspects turn the area as one of the most active at Antarctic region. During 1999 austral summer a seismic crisis was developed. It caused the organisation of a geophysical campaign called DECVOL, where several Spanish scientific institutions participated. Along this, several kinds of studies were carried out. Onland: geodesic GPS and gravity measurements, sampling and gases analysis, continuous seismic recording and geomagnetic measurements. Additionally a geophysical marine campaign [inside and outside Deception island] was carried out. Bathymetry and geopotential information [earth gravity field and geomagnetis m data] were acquired. The multi-disciplinar campaign goal was to perform a fast geophysical evaluation of the volcanic risk. This aspect was important particularly, because the emplacement of Spanish and Argentinean semi -permanent stations around its inner bay. In this study, potential field data recorded along this cruise have been used, together with satellite borne altimetry derived data for gravity, seismic bibliography information of the area, and finally magnetic data compiled in previous campaigns, that were processed until homogeneity could be guaranteed. All these gives a deep detail vision of the structure of the crust at Deception surroundings. In this communication the Bouguer gravity anomaly and scalar magnetic maps are presented, compared and discussed, as well as three gravity and magnetic marine profiles are 2D 1/2 modelled.

  12. Predict or classify: The deceptive role of time-locking in brain signal classification

    Science.gov (United States)

    Rusconi, Marco; Valleriani, Angelo

    2016-06-01

    Several experimental studies claim to be able to predict the outcome of simple decisions from brain signals measured before subjects are aware of their decision. Often, these studies use multivariate pattern recognition methods with the underlying assumption that the ability to classify the brain signal is equivalent to predict the decision itself. Here we show instead that it is possible to correctly classify a signal even if it does not contain any predictive information about the decision. We first define a simple stochastic model that mimics the random decision process between two equivalent alternatives, and generate a large number of independent trials that contain no choice-predictive information. The trials are first time-locked to the time point of the final event and then classified using standard machine-learning techniques. The resulting classification accuracy is above chance level long before the time point of time-locking. We then analyze the same trials using information theory. We demonstrate that the high classification accuracy is a consequence of time-locking and that its time behavior is simply related to the large relaxation time of the process. We conclude that when time-locking is a crucial step in the analysis of neural activity patterns, both the emergence and the timing of the classification accuracy are affected by structural properties of the network that generates the signal.

  13. Crossing simple resonances

    International Nuclear Information System (INIS)

    Collins, T.

    1985-08-01

    A simple criterion governs the beam distortion and/or loss of protons on a fast resonance crossing. Results from numerical integrations are illustrated for simple sextupole, octupole, and 10-pole resonances

  14. Crossing simple resonances

    Energy Technology Data Exchange (ETDEWEB)

    Collins, T.

    1985-08-01

    A simple criterion governs the beam distortion and/or loss of protons on a fast resonance crossing. Results from numerical integrations are illustrated for simple sextupole, octupole, and 10-pole resonances.

  15. Are Eyes Windows to a Deceiver's Soul? Children's Use of Another's Eye Gaze Cues in a Deceptive Situation

    Science.gov (United States)

    Freire, Alejo; Eskritt, Michelle; Lee, Kang

    2004-01-01

    Three experiments examined 3- to 5-year-olds' use of eye gaze cues to infer truth in a deceptive situation. Children watched a video of an actor who hid a toy in 1 of 3 cups. In Experiments 1 and 2, the actor claimed ignorance about the toy's location but looked toward 1 of the cups, without (Experiment 1) and with (Experiment 2) head movement. In…

  16. Facial markings in the social cuckoo wasp Polistes sulcifer: No support for the visual deception and the assessment hypotheses.

    Science.gov (United States)

    Cini, Alessandro; Ortolani, Irene; Zechini, Luigi; Cervo, Rita

    2015-02-01

    Insect social parasites have to conquer a host colony by overcoming its defensive barriers. In addition to increased fighting abilities, many social parasites evolved sophisticated sensory deception mechanisms to elude host colonies defenses by exploiting host communication channels. Recently, it has been shown that the conspicuous facial markings of a paper wasp social parasite, Polistes sulcifer, decrease the aggressiveness of host foundresses. Two main hypotheses stand as explanations of this phenomenon: visual sensory deception (i.e. the black patterning reduces host aggression by exploiting the host visual communication system) and visual quality assessment (i.e. facial markings reduce aggressiveness as they signal the increased fighting ability of parasites). Through behavioral assays and morphological measurements we tested three predictions resulting from these hypotheses and found no support either for the visual sensory deception or for the quality assessment to explain the reduction in host aggressiveness towards the parasite. Our results suggest that other discrimination processes may explain the observed phenomenon. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. A simple rule of thumb for elegant prehension.

    Science.gov (United States)

    Mon-Williams, M; Tresilian, J R

    2001-07-10

    Reaching out to grasp an object (prehension) is a deceptively elegant and skilled behavior. The movement prior to object contact can be described as having two components, the movement of the hand to an appropriate location for gripping the object, the "transport" component, and the opening and closing of the aperture between the fingers as they prepare to grip the target, the "grasp" component. The grasp component is sensitive to the size of the object, so that a larger grasp aperture is formed for wider objects; the maximum grasp aperture (MGA) is a little wider than the width of the target object and occurs later in the movement for larger objects. We present a simple model that can account for the temporal relationship between the transport and grasp components. We report the results of an experiment providing empirical support for our "rule of thumb." The model provides a simple, but plausible, account of a neural control strategy that has been the center of debate over the last two decades.

  18. A reverse order interview does not aid deception detection regarding intentions.

    Science.gov (United States)

    Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris

    2015-01-01

    Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques.

  19. Impression management ("lie") scales are associated with interpersonally oriented self-control, not other-deception.

    Science.gov (United States)

    Uziel, Liad

    2014-06-01

    This article explores the status of impression management (IM) scales ("lie scales," notably, BIDR-IM) as measures of response bias, offers theory-driven substantive meaning to them, and compares them with self-deception enhancement (SDE). Study 1 (N = 99) compared self-descriptions of actual self and ideal self given in a non-anonymous setting. High similarity indicates self-enhancement. Study 2 (70 dyads) analyzed self-other agreement about IM and SDE. Agreement indicates substantive basis to the scales' scores. Study 3 (N = 182) explored the centrality of self-control in the self-perception of individuals varying in IM and SDE. Study 4 (95 dyads) corroborated self-reports about self-control using informants' reports. In Study 1, IM was associated with relative humility, whereas SDE was associated with self-enhancement. In Study 2, strong self-other agreement was found only for IM, indicating that high IM (but not SDE) is grounded in real-life behavior. In Study 3, self-control was central in the self-perception of high IM and high SDE individuals. In Study 4, strong relations with self-control were corroborated by informants only for IM. IM scales measure substantive content associated with self-control aimed at social adaptation, whereas the SDE scale depicts individuals with a grandiose self-perception, who fail to impress knowledgeable others. © 2013 Wiley Periodicals, Inc.

  20. Reflections on Phishing for Phools – The Economics of Manipulation and Deception

    Directory of Open Access Journals (Sweden)

    Thomas Klikauer

    2016-04-01

    Full Text Available Abstract: Nobel Prize winning economists Akerlof and Shiller’s phishing for phools explains the economics behind mass deception and manipulation in market economies. While “phishing” is commonly known as a form of internet fraught, their book ‘takes a new, broader meaning, i.e. getting people to do things that are in the interest of the phisherman, but not in the interest of the target. A phool is someone who, for whatever reason, is successfully phished. These are emotional phools (feelings override common sense and information phools (people act on information that is intentionally crafted to mislead them. Divided into “unpaid bills and financial crash”, “phishing in many contexts”, and “general lessons”, the book uses rafts of examples from economics, the media, and advertising to substantiate their claim. While it avoids linking their findings to capitalism, the book contains a few helpful hints when seeking to avoid being “phished as a phool”. In the end, and despite the economic analysis of the two Nobel Prize winners, the more illuminating book on the subject remains Lindstrom’s “Buyology”.

  1. A reverse order interview does not aid deception detection regarding intentions

    Science.gov (United States)

    Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris

    2015-01-01

    Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques PMID:26379610

  2. Friendship after a friends with benefits relationship: deception, psychological functioning, and social connectedness.

    Science.gov (United States)

    Owen, Jesse; Fincham, Frank D; Manthos, Megan

    2013-11-01

    Friends with benefits (FWB) relationships are formed by an integration of friendship and sexual intimacy, typically without the explicit commitments characteristic of an exclusive romantic relationship. The majority of these relationships do not transition into committed romantic relationships, raising questions about what happens to the relationship after the FWB ends. In a sample of 119 men and 189 women university students, with a median age of 19 years and the majority identified as Caucasian (63.6 %), we assessed relationship adjustment, feelings of deception, perception of the FWB relationship and friendship, social connectedness, psychological distress, and loneliness. Results demonstrated that the majority of FWB relationships continued as friendships after the sexual intimacy ceased and that about 50 % of the participants reported feeling as close or closer to their FWB partner. Those who did not remain friends were more likely to report that their FWB relationship was more sex- than friendship-based; they also reported higher levels of feeling deceived by their FWB partner and higher levels of loneliness and psychological distress, but lower levels of mutual social connectedness. Higher levels of feeling deceived were related to feeling less close to the post-FWB friend; also, more sex-based FWB relationships were likely to result in post-FWB friendships that were either more or less close (as opposed to unchanged). FWB relationships, especially those that include more attention to friendship based intimacy, do not appear to negatively impact the quality of the friendship after the "with benefits" ends.

  3. Can training improve laypersons helping behaviour in first aid? A randomised controlled deception trial.

    Science.gov (United States)

    Van de Velde, Stijn; Roex, Ann; Vangronsveld, Karoline; Niezink, Lidewij; Van Praet, Koen; Heselmans, Annemie; Donceel, Peter; Vandekerckhove, Philippe; Ramaekers, Dirk; Aertgeerts, Bert

    2013-04-01

    There is limited evidence indicating that laypersons trained in first aid provide better help, but do not help more often than untrained laypersons. This study investigated the effect of conventional first aid training versus conventional training plus supplementary training aimed at decreasing barriers to helping. The authors conducted a randomised controlled trial. After 24 h of conventional first aid training, the participants either attended an experimental lesson to reduce barriers to helping or followed a control lesson. The authors used a deception test to measure the time between the start of the unannounced simulated emergency and seeking help behaviour and the number of particular helping actions. The authors randomised 72 participants to both groups. 22 participants were included in the analysis for the experimental group and 36 in the control group. The authors found no statistically or clinically significant differences for any of the outcome measures. The time until seeking help (geometrical mean and 95% CI) was 55.5 s (42.9 to 72.0) in the experimental group and 56.5 s (43.0 to 74.3) in the control group. 57% of the participants asked a bystander to seek help, 40% left the victim to seek help themselves and 3% did not seek any help. Supplementary training on dealing with barriers to helping did not alter the helping behaviour. The timing and appropriateness of the aid provided can be improved. The authors registered this trial at ClinicalTrials.gov as NCT00954161.

  4. Adult Smokers' Responses to “Corrective Statements” Regarding Tobacco Industry Deception

    Science.gov (United States)

    Kollath-Cattano, Christy L.; Abad-Vivero, Erika N.; Thrasher, James F.; Bansal-Travers, Maansi; O'Connor, Richard J.; Krugman, Dean M.; Berg, Carla J.; Hardin, James W.

    2014-01-01

    Background To inform consumers, U.S. Federal Courts have ordered the tobacco industry to disseminate “corrective statements” (CSs) about their deception regarding five topics: smoker health effects, nonsmoker health effects, cigarette addictiveness, design of cigarettes to increase addiction, and relative safety of light cigarettes. Purpose To determine how smokers from diverse backgrounds respond to the final, court-mandated wording of these CSs. Methods Data were analyzed from an online consumer panel of 1,404 adult smokers who evaluated one of five CS topics (n=280–281) by reporting novelty, relevance, anger at the industry, and motivation to quit because of the CS. Logistic and linear regression models assessed main and interactive effects of race/ethnicity, gender, education, and CS topic on these responses. Data were collected in January 2013 and analyzed in March 2013. Results Thirty percent to 54% of participants reported that each CS provided novel information, and novelty was associated with greater relevance, anger at the industry, and motivation to quit because of the message. African Americans and Latinos were more likely than non-Hispanic whites to report that CSs were novel, and they had stronger responses to CSs across all indicators. Compared to men, women reported that CSs were more relevant and motivated them to quit. Conclusions This study suggests that smokers would value and respond to CSs, particularly smokers from groups that suffer from tobacco–related health disparities. PMID:24746372

  5. Secrecy in Educational Practices: Enacting Nested Black Boxes in Cheating and Deception Detection Systems

    Directory of Open Access Journals (Sweden)

    Jo An Oravec

    2018-02-01

    Full Text Available This paper covers secrecy from the vantage point of recent technological initiatives designed to detect cheating and deception in educational contexts as well as to monitor off-campus social media speech code violations. Many of these systems are developed and implemented by third-party corporate entities who claim practices to be proprietary and secret. The outsourcers involved in these efforts have provided one level of secrecy and educational administrators involved yet another level, thus constructing "nested black boxes." Also discussed in this paper is the “paranoid style” of administration, often supported by the surveillance and construction of rosters of potential non-conformists, such as alleged cheaters and speech code violators. The educational technologies described in this article are increasingly applied to workplace practices, with young people being trained in what is deemed acceptable conduct. Secrecy can serve to alter the character of relationships within the educational institutions involved as well as inside the workplaces in which the approaches are increasingly being integrated.

  6. Potential ash impact from Antarctic volcanoes: Insights from Deception Island's most recent eruption.

    Science.gov (United States)

    Geyer, A; Marti, A; Giralt, S; Folch, A

    2017-11-28

    Ash emitted during explosive volcanic eruptions may disperse over vast areas of the globe posing a threat to human health and infrastructures and causing significant disruption to air traffic. In Antarctica, at least five volcanoes have reported historic activity. However, no attention has been paid to the potential socio-economic and environmental consequences of an ash-forming eruption occurring at high southern latitudes. This work shows how ash from Antarctic volcanoes may pose a higher threat than previously believed. As a case study, we evaluate the potential impacts of ash for a given eruption scenario from Deception Island, one of the most active volcanoes in Antarctica. Numerical simulations using the novel MMB-MONARCH-ASH model demonstrate that volcanic ash emitted from Antarctic volcanoes could potentially encircle the globe, leading to significant consequences for global aviation safety. Results obtained recall the need for performing proper hazard assessment on Antarctic volcanoes, and are crucial for understanding the patterns of ash distribution at high southern latitudes with strong implications for tephrostratigraphy, which is pivotal to synchronize palaeoclimatic records.

  7. Double Deception: Ant-Mimicking Spiders Elude Both Visually- and Chemically-Oriented Predators

    Science.gov (United States)

    Uma, Divya; Durkee, Caitlin; Herzner, Gudrun; Weiss, Martha

    2013-01-01

    Biological mimicry is often multimodal, in that a mimic reinforces its resemblance to another organism via different kinds of signals that can be perceived by a specific target audience. In this paper we describe a novel scenario, in which a mimic deceives at least two distinct audiences, each of which relies primarily on a different sensory modality for decision-making. We have previously shown that Peckhamia picata, a myrmecomorphic spider that morphologically and behaviorally resembles the ant Camponotus nearcticus, experiences reduced predation by visually-oriented jumping spiders. Here we report that Peckhamia also faces reduced aggression from spider-hunting sphecid wasps as well as from its model ant, both of which use chemical cues to identify prey. We also report that Peckhamia does not chemically resemble its model ants, and that its total cuticular hydrocarbons are significantly lower than those of the ants and non-mimic spiders. Although further studies are needed to clarify the basis of Peckhamia's chemically-mediated protection, to our knowledge, such ‘double deception,’ in which a single organism sends misleading visual cues to one set of predators while chemically misleading another set, has not been reported; however, it is likely to be common among what have until now been considered purely visual mimics. PMID:24236152

  8. Simple WZW currents

    International Nuclear Information System (INIS)

    Fuchs, J.

    1990-08-01

    A complete classification of simple currents of WZW theory is obtained. The proof is based on an analysis of the quantum dimensions of the primary fields. Simple currents are precisely the primaries with unit quantum dimension; for WZW theories explicit formulae for the quantum dimensions can be derived so that an identification of the fields with unit quantum dimension is possible. (author). 19 refs.; 2 tabs

  9. When is deceptive message production more effortful than truth-telling? A baker’s dozen of moderators

    Directory of Open Access Journals (Sweden)

    Judee K Burgoon

    2015-12-01

    Full Text Available Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker’s dozen of moderators that may alter the degree of cognitive difficulty associated with producing deceptive messages. Among sender-related factors are memory processes, motivation, incentives, and consequences. Lying increases activation of a network of brain regions related to executive memory, suppression of unwanted behaviors, and task switching that is not observed with truth-telling. High motivation coupled with strong incentives or the risk of adverse consequences also prompts more cognitive exertion--for truth-tellers and deceivers alike--to appear credible, with associated effects on performance and message production effort, depending on the magnitude of effort, communicator skill and experience. Factors related to message and communication context include discourse genre, type of prevarication, expected response length, communication medium, preparation, and recency of target event/issue. These factors can attenuate the degree of cognitive taxation on senders so that truth-telling and deceiving are similarly effortful. Factors related to the interpersonal relationship among interlocutors include whether sender and receiver are cooperative or adversarial and how well-acquainted they are with one another. A final consideration is whether the unit of analysis is the utterance, turn at talk, episode, entire interaction, or series of interactions. Taking these factors into account should produce a more nuanced answer to the question of when deception is more difficult than truth-telling.

  10. Seismic monitoring at Deception Island volcano (Antarctica): the 2010-2011 survey

    Science.gov (United States)

    Martín, R.; Carmona, E.; Almendros, J.; Serrano, I.; Villaseñor, A.; Galeano, J.

    2012-04-01

    As an example of the recent advances introduced in seismic monitoring of Deception Island volcano (Antarctica) during recent years, we describe the instrumental network deployed during the 2010-2011 survey by the Instituto Andaluz de Geofísica of University of Granada, Spain (IAG-UGR). The period of operation extended from December 19, 2010 to March 5, 2011. We deployed a wireless seismic network composed by four three-component seismic stations. These stations are based on 24-bit SL04 SARA dataloggers sampling at 100 sps. They use a PC with embedded linux and SEISLOG data acquisition software. We use two types of three-component seismometers: short-period Mark L4C with natural frequency of 1 Hz and medium-period Lennartz3D/5s with natural frequency of 0.2 Hz. The network was designed for an optimum spatial coverage of the northern half of Deception, where a magma chamber has been reported. Station locations include the vicinity of the Spanish base "Gabriel de Castilla" (GdC), Obsidianas Beach, a zone near the craters from the 1970 eruptions, and the Chilean Shelter located south of Pendulum Cove. Continuous data from the local seismic network are received in real-time in the base by wifi transmission. We used Ubiquiti Networks Nanostation2 antennas with 2.4 GHz, dual-polarity, 10 dBi gain, and 54 Mbps transmission rate. They have shown a great robustness and speed for real-time applications. To prioritize data acquisition when the battery level is low, we have designed a circuit that allows independent power management for the seismic station and wireless transmission system. The reception antenna located at GdC is connected to a computer running SEISCOMP. This software supports several transmission protocols and manages the visualization and recording of seismic data, including the generation of summary plots to show the seismic activity. These twelve data channels are stored in miniseed format and displayed in real time, which allows for a rapid evaluation of

  11. A massive experiment on choice blindness in political decisions: Confidence, confabulation, and unconscious detection of self-deception.

