WorldWideScience

Sample records for deceptively simple random

  1. Deceptively Simple: Unpacking the Notion of “Sharing”

    Directory of Open Access Journals (Sweden)

    Airi Lampinen

    2015-04-01

    Full Text Available This essay approaches social media by addressing the deceptively simple notion of “sharing.” While “sharing” is central to how activities taking place on social media get discussed, the word does not necessarily help us get our analytical work about social media done. It is at risk of turning into one of those words that mean little because we try to make them mean too many things at once. While it remains relevant to address and analyze discourses surrounding the notion of “sharing,” it is important to be critical about them. Sharing is not a monolith. Sharing is diverse. Sharing serves the economic interests of big corporations. Perhaps most importantly, referring to activities as “sharing” is political and value-laden.

  2. Rules of Deception

    DEFF Research Database (Denmark)

    Juhlin, Jonas

    In all wars, deception has been an important element for the military planners, on both the tactical level and the operational level. The good, effective deception operation is of great risk of conflicting with the current Laws of Armed Conflicts, which will be of great concern for the deception ......, the paper will discuss how the inclusion of mission specific rules of deception can greatly help define the boundaries, and give necessary guide lines for conducting deception operations within the laws of armed conflict....

  3. Unobtrusive Deception Detection

    NARCIS (Netherlands)

    Elkins, Aaron; Zafeiriou, Stefanos; Pantic, Maja; Burgoon, Judee; Calvo, Rafael; D' Mello, Sidney; Gratch, Jonathan; Kappas, Arvid

    In response to national security needs and human deception detection limitations paired with advances in sensor and computing technology research into automated deception detection has increased in recent years. These technologies rely on psychological and communication theories of deception to

  4. Deception: Counterdeception and Counterintelligence

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    deception and support deception campaigns. While deception today relies on traditional basic principles, the authors recognize that it requires a fresh approach due to the roles played by information technologies such as social media. Their unique treatment of the perspectives of both the operations planner...... in deception for both both operational planners and intelligence analysts using a case-based approach. By reading and working through the exercises in this text, operations planners will learn how to build and conduct a deception campaign; and intelligence analysts will develop the ability to recognize...... when conducting intelligence analysis. Finally, it goes beyond existing books by dealing with multichannel deception across the political, military, economic, social, infrastructure, and information domains, with special emphasis on use of the rich modern environment for conveying information....

  5. Exploring the movement dynamics of deception

    Directory of Open Access Journals (Sweden)

    Nicholas D Duran

    2013-03-01

    Full Text Available Both the science and the everyday practice of detecting a lie rest on the same assumption: hidden cognitive states that the liar would like to remain hidden nevertheless influence observable behavior. This assumption has good evidence. The insights of professional interrogators, anecdotal evidence, and body language textbooks have all built up a sizeable catalogue of nonverbal cues that have been claimed to distinguish deceptive and truthful behavior. Typically, these cues are discrete, individual behaviors - a hand touching a mouth, the rise of a brow - that distinguish lies from truths solely in terms of their frequency or duration. Research to date has failed to establish any of these nonverbal cues as a reliable marker of deception. Here we argue that perhaps this is because simple tallies of behavior can miss out on the rich but subtle organization of behavior as it unfolds over time. Research in cognitive science from a dynamical systems perspective has shown that behavior is structured across multiple timescales, with more or less regularity and structure. Using tools that are sensitive to these dynamics, we analyzed body motion data from an experiment that put participants in a realistic situation of choosing, or not, to lie to an experimenter. Our analyses indicate that when being deceptive, continuous fluctuations of movement in the upper face, and somewhat in the arms, are characterized by dynamical properties of less stability, but greater complexity. For the upper face, these distinctions are present despite no apparent differences in the overall amount of movement between deception and truth. We suggest that these unique dynamical signatures of motion are indicative of both the cognitive demands inherent to deception and the need to respond adaptively in a social context.

  6. Defining body deception and its role in peer based social comparison theories of body dissatisfaction.

    Science.gov (United States)

    Hildebrandt, Tom; Shiovitz, Rachel; Alfano, Lauren; Greif, Rebecca

    2008-09-01

    The purpose of the current study was to operationalize the phenomenon of body deception, describe its theoretical importance, and validate its existence in an experimental paradigm. The definition of body deception includes the intentional misrepresentation of information about appearance to others. The present study examined body deception in a controlled experimental study of male and female same-sex peer groups using a series of hierarchical linear models. Ninety male and 90 female undergraduates were randomized to an experimental same-sex peer group or individual control condition. The results suggested that both men and women used body deception among peers, but men's body deception was muscularity driven whereas women's was thinness driven. Body dissatisfaction was significantly predictive of the degree of body deception used by both genders and it was significantly related to peer group membership. An integrated model for the role of body deception in body image disturbance is proposed.

  7. Overcoming Deception in Evolution of Cognitive Behaviors

    DEFF Research Database (Denmark)

    Lehman, Joel; Miikkulainen, Risto

    2014-01-01