    Directory of Open Access Journals (Sweden)

    Andrés Rieznik

    Full Text Available We implemented a Choice Blindness Paradigm containing political statements in Argentina to reveal the existence of categorical ranges of introspective reports, identified by confidence and agreement levels, separating easy from very hard to manipulate decisions. CBP was implemented in both live and web-based forms. Importantly, and contrary to what was observed in Sweden, we did not observe changes in voting intentions. Also, confidence levels in the manipulated replies where significantly lower than in non-manipulated cases even in undetected manipulations. We name this phenomenon unconscious detection of self-deception. Results also show that females are more difficult to manipulate than men.

  12. Deception, discrimination, and fear of reprisal: lessons in ethics from third-year medical students.

    Science.gov (United States)

    Caldicott, Catherine V; Faber-Langendoen, Kathy

    2005-09-01

    To systematically examine ethical conflicts reported by all State University of New York Upstate Medical University third-year students, compare them with conflicts reported in the literature, and identify content areas that compel new or renewed emphasis in national educational objectives, standard curricula, and texts. From 1999 to 2002, all third-year students submitted papers for a required bioethics course. These papers depicted ethical issues arising during clinical clerkships. The authors devised a checklist of ethical issues; after analyzing the students' papers, the authors applied the checklist to the papers to create a taxonomy. Three hundred twenty-seven students submitted 688 cases involving 40 ethical issues. The most common issues were deliberate lies or deceptions (n = 68), patients' right to refuse recommended treatment (n = 48), and insistence on futile treatment (n = 46). Students perceived overt and subtle discrimination toward patients, reflected in substandard or excessive treatment. In 81 cases (12%), students expressed reluctance to speak up about moral conflict for fear of reprisal. This fear was expressed in 18 (45%) of the 40 issues-particularly student-specific (36 [52% of 69]) and quality of care (7 [24% of 29])-and most frequently in cases involving surgery (p ethical dilemmas in both "usual and customary" and seemingly incidental situations. Students who described fear of speaking up perceived a tradeoff between academic survival and patients' interests. The cases demonstrated that students still lacked the tools to navigate ethical dilemmas effectively. The authors propose that moral courage is within the realm of professional expectations for medical students; its cultivation is an appropriate formal objective for medical education.

  13. Strategy as simple rules.

    Science.gov (United States)

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple.

  14. Simple Finite Sums

    KAUST Repository

    Alabdulmohsin, Ibrahim M.

    2018-03-07

    We will begin our treatment of summability calculus by analyzing what will be referred to, throughout this book, as simple finite sums. Even though the results of this chapter are particular cases of the more general results presented in later chapters, they are important to start with for a few reasons. First, this chapter serves as an excellent introduction to what summability calculus can markedly accomplish. Second, simple finite sums are encountered more often and, hence, they deserve special treatment. Third, the results presented in this chapter for simple finite sums will, themselves, be used as building blocks for deriving the most general results in subsequent chapters. Among others, we establish that fractional finite sums are well-defined mathematical objects and show how various identities related to the Euler constant as well as the Riemann zeta function can actually be derived in an elementary manner using fractional finite sums.

  15. Simple Finite Sums

    KAUST Repository

    Alabdulmohsin, Ibrahim M.

    2018-01-01

    We will begin our treatment of summability calculus by analyzing what will be referred to, throughout this book, as simple finite sums. Even though the results of this chapter are particular cases of the more general results presented in later chapters, they are important to start with for a few reasons. First, this chapter serves as an excellent introduction to what summability calculus can markedly accomplish. Second, simple finite sums are encountered more often and, hence, they deserve special treatment. Third, the results presented in this chapter for simple finite sums will, themselves, be used as building blocks for deriving the most general results in subsequent chapters. Among others, we establish that fractional finite sums are well-defined mathematical objects and show how various identities related to the Euler constant as well as the Riemann zeta function can actually be derived in an elementary manner using fractional finite sums.

  16. Excel 2010 Made Simple

    CERN Document Server

    Katz, Abbott

    2011-01-01

    Get the most out of Excel 2010 with Excel 2010 Made Simple - learn the key features, understand what's new, and utilize dozens of time-saving tips and tricks to get your job done. Over 500 screen visuals and clear-cut instructions guide you through the features of Excel 2010, from formulas and charts to navigating around a worksheet and understanding Visual Basic for Applications (VBA) and macros. Excel 2010 Made Simple takes a practical and highly effective approach to using Excel 2010, showing you the best way to complete your most common spreadsheet tasks. You'll learn how to input, format,

  17. Droids Made Simple

    CERN Document Server

    Mazo, Gary

    2011-01-01

    If you have a Droid series smartphone - Droid, Droid X, Droid 2, or Droid 2 Global - and are eager to get the most out of your device, Droids Made Simple is perfect for you. Authors Martin Trautschold, Gary Mazo and Marziah Karch guide you through all of the features, tips, and tricks using their proven combination of clear instructions and detailed visuals. With hundreds of annotated screenshots and step-by-step directions, Droids Made Simple will transform you into a Droid expert, improving your productivity, and most importantly, helping you take advantage of all of the cool features that c

  18. Clusters in simple fluids

    International Nuclear Information System (INIS)

    Sator, N.

    2003-01-01

    This article concerns the correspondence between thermodynamics and the morphology of simple fluids in terms of clusters. Definitions of clusters providing a geometric interpretation of the liquid-gas phase transition are reviewed with an eye to establishing their physical relevance. The author emphasizes their main features and basic hypotheses, and shows how these definitions lead to a recent approach based on self-bound clusters. Although theoretical, this tutorial review is also addressed to readers interested in experimental aspects of clustering in simple fluids

  19. Association "Les Simples"

    OpenAIRE

    Thouzery, Michel

    2014-01-01

    Fondée par les producteurs du Syndicat Inter-Massifs pour la Production et l’Économie des Simples (S.I.M.P.L.E.S), l’association base son action sur la recherche et le maintien d’une production de qualité (herboristerie et préparations à base de plantes) qui prend en compte le respect de l’environnement et la pérennité des petits producteurs en zone de montagne. Actions de formation Stages de découverte de la flore médicinale sauvage, Stages de culture et transformation des plantes médicinale...

  20. A simple electron multiplexer

    International Nuclear Information System (INIS)

    Dobrzynski, L; Akjouj, A; Djafari-Rouhani, B; Al-Wahsh, H; Zielinski, P

    2003-01-01

    We present a simple multiplexing device made of two atomic chains coupled by two other transition metal atoms. We show that this simple atomic device can transfer electrons at a given energy from one wire to the other, leaving all other electron states unaffected. Closed-form relations between the transmission coefficients and the inter-atomic distances are given to optimize the desired directional electron ejection. Such devices can be adsorbed on insulating substrates and characterized by current surface technologies. (letter to the editor)

  1. Effect of adding the novel fiber, PGX®, to commonly consumed foods on glycemic response, glycemic index and GRIP: a simple and effective strategy for reducing post prandial blood glucose levels - a randomized, controlled trial

    Directory of Open Access Journals (Sweden)

    Lyon Michael

    2010-11-01

    Full Text Available Abstract Background Reductions in postprandial glycemia have been demonstrated previously with the addition of the novel viscous polysaccharide (NVP, PolyGlycopleX® (PGX®, to an OGTT or white bread. This study explores whether these reductions are sustained when NVP is added to a range of commonly consumed foods or incorporated into a breakfast cereal. Methods Ten healthy subjects (4M, 6F; age 37.3 ± 3.6 y; BMI 23.8 ± 1.3 kg/m2, participated in an acute, randomized controlled trial. The glycemic response to cornflakes, rice, yogurt, and a frozen dinner with and without 5 g of NVP sprinkled onto the food was determined. In addition, 3 granolas with different levels of NVP and 3 control white breads and one white bread and milk were also consumed. All meals contained 50 g of available carbohydrate. Capillary blood samples were taken fasting and at 15, 30, 45, 60, 90 and 120 min after the start of the meal. The glycemic index (GI and the glycemic reduction index potential (GRIP were calculated. The blood glucose concentrations at each time and the iAUC values were subjected to repeated-measures analysis of variance (ANOVA examining for the effect of test meal. After demonstration of significant heterogeneity, differences between individual means was assessed using GLM ANOVA with Tukey test to adjust for multiple comparisons. Results Addition of NVP reduced blood glucose response irrespective of food or dose (p Conclusion Sprinkling or incorporation of NVP into a variety of different foods is highly effective in reducing postprandial glycemia and lowering the GI of a food. Clinical Trial registration NCT00935350.

  2. Simple Driving Techniques

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    2002-01-01

    -like language. Our aim is to extract a simple notion of driving and show that even in this tamed form it has much of the power of more general notions of driving. Our driving technique may be used to simplify functional programs which use function composition and will often be able to remove intermediate data...

  3. A Simple Tiltmeter

    Science.gov (United States)

    Dix, M. G.; Harrison, D. R.; Edwards, T. M.

    1982-01-01

    Bubble vial with external aluminum-foil electrodes is sensing element for simple indicating tiltmeter. To measure bubble displacement, bridge circuit detects difference in capacitance between two sensing electrodes and reference electrode. Tiltmeter was developed for experiment on forecasting seismic events by changes in Earth's magnetic field.

  4. A Simple Hydrogen Electrode

    Science.gov (United States)

    Eggen, Per-Odd

    2009-01-01

    This article describes the construction of an inexpensive, robust, and simple hydrogen electrode, as well as the use of this electrode to measure "standard" potentials. In the experiment described here the students can measure the reduction potentials of metal-metal ion pairs directly, without using a secondary reference electrode. Measurements…

  5. Structure of simple liquids

    International Nuclear Information System (INIS)

    Blain, J.F.

    1969-01-01

    The results obtained by application to argon and sodium of the two important methods of studying the structure of liquids: scattering of X-rays and neutrons, are presented on one hand. On the other hand the principal models employed for reconstituting the structure of simple liquids are exposed: mathematical models, lattice models and their derived models, experimental models. (author) [fr

  6. Simple mathematical fireworks

    International Nuclear Information System (INIS)

    De Luca, R; Faella, O

    2014-01-01

    Mathematical fireworks are reproduced in two dimensions by means of simple notions in kinematics and Newtonian mechanics. Extension of the analysis in three dimensions is proposed and the geometric figures the falling tiny particles make on the ground after explosion are determined. (paper)

  7. simple sequence repeat (SSR)

    African Journals Online (AJOL)

    In the present study, 78 mapped simple sequence repeat (SSR) markers representing 11 linkage groups of adzuki bean were evaluated for transferability to mungbean and related Vigna spp. 41 markers amplified characteristic bands in at least one Vigna species. The transferability percentage across the genotypes ranged ...

  8. A Simple Wave Driver

    Science.gov (United States)

    Temiz, Burak Kagan; Yavuz, Ahmet

    2015-01-01

    This study was done to develop a simple and inexpensive wave driver that can be used in experiments on string waves. The wave driver was made using a battery-operated toy car, and the apparatus can be used to produce string waves at a fixed frequency. The working principle of the apparatus is as follows: shortly after the car is turned on, the…

  9. Once an Impression Manager, Always an Impression Manager? Antecedents of Honest and Deceptive Impression Management Use and Variability across Multiple Job Interviews.

    Science.gov (United States)

    Roulin, Nicolas; Bourdage, Joshua S

    2017-01-01

    Research has examined the antecedents of applicants' use of impression management (IM) tactics in employment interviews. All existing empirical studies have measured IM in one particular interview. Yet, applicants generally interview multiple times for different positions, and thus have multiple opportunities to engage in IM, before they can secure a job. Similarly, recent theoretical advances in personnel selection and IM research have suggested that applicant behaviors should be considered as dynamic and adaptive in nature. In line with this perspective, the present study is the first to examine the role of individual differences in both applicants' use of IM tactics and the variability in IM use across multiple interviews. It also highlights which honest and deceptive IM tactics remain stable vs. vary in consecutive interviews with different interviewers and organizations. Results suggest that applicants high in Extraversion or core self-evaluations tend to engage in more honest self-promotion but do not adapt their IM approach across interviews. In contrast, applicants who possess more undesirable personality traits (i.e., low on Honesty-Humility and Conscientiousness, but high on Machiavellianism, Narcissism, Psychopathy, or Competitive Worldviews) tend to use more deceptive IM (and especially image creation tactics) and are also more likely to adapt their IM strategy across interviews. Because deceptive IM users can obtain better evaluations from interviewers and the personality profile of those users is often associated with undesirable workplace outcomes, this study provides additional evidence for the claim that deceptive IM (or faking) is a potential threat for organizations.

  10. When Appearances Are not Deceptive: A Comparative History of School Uniforms in Argentina and the United States (Nineteenth--Twentieth Centuries)

    Science.gov (United States)

    Dussel, Ines

    2005-01-01

    Appearances are deceptive, the saying goes. However, we devote much time to the presentation of ourselves, and ties and necklaces can take up more energy than other "substantial" matters. This article analyzes the history of the presentation of selves in schools through the study of school uniforms. It will be claimed that modernity…

  11. Implications of Self-Deception for Self-Reported Intrinsic and Extrinsic Motivational Dispositions and Actual Learning Performance: A Higher Order Structural Model

    Science.gov (United States)

    Hirschfeld, Robert R.; Thomas, Christopher H.; McNatt, D. Brian

    2008-01-01

    The authors explored implications of individuals' self-deception (a trait) for their self-reported intrinsic and extrinsic motivational dispositions and their actual learning performance. In doing so, a higher order structural model was developed and tested in which intrinsic and extrinsic motivational dispositions were underlying factors that…

  12. Positive Response Distortion by Police Officer Applicants: Association of Paulhus Deception Scales with MMPI-2 and Inwald Personality Inventory Validity Scales

    Science.gov (United States)

    Detrick, Paul; Chibnall, John T.

    2008-01-01

    Interpretation of positive response distortion (socially desirable responding) in employment evaluations is an important validity issue. This study of police officer applicants examined the construct validity of the Paulhus Deception Scales (PDS)--Moralistic Bias (MB; exaggerated adjustment/agreeableness) and Egoistic Bias (EB; exaggerated…

  13. Is Italian regulation of Deceptive advertising Really Effective? A Content Analysis of the Authority’s Sentences (1999-2004) in Three Sectors: Mobile Communication, Cosmetics, Retailing

    OpenAIRE

    K. Premazzi

    2005-01-01

    Study involving a content analysis of the Italian Authority’s Sentences about deceptive advertising in the mobile communication, cosmetics, and retailing sector in the period 1999-2004, with the main aim to assess the effectiveness of the Italian regulation on this subject.

  14. Complexity is simple!

    Science.gov (United States)

    Cottrell, William; Montero, Miguel

    2018-02-01

    In this note we investigate the role of Lloyd's computational bound in holographic complexity. Our goal is to translate the assumptions behind Lloyd's proof into the bulk language. In particular, we discuss the distinction between orthogonalizing and `simple' gates and argue that these notions are useful for diagnosing holographic complexity. We show that large black holes constructed from series circuits necessarily employ simple gates, and thus do not satisfy Lloyd's assumptions. We also estimate the degree of parallel processing required in this case for elementary gates to orthogonalize. Finally, we show that for small black holes at fixed chemical potential, the orthogonalization condition is satisfied near the phase transition, supporting a possible argument for the Weak Gravity Conjecture first advocated in [1].

  15. Unicameral (simple) bone cysts.

    Science.gov (United States)

    Baig, Rafath; Eady, John L

    2006-09-01

    Since their original description by Virchow, simple bone cysts have been studied repeatedly. Although these defects are not true neoplasms, simple bone cysts may create major structural defects of the humerus, femur, and os calcis. They are commonly discovered incidentally when x-rays are taken for other reasons or on presentation due to a pathologic fracture. Various treatment strategies have been employed, but the only reliable predictor of success of any treatment strategy is the age of the patient; those being older than 10 years of age heal their cysts at a higher rate than those under age 10. The goal of management is the formation of a bone that can withstand the stresses of use by the patient without evidence of continued bone destruction as determined by serial radiographic follow-up. The goal is not a normal-appearing x-ray, but a functionally stable bone.

  16. Information technology made simple

    CERN Document Server

    Carter, Roger

    1991-01-01

    Information Technology: Made Simple covers the full range of information technology topics, including more traditional subjects such as programming languages, data processing, and systems analysis. The book discusses information revolution, including topics about microchips, information processing operations, analog and digital systems, information processing system, and systems analysis. The text also describes computers, computer hardware, microprocessors, and microcomputers. The peripheral devices connected to the central processing unit; the main types of system software; application soft

  17. Modern mathematics made simple

    CERN Document Server

    Murphy, Patrick

    1982-01-01

    Modern Mathematics: Made Simple presents topics in modern mathematics, from elementary mathematical logic and switching circuits to multibase arithmetic and finite systems. Sets and relations, vectors and matrices, tesselations, and linear programming are also discussed.Comprised of 12 chapters, this book begins with an introduction to sets and basic operations on sets, as well as solving problems with Venn diagrams. The discussion then turns to elementary mathematical logic, with emphasis on inductive and deductive reasoning; conjunctions and disjunctions; compound statements and conditional

  18. Rack Protection Monitor - A Simple System

    International Nuclear Information System (INIS)

    Orr, S.

    1997-12-01

    The Rack Protection Monitor is a simple, fail-safe device to monitor smoke, temperature and ventilation sensors. It accepts inputs from redundant sensors and has a hardwired algorithm to prevent nuisance power trips due to random sensor failures. When a sensor is triggered the Rack Protection Monitor latches and annunicates the alarm. If another sensor is triggered, the Rack Protection Monitor locally shuts down the power to the relay rack and sends alarm to central control

  19. Randomization tests

    CERN Document Server

    Edgington, Eugene

    2007-01-01

    Statistical Tests That Do Not Require Random Sampling Randomization Tests Numerical Examples Randomization Tests and Nonrandom Samples The Prevalence of Nonrandom Samples in Experiments The Irrelevance of Random Samples for the Typical Experiment Generalizing from Nonrandom Samples Intelligibility Respect for the Validity of Randomization Tests Versatility Practicality Precursors of Randomization Tests Other Applications of Permutation Tests Questions and Exercises Notes References Randomized Experiments Unique Benefits of Experiments Experimentation without Mani

  20. Dimensional analysis made simple

    International Nuclear Information System (INIS)

    Lira, Ignacio

    2013-01-01

    An inductive strategy is proposed for teaching dimensional analysis to second- or third-year students of physics, chemistry, or engineering. In this strategy, Buckingham's theorem is seen as a consequence and not as the starting point. In order to concentrate on the basics, the mathematics is kept as elementary as possible. Simple examples are suggested for classroom demonstrations of the power of the technique and others are put forward for homework or experimentation, but instructors are encouraged to produce examples of their own. (paper)

  1. Applied mathematics made simple

    CERN Document Server

    Murphy, Patrick

    1982-01-01

    Applied Mathematics: Made Simple provides an elementary study of the three main branches of classical applied mathematics: statics, hydrostatics, and dynamics. The book begins with discussion of the concepts of mechanics, parallel forces and rigid bodies, kinematics, motion with uniform acceleration in a straight line, and Newton's law of motion. Separate chapters cover vector algebra and coplanar motion, relative motion, projectiles, friction, and rigid bodies in equilibrium under the action of coplanar forces. The final chapters deal with machines and hydrostatics. The standard and conte

  2. Data processing made simple

    CERN Document Server

    Wooldridge, Susan

    2013-01-01

    Data Processing: Made Simple, Second Edition presents discussions of a number of trends and developments in the world of commercial data processing. The book covers the rapid growth of micro- and mini-computers for both home and office use; word processing and the 'automated office'; the advent of distributed data processing; and the continued growth of database-oriented systems. The text also discusses modern digital computers; fundamental computer concepts; information and data processing requirements of commercial organizations; and the historical perspective of the computer industry. The

  3. ASP made simple

    CERN Document Server

    Deane, Sharon

    2003-01-01

    ASP Made Simple provides a brief introduction to ASP for the person who favours self teaching and/or does not have expensive computing facilities to learn on. The book will demonstrate how the principles of ASP can be learned with an ordinary PC running Personal Web Server, MS Access and a general text editor like Notepad.After working through the material readers should be able to:* Write ASP scripts that can display changing information on a web browser* Request records from a remote database or add records to it* Check user names & passwords and take this knowledge forward, either for their

  4. Theory of simple liquids

    CERN Document Server

    Hansen, Jean-Pierre

    1986-01-01

    This book gives a comprehensive and up-to-date treatment of the theory of ""simple"" liquids. The new second edition has been rearranged and considerably expanded to give a balanced account both of basic theory and of the advances of the past decade. It presents the main ideas of modern liquid state theory in a way that is both pedagogical and self-contained. The book should be accessible to graduate students and research workers, both experimentalists and theorists, who have a good background in elementary mechanics.Key Features* Compares theoretical deductions with experimental r

  5. "To Bluff like a Man or Fold like a Girl?" - Gender Biased Deceptive Behavior in Online Poker.

    Science.gov (United States)

    Palomäki, Jussi; Yan, Jeff; Modic, David; Laakasuo, Michael

    2016-01-01

    Evolutionary psychology suggests that men are more likely than women to deceive to bolster their status and influence. Also gender perception influences deceptive behavior, which is linked to pervasive gender stereotypes: women are typically viewed as weaker and more gullible than men. We assessed bluffing in an online experiment (N = 502), where participants made decisions to bluff or not in simulated poker tasks against opponents represented by avatars. Participants bluffed on average 6% more frequently at poker tables with female-only avatars than at tables with male-only or gender mixed avatars-a highly significant effect in games involving repeated decisions. Nonetheless, participants did not believe the avatar genders affected their decisions. Males bluffed 13% more frequently than females. Unlike most economic games employed exclusively in research contexts, online poker is played for money by tens of millions of people worldwide. Thus, gender effects in bluffing have significant monetary consequences for poker players.

  6. The science of ethics: Deception, the resilient self, and the APA code of ethics, 1966-1973.

    Science.gov (United States)

    Stark, Laura

    2010-01-01

    This paper has two aims. The first is to shed light on a remarkable archival source, namely survey responses from thousands of American psychologists during the 1960s in which they described their contemporary research practices and discussed whether the practices were "ethical." The second aim is to examine the process through which the American Psychological Association (APA) used these survey responses to create principles on how psychologists should treat human subjects. The paper focuses on debates over whether "deception" research was acceptable. It documents how members of the committee that wrote the principles refereed what was, in fact, a disagreement between two contemporary research orientations. The paper argues that the ethics committee ultimately built the model of "the resilient self" into the APA's 1973 ethics code. At the broadest level, the paper explores how prevailing understandings of human nature are written into seemingly universal and timeless codes of ethics. © 2010 Wiley Periodicals, Inc.

  7. "To Bluff like a Man or Fold like a Girl?" - Gender Biased Deceptive Behavior in Online Poker.

    Directory of Open Access Journals (Sweden)

    Jussi Palomäki

    Full Text Available Evolutionary psychology suggests that men are more likely than women to deceive to bolster their status and influence. Also gender perception influences deceptive behavior, which is linked to pervasive gender stereotypes: women are typically viewed as weaker and more gullible than men. We assessed bluffing in an online experiment (N = 502, where participants made decisions to bluff or not in simulated poker tasks against opponents represented by avatars. Participants bluffed on average 6% more frequently at poker tables with female-only avatars than at tables with male-only or gender mixed avatars-a highly significant effect in games involving repeated decisions. Nonetheless, participants did not believe the avatar genders affected their decisions. Males bluffed 13% more frequently than females. Unlike most economic games employed exclusively in research contexts, online poker is played for money by tens of millions of people worldwide. Thus, gender effects in bluffing have significant monetary consequences for poker players.

  8. A super-assembly of Whi3 encodes memory of deceptive encounters by single cells during yeast courtship.

    Science.gov (United States)

    Caudron, Fabrice; Barral, Yves

    2013-12-05

    Cellular behavior is frequently influenced by the cell's history, indicating that single cells may memorize past events. We report that budding yeast permanently escape pheromone-induced cell-cycle arrest when experiencing a deceptive mating attempt, i.e., not reaching their putative partner within reasonable time. This acquired behavior depends on super-assembly and inactivation of the G1/S inhibitor Whi3, which liberates the G1 cyclin Cln3 from translational inhibition. Super-assembly of Whi3 is a slow response to pheromone, driven by polyQ and polyN domains, counteracted by Hsp70, and stable over generations. Unlike prion aggregates, Whi3 super-assemblies are not inherited mitotically but segregate to the mother cell. We propose that such polyQ- and polyN-based elements, termed here mnemons, act as cellular memory devices to encode previous environmental conditions. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Randomness at the root of things 1: Random walks

    Science.gov (United States)

    Ogborn, Jon; Collins, Simon; Brown, Mick

    2003-09-01

    This is the first of a pair of articles about randomness in physics. In this article, we use some variations on the idea of a `random walk' to consider first the path of a particle in Brownian motion, and then the random variation to be expected in radioactive decay. The arguments are set in the context of the general importance of randomness both in physics and in everyday life. We think that the ideas could usefully form part of students' A-level work on random decay and quantum phenomena, as well as being good for their general education. In the second article we offer a novel and simple approach to Poisson sequences.

  10. Probabilistic simple sticker systems

    Science.gov (United States)

    Selvarajoo, Mathuri; Heng, Fong Wan; Sarmin, Nor Haniza; Turaev, Sherzod

    2017-04-01

    A model for DNA computing using the recombination behavior of DNA molecules, known as a sticker system, was introduced by by L. Kari, G. Paun, G. Rozenberg, A. Salomaa, and S. Yu in the paper entitled DNA computing, sticker systems and universality from the journal of Acta Informatica vol. 35, pp. 401-420 in the year 1998. A sticker system uses the Watson-Crick complementary feature of DNA molecules: starting from the incomplete double stranded sequences, and iteratively using sticking operations until a complete double stranded sequence is obtained. It is known that sticker systems with finite sets of axioms and sticker rules generate only regular languages. Hence, different types of restrictions have been considered to increase the computational power of sticker systems. Recently, a variant of restricted sticker systems, called probabilistic sticker systems, has been introduced [4]. In this variant, the probabilities are initially associated with the axioms, and the probability of a generated string is computed by multiplying the probabilities of all occurrences of the initial strings in the computation of the string. Strings for the language are selected according to some probabilistic requirements. In this paper, we study fundamental properties of probabilistic simple sticker systems. We prove that the probabilistic enhancement increases the computational power of simple sticker systems.

  11. Beyond Simple Headquarters Configurations

    DEFF Research Database (Denmark)

    Dellestrand, Henrik; Kappen, Philip; Nell, Phillip Christopher

    We investigate “dual headquarters involvement”, i.e. corporate and divisional headquarters’ simultaneous involvement in subsidiaries’ innovation development projects. Analyses draw on 85 innovation projects in 23 multibusiness firms and reveal that cross-divisional innovation importance, i.......e., an innovation that is important for the firm beyond the divisional boundaries, drives dual headquarters involvement in innovation development. Contrary to expectations, on average, a non-significant effect of cross-divisional embeddedness on dual headquarters involvement is found. Yet, both cross......-divisional importance and embeddedness effects are contingent on the overall complexity of the innovation project as signified by the size of the development network. The results lend support for the notion that parenting in complex structures entails complex headquarters structures and that we need to go beyond simple...

  12. Simple relation algebras

    CERN Document Server

    Givant, Steven

    2017-01-01

    This monograph details several different methods for constructing simple relation algebras, many of which are new with this book. By drawing these seemingly different methods together, all are shown to be aspects of one general approach, for which several applications are given. These tools for constructing and analyzing relation algebras are of particular interest to mathematicians working in logic, algebraic logic, or universal algebra, but will also appeal to philosophers and theoretical computer scientists working in fields that use mathematics. The book is written with a broad audience in mind and features a careful, pedagogical approach; an appendix contains the requisite background material in relation algebras. Over 400 exercises provide ample opportunities to engage with the material, making this a monograph equally appropriate for use in a special topics course or for independent study. Readers interested in pursuing an extended background study of relation algebras will find a comprehensive treatme...

  13. A Simple Harmonic Universe

    Energy Technology Data Exchange (ETDEWEB)

    Graham, Peter W.; /Stanford U., ITP; Horn, Bart; Kachru, Shamit; /Stanford U., ITP /SLAC; Rajendran, Surjeet; /Johns Hopkins U. /Stanford U., ITP; Torroba, Gonzalo; /Stanford U., ITP /SLAC

    2011-12-14

    We explore simple but novel bouncing solutions of general relativity that avoid singularities. These solutions require curvature k = +1, and are supported by a negative cosmological term and matter with -1 < w < -1 = 3. In the case of moderate bounces (where the ratio of the maximal scale factor a{sub +} to the minimal scale factor a{sub -} is {Omicron}(1)), the solutions are shown to be classically stable and cycle through an infinite set of bounces. For more extreme cases with large a{sub +} = a{sub -}, the solutions can still oscillate many times before classical instabilities take them out of the regime of validity of our approximations. In this regime, quantum particle production also leads eventually to a departure from the realm of validity of semiclassical general relativity, likely yielding a singular crunch. We briefly discuss possible applications of these models to realistic cosmology.

  14. SIMPLE for industrial radiography

    International Nuclear Information System (INIS)

    Azhar Azmi; Abd Nassir Ibrahim; Siti Madiha Muhammad Amir; Glam Hadzir Patai Mohamad; Saidi Rajab

    2004-01-01

    The first thing industrial radiographers have to do before commencing radiography works is to determine manually the amount of correct exposure that the film need to be exposed in order to obtain the right density. The amount of exposure depends on many variables such as type of radioisotope, type of film, nature of test-object and its orientation, and specific arrangement related to object location and configuration. In many cases radiography works are rejected because of radiographs fail to meet certain reference criteria as defined in the applicable standard. One of the main reasons of radiograph rejection is due to inadequate exposure received by the films. SIMPLE is a software specially developed to facilitate the calculation of gamma-radiography exposure. By using this software and knowing radiographic parameters to be encountered during the work, it is expected that human error will be minimized, thus enhancing the quality and productivity of NDT jobs. (Author)

  15. Molecular genetics made simple

    Directory of Open Access Journals (Sweden)

    Heba Sh. Kassem

    2012-07-01

    Full Text Available Genetics have undoubtedly become an integral part of biomedical science and clinical practice, with important implications in deciphering disease pathogenesis and progression, identifying diagnostic and prognostic markers, as well as designing better targeted treatments. The exponential growth of our understanding of different genetic concepts is paralleled by a growing list of genetic terminology that can easily intimidate the unfamiliar reader. Rendering genetics incomprehensible to the clinician however, defeats the very essence of genetic research: its utilization for combating disease and improving quality of life. Herein we attempt to correct this notion by presenting the basic genetic concepts along with their usefulness in the cardiology clinic. Bringing genetics closer to the clinician will enable its harmonious incorporation into clinical care, thus not only restoring our perception of its simple and elegant nature, but importantly ensuring the maximal benefit for our patients.

  16. Molecular genetics made simple

    Science.gov (United States)

    Kassem, Heba Sh.; Girolami, Francesca; Sanoudou, Despina

    2012-01-01

    Abstract Genetics have undoubtedly become an integral part of biomedical science and clinical practice, with important implications in deciphering disease pathogenesis and progression, identifying diagnostic and prognostic markers, as well as designing better targeted treatments. The exponential growth of our understanding of different genetic concepts is paralleled by a growing list of genetic terminology that can easily intimidate the unfamiliar reader. Rendering genetics incomprehensible to the clinician however, defeats the very essence of genetic research: its utilization for combating disease and improving quality of life. Herein we attempt to correct this notion by presenting the basic genetic concepts along with their usefulness in the cardiology clinic. Bringing genetics closer to the clinician will enable its harmonious incorporation into clinical care, thus not only restoring our perception of its simple and elegant nature, but importantly ensuring the maximal benefit for our patients. PMID:25610837

  17. SIMPLE LIFE AND RELIGION

    Directory of Open Access Journals (Sweden)

    Ahmet YILDIRIM

    2014-07-01

    Full Text Available Individuals in terms of the economy in which we live is one of the most important phenomenon of the century. This phenomenon present itself as the only determinant of people's lives by entering almost makes itself felt. The mo st obvious objective needs of the economy by triggering motive is to induce people to consume . Consumer culture pervades all aspects of the situation are people . Therefore, these people have the blessing of culture , beauty and value all in the name of w hatever is consumed. This is way out of the siege of moral and religious values we have is to go back again . Referred by local cultural and religious values, based on today increasingly come to the fore and the Muslim way of life appears to be close to th e plain / lean preferred by many people life has been a way of life. Even the simple life , a way of life in the Western world , a conception of life , a philosophy, a movement as it has become widely accepted. Here in determining the Muslim way of life Pr ophet. Prophet (sa lived the kind of life a very important model, sample, and determining which direction is known. Religious values, which is the carrier of the prophets, sent to the society they have always been examples and models. Because every aspect of human life, his life style and the surrounding area has a feature. We also value his life that he has unknowingly and without learning and skills and to understand it is not possible to live our religion . We also our presentation, we mainly of Islam o utlook on life and predicted life - style, including the Prophet of Islam 's (sa simple life to scrutinize and lifestyle issues related to reveal , in short Islam's how life has embraced and the Prophet. Prophet's will try to find answers to questions reg arding how to live.

  18. Nothing Happens by Accident, or Does It? A Low Prior for Randomness Does Not Explain Belief in Conspiracy Theories.

    Science.gov (United States)

    Dieguez, Sebastian; Wagner-Egger, Pascal; Gauvrit, Nicolas

    2015-11-01

    Belief in conspiracy theories has often been associated with a biased perception of randomness, akin to a nothing-happens-by-accident heuristic. Indeed, a low prior for randomness (i.e., believing that randomness is a priori unlikely) could plausibly explain the tendency to believe that a planned deception lies behind many events, as well as the tendency to perceive meaningful information in scattered and irrelevant details; both of these tendencies are traits diagnostic of conspiracist ideation. In three studies, we investigated this hypothesis and failed to find the predicted association between low prior for randomness and conspiracist ideation, even when randomness was explicitly opposed to malevolent human intervention. Conspiracy believers' and nonbelievers' perceptions of randomness were not only indistinguishable from each other but also accurate compared with the normative view arising from the algorithmic information framework. Thus, the motto "nothing happens by accident," taken at face value, does not explain belief in conspiracy theories. © The Author(s) 2015.

  19. Quasispecies made simple.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available Quasispecies are clouds of genotypes that appear in a population at mutation-selection balance. This concept has recently attracted the attention of virologists, because many RNA viruses appear to generate high levels of genetic variation that may enhance the evolution of drug resistance and immune escape. The literature on these important evolutionary processes is, however, quite challenging. Here we use simple models to link mutation-selection balance theory to the most novel property of quasispecies: the error threshold-a mutation rate below which populations equilibrate in a traditional mutation-selection balance and above which the population experiences an error catastrophe, that is, the loss of the favored genotype through frequent deleterious mutations. These models show that a single fitness landscape may contain multiple, hierarchically organized error thresholds and that an error threshold is affected by the extent of back mutation and redundancy in the genotype-to-phenotype map. Importantly, an error threshold is distinct from an extinction threshold, which is the complete loss of the population through lethal mutations. Based on this framework, we argue that the lethal mutagenesis of a viral infection by mutation-inducing drugs is not a true error catastophe, but is an extinction catastrophe.

  20. A simple scaler timer

    International Nuclear Information System (INIS)

    Narayanan, R.; Kalavathy, K.R.

    1989-01-01

    In any nuclear reactor, the start-up channels monitor the neutron flux during the start-up operation and give the alarm signals for safety purposes. Normally, a fission chamber is used as a detector to detect the low level neutron fluxes. The output of the detector after amplification and discrimination is shaped in a pulse shaper to provide constant width, constant height pulses for further processing in rate meters. The shaped pulses also go to a scaler timer, where they are counted for fixed time intervals and the accumulated counts displayed. The scaler timer described in this paper uses LSIs to get at a simple, compact and reliable unit. The design is centered around two LSIs. MOS Counter Timebase LSI type MK 5009P (U1) is used to generate the gating pulses. A 1 MHz crystal is used to generate the system clock. A 4 bit address selects the desired gating intervals of 1 or 10 or 100 seconds. In fact, MK 5009 is a very versatile LSI in a 16 pin DIP package, consisting of a MOS oscillator and divider chain. It is binary encoded for frequency division selection ranging from 1 to 36 x 10. With an input frequency of 1 MHz, MK 5009 provides the time periods of 1 μs to 100 seconds, one minute, ten minute and one hour periods. (author)

  1. A Simple Accelerometer Calibrator

    International Nuclear Information System (INIS)

    Salam, R A; Islamy, M R F; Khairurrijal; Munir, M M; Latief, H; Irsyam, M

    2016-01-01

    High possibility of earthquake could lead to the high number of victims caused by it. It also can cause other hazards such as tsunami, landslide, etc. In that case it requires a system that can examine the earthquake occurrence. Some possible system to detect earthquake is by creating a vibration sensor system using accelerometer. However, the output of the system is usually put in the form of acceleration data. Therefore, a calibrator system for accelerometer to sense the vibration is needed. In this study, a simple accelerometer calibrator has been developed using 12 V DC motor, optocoupler, Liquid Crystal Display (LCD) and AVR 328 microcontroller as controller system. The system uses the Pulse Wave Modulation (PWM) form microcontroller to control the motor rotational speed as response to vibration frequency. The frequency of vibration was read by optocoupler and then those data was used as feedback to the system. The results show that the systems could control the rotational speed and the vibration frequencies in accordance with the defined PWM. (paper)

  2. How Can Men Convicted of Violence Against Women Feel Moral While Holding Sexist and Violent Attitudes? A Homeostatic Moral Model Based on Self-Deception.

    Science.gov (United States)

    Vecina, María L

    2018-05-01

    A moral model is proposed to understand how men convicted of violence against the partner can feel moral in spite of their past violent behavior and their current violent and sexist attitudes. Because of its appeal to the role of self-deception and its relationship to psychological well-being, it was hypothesized that a rigid conception about what is right and wrong (moral absolutism) is associated with ambivalent outcomes that keep their psychological system in homeostasis. The relationships were specified a priori and tested using path analysis. Several fit indices supported the adequacy of the model and showed that moral absolutism was indirectly related to both psychological well-being and a good moral self-conceptualization through self-deception. At the same time, moral absolutism was related to sexist and violent attitudes and a poor moral self-conceptualization. Future interventions could include strategies to reduce the resistances to change based on the reduction of moral absolutism and self-deception.

  3. A Simple Spectral Observer

    Directory of Open Access Journals (Sweden)

    Lizeth Torres

    2018-05-01

    Full Text Available The principal aim of a spectral observer is twofold: the reconstruction of a signal of time via state estimation and the decomposition of such a signal into the frequencies that make it up. A spectral observer can be catalogued as an online algorithm for time-frequency analysis because is a method that can compute on the fly the Fourier transform (FT of a signal, without having the entire signal available from the start. In this regard, this paper presents a novel spectral observer with an adjustable constant gain for reconstructing a given signal by means of the recursive identification of the coefficients of a Fourier series. The reconstruction or estimation of a signal in the context of this work means to find the coefficients of a linear combination of sines a cosines that fits a signal such that it can be reproduced. The design procedure of the spectral observer is presented along with the following applications: (1 the reconstruction of a simple periodical signal, (2 the approximation of both a square and a triangular signal, (3 the edge detection in signals by using the Fourier coefficients, (4 the fitting of the historical Bitcoin market data from 1 December 2014 to 8 January 2018 and (5 the estimation of a input force acting upon a Duffing oscillator. To round out this paper, we present a detailed discussion about the results of the applications as well as a comparative analysis of the proposed spectral observer vis-à-vis the Short Time Fourier Transform (STFT, which is a well-known method for time-frequency analysis.

  4. Blocked Randomization with Randomly Selected Block Sizes

    Directory of Open Access Journals (Sweden)

    Jimmy Efird

    2010-12-01

    Full Text Available When planning a randomized clinical trial, careful consideration must be given to how participants are selected for various arms of a study. Selection and accidental bias may occur when participants are not assigned to study groups with equal probability. A simple random allocation scheme is a process by which each participant has equal likelihood of being assigned to treatment versus referent groups. However, by chance an unequal number of individuals may be assigned to each arm of the study and thus decrease the power to detect statistically significant differences between groups. Block randomization is a commonly used technique in clinical trial design to reduce bias and achieve balance in the allocation of participants to treatment arms, especially when the sample size is small. This method increases the probability that each arm will contain an equal number of individuals by sequencing participant assignments by block. Yet still, the allocation process may be predictable, for example, when the investigator is not blind and the block size is fixed. This paper provides an overview of blocked randomization and illustrates how to avoid selection bias by using random block sizes.

  5. A 'simple' hybrid model for power derivatives

    International Nuclear Information System (INIS)

    Lyle, Matthew R.; Elliott, Robert J.

    2009-01-01

    This paper presents a method for valuing power derivatives using a supply-demand approach. Our method extends work in the field by incorporating randomness into the base load portion of the supply stack function and equating it with a noisy demand process. We obtain closed form solutions for European option prices written on average spot prices considering two different supply models: a mean-reverting model and a Markov chain model. The results are extensions of the classic Black-Scholes equation. The model provides a relatively simple approach to describe the complicated price behaviour observed in electricity spot markets and also allows for computationally efficient derivatives pricing. (author)

  6. From complex to simple: interdisciplinary stochastic models

    International Nuclear Information System (INIS)

    Mazilu, D A; Zamora, G; Mazilu, I

    2012-01-01

    We present two simple, one-dimensional, stochastic models that lead to a qualitative understanding of very complex systems from biology, nanoscience and social sciences. The first model explains the complicated dynamics of microtubules, stochastic cellular highways. Using the theory of random walks in one dimension, we find analytical expressions for certain physical quantities, such as the time dependence of the length of the microtubules, and diffusion coefficients. The second one is a stochastic adsorption model with applications in surface deposition, epidemics and voter systems. We introduce the ‘empty interval method’ and show sample calculations for the time-dependent particle density. These models can serve as an introduction to the field of non-equilibrium statistical physics, and can also be used as a pedagogical tool to exemplify standard statistical physics concepts, such as random walks or the kinetic approach of the master equation. (paper)

  7. Random Decrement Based FRF Estimation

    DEFF Research Database (Denmark)

    Brincker, Rune; Asmussen, J. C.

    to speed and quality. The basis of the new method is the Fourier transformation of the Random Decrement functions which can be used to estimate the frequency response functions. The investigations are based on load and response measurements of a laboratory model of a 3 span bridge. By applying both methods...... that the Random Decrement technique is based on a simple controlled averaging of time segments of the load and response processes. Furthermore, the Random Decrement technique is expected to produce reliable results. The Random Decrement technique will reduce leakage, since the Fourier transformation...

  8. Random Decrement Based FRF Estimation

    DEFF Research Database (Denmark)

    Brincker, Rune; Asmussen, J. C.

    1997-01-01

    to speed and quality. The basis of the new method is the Fourier transformation of the Random Decrement functions which can be used to estimate the frequency response functions. The investigations are based on load and response measurements of a laboratory model of a 3 span bridge. By applying both methods...... that the Random Decrement technique is based on a simple controlled averaging of time segments of the load and response processes. Furthermore, the Random Decrement technique is expected to produce reliable results. The Random Decrement technique will reduce leakage, since the Fourier transformation...

  9. a simple a simple excitation control excitation control excitation

    African Journals Online (AJOL)

    eobe

    field voltages determined follow a simple quadratic relationship that offer a very simple control scheme, dependent on only the stator current. Keywords: saturated reactances, no-load field voltage, excitation control, synchronous generators. 1. Introduction. Introduction. Introduction. The commonest generator in use today is ...

  10. Is simple nephrectomy truly simple? Comparison with the radical alternative.

    Science.gov (United States)

    Connolly, S S; O'Brien, M Frank; Kunni, I M; Phelan, E; Conroy, R; Thornhill, J A; Grainger, R

    2011-03-01

    The Oxford English dictionary defines the term "simple" as "easily done" and "uncomplicated". We tested the validity of this terminology in relation to open nephrectomy surgery. Retrospective review of 215 patients undergoing open, simple (n = 89) or radical (n = 126) nephrectomy in a single university-affiliated institution between 1998 and 2002. Operative time (OT), estimated blood loss (EBL), operative complications (OC) and length of stay in hospital (LOS) were analysed. Statistical analysis employed Fisher's exact test and Stata Release 8.2. Simple nephrectomy was associated with shorter OT (mean 126 vs. 144 min; p = 0.002), reduced EBL (mean 729 vs. 859 cc; p = 0.472), lower OC (9 vs. 17%; 0.087), and more brief LOS (mean 6 vs. 8 days; p < 0.001). All parameters suggest favourable outcome for the simple nephrectomy group, supporting the use of this terminology. This implies "simple" nephrectomies are truly easier to perform with less complication than their radical counterpart.

  11. Seasonal variation in biochemical indicators of physiological status in Euphausia superba from Port Foster, Deception Island, Antarctica

    Science.gov (United States)

    Cullen, M.; Kaufmann, R. S.; Lowery, M. S.

    2003-06-01

    Seasonal changes in biochemical indicators of physiological status were analyzed in abdominal muscle of the Antarctic krill, Euphausia superba, collected from Port Foster, Deception Island, an active volcano located in the Shetland Island chain west of the Antarctic Peninsula. Krill were collected with a 10 m 2 MOCNESS trawl during four cruises (November 1999, February, May, November 2000). RNA:DNA mirrored the chlorophyll a concentration, with the highest values found during seasons of abundant phytoplankton. Activities of the glycolytic enzyme lactate dehydrogenase (LDH) and the mitochondrial enzyme citrate synthase (CS) were significantly higher in male krill when compared to females of similar size, indicating that their burst and aerobic swimming performance may be higher than females throughout the year. RNA:DNA ratio and enzyme activities were highly elevated in summer as compared to the earliest spring sampling period. Krill showed significant seasonal changes in LDH activity, with lowest values in spring and highest values in summer (females) or autumn (males). Krill showed significant seasonal changes in CS activity with highest values in summer. Protein and % water varied significantly among seasons for both males and females. Lower CS activity and RNA:DNA ratio suggest krill exhibit reduced metabolism during the winter when phytoplankton production is reduced, perhaps enhancing survival. Lower enzyme activities in female krill in early spring suggest they may achieve greater metabolic suppression during overwintering.

  12. Quaternary volcanism in Deception Island (Antarctica): South Shetland Trench subduction-related signature in the Bransfield Basin back arc domain

    International Nuclear Information System (INIS)

    Gale, C.; Ubide, T.; Lago, M.; Gil-Imaz, A.; Gil-Pena, I.; Galindo-Zaldivar, J.; Rey, J.; Maestro, A.; Lopez-Martinez, J.

    2014-01-01

    Deception Island shows a volcanism related to the Phoenix Plate subduction and roll-back under South Shetland Block in the present times. The development of the island is related to the evolution and collapse of a volcanic caldera, and this study is focused on the petrology, mineralogy and geochemistry of the post-caldera rocks. We have made a study of the lava flows, dikes and the youngest historic eruption in 1970. These rocks range from dacite to rhyolite and have a microporphyritic texture with olivine and minor clinopyroxene. A pre-caldera basaltic andesite has also been studied. It has a microporphyritic texture with clinopyroxene. The intermediate and acid compositions alternating in the volcanostratigraphic sequence suggest either mafic recharge events or melt extraction from different levels in the deep magmatic system. All the studied compositions share a subduction-related signature similar to other magmatics from the Bransfield Basin. However, compositional differences between pre-caldera and post-caldera rocks indicate a different magma source and depth of crystallisation. According to the geothermobarometric calculations the pre-caldera magmas started to crystallise at deeper levels (13.5-15 km) than the post-caldera magmas (6.2-7.8 km). Specifically, the postcaldera magmas indicate a smaller influence of the subducting slab in the southwestern part of the Bransfield Basin in respect to the available data from other sectors as well as the involvement of crustal contamination in the genesis of the magmas. (Author)

  13. Macrobenthic patterns at the shallow marine waters in the caldera of the active volcano of Deception Island, Antarctica

    Science.gov (United States)

    Angulo-Preckler, Carlos; Figuerola, Blanca; Núñez-Pons, Laura; Moles, Juan; Martín-Martín, Rafael; Rull-Lluch, Jordi; Gómez-Garreta, Amelia; Avila, Conxita

    2018-04-01

    Deception Island is an active volcano located at the southern end of the South Shetland Archipelago, in the Antarctic Ocean. After the last eruption in 1970, benthic recolonization took place within the bay, with echinoderms being the dominant epifauna (e.g., the ophiuroid Ophionotus victoriae, the echinoid Sterechinus neumayeri and the sea star Odontaster validus), together with dense infaunal communities (mostly composed by oligochaetes, polychaetes, and bivalves). Here, we aim to describe the actual status of the marine benthic ecosystems inhabiting the shallow subtidal areas of this volcanic island. Benthic species were qualitatively scored as presence versus absence, considering the different sampling effort between localities done over the years. A total of 139 species of macroorganisms, belonging to 16 phyla were found, including fauna and flora, increasing the species richness values previously reported in all sites surveyed within the volcano caldera. Moreover, a dramatic increase in biodiversity was found towards the entrance of the bay. We suggest, however, that recolonization from external waters may not be the only reason for this pattern. In fact, sediment flux rates and substrate instability are common disturbances within the bay, probably being among the major factors determining benthic community assemblages. These processes probably favour deposit feeding communities at the innermost locations of the bay. This study provides a remarkably increased and updated species inventory from previous reports, altogether with a description of the main communities inhabiting the bay and the abiotic factors regulating this, mainly the bottom type.

  14. Embedded ARM system for volcano monitoring in remote areas: application to the active volcano on Deception Island (Antarctica).

    Science.gov (United States)

    Peci, Luis Miguel; Berrocoso, Manuel; Fernández-Ros, Alberto; García, Alicia; Marrero, José Manuel; Ortiz, Ramón

    2014-01-02

    This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARM™ processor has been used, allowing a great flexibility in hardware configuration. The use of a complete Linux solution (Debian™) as Operating System permits a quick, easy application development to control sensors and communications. This provides all the capabilities required and great stability with relatively low energy consumption. The cost of the components and applications development is low since they are widely used in different fields. Sensors and commercial modules have been combined with other self-developed modules. The Modular Volcano Monitoring System (MVMS) described has been deployed on the active Deception Island (Antarctica) volcano, within the Spanish Antarctic Program, and has proved successful for monitoring the volcano, with proven reliability and efficient operation under extreme conditions. In another context, i.e., the recent volcanic activity on El Hierro Island (Canary Islands) in 2011, this technology has been used for the seismic equipment and GPS systems deployed, thus showing its efficiency in the monitoring of a volcanic crisis.

  15. Embedded ARM System for Volcano Monitoring in Remote Areas: Application to the Active Volcano on Deception Island (Antarctica

    Directory of Open Access Journals (Sweden)

    Luis Miguel Peci

    2014-01-01

    Full Text Available This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARMTM processor has been used, allowing a great flexibility in hardware configuration. The use of a complete Linux solution (DebianTM as Operating System permits a quick, easy application development to control sensors and communications. This provides all the capabilities required and great stability with relatively low energy consumption. The cost of the components and applications development is low since they are widely used in different fields. Sensors and commercial modules have been combined with other self-developed modules. The Modular Volcano Monitoring System (MVMS described has been deployed on the active Deception Island (Antarctica volcano, within the Spanish Antarctic Program, and has proved successful for monitoring the volcano, with proven reliability and efficient operation under extreme conditions. In another context, i.e., the recent volcanic activity on El Hierro Island (Canary Islands in 2011, this technology has been used for the seismic equipment and GPS systems deployed, thus showing its efficiency in the monitoring of a volcanic crisis.

  16. Study of the active layer at the Spanish Antarctic station “Gabriel de Castilla”, Deception Island, Antarctica

    International Nuclear Information System (INIS)

    Pablo, M.A. de; Molina, A.; Recio, C.; Ramos, M.; Goyanes, G.; Ropero, M.A.

    2017-01-01

    The degradation of permanent frozen ground (permafrost) and the increase in the thickness of the active layer may be caused both by natural processes (such as global climate change) and by anthropic activity, which changes the natural environmental conditions that allow its existence, as has been widely reported to occur in the northern polar and subpolar regions. In the case of Antarctica, some scientific research stations are located in areas with permafrost, such as the Spanish Antarctic station “Gabriel de Castilla” on Deception Island. In the place where the station is located, an important increase in erosion has been observed in recent years, including the excavation of new gullies and the erosion of the coastal cliffs. In order to develop an initial analysis of the possible effects of the station on the permafrost degradation, ground temperature has been monitored since 2012 and the thickness and of the active layer and the temperature, both inside and beneath the station, have also been sporadically measured. Here we show the results and discuss how the station reduces the freezing of the ground during the winter when the station is closed and facilitates the warming of the ground during the living periods of the station in the Antarctic summer. Those initial results and conclusions make necessary to continue the study of the permafrost and the active layer in the station site by systematic monitoring of the ground temperature and the thickness of the active layer. [es

  17. Functional Significance of Labellum Pattern Variation in a Sexually Deceptive Orchid (Ophrys heldreichii: Evidence of Individual Signature Learning Effects.

    Directory of Open Access Journals (Sweden)

    Kerstin Stejskal

    Full Text Available Mimicking female insects to attract male pollinators is an important strategy in sexually deceptive orchids of the genus Ophrys, and some species possess flowers with conspicuous labellum patterns. The function of the variation of the patterns remains unresolved, with suggestions that these enhance pollinator communication. We investigated the possible function of the labellum pattern in Ophrys heldreichii, an orchid species in which the conspicuous and complex labellum pattern contrasts with a dark background. The orchid is pollinated exclusively by males of the solitary bee, Eucera berlandi. Comparisons of labellum patterns revealed that patterns within inflorescences are more similar than those of other conspecific plants. Field observations showed that the males approach at a great speed and directly land on flowers, but after an unsuccessful copulation attempt, bees hover close and visually scan the labellum pattern for up to a minute. Learning experiments conducted with honeybees as an accessible model of bee vision demonstrated that labellum patterns of different plants can be reliably learnt; in contrast, patterns of flowers from the same inflorescence could not be discriminated. These results support the hypothesis that variable labellum patterns in O. heldreichii are involved in flower-pollinator communication which would likely help these plants to avoid geitonogamy.

  18. Xenoepitope substitution avoids deceptive imprinting and broadens the immune response to foot-and-mouth disease virus.

    Science.gov (United States)

    Szczepanek, Steven M; Barrette, Roger W; Rood, Debra; Alejo, Diana; Silbart, Lawrence K

    2012-04-01

    Many RNA viruses encode error-prone polymerases which introduce mutations into B and T cell epitopes, providing a mechanism for immunological escape. When regions of hypervariability are found within immunodominant epitopes with no known function, they are referred to as "decoy epitopes," which often deceptively imprint the host's immune response. In this work, a decoy epitope was identified in the foot-and-mouth disease virus (FMDV) serotype O VP1 G-H loop after multiple sequence alignment of 118 isolates. A series of chimeric cyclic peptides resembling the type O G-H loop were prepared, each bearing a defined "B cell xenoepitope" from another virus in place of the native decoy epitope. These sequences were derived from porcine respiratory and reproductive syndrome virus (PRRSV), from HIV, or from a presumptively tolerogenic sequence from murine albumin and were subsequently used as immunogens in BALB/c mice. Cross-reactive antibody responses against all peptides were compared to a wild-type peptide and ovalbumin (OVA). A broadened antibody response was generated in animals inoculated with the PRRSV chimeric peptide, in which virus binding of serum antibodies was also observed. A B cell epitope mapping experiment did not reveal recognition of any contiguous linear epitopes, raising the possibility that the refocused response was directed to a conformational epitope. Taken together, these results indicate that xenoepitope substitution is a novel method for immune refocusing against decoy epitopes of RNA viruses such as FMDV as part of the rational design of next-generation vaccines.

  19. Simple-MSSM: a simple and efficient method for simultaneous multi-site saturation mutagenesis.

    Science.gov (United States)

    Cheng, Feng; Xu, Jian-Miao; Xiang, Chao; Liu, Zhi-Qiang; Zhao, Li-Qing; Zheng, Yu-Guo

    2017-04-01

    To develop a practically simple and robust multi-site saturation mutagenesis (MSSM) method that enables simultaneously recombination of amino acid positions for focused mutant library generation. A general restriction enzyme-free and ligase-free MSSM method (Simple-MSSM) based on prolonged overlap extension PCR (POE-PCR) and Simple Cloning techniques. As a proof of principle of Simple-MSSM, the gene of eGFP (enhanced green fluorescent protein) was used as a template gene for simultaneous mutagenesis of five codons. Forty-eight randomly selected clones were sequenced. Sequencing revealed that all the 48 clones showed at least one mutant codon (mutation efficiency = 100%), and 46 out of the 48 clones had mutations at all the five codons. The obtained diversities at these five codons are 27, 24, 26, 26 and 22, respectively, which correspond to 84, 75, 81, 81, 69% of the theoretical diversity offered by NNK-degeneration (32 codons; NNK, K = T or G). The enzyme-free Simple-MSSM method can simultaneously and efficiently saturate five codons within one day, and therefore avoid missing interactions between residues in interacting amino acid networks.

  20. Randomized random walk on a random walk

    International Nuclear Information System (INIS)

    Lee, P.A.

    1983-06-01

    This paper discusses generalizations of the model introduced by Kehr and Kunter of the random walk of a particle on a one-dimensional chain which in turn has been constructed by a random walk procedure. The superimposed random walk is randomised in time according to the occurrences of a stochastic point process. The probability of finding the particle in a particular position at a certain instant is obtained explicitly in the transform domain. It is found that the asymptotic behaviour for large time of the mean-square displacement of the particle depends critically on the assumed structure of the basic random walk, giving a diffusion-like term for an asymmetric walk or a square root law if the walk is symmetric. Many results are obtained in closed form for the Poisson process case, and these agree with those given previously by Kehr and Kunter. (author)

  1. Reconstructing random media

    International Nuclear Information System (INIS)

    Yeong, C.L.; Torquato, S.

    1998-01-01

    We formulate a procedure to reconstruct the structure of general random heterogeneous media from limited morphological information by extending the methodology of Rintoul and Torquato [J. Colloid Interface Sci. 186, 467 (1997)] developed for dispersions. The procedure has the advantages that it is simple to implement and generally applicable to multidimensional, multiphase, and anisotropic structures. Furthermore, an extremely useful feature is that it can incorporate any type and number of correlation functions in order to provide as much morphological information as is necessary for accurate reconstruction. We consider a variety of one- and two-dimensional reconstructions, including periodic and random arrays of rods, various distribution of disks, Debye random media, and a Fontainebleau sandstone sample. We also use our algorithm to construct heterogeneous media from specified hypothetical correlation functions, including an exponentially damped, oscillating function as well as physically unrealizable ones. copyright 1998 The American Physical Society

  2. Coronary bifurcation lesions treated with simple or complex stenting

    DEFF Research Database (Denmark)

    Behan, Miles W; Holm, Niels R; de Belder, Adam J

    2016-01-01

    AIMS: Randomized trials of coronary bifurcation stenting have shown better outcomes from a simple (provisional) strategy rather than a complex (planned two-stent) strategy in terms of short-term efficacy and safety. Here, we report the 5-year all-cause mortality based on pooled patient-level data...

  3. A simple approximation method for dilute Ising systems

    International Nuclear Information System (INIS)

    Saber, M.

    1996-10-01

    We describe a simple approximate method to analyze dilute Ising systems. The method takes into consideration the fluctuations of the effective field, and is based on a probability distribution of random variables which correctly accounts for all the single site kinematic relations. It is shown that the simplest approximation gives satisfactory results when compared with other methods. (author). 12 refs, 2 tabs

  4. Linear Programming, the Simplex Algorithm and Simple Polytopes

    Directory of Open Access Journals (Sweden)

    Das Bhusan

    2010-09-01

    Full Text Available In the first part of the paper we survey some far reaching applications of the basis facts of linear programming to the combinatorial theory of simple polytopes. In the second part we discuss some recent developments concurring the simplex algorithm. We describe sub-exponential randomized pivot roles and upper bounds on the diameter of graphs of polytopes.

  5. Comparative effectiveness of inter-simple sequence repeat and ...

    African Journals Online (AJOL)

    A study to compare the effectiveness of inter-simple sequence repeats (ISSR) and randomly amplified polymorphic DNA (RAPD) profiling was carried out with a total of 65 DNA samples using 12 species of Indian Garcinia. ISSR and RAPD profiling were performed with 19 and 12 primers, respectively. ISSR markers ...

  6. Do impression management and self-deception distort self-report measures with content of dynamic risk factors in offender samples? A meta-analytic review.

    Science.gov (United States)

    Hildebrand, Martin; Wibbelink, Carlijn J M; Verschuere, Bruno

    Self-report measures provide an important source of information in correctional/forensic settings, yet at the same time the validity of that information is often questioned because self-reports are thought to be highly vulnerable to self-presentation biases. Primary studies in offender samples have provided mixed results with regard to the impact of socially desirable responding on self-reports. The main aim of the current study was therefore to investigate-via a meta-analytic review of published studies-the association between the two dimensions of socially desirable responding, impression management and self-deceptive enhancement, and self-report measures with content of dynamic risk factors using the Balanced Inventory of Desirable Responding (BIDR) in offender samples. These self-report measures were significantly and negatively related with self-deception (r = -0.120, p impression management (r = -0.158, p impression management effect with the trim and fill method indicating that the relation is probably even smaller (r = -0.07). The magnitude of the effect sizes was small. Moderation analyses suggested that type of dynamic risk factor (e.g., antisocial cognition versus antisocial personality), incentives, and publication year affected the relationship between impression management and self-report measures with content of dynamic risk factors, whereas sample size, setting (e.g., incarcerated, community), and publication year influenced the relation between self-deception and these self-report measures. The results indicate that the use of self-report measures to assess dynamic risk factors in correctional/forensic settings is not inevitably compromised by socially desirable responding, yet caution is warranted for some risk factors (antisocial personality traits), particularly when incentives are at play. Copyright © 2018 Elsevier Ltd. All rights reserved.

  7. Simple Solutions for Dry Eye

    Science.gov (United States)

    Patient Education Sheet Simple Solutions for Dry Eye The SSF thanks J. Daniel Nelson, MD, Associate Medical Director, Specialty Care HealthPartners Medical Group & Clinics, and Professor of Ophthalmology, University of ...

  8. Random Fields

    Science.gov (United States)

    Vanmarcke, Erik

    1983-03-01

    Random variation over space and time is one of the few attributes that might safely be predicted as characterizing almost any given complex system. Random fields or "distributed disorder systems" confront astronomers, physicists, geologists, meteorologists, biologists, and other natural scientists. They appear in the artifacts developed by electrical, mechanical, civil, and other engineers. They even underlie the processes of social and economic change. The purpose of this book is to bring together existing and new methodologies of random field theory and indicate how they can be applied to these diverse areas where a "deterministic treatment is inefficient and conventional statistics insufficient." Many new results and methods are included. After outlining the extent and characteristics of the random field approach, the book reviews the classical theory of multidimensional random processes and introduces basic probability concepts and methods in the random field context. It next gives a concise amount of the second-order analysis of homogeneous random fields, in both the space-time domain and the wave number-frequency domain. This is followed by a chapter on spectral moments and related measures of disorder and on level excursions and extremes of Gaussian and related random fields. After developing a new framework of analysis based on local averages of one-, two-, and n-dimensional processes, the book concludes with a chapter discussing ramifications in the important areas of estimation, prediction, and control. The mathematical prerequisite has been held to basic college-level calculus.

  9. It's the deceiver, not the receiver: No individual differences when detecting deception in a foreign and a native language.

    Directory of Open Access Journals (Sweden)

    Marvin K H Law

    Full Text Available Individual differences in lie detection remain poorly understood. Bond and DePaulo's meta-analysis examined judges (receivers who were ascertaining lies from truths and senders (deceiver who told these lies and truths. Bond and DePaulo found that the accuracy of detecting deception depended more on the characteristics of senders rather than the judges' ability to detect lies/truths. However, for many studies in this meta-analysis, judges could hear and understand senders. This made language comprehension a potential confound. This paper presents the results of two studies. Extending previous work, in Study 1, we removed language comprehension as a potential confound by having English-speakers (N = 126, mean age = 19.86 judge the veracity of German speakers (n = 12 in a lie detection task. The twelve lie-detection stimuli included emotional and non-emotional content, and were presented in three modalities-audio only, video only, and audio and video together. The intelligence (General, Auditory, Emotional and personality (Dark Triads and Big 6 of participants was also assessed. In Study 2, a native German-speaking sample (N = 117, mean age = 29.10 were also tested on a similar lie detection task to provide a control condition. Despite significantly extending research design and the selection of constructs employed to capture individual differences, both studies replicated Bond and DePaulo's findings. The results of Study1 indicated that removing language comprehension did not amplify individual differences in judge's ability to ascertain lies from truths. Study 2 replicated these results confirming a lack of individual differences in judge's ability to detect lies. The results of both studies suggest that Sender (deceiver characteristics exerted a stronger influence on the outcomes of lie detection than the judge's attributes.

  10. Alzheimer random walk

    Science.gov (United States)

    Odagaki, Takashi; Kasuya, Keisuke

    2017-09-01

    Using the Monte Carlo simulation, we investigate a memory-impaired self-avoiding walk on a square lattice in which a random walker marks each of sites visited with a given probability p and makes a random walk avoiding the marked sites. Namely, p = 0 and p = 1 correspond to the simple random walk and the self-avoiding walk, respectively. When p> 0, there is a finite probability that the walker is trapped. We show that the trap time distribution can well be fitted by Stacy's Weibull distribution b(a/b){a+1}/{b}[Γ({a+1}/{b})]-1x^a\\exp(-a/bx^b)} where a and b are fitting parameters depending on p. We also find that the mean trap time diverges at p = 0 as p- α with α = 1.89. In order to produce sufficient number of long walks, we exploit the pivot algorithm and obtain the mean square displacement and its Flory exponent ν(p) as functions of p. We find that the exponent determined for 1000 step walks interpolates both limits ν(0) for the simple random walk and ν(1) for the self-avoiding walk as [ ν(p) - ν(0) ] / [ ν(1) - ν(0) ] = pβ with β = 0.388 when p ≪ 0.1 and β = 0.0822 when p ≫ 0.1. Contribution to the Topical Issue "Continuous Time Random Walk Still Trendy: Fifty-year History, Current State and Outlook", edited by Ryszard Kutner and Jaume Masoliver.

  11. Simple Tidal Prism Models Revisited

    Science.gov (United States)

    Luketina, D.

    1998-01-01

    Simple tidal prism models for well-mixed estuaries have been in use for some time and are discussed in most text books on estuaries. The appeal of this model is its simplicity. However, there are several flaws in the logic behind the model. These flaws are pointed out and a more theoretically correct simple tidal prism model is derived. In doing so, it is made clear which effects can, in theory, be neglected and which can not.

  12. Random packing of digitized particles

    NARCIS (Netherlands)

    Korte, de A.C.J.; Brouwers, H.J.H.

    2013-01-01

    The random packing of regularly and irregularly shaped particles has been studied extensively. Within this paper, packing is studied from the perspective of digitized particles. These digitized particles are developed for and used in cellular automata systems, which are employed for the simple

  13. Random packing of digitized particles

    NARCIS (Netherlands)

    de Korte, A.C.J.; Brouwers, Jos

    2012-01-01

    The random packing of regularly and irregularly shaped particles has been studied extensively. Within this paper, packing is studied from the perspective of digitized particles. These digitized particles are developed for and used in cellular automata systems, which are employed for the simple

  14. Thermophoresis as persistent random walk

    International Nuclear Information System (INIS)

    Plyukhin, A.V.

    2009-01-01

    In a simple model of a continuous random walk a particle moves in one dimension with the velocity fluctuating between +v and -v. If v is associated with the thermal velocity of a Brownian particle and allowed to be position dependent, the model accounts readily for the particle's drift along the temperature gradient and recovers basic results of the conventional thermophoresis theory.

  15. Qubits in a random environment

    International Nuclear Information System (INIS)

    Akhalwaya, I; Fannes, M; Petruccione, F

    2007-01-01

    Decoherence phenomena in a small quantum system coupled to a complex environment can be modelled with random matrices. We propose a simple deterministic model in the limit of a high dimensional environment. The model is investigated numerically and some analytically addressable questions are singled out

  16. Brief motivational interview and educational brochure in emergency room settings for adolescents and young adults with alcohol-related problems: a randomized single-blind clinical trial Intervenção motivacional breve e brochura educacional em pronto-socorro para adolescentes e adultos jovens com problemas relacionados ao álcool: um ensaio clínico simples-cego randomizado

    Directory of Open Access Journals (Sweden)

    Maria Luiza Segatto

    2011-09-01

    Full Text Available OBJECTIVE: To evaluate the effectiveness of brief motivational interviewing and an educational brochure when delivered in emergency room to reduce alcohol abuse and related problems among adolescents and young adults. METHOD: A randomized single-blind clinical trial with a three-month follow-up was carried out at three emergency rooms from October 2004 to November 2005; subjects assessed were 16-25 years old treated for alcohol related events up to 6 hours after consumption. Socio-demographic data, quantity, frequency and negative consequences of alcohol consumption, motivation to change habits and future risk perception were evaluated. Statistical analysis was performed on subjects who completed follow-up (completers. ANCOVA model was used to analyze the difference between the intervention groups with statistical significance level α = 5% and confidence interval (CI of 95%. RESULTS: 186 subjects formed the initial sample, being 175 included and randomized to the educational brochure group (n = 88 or motivational interviewing group (n = 87. Follow-up assessment was performed in 85.2% of the sample. No significant difference between groups was observed. However, significant reductions (p OBJETIVO: Avaliar a efetividade da entrevista motivacional breve e de uma brochura educativa quando aplicadas em prontos-socorros para reduzir o abuso e problemas relacionados ao álcool entre os jovens. MÉTODO: Um ensaio clínico randomizado simples-cego com três meses de seguimento foi realizado em três prontos-socorros de outubro de 2004 a novembro de 2005, com indivíduos de 16-25 anos tratados por eventos relacionados ao álcool com até 6 horas após o consumo. Dados sociodemográficos, quantidade, frequência e consequências negativas, motivação para mudanças de hábitos e percepção para riscos do consumo de álcool foram avaliados. A análise estatística foi realizada em indivíduos que completaram o seguimento (completados. Modelo de ANCOVA

  17. Brief motivational interview and educational brochure in emergency room settings for adolescents and young adults with alcohol related problems: a randomized single blind clinical trial Intervenção motivacional breve e brochura educacional em pronto-socorro para adolescentes e adultos jovens com problemas relacionados ao álcool: um ensaio clínico simples cego randomizado

    Directory of Open Access Journals (Sweden)

    Maria Luiza Segatto

    2011-01-01

    Full Text Available OBJECTIVE: To evaluate the effectiveness of brief motivational interviewing and an educational brochure when delivered in emergency room to reduce alcohol abuse and related problems among adolescents and young adults. METHOD: a randomized single blind clinical trial with a 3 month follow-up was carried out at three emergency rooms from October 2004 to November 2005; subjects assessed were 16-25 years old treated for alcohol related events up to 6 hours after consumption. Socio-demographic data, quantity, frequency and negative consequences of alcohol consumption, motivation to change habits and future risk preception were evaluated. Statistical analysis was performed on subjects who completed follow up (completers. ANCOVA model was used to analyze the difference between the intervention groups with statistical significance level α = 5% and Confidence Interval (CI 95%. RESULTS: 186 subjects formed the initial sample, being n = 175 included and randomized to educational brochure group (n = 88 or motivational interviewing group (n = 87. Follow-up assessment was performed in 85.2% sample. No significant difference between groups was observed. However, significant reductions (p OBJETIVO: Avaliar a efetividade da entrevista motivacional breve e de uma brochura educativa quando aplicadas em prontos-socorros para reduzir o abuso e problemas relacionados ao álcool entre os jovens. MÉTODO: Um ensaio clínico randomizado simples-cego com três meses de seguimento foi realizado em três prontos-socorros de outubro de 2004 a novembro de 2005, com indivíduos de 16-25 anos tratados por eventos relacionados ao álcool com até 6 horas após o consumo. Dados sociodemográficos, quantidade, frequência e consequências negativas, motivação para mudanças de hábitos e percepção para riscos do consumo de álcool foram avaliados. A análise estatística foi realizada em indivíduos que completaram o seguimento (completados. Modelo de ANCOVA foi utilizado

  18. Effects of the Combination of P3-based GKT and Reality Monitoring on Deceptive Classification

    Directory of Open Access Journals (Sweden)

    Ki-Won eJang

    2013-01-01

    Full Text Available The study aimed to investigate whether a combination of the P3-based Guilty Knowledge Test (GKT and reality monitoring (RM distinguished between individuals who are guilty, witnesses, or informed, and using both tests provided more accurate information than did the use of either measure alone. Participants consisted of 45 males that were randomly and evenly assigned to three groups (i.e., guilty, witness, and informed. The guilty group conducted a mock crime where they intentionally crashed their vehicle into another vehicle in a virtual environment (VE. As those in the witness group drove their own vehicles, they observed the guilty groups’ vehicle crash into another vehicle. The informed group read an account and saw screenshots of the accident. All participants were instructed to insist that they were innocent. They performed the P3-based GKT and wrote an account of the accident for the RM analysis. A higher P3 amplitude corresponded to how well the participants recognized the presented stimulus, and a higher RM score corresponded to how well the participants reported vivid sensory information and how much less they reported uncertain information. Findings for the P3-based GKT indicated that the informed group showed lower P3 amplitude when presented with the probe stimulus than did the guilty and witness groups. Regarding the RM analysis, the informed group obtained higher RM scores on visual, temporal, and spatial details and lower scores on cognitive operations than the guilty and witness groups. Discriminant analysis revealed that the combination of the P3-based GKT and RM more accurately distinguished between the three groups than the use of either measure alone. The findings suggest that RM may build upon a weakness of the P3-based GKT’s. More specifically, it may build upon its susceptibility to the leakage of information about the crime, therefore helping protect innocent individuals who have information about a crime from being

  19. Learning from correlated patterns by simple perceptrons

    Energy Technology Data Exchange (ETDEWEB)

    Shinzato, Takashi; Kabashima, Yoshiyuki [Department of Computational Intelligence and Systems Science, Tokyo Institute of Technology, Yokohama 226-8502 (Japan)], E-mail: shinzato@sp.dis.titech.ac.jp, E-mail: kaba@dis.titech.ac.jp

    2009-01-09

    Learning behavior of simple perceptrons is analyzed for a teacher-student scenario in which output labels are provided by a teacher network for a set of possibly correlated input patterns, and such that the teacher and student networks are of the same type. Our main concern is the effect of statistical correlations among the input patterns on learning performance. For this purpose, we extend to the teacher-student scenario a methodology for analyzing randomly labeled patterns recently developed in Shinzato and Kabashima 2008 J. Phys. A: Math. Theor. 41 324013. This methodology is used for analyzing situations in which orthogonality of the input patterns is enhanced in order to optimize the learning performance.

  20. Learning from correlated patterns by simple perceptrons

    Science.gov (United States)

    Shinzato, Takashi; Kabashima, Yoshiyuki

    2009-01-01

    Learning behavior of simple perceptrons is analyzed for a teacher-student scenario in which output labels are provided by a teacher network for a set of possibly correlated input patterns, and such that the teacher and student networks are of the same type. Our main concern is the effect of statistical correlations among the input patterns on learning performance. For this purpose, we extend to the teacher-student scenario a methodology for analyzing randomly labeled patterns recently developed in Shinzato and Kabashima 2008 J. Phys. A: Math. Theor. 41 324013. This methodology is used for analyzing situations in which orthogonality of the input patterns is enhanced in order to optimize the learning performance.

  1. Learning from correlated patterns by simple perceptrons

    International Nuclear Information System (INIS)

    Shinzato, Takashi; Kabashima, Yoshiyuki

    2009-01-01

    Learning behavior of simple perceptrons is analyzed for a teacher-student scenario in which output labels are provided by a teacher network for a set of possibly correlated input patterns, and such that the teacher and student networks are of the same type. Our main concern is the effect of statistical correlations among the input patterns on learning performance. For this purpose, we extend to the teacher-student scenario a methodology for analyzing randomly labeled patterns recently developed in Shinzato and Kabashima 2008 J. Phys. A: Math. Theor. 41 324013. This methodology is used for analyzing situations in which orthogonality of the input patterns is enhanced in order to optimize the learning performance

  2. Simple arithmetic: not so simple for highly math anxious individuals.

    Science.gov (United States)

    Chang, Hyesang; Sprute, Lisa; Maloney, Erin A; Beilock, Sian L; Berman, Marc G

    2017-12-01

    Fluency with simple arithmetic, typically achieved in early elementary school, is thought to be one of the building blocks of mathematical competence. Behavioral studies with adults indicate that math anxiety (feelings of tension or apprehension about math) is associated with poor performance on cognitively demanding math problems. However, it remains unclear whether there are fundamental differences in how high and low math anxious individuals approach overlearned simple arithmetic problems that are less reliant on cognitive control. The current study used functional magnetic resonance imaging to examine the neural correlates of simple arithmetic performance across high and low math anxious individuals. We implemented a partial least squares analysis, a data-driven, multivariate analysis method to measure distributed patterns of whole-brain activity associated with performance. Despite overall high simple arithmetic performance across high and low math anxious individuals, performance was differentially dependent on the fronto-parietal attentional network as a function of math anxiety. Specifically, low-compared to high-math anxious individuals perform better when they activate this network less-a potential indication of more automatic problem-solving. These findings suggest that low and high math anxious individuals approach even the most fundamental math problems differently. © The Author (2017). Published by Oxford University Press.

  3. Random number generation and creativity.

    Science.gov (United States)

    Bains, William

    2008-01-01

    A previous paper suggested that humans can generate genuinely random numbers. I tested this hypothesis by repeating the experiment with a larger number of highly numerate subjects, asking them to call out a sequence of digits selected from 0 through 9. The resulting sequences were substantially non-random, with an excess of sequential pairs of numbers and a deficit of repeats of the same number, in line with previous literature. However, the previous literature suggests that humans generate random numbers with substantial conscious effort, and distractions which reduce that effort reduce the randomness of the numbers. I reduced my subjects' concentration by asking them to call out in another language, and with alcohol - neither affected the randomness of their responses. This suggests that the ability to generate random numbers is a 'basic' function of the human mind, even if those numbers are not mathematically 'random'. I hypothesise that there is a 'creativity' mechanism, while not truly random, provides novelty as part of the mind's defence against closed programming loops, and that testing for the effects seen here in people more or less familiar with numbers or with spontaneous creativity could identify more features of this process. It is possible that training to perform better at simple random generation tasks could help to increase creativity, through training people to reduce the conscious mind's suppression of the 'spontaneous', creative response to new questions.

  4. Generalized Gradient Approximation Made Simple

    International Nuclear Information System (INIS)

    Perdew, J.P.; Burke, K.; Ernzerhof, M.

    1996-01-01

    Generalized gradient approximations (GGA close-quote s) for the exchange-correlation energy improve upon the local spin density (LSD) description of atoms, molecules, and solids. We present a simple derivation of a simple GGA, in which all parameters (other than those in LSD) are fundamental constants. Only general features of the detailed construction underlying the Perdew-Wang 1991 (PW91) GGA are invoked. Improvements over PW91 include an accurate description of the linear response of the uniform electron gas, correct behavior under uniform scaling, and a smoother potential. copyright 1996 The American Physical Society

  5. Curvature of random walks and random polygons in confinement

    International Nuclear Information System (INIS)

    Diao, Y; Ernst, C; Montemayor, A; Ziegler, U

    2013-01-01

    The purpose of this paper is to study the curvature of equilateral random walks and polygons that are confined in a sphere. Curvature is one of several basic geometric properties that can be used to describe random walks and polygons. We show that confinement affects curvature quite strongly, and in the limit case where the confinement diameter equals the edge length the unconfined expected curvature value doubles from π/2 to π. To study curvature a simple model of an equilateral random walk in spherical confinement in dimensions 2 and 3 is introduced. For this simple model we derive explicit integral expressions for the expected value of the total curvature in both dimensions. These expressions are functions that depend only on the radius R of the confinement sphere. We then show that the values obtained by numeric integration of these expressions agrees with numerical average curvature estimates obtained from simulations of random walks. Finally, we compare the confinement effect on curvature of random walks with random polygons. (paper)

  6. Random Item Generation Is Affected by Age

    Science.gov (United States)

    Multani, Namita; Rudzicz, Frank; Wong, Wing Yiu Stephanie; Namasivayam, Aravind Kumar; van Lieshout, Pascal

    2016-01-01

    Purpose: Random item generation (RIG) involves central executive functioning. Measuring aspects of random sequences can therefore provide a simple method to complement other tools for cognitive assessment. We examine the extent to which RIG relates to specific measures of cognitive function, and whether those measures can be estimated using RIG…

  7. Emergence Issues - not so simple

    African Journals Online (AJOL)

    Anaesthetics Supplement: Emergence Issues - not so simple. S Afr Fam Pract 2014. Vol 56 No 2 Supplement 1. Introduction. Emergence from anaesthesia is by definition the process of return to baseline physiological function of all organ systems after cessation of administration of general anaesthesia and is the stage from ...

  8. On framed simple Lie groups

    OpenAIRE

    MINAMI, Haruo

    2016-01-01

    For a compact simple Lie group $G$, we show that the element $[G, \\mathcal{L}] \\in \\pi^S_*(S^0)$ represented by the pair $(G, \\mathcal{L})$ is zero, where $\\mathcal{L}$ denotes the left invariant framing of $G$. The proof relies on the method of E. Ossa [Topology, 21 (1982), 315–323].

  9. The simple ethers of glycerin

    International Nuclear Information System (INIS)

    Kimsanov, B.Kh.; Karimov, M.B.

    1998-01-01

    From glycerin derivatives the considerable interest is present simple ethers because many of them are biological active and found wide practical using as an effect drugs, inters for thin organic synthesis, vehicle for injections, regulators of plants growth, reagents, components for perfumery-cosmetic goods and etc

  10. Solving Simple Kinetics without Integrals

    Science.gov (United States)

    de la Pen~a, Lisandro Herna´ndez

    2016-01-01

    The solution of simple kinetic equations is analyzed without referencing any topic from differential equations or integral calculus. Guided by the physical meaning of the rate equation, a systematic procedure is used to generate an approximate solution that converges uniformly to the exact solution in the case of zero, first, and second order…

  11. Grief: Difficult Times, Simple Steps.

    Science.gov (United States)

    Waszak, Emily Lane

    This guide presents techniques to assist others in coping with the loss of a loved one. Using the language of 9 layperson, the book contains more than 100 tips for caregivers or loved ones. A simple step is presented on each page, followed by reasons and instructions for each step. Chapters include: "What to Say"; "Helpful Things to Do"; "Dealing…

  12. Simple stålrammebygninger

    DEFF Research Database (Denmark)

    Ellum, J.C.

    Anvisningen gennemgår dimensioneringen og bringer detaljerede konstruktionstegninger til simple stålrammebygninger, dvs. lukkede, fritliggende bygninger i én etage, hvor tagkonstruktionen ud over egenlast kun er påvirket af naturlaster, dvs. sne og vind. Dimensioneringen sker ved at udfylde et di...

  13. Simple models with ALICE fluxes

    CERN Document Server

    Striet, J

    2000-01-01

    We introduce two simple models which feature an Alice electrodynamics phase. In a well defined sense the Alice flux solutions we obtain in these models obey first order equations similar to those of the Nielsen-Olesen fluxtube in the abelian higgs model in the Bogomol'nyi limit. Some numerical solutions are presented as well.

  14. Roughening in random sine-Gordon systems

    International Nuclear Information System (INIS)

    Schwartz, M.; Nattermann, T.

    1991-01-01

    We consider the spatial correlations of the optimal solutions of the random sine-Gordon equation as an example of the usefulness of a very simple ansatz relating the Fourier transforms of certain functions of the field Φ to the Fourier transform of the random fields. The dramatic change in the correlations when going from above to below two dimensions is directly attributed to the transfer from dominance of long range fluctuations of the randomness to the dominance of short range fluctuations. (orig.)

  15. Structure of simple liquids; Structure des liquides simples

    Energy Technology Data Exchange (ETDEWEB)

    Blain, J F [Commissariat a l' Energie Atomique, Fontenay-aux-Roses (France). Centre d' Etudes Nucleaires

    1969-07-01

    The results obtained by application to argon and sodium of the two important methods of studying the structure of liquids: scattering of X-rays and neutrons, are presented on one hand. On the other hand the principal models employed for reconstituting the structure of simple liquids are exposed: mathematical models, lattice models and their derived models, experimental models. (author) [French] On presente d'une part les resultats obtenus par application a l'argon et au sodium des deux principales methodes d'etude de la structure des liquides: la diffusion des rayons X et la diffusion des neutrons; d'autre part, les principaux modeles employes pour reconstituer la structure des liquides simples sont exposes: modeles mathematiques, modeles des reseaux et modeles derives, modeles experimentaux. (auteur)

  16. Random magnetism

    International Nuclear Information System (INIS)

    Tsallis, C.

    1980-03-01

    The 'ingredients' which control a phase transition in well defined system as well as in random ones (e.g. random magnetic systems) are listed and discussed within a somehow unifying perspective. Among these 'ingredients' we find the couplings and elements responsible for the cooperative phenomenon, the topological connectivity as well as possible topological incompatibilities, the influence of new degrees of freedom, the order parameter dimensionality, the ground state degeneracy and finally the 'quanticity' of the system. The general trends, though illustrated in magnetic systems, essentially hold for all phase transitions, and give a basis for connection of this area with Field theory, Theory of dynamical systems, etc. (Author) [pt

  17. Random magnetism

    International Nuclear Information System (INIS)

    Tsallis, C.

    1981-01-01

    The 'ingredients' which control a phase transition in well defined systems as well as in random ones (e.q. random magnetic systems) are listed and discussed within a somehow unifying perspective. Among these 'ingredients' the couplings and elements responsible for the cooperative phenomenon, the topological connectivity as well as possible topological incompatibilities, the influence of new degrees of freedom, the order parameter dimensionality, the ground state degeneracy and finally the 'quanticity' of the system are found. The general trends, though illustrated in magnetic systems, essentially hold for all phase transitions, and give a basis for connection of this area with Field theory, Theory of dynamical systems, etc. (Author) [pt

  18. A Simple Statistical Thermodynamics Experiment

    Science.gov (United States)

    LoPresto, Michael C.

    2010-01-01

    Comparing the predicted and actual rolls of combinations of both two and three dice can help to introduce many of the basic concepts of statistical thermodynamics, including multiplicity, probability, microstates, and macrostates, and demonstrate that entropy is indeed a measure of randomness, that disordered states (those of higher entropy) are…

  19. Simple Electromagnetic Analysis in Cryptography

    Directory of Open Access Journals (Sweden)

    Zdenek Martinasek

    2012-07-01

    Full Text Available The article describes the main principle and methods of simple electromagnetic analysis and thus provides an overview of simple electromagnetic analysis.The introductions chapters describe specific SPA attack used visual inspection of EM traces, template based attack and collision attack.After reading the article, the reader is sufficiently informed of any context of SEMA.Another aim of the article is the practical realization of SEMA which is focused on AES implementation.The visual inspection of EM trace of AES is performed step by step and the result is the determination of secret key Hamming weight.On the resulting EM trace, the Hamming weight of the secret key 1 to 8 was clearly visible.This method allows reduction from the number of possible keys for following brute force attack.

  20. Complexity-aware simple modeling.

    Science.gov (United States)

    Gómez-Schiavon, Mariana; El-Samad, Hana

    2018-02-26

    Mathematical models continue to be essential for deepening our understanding of biology. On one extreme, simple or small-scale models help delineate general biological principles. However, the parsimony of detail in these models as well as their assumption of modularity and insulation make them inaccurate for describing quantitative features. On the other extreme, large-scale and detailed models can quantitatively recapitulate a phenotype of interest, but have to rely on many unknown parameters, making them often difficult to parse mechanistically and to use for extracting general principles. We discuss some examples of a new approach-complexity-aware simple modeling-that can bridge the gap between the small-scale and large-scale approaches. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Simple Functions Spreadsheet tool presentation

    International Nuclear Information System (INIS)

    Grive, Mireia; Domenech, Cristina; Montoya, Vanessa; Garcia, David; Duro, Lara

    2010-09-01

    This document is a guide for users of the Simple Functions Spreadsheet tool. The Simple Functions Spreadsheet tool has been developed by Amphos 21 to determine the solubility limits of some radionuclides and it has been especially designed for Performance Assessment exercises. The development of this tool has been promoted by the necessity expressed by SKB of having a confident and easy-to-handle tool to calculate solubility limits in an agile and relatively fast manner. Its development started in 2005 and since then, it has been improved until the current version. This document describes the accurate and preliminary study following expert criteria that has been used to select the simplified aqueous speciation and solid phase system included in the tool. This report also gives the basic instructions to use this tool and to interpret its results. Finally, this document also reports the different validation tests and sensitivity analyses that have been done during the verification process

  2. Gradings on simple Lie algebras

    CERN Document Server

    Elduque, Alberto

    2013-01-01

    Gradings are ubiquitous in the theory of Lie algebras, from the root space decomposition of a complex semisimple Lie algebra relative to a Cartan subalgebra to the beautiful Dempwolff decomposition of E_8 as a direct sum of thirty-one Cartan subalgebras. This monograph is a self-contained exposition of the classification of gradings by arbitrary groups on classical simple Lie algebras over algebraically closed fields of characteristic not equal to 2 as well as on some nonclassical simple Lie algebras in positive characteristic. Other important algebras also enter the stage: matrix algebras, the octonions, and the Albert algebra. Most of the presented results are recent and have not yet appeared in book form. This work can be used as a textbook for graduate students or as a reference for researchers in Lie theory and neighboring areas.

  3. Licensing of simple digital devices

    International Nuclear Information System (INIS)

    Jackson, T. W.

    2008-01-01

    The inability to guarantee error-free software gave rise to the potential for common-cause failure of digital safety systems in nuclear power plants. To address this vulnerability, the U. S. Nuclear Regulatory Commission (NRC) required a quality software development process and a defense-in-depth and diversity analysis for digital safety systems. As a result of recent interim [NRC] staff guidance in the digital instrumentation and control (I and C) area, licensing of simple digital devices decreases some regulatory burden with respect to demonstrating a quality software development process and defense-in-depth and diversity analysis. This paper defines simple digital devices and addresses the interim staff guidance that applies to such devices. The paper also highlights the technical aspects that affect the licensing of such devices and incorporates licensing experience in the U.S. to date. (authors)

  4. Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J.C.; Ibrahim, S.R.; Brincker, Rune

    Abstraet Thispaper demansirates how to use the Random Decrement (RD) technique for identification o flinear structures subjected to ambient excitation. The theory behind the technique will be presented and guidelines how to choose the different variables will be given. This is done by introducing...

  5. Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J. C.; Ibrahim, S. R.; Brincker, Rune

    This paper demonstrates how to use the Random Decrement (RD) technique for identification of linear structures subjected to ambient excitation. The theory behind the technique will be presented and guidelines how to choose the different variables will be given. This is done by introducing a new...

  6. Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J. C.; Ibrahim, R.; Brincker, Rune

    1998-01-01

    This paper demonstrates how to use the Random Decrement (RD) technique for identification of linear structures subjected to ambient excitation. The theory behind the technique will be presented and guidelines how to choose the different variables will be given. This is done by introducing a new...

  7. Random dynamics

    International Nuclear Information System (INIS)

    Bennett, D.L.; Brene, N.; Nielsen, H.B.

    1986-06-01

    The goal of random dynamics is the derivation of the laws of Nature as we know them (standard model) from inessential assumptions. The inessential assumptions made here are expressed as sets of general models at extremely high energies: gauge glass and spacetime foam. Both sets of models lead tentatively to the standard model. (orig.)

  8. Random dynamics

    International Nuclear Information System (INIS)

    Bennett, D.L.

    1987-01-01

    The goal of random dynamics is the derivation of the laws of Nature as we know them (standard model) from inessential assumptions. The inessential assumptions made here are expressed as sets of general models at extremely high energies: Gauge glass and spacetime foam. Both sets of models lead tentatively to the standard model. (orig.)

  9. Random Dynamics

    Science.gov (United States)

    Bennett, D. L.; Brene, N.; Nielsen, H. B.

    1987-01-01

    The goal of random dynamics is the derivation of the laws of Nature as we know them (standard model) from inessential assumptions. The inessential assumptions made here are expressed as sets of general models at extremely high energies: gauge glass and spacetime foam. Both sets of models lead tentatively to the standard model.

  10. A simple electron plasma wave

    International Nuclear Information System (INIS)

    Brodin, G.; Stenflo, L.

    2017-01-01

    Considering a class of solutions where the density perturbations are functions of time, but not of space, we derive a new exact large amplitude wave solution for a cold uniform electron plasma. This result illustrates that most simple analytical solutions can appear even if the density perturbations are large. - Highlights: • The influence of large amplitude electromagnetic waves on electrostatic oscillations is found. • A generalized Mathieu equation is derived. • Anharmonic wave profiles are computed numerically.

  11. A Simple Probabilistic Combat Model

    Science.gov (United States)

    2016-06-13

    Government may violate any copyrights that exist in this work. This page intentionally left blank. ABSTRACT The Lanchester ...page intentionally left blank. TABLE OF CONTENTS Page No.Abstract iii List of Illustrations vii 1. INTRODUCTION 1 2. DETERMINISTIC LANCHESTER MODEL...This page intentionally left blank. 1. INTRODUCTION The Lanchester combat model1 is a simple way to assess the effects of quantity and quality

  12. A simple electron plasma wave

    Energy Technology Data Exchange (ETDEWEB)

    Brodin, G., E-mail: gert.brodin@physics.umu.se [Department of Physics, Umeå University, SE-901 87 Umeå (Sweden); Stenflo, L. [Department of Physics, Linköping University, SE-581 83 Linköping (Sweden)

    2017-03-18

    Considering a class of solutions where the density perturbations are functions of time, but not of space, we derive a new exact large amplitude wave solution for a cold uniform electron plasma. This result illustrates that most simple analytical solutions can appear even if the density perturbations are large. - Highlights: • The influence of large amplitude electromagnetic waves on electrostatic oscillations is found. • A generalized Mathieu equation is derived. • Anharmonic wave profiles are computed numerically.

  13. Simple and Realistic Data Generation

    DEFF Research Database (Denmark)

    Pedersen, Kenneth Houkjær; Torp, Kristian; Wind, Rico

    2006-01-01

    This paper presents a generic, DBMS independent, and highly extensible relational data generation tool. The tool can efficiently generate realistic test data for OLTP, OLAP, and data streaming applications. The tool uses a graph model to direct the data generation. This model makes it very simple...... to generate data even for large database schemas with complex inter- and intra table relationships. The model also makes it possible to generate data with very accurate characteristics....

  14. Classification of simple current invariants

    CERN Document Server

    Gato-Rivera, Beatriz

    1992-01-01

    We summarize recent work on the classification of modular invariant partition functions that can be obtained with simple currents in theories with a center (Z_p)^k with p prime. New empirical results for other centers are also presented. Our observation that the total number of invariants is monodromy-independent for (Z_p)^k appears to be true in general as well. (Talk presented in the parallel session on string theory of the Lepton-Photon/EPS Conference, Geneva, 1991.)

  15. Instant simple botting with PHP

    CERN Document Server

    Anderson, Shay Michael

    2013-01-01

    do for you, and then get to work with the most important features and tasks. This book is a hands-on Starter guide that takes the reader from initialization to the coding and implementation of bot apps.Instant Simple Botting with PHP targets programmers of all levels who are familiar with common PHP functions and syntax, and who want to learn about bots and how to design and develop bots using objects.

  16. The sample ACF of a simple bilinear process

    NARCIS (Netherlands)

    Basrak, B; Davis, RA; Mikosch, T

    1999-01-01

    We consider a simple bilinear process X-t = aX(t-1) + bX(t-1)Z(t-1) +Z(t), where (Z(t)) is a sequence of iid N(0, 1) random variables. It follows from a result by Kesten (1973, Acta Math. 131, 207-248) that X-t has a distribution with regularly varying tails of index alpha > 0 provided the equation

  17. The Effect of Herrmann Whole Brain Teaching Method on Students' Understanding of Simple Electric Circuits

    Science.gov (United States)

    Bawaneh, Ali Khalid Ali; Nurulazam Md Zain, Ahmad; Salmiza, Saleh

    2011-01-01

    The purpose of this study was to investigate the effect of Herrmann Whole Brain Teaching Method over conventional teaching method on eight graders in their understanding of simple electric circuits in Jordan. Participants (N = 273 students; M = 139, F = 134) were randomly selected from Bani Kenanah region-North of Jordan and randomly assigned to…

  18. Views about scientists and scientific work in the novel Deception Point by Dan Brown: possibilities to insert History and Philosophy of Science elements

    Directory of Open Access Journals (Sweden)

    Wilmo Ernesto Francisco Junior

    2015-02-01

    Full Text Available Considering the influence of literature on people lives, this study investigates elements concerning views about scientists and scientific work presented in Deception Point, a novel by Dan Brown. Multiple aspects to represent the scientist figure, life and work, emerge from the novel and problematize characteristics that can be considered as a common sense view, or others perspectives based on more contemporaneous philosophical thoughts on science. Reading and analyzing this novel could be an interesting opportunity to insert elements of history and philosophy of science under different focus. This study discusses some elements, from excerpts of the novel, which may become possibilities for debates in Science classes at schools, and in teacher education.

  19. The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy.

    Science.gov (United States)

    Arnold, Denis G; Oakley, James L

    2013-06-01

    As the pharmaceutical industry lobbies European regulators to permit direct-to-consumer advertising (DTCA) of prescription drugs in the European Union, we found that five leading companies violated industry-developed and -promulgated standards for ethical advertising in the United States. Utilizing multiple data sources and methods, we demonstrate a consistent failure by companies that market erectile dysfunction drugs to comply with the industry's guiding principles for ethical DTCA over a four-year period despite pledges of compliance by company leaders. Noncompliance resulted in children being exposed to sexually themed promotional messages more than 100 billion times. We argue that the guidelines are a coordinated effort by the industry to prevent unwanted federal regulation, and we introduce the concept of a blocking strategy to explain company behavior and to advance theoretical understanding of firms' public affairs strategies. We recommend policy responses to prevent deceptive practices, protect children from adult content, and promote genuine health care education.

  20. What Is a Simple Liquid?

    Directory of Open Access Journals (Sweden)

    Trond S. Ingebrigtsen

    2012-03-01

    Full Text Available This paper is an attempt to identify the real essence of simplicity of liquids in John Locke’s understanding of the term. Simple liquids are traditionally defined as many-body systems of classical particles interacting via radially symmetric pair potentials. We suggest that a simple liquid should be defined instead by the property of having strong correlations between virial and potential-energy equilibrium fluctuations in the NVT ensemble. There is considerable overlap between the two definitions, but also some notable differences. For instance, in the new definition simplicity is not a direct property of the intermolecular potential because a liquid is usually only strongly correlating in part of its phase diagram. Moreover, not all simple liquids are atomic (i.e., with radially symmetric pair potentials and not all atomic liquids are simple. The main part of the paper motivates the new definition of liquid simplicity by presenting evidence that a liquid is strongly correlating if and only if its intermolecular interactions may be ignored beyond the first coordination shell (FCS. This is demonstrated by NVT simulations of the structure and dynamics of several atomic and three molecular model liquids with a shifted-forces cutoff placed at the first minimum of the radial distribution function. The liquids studied are inverse power-law systems (r^{-n} pair potentials with n=18,6,4, Lennard-Jones (LJ models (the standard LJ model, two generalized Kob-Andersen binary LJ mixtures, and the Wahnstrom binary LJ mixture, the Buckingham model, the Dzugutov model, the LJ Gaussian model, the Gaussian core model, the Hansen-McDonald molten salt model, the Lewis-Wahnstrom ortho-terphenyl model, the asymmetric dumbbell model, and the single-point charge water model. The final part of the paper summarizes properties of strongly correlating liquids, emphasizing that these are simpler than liquids in general. Simple liquids, as defined here, may be

  1. Deception: Theory and Practice

    Science.gov (United States)

    2012-06-01

    or degrade these plans. An example of poor coordinate occurred during the assault on the German garrison at Brest during the summer of 1944; the 23rd... Paris peace talks.339 The SSPL program was effectively ended with the 1 April 1968.340 335

  2. Testing Deceptive Honeypots

    Science.gov (United States)

    2014-09-01

    42 Figure 26. IPv6 address of traffic by region (cmand.org). .................................... 42 Figure 27. Web honeypot traffic...distribution for IPv6 addresses. Unfortunately, only a few honeypots support IPv6 address like Dionaea. 11 We studied mostly two honeypot technologies...used data from cmand.org (183,713 IPv4 packets and 199 IPv6 packets) from May 30, 2011, to November 26, 2013. For the web honeypot, data were

  3. Deception or Illusion ?

    Directory of Open Access Journals (Sweden)

    Volkan YUNCU

    2017-04-01

    Full Text Available Reputation is defined as the collective assesments evaluations on the reliability or credibility of an organization based on its past performance. Its effect on ensuring the stakeholders’ support and loyalty is increasingly recognized. Media is one of the most crucial elements that affect these evaluations since it has a great effect on the general opinion of society, and this effect lays the ground for the emergence of social pressure in any negative situation. Thus, there is a linear relationship between the effect of media on stakeholder groups and the sustainability and perceived reputation of businesses. In this age of information and technology, the ability of consumers to spread a slightest malfunction that they encounter to the entire world by means of internet and especially social media urges the businesses take extremely meticulous measures to protect their perceived reputations. This study is aimed to analyze the effect of the reflection of the results of a worldwide auto manufacturer’s emission test investigation for some vehicles in 2015 on the perceived reputation of the brand. Through logistic regression analysis, it is observed that the news regrading the brand had a negative effect on consumers in Turkey.

  4. Simulation of a directed random-walk model: the effect of pseudo-random-number correlations

    OpenAIRE

    Shchur, L. N.; Heringa, J. R.; Blöte, H. W. J.

    1996-01-01

    We investigate the mechanism that leads to systematic deviations in cluster Monte Carlo simulations when correlated pseudo-random numbers are used. We present a simple model, which enables an analysis of the effects due to correlations in several types of pseudo-random-number sequences. This model provides qualitative understanding of the bias mechanism in a class of cluster Monte Carlo algorithms.

  5. Correlation and simple linear regression.

    Science.gov (United States)

    Zou, Kelly H; Tuncali, Kemal; Silverman, Stuart G

    2003-06-01

    In this tutorial article, the concepts of correlation and regression are reviewed and demonstrated. The authors review and compare two correlation coefficients, the Pearson correlation coefficient and the Spearman rho, for measuring linear and nonlinear relationships between two continuous variables. In the case of measuring the linear relationship between a predictor and an outcome variable, simple linear regression analysis is conducted. These statistical concepts are illustrated by using a data set from published literature to assess a computed tomography-guided interventional technique. These statistical methods are important for exploring the relationships between variables and can be applied to many radiologic studies.

  6. Systems analysis made simple computerbooks

    CERN Document Server

    Antill, Lyn

    1980-01-01

    Systems Analysis: Made Simple Computerbooks introduces the essential elements of information systems analysis and design and teaches basic technical skills required for the tasks involved. The book covers the aspects to the design of an information system; information systems and the organization, including the types of information processing activity and computer-based information systems; the role of the systems analyst; and the human activity system. The text also discusses information modeling, socio-technical design, man-machine interface, and the database design. Software specification

  7. Computer electronics made simple computerbooks

    CERN Document Server

    Bourdillon, J F B

    1975-01-01

    Computer Electronics: Made Simple Computerbooks presents the basics of computer electronics and explains how a microprocessor works. Various types of PROMs, static RAMs, dynamic RAMs, floppy disks, and hard disks are considered, along with microprocessor support devices made by Intel, Motorola and Zilog. Bit slice logic and some AMD bit slice products are also described. Comprised of 14 chapters, this book begins with an introduction to the fundamentals of hardware design, followed by a discussion on the basic building blocks of hardware (NAND, NOR, AND, OR, NOT, XOR); tools and equipment that

  8. Singular perturbation of simple eigenvalues

    International Nuclear Information System (INIS)

    Greenlee, W.M.

    1976-01-01

    Two operator theoretic theorems which generalize those of asymptotic regular perturbation theory and which apply to singular perturbation problems are proved. Application of these theorems to concrete problems is involved, but the perturbation expansions for eigenvalues and eigenvectors are developed in terms of solutions of linear operator equations. The method of correctors, as well as traditional boundary layer techniques, can be used to apply these theorems. The current formulation should be applicable to highly singular ''hard core'' potential perturbations of the radial equation of quantum mechanics. The theorems are applied to a comparatively simple model problem whose analysis is basic to that of the quantum mechanical problem

  9. Simple Simulations of DNA Condensation

    Energy Technology Data Exchange (ETDEWEB)

    STEVENS,MARK J.

    2000-07-12

    Molecular dynamics simulations of a simple, bead-spring model of semiflexible polyelectrolytes such as DNA are performed. All charges are explicitly treated. Starting from extended, noncondensed conformations, condensed structures form in the simulations with tetravalent or trivalent counterions. No condensates form or are stable for divalent counterions. The mechanism by which condensates form is described. Briefly, condensation occurs because electrostatic interactions dominate entropy, and the favored Coulombic structure is a charge ordered state. Condensation is a generic phenomena and occurs for a variety of polyelectrolyte parameters. Toroids and rods are the condensate structures. Toroids form preferentially when the molecular stiffness is sufficiently strong.

  10. Wrist arthrography: a simple method

    Energy Technology Data Exchange (ETDEWEB)

    Berna-Serna, Juan D.; Reus, Manuel; Alonso, Jose [Virgen de la Arrixaca University Hospital, Department of Radiology, El Palmar (Murcia) (Spain); Martinez, Francisco; Domenech-Ratto, Gines [University of Murcia, Department of Human Anatomy, Faculty of Medicine, Murcia (Spain)

    2006-02-01

    A technique of wrist arthrography is presented using an adhesive marker-plate with radiopaque coordinates to identify precisely sites for puncture arthrography of the wrist and to obviate the need for fluoroscopic guidance. Radiocarpal joint arthrography was performed successfully in all 24 cases, 14 in the cadaveric wrists and 10 in the live patients. The arthrographic procedure described in this study is simple, safe, and rapid, and has the advantage of precise localisation of the site for puncture without need for fluoroscopic guidance. (orig.)

  11. Windows Phone 7 Made Simple

    CERN Document Server

    Trautschold, Martin

    2011-01-01

    With Windows Phone 7, Microsoft has created a completely new smartphone operating system that focuses on allowing users to be productive with their smartphone in new ways, while offering seamless integration and use of Microsoft Office Mobile as well as other productivity apps available in the Microsoft App Store. Windows Phone 7 Made Simple offers a clear, visual, step-by-step approach to using your Windows Phone 7 smartphone, no matter what the manufacturer. Author Jon Westfall is an expert in mobile devices, recognized by Microsoft as a "Most Valuable Professional" with experience

  12. Simple emergent power spectra from complex inflationary physics

    Energy Technology Data Exchange (ETDEWEB)

    Dias, Mafalda; Frazer, Jonathan [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Marsh, M.C. David [Cambridge Univ. (United Kingdom). Dept. of Applied Mathematics and Theoretical Physics (DAMTP)

    2016-04-15

    We construct ensembles of random scalar potentials for N{sub f} interacting scalar fields using non-equilibrium random matrix theory, and use these to study the generation of observables during small-field inflation. For N{sub f}=O(few), these heavily featured scalar potentials give rise to power spectra that are highly non-linear, at odds with observations. For N{sub f}>>1, the superhorizon evolution of the perturbations is generically substantial, yet the power spectra simplify considerably and become more predictive, with most realisations being well approximated by a linear power spectrum. This provides proof of principle that complex inflationary physics can give rise to simple emergent power spectra. We explain how these results can be understood in terms of large N{sub f} universality of random matrix theory.

  13. Simple emergent power spectra from complex inflationary physics

    International Nuclear Information System (INIS)

    Dias, Mafalda; Frazer, Jonathan; Marsh, M.C. David

    2016-04-01

    We construct ensembles of random scalar potentials for N f interacting scalar fields using non-equilibrium random matrix theory, and use these to study the generation of observables during small-field inflation. For N f =O(few), these heavily featured scalar potentials give rise to power spectra that are highly non-linear, at odds with observations. For N f >>1, the superhorizon evolution of the perturbations is generically substantial, yet the power spectra simplify considerably and become more predictive, with most realisations being well approximated by a linear power spectrum. This provides proof of principle that complex inflationary physics can give rise to simple emergent power spectra. We explain how these results can be understood in terms of large N f universality of random matrix theory.

  14. Locally Perturbed Random Walks with Unbounded Jumps

    OpenAIRE

    Paulin, Daniel; Szász, Domokos

    2010-01-01

    In \\cite{SzT}, D. Sz\\'asz and A. Telcs have shown that for the diffusively scaled, simple symmetric random walk, weak convergence to the Brownian motion holds even in the case of local impurities if $d \\ge 2$. The extension of their result to finite range random walks is straightforward. Here, however, we are interested in the situation when the random walk has unbounded range. Concretely we generalize the statement of \\cite{SzT} to unbounded random walks whose jump distribution belongs to th...

  15. Electrical conductivity in random alloys

    International Nuclear Information System (INIS)

    Mookerjee, A.; Thakur, P.K.; Yussouff, M.

    1984-12-01

    Based on the augmented space formalism introduced by one of us and the use of the Ward identity and the Bethe-Sapeter equation, a formalism has been developed for the calculation of electrical conductivity for random alloys. A simple application is made to a model case, and it is argued that the formalism enables us to carry out viable calculations on more realistic models of alloys. (author)

  16. Crowding with conjunctions of simple features.

    Science.gov (United States)

    Põder, Endel; Wagemans, Johan

    2007-11-20

    Several recent studies have related crowding with the feature integration stage in visual processing. In order to understand the mechanisms involved in this stage, it is important to use stimuli that have several features to integrate, and these features should be clearly defined and measurable. In this study, Gabor patches were used as target and distractor stimuli. The stimuli differed in three dimensions: spatial frequency, orientation, and color. A group of 3, 5, or 7 objects was presented briefly at 4 deg eccentricity of the visual field. The observers' task was to identify the object located in the center of the group. A strong effect of the number of distractors was observed, consistent with various spatial pooling models. The analysis of incorrect responses revealed that these were a mix of feature errors and mislocalizations of the target object. Feature errors were not purely random, but biased by the features of distractors. We propose a simple feature integration model that predicts most of the observed regularities.

  17. Random distributed feedback fibre lasers

    Energy Technology Data Exchange (ETDEWEB)

    Turitsyn, Sergei K., E-mail: s.k.turitsyn@aston.ac.uk [Aston Institute of Photonic Technologies, Aston University, Birmingham B4 7ET (United Kingdom); Novosibirsk State University, 2 Pirogova str., 630090, Novosibirsk (Russian Federation); Babin, Sergey A. [Novosibirsk State University, 2 Pirogova str., 630090, Novosibirsk (Russian Federation); Institute of Automation and Electrometry SB RAS, 1 Ac. Koptug. ave., 630090, Novosibirsk (Russian Federation); Churkin, Dmitry V. [Aston Institute of Photonic Technologies, Aston University, Birmingham B4 7ET (United Kingdom); Novosibirsk State University, 2 Pirogova str., 630090, Novosibirsk (Russian Federation); Institute of Automation and Electrometry SB RAS, 1 Ac. Koptug. ave., 630090, Novosibirsk (Russian Federation); Vatnik, Ilya D.; Nikulin, Maxim [Institute of Automation and Electrometry SB RAS, 1 Ac. Koptug. ave., 630090, Novosibirsk (Russian Federation); Podivilov, Evgenii V. [Novosibirsk State University, 2 Pirogova str., 630090, Novosibirsk (Russian Federation); Institute of Automation and Electrometry SB RAS, 1 Ac. Koptug. ave., 630090, Novosibirsk (Russian Federation)

    2014-09-10

    The concept of random lasers exploiting multiple scattering of photons in an amplifying disordered medium in order to generate coherent light without a traditional laser resonator has attracted a great deal of attention in recent years. This research area lies at the interface of the fundamental theory of disordered systems and laser science. The idea was originally proposed in the context of astrophysics in the 1960s by V.S. Letokhov, who studied scattering with “negative absorption” of the interstellar molecular clouds. Research on random lasers has since developed into a mature experimental and theoretical field. A simple design of such lasers would be promising for potential applications. However, in traditional random lasers the properties of the output radiation are typically characterized by complex features in the spatial, spectral and time domains, making them less attractive than standard laser systems in terms of practical applications. Recently, an interesting and novel type of one-dimensional random laser that operates in a conventional telecommunication fibre without any pre-designed resonator mirrors–random distributed feedback fibre laser–was demonstrated. The positive feedback required for laser generation in random fibre lasers is provided by the Rayleigh scattering from the inhomogeneities of the refractive index that are naturally present in silica glass. In the proposed laser concept, the randomly backscattered light is amplified through the Raman effect, providing distributed gain over distances up to 100 km. Although an effective reflection due to the Rayleigh scattering is extremely small (∼0.1%), the lasing threshold may be exceeded when a sufficiently large distributed Raman gain is provided. Such a random distributed feedback fibre laser has a number of interesting and attractive features. The fibre waveguide geometry provides transverse confinement, and effectively one-dimensional random distributed feedback leads to the

  18. Random distributed feedback fibre lasers

    International Nuclear Information System (INIS)

    Turitsyn, Sergei K.; Babin, Sergey A.; Churkin, Dmitry V.; Vatnik, Ilya D.; Nikulin, Maxim; Podivilov, Evgenii V.

    2014-01-01

    The concept of random lasers exploiting multiple scattering of photons in an amplifying disordered medium in order to generate coherent light without a traditional laser resonator has attracted a great deal of attention in recent years. This research area lies at the interface of the fundamental theory of disordered systems and laser science. The idea was originally proposed in the context of astrophysics in the 1960s by V.S. Letokhov, who studied scattering with “negative absorption” of the interstellar molecular clouds. Research on random lasers has since developed into a mature experimental and theoretical field. A simple design of such lasers would be promising for potential applications. However, in traditional random lasers the properties of the output radiation are typically characterized by complex features in the spatial, spectral and time domains, making them less attractive than standard laser systems in terms of practical applications. Recently, an interesting and novel type of one-dimensional random laser that operates in a conventional telecommunication fibre without any pre-designed resonator mirrors–random distributed feedback fibre laser–was demonstrated. The positive feedback required for laser generation in random fibre lasers is provided by the Rayleigh scattering from the inhomogeneities of the refractive index that are naturally present in silica glass. In the proposed laser concept, the randomly backscattered light is amplified through the Raman effect, providing distributed gain over distances up to 100 km. Although an effective reflection due to the Rayleigh scattering is extremely small (∼0.1%), the lasing threshold may be exceeded when a sufficiently large distributed Raman gain is provided. Such a random distributed feedback fibre laser has a number of interesting and attractive features. The fibre waveguide geometry provides transverse confinement, and effectively one-dimensional random distributed feedback leads to the

  19. iPad Made Simple

    CERN Document Server

    Trautschold, Martin; Learning, MSL Made Simple

    2010-01-01

    The new iPad is sleek, powerful, and most importantly, it's much more than just a big iPhone. Your iPad is can be used for reading, surfing the web, emailing, watching TV/Movies, getting work done, and much more. And with the upcoming wave of iPad apps, the possibilities are endless. iPad X Made Simple clarifies all of the key features on the iPad, introduces what's new, and also reveals dozens of time-saving shortcuts and techniques. The book has over 1,000 screen shots that are carefully annotated with step-by-step instructions. * Clear instructions on how to set up and use the iPad * Illust

  20. Methadone radioimmunoassay: two simple methods

    International Nuclear Information System (INIS)

    Robinson, K.; Smith, R.N.

    1983-01-01

    Two simple and economical radioimmunoassays for methadone in blood or urine are described. Haemolysis, decomposition, common anticoagulants and sodium fluoride do not affect the results. One assay used commercially-available [1- 3 H](-)-methadone hydrobromide as the label, while the other uses a radioiodinated conjugate of 4-dimethylamino-2,2-diphenylpentanoic acid and L-tyrosine methyl ester. A commercially-available antiserum is used in both assays. Normethadone and α-methadol cross-react to a small extent with the antiserum while methadone metabolites, dextropropoxyphene, dipipanone and phenadoxone have negligible cross-reactivities. The 'cut-offs' of the two assays as described are 30 and 33 ng ml -1 for blood, and 24 and 21 ng ml -1 for urine. The assay using the radioiodinated conjugate can be made more sensitive if required by increasing the specific activity of the label. (author)

  1. Simple types of anisotropic inflation

    International Nuclear Information System (INIS)

    Barrow, John D.; Hervik, Sigbjoern

    2010-01-01

    We display some simple cosmological solutions of gravity theories with quadratic Ricci curvature terms added to the Einstein-Hilbert Lagrangian which exhibit anisotropic inflation. The Hubble expansion rates are constant and unequal in three orthogonal directions. We describe the evolution of the simplest of these homogeneous and anisotropic cosmological models from its natural initial state and evaluate the deviations they will create from statistical isotropy in the fluctuations produced during a period of anisotropic inflation. The anisotropic inflation is not a late-time attractor in these models but the rate of approach to a final isotropic de Sitter state is slow and is conducive to the creation of observable anisotropic statistical effects in the microwave background. The statistical anisotropy would not be scale invariant and the level of statistical anisotropy will grow with scale.

  2. The random projection method

    CERN Document Server

    Vempala, Santosh S

    2005-01-01

    Random projection is a simple geometric technique for reducing the dimensionality of a set of points in Euclidean space while preserving pairwise distances approximately. The technique plays a key role in several breakthrough developments in the field of algorithms. In other cases, it provides elegant alternative proofs. The book begins with an elementary description of the technique and its basic properties. Then it develops the method in the context of applications, which are divided into three groups. The first group consists of combinatorial optimization problems such as maxcut, graph coloring, minimum multicut, graph bandwidth and VLSI layout. Presented in this context is the theory of Euclidean embeddings of graphs. The next group is machine learning problems, specifically, learning intersections of halfspaces and learning large margin hypotheses. The projection method is further refined for the latter application. The last set consists of problems inspired by information retrieval, namely, nearest neig...

  3. Random tensors

    CERN Document Server

    Gurau, Razvan

    2017-01-01

    Written by the creator of the modern theory of random tensors, this book is the first self-contained introductory text to this rapidly developing theory. Starting from notions familiar to the average researcher or PhD student in mathematical or theoretical physics, the book presents in detail the theory and its applications to physics. The recent detections of the Higgs boson at the LHC and gravitational waves at LIGO mark new milestones in Physics confirming long standing predictions of Quantum Field Theory and General Relativity. These two experimental results only reinforce today the need to find an underlying common framework of the two: the elusive theory of Quantum Gravity. Over the past thirty years, several alternatives have been proposed as theories of Quantum Gravity, chief among them String Theory. While these theories are yet to be tested experimentally, key lessons have already been learned. Whatever the theory of Quantum Gravity may be, it must incorporate random geometry in one form or another....

  4. Semantic markup of sensor capabilities: how simple it too simple?

    Science.gov (United States)

    Rueda-Velasquez, C. A.; Janowicz, K.; Fredericks, J.

    2016-12-01

    Semantics plays a key role for the publication, retrieval, integration, and reuse of observational data across the geosciences. In most cases, one can safely assume that the providers of such data, e.g., individual scientists, understand the observation context in which their data are collected,e.g., the used observation procedure, the sampling strategy, the feature of interest being studied, and so forth. However, can we expect that the same is true for the technical details of the used sensors and especially the nuanced changes that can impact observations in often unpredictable ways? Should the burden of annotating the sensor capabilities, firmware, operation ranges, and so forth be really part of a scientist's responsibility? Ideally, semantic annotations should be provided by the parties that understand these details and have a vested interest in maintaining these data. With manufactures providing semantically-enabled metadata for their sensors and instruments, observations could more easily be annotated and thereby enriched using this information. Unfortunately, today's sensor ontologies and tool chains developed for the Semantic Web community require expertise beyond the knowledge and interest of most manufacturers. Consequently, knowledge engineers need to better understand the sweet spot between simple ontologies/vocabularies and sufficient expressivity as well as the tools required to enable manufacturers to share data about their sensors. Here, we report on the current results of EarthCube's X-Domes project that aims to address the questions outlined above.

  5. A Bayesian Justification for Random Sampling in Sample Survey

    Directory of Open Access Journals (Sweden)

    Glen Meeden

    2012-07-01

    Full Text Available In the usual Bayesian approach to survey sampling the sampling design, plays a minimal role, at best. Although a close relationship between exchangeable prior distributions and simple random sampling has been noted; how to formally integrate simple random sampling into the Bayesian paradigm is not clear. Recently it has been argued that the sampling design can be thought of as part of a Bayesian's prior distribution. We will show here that under this scenario simple random sample can be given a Bayesian justification in survey sampling.

  6. Routing of Physarum polycephalum “signals” using simple chemicals

    Science.gov (United States)

    de Lacy Costello, Ben; Adamatzky, Andrew I

    2014-01-01

    In previous work the chemotaxis toward simple organic chemicals was assessed. We utilize the knowledge gained from these chemotactic assays to route Physarum polycephalum “signals” at a series of junctions. By applying chemical inputs at a simple T-junction we were able to reproducibly control the path taken by the plasmodium of P. Polycephalum. Where the chemoattractant farnesene was used at one input a routed signal could be reproducibly generated i.e., P. Polycephalum moves toward the source of chemoattractant. Where the chemoattractant was applied at both inputs the signal was reproducibly split i.e., at the junction the plasmodium splits and moves toward both sources of chemoattractant. If a chemorepellent was used then the signal was reproducibly suppressed i.e., P. Polycephalum did not reach either output and was confined to the input channel. This was regardless of whether a chemoattractant was used in combination with the chemorepellent showing a hierarchy of inhibition over attraction. If no chemical input was used in the simple circuit then a random signal was generated, whereby P. Polycephalum would move toward one output at the junction, but the direction was randomly selected. PMID:25346788

  7. Water nanoelectrolysis: A simple model

    Science.gov (United States)

    Olives, Juan; Hammadi, Zoubida; Morin, Roger; Lapena, Laurent

    2017-12-01

    A simple model of water nanoelectrolysis—defined as the nanolocalization at a single point of any electrolysis phenomenon—is presented. It is based on the electron tunneling assisted by the electric field through the thin film of water molecules (˜0.3 nm thick) at the surface of a tip-shaped nanoelectrode (micrometric to nanometric curvature radius at the apex). By applying, e.g., an electric potential V1 during a finite time t1, and then the potential -V1 during the same time t1, we show that there are three distinct regions in the plane (t1, V1): one for the nanolocalization (at the apex of the nanoelectrode) of the electrolysis oxidation reaction, the second one for the nanolocalization of the reduction reaction, and the third one for the nanolocalization of the production of bubbles. These parameters t1 and V1 completely control the time at which the electrolysis reaction (of oxidation or reduction) begins, the duration of this reaction, the electrolysis current intensity (i.e., the tunneling current), the number of produced O2 or H2 molecules, and the radius of the nanolocalized bubbles. The model is in good agreement with our experiments.

  8. Simple substrates for complex cognition

    Directory of Open Access Journals (Sweden)

    Peter Dayan

    2008-12-01

    Full Text Available Complex cognitive tasks present a range of computational and algorithmic challenges for neural accounts of both learning and inference. In particular, it is extremely hard to solve them using the sort of simple policies that have been extensively studied as solutions to elementary Markov decision problems. There has thus been recent interest in architectures for the instantiation and even learning of policies that are formally more complicated than these, involving operations such as gated working memory. However, the focus of these ideas and methods has largely been on what might best be considered as automatized, routine or, in the sense of animal conditioning, habitual, performance. Thus, they have yet to provide a route towards understanding the workings of rule-based control, which is critical for cognitively sophisticated competence. Here, we review a recent suggestion for a uniform architecture for habitual and rule-based execution, discuss some of the habitual mechanisms that underpin the use of rules, and consider a statistical relationship between rules and habits.

  9. Plunger with simple retention valve

    International Nuclear Information System (INIS)

    Fekete, A.V.

    1987-01-01

    This patent describes a positive displacement retention valve apparatus in which the actual flow equals the theoretical maximum flow through the retention valve. The apparatus includes, in combination, a confined fluid flow conduit, a piston adapted for reciprocal movement within the fluid flow conduit between upstream and downstream limit positions, piston reciprocating means, and pressure responsive check valve means located upstream with respect to the piston in the fluid flow conduit. The pressure responsive check valve means operable to permit fluid flow therethrough in a downstream direction toward the piston, and to preclude fluid flow therethrough in an opposite direction. The piston is composed of parts which are relatively movable with respect to one another. The piston includes a simple retention valve consisting of a plug means, a cylinder having a minimum and a maximum internal cross section flow area therein and being reciprocal within the confined fluid flow conduit, and a seat on the cylinder for the plug means. The piston reciprocating means are operatively connected to the plug means

  10. Random walks and diffusion on networks

    Science.gov (United States)

    Masuda, Naoki; Porter, Mason A.; Lambiotte, Renaud

    2017-11-01

    Random walks are ubiquitous in the sciences, and they are interesting from both theoretical and practical perspectives. They are one of the most fundamental types of stochastic processes; can be used to model numerous phenomena, including diffusion, interactions, and opinions among humans and animals; and can be used to extract information about important entities or dense groups of entities in a network. Random walks have been studied for many decades on both regular lattices and (especially in the last couple of decades) on networks with a variety of structures. In the present article, we survey the theory and applications of random walks on networks, restricting ourselves to simple cases of single and non-adaptive random walkers. We distinguish three main types of random walks: discrete-time random walks, node-centric continuous-time random walks, and edge-centric continuous-time random walks. We first briefly survey random walks on a line, and then we consider random walks on various types of networks. We extensively discuss applications of random walks, including ranking of nodes (e.g., PageRank), community detection, respondent-driven sampling, and opinion models such as voter models.

  11. Simulation of random walks in field theory

    International Nuclear Information System (INIS)

    Rensburg, E.J.J. van

    1988-01-01

    The numerical simulation of random walks is considered using the Monte Carlo method previously proposed. The algorithm is tested and then generalised to generate Edwards random walks. The renormalised masses of the Edwards model are calculated and the results are compared with those obtained from a simple perturbation theory calculation for small values of the bare coupling constant. The efficiency of this algorithm is discussed and compared with an alternative approach. (author)

  12. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  13. SSL - THE SIMPLE SOCKETS LIBRARY

    Science.gov (United States)

    Campbell, C. E.

    1994-01-01

    The Simple Sockets Library (SSL) allows C programmers to develop systems of cooperating programs using Berkeley streaming Sockets running under the TCP/IP protocol over Ethernet. The SSL provides a simple way to move information between programs running on the same or different machines and does so with little overhead. The SSL can create three types of Sockets: namely a server, a client, and an accept Socket. The SSL's Sockets are designed to be used in a fashion reminiscent of the use of FILE pointers so that a C programmer who is familiar with reading and writing files will immediately feel comfortable with reading and writing with Sockets. The SSL consists of three parts: the library, PortMaster, and utilities. The user of the SSL accesses it by linking programs to the SSL library. The PortMaster initializes connections between clients and servers. The PortMaster also supports a "firewall" facility to keep out socket requests from unapproved machines. The "firewall" is a file which contains Internet addresses for all approved machines. There are three utilities provided with the SSL. SKTDBG can be used to debug programs that make use of the SSL. SPMTABLE lists the servers and port numbers on requested machine(s). SRMSRVR tells the PortMaster to forcibly remove a server name from its list. The package also includes two example programs: multiskt.c, which makes multiple accepts on one server, and sktpoll.c, which repeatedly attempts to connect a client to some server at one second intervals. SSL is a machine independent library written in the C-language for computers connected via Ethernet using the TCP/IP protocol. It has been successfully compiled and implemented on a variety of platforms, including Sun series computers running SunOS, DEC VAX series computers running VMS, SGI computers running IRIX, DECstations running ULTRIX, DEC alpha AXPs running OSF/1, IBM RS/6000 computers running AIX, IBM PC and compatibles running BSD/386 UNIX and HP Apollo 3000

  14. Random pulse generator

    International Nuclear Information System (INIS)

    Guo Ya'nan; Jin Dapeng; Zhao Dixin; Liu Zhen'an; Qiao Qiao; Chinese Academy of Sciences, Beijing

    2007-01-01

    Due to the randomness of radioactive decay and nuclear reaction, the signals from detectors are random in time. But normal pulse generator generates periodical pulses. To measure the performances of nuclear electronic devices under random inputs, a random generator is necessary. Types of random pulse generator are reviewed, 2 digital random pulse generators are introduced. (authors)

  15. Reconstructing Nearly Simple Polytopes from their Graph

    OpenAIRE

    Doolittle, Joseph

    2017-01-01

    We present a partial description of which polytopes are reconstructible from their graphs. This is an extension of work by Blind and Mani (1987) and Kalai (1988), which showed that simple polytopes can be reconstructed from their graphs. In particular, we introduce a notion of $h$-nearly simple and prove that 1-nearly simple and 2-nearly simple polytopes are reconstructible from their graphs. We also give an example of a 3-nearly simple polytope which is not reconstructible from its graph. Fu...

  16. Random matrices and random difference equations

    International Nuclear Information System (INIS)

    Uppuluri, V.R.R.

    1975-01-01

    Mathematical models leading to products of random matrices and random difference equations are discussed. A one-compartment model with random behavior is introduced, and it is shown how the average concentration in the discrete time model converges to the exponential function. This is of relevance to understanding how radioactivity gets trapped in bone structure in blood--bone systems. The ideas are then generalized to two-compartment models and mammillary systems, where products of random matrices appear in a natural way. The appearance of products of random matrices in applications in demography and control theory is considered. Then random sequences motivated from the following problems are studied: constant pulsing and random decay models, random pulsing and constant decay models, and random pulsing and random decay models

  17. Correcting slightly less simple movements

    Directory of Open Access Journals (Sweden)

    M.P. Aivar

    2005-01-01

    Full Text Available Many studies have analysed how goal directed movements are corrected in response to changes in the properties of the target. However, only simple movements to single targets have been used in those studies, so little is known about movement corrections under more complex situations. Evidence from studies that ask for movements to several targets in sequence suggests that whole sequences of movements are planned together. Planning related segments of a movement together makes it possible to optimise the whole sequence, but it means that some parts are planned quite long in advance, so that it is likely that they will have to be modified. In the present study we examined how people respond to changes that occur while they are moving to the first target of a sequence. Subjects moved a stylus across a digitising tablet. They moved from a specified starting point to two targets in succession. The first of these targets was always at the same position but it could have one of two sizes. The second target could be in one of two different positions and its size was different in each case. On some trials the first target changed size, and on some others the second target changed size and position, as soon as the subject started to move. When the size of the first target changed the subjects slowed down the first segment of their movements. Even the peak velocity, which was only about 150 ms after the change in size, was lower. Beside this fast response to the change itself, the dwell time at the first target was also affected: its duration increased after the change. Changing the size and position of the second target did not influence the first segment of the movement, but also increased the dwell time. The dwell time was much longer for a small target, irrespective of its initial size. If subjects knew in advance which target could change, they moved faster than if they did not know which could change. Taken together, these

  18. Simple heuristic for the viscosity of polydisperse hard spheres

    Science.gov (United States)

    Farr, Robert S.

    2014-12-01

    We build on the work of Mooney [Colloids Sci. 6, 162 (1951)] to obtain an heuristic analytic approximation to the viscosity of a suspension any size distribution of hard spheres in a Newtonian solvent. The result agrees reasonably well with rheological data on monodispserse and bidisperse hard spheres, and also provides an approximation to the random close packing fraction of polydisperse spheres. The implied packing fraction is less accurate than that obtained by Farr and Groot [J. Chem. Phys. 131(24), 244104 (2009)], but has the advantage of being quick and simple to evaluate.

  19. SIMPLE ESTIMATOR AND CONSISTENT STRONGLY OF STABLE DISTRIBUTIONS

    Directory of Open Access Journals (Sweden)

    Cira E. Guevara Otiniano

    2016-06-01

    Full Text Available Stable distributions are extensively used to analyze earnings of financial assets, such as exchange rates and stock prices assets. In this paper we propose a simple and strongly consistent estimator for the scale parameter of a symmetric stable L´evy distribution. The advantage of this estimator is that your computational time is minimum thus it can be used to initialize intensive computational procedure such as maximum likelihood. With random samples of sized n we tested the efficacy of these estimators by Monte Carlo method. We also included applications for three data sets.

  20. Simple method to generate and fabricate stochastic porous scaffolds

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Nan, E-mail: y79nzw@163.com; Gao, Lilan; Zhou, Kuntao

    2015-11-01

    Considerable effort has been made to generate regular porous structures (RPSs) using function-based methods, although little effort has been made for constructing stochastic porous structures (SPSs) using the same methods. In this short communication, we propose a straightforward method for SPS construction that is simple in terms of methodology and the operations used. Using our method, we can obtain a SPS with functionally graded, heterogeneous and interconnected pores, target pore size and porosity distributions, which are useful for applications in tissue engineering. The resulting SPS models can be directly fabricated using additive manufacturing (AM) techniques. - Highlights: • Random porous structures are constructed based on their regular counterparts. • Functionally graded random pores can be constructed easily. • The scaffolds can be directly fabricated using additive manufacturing techniques.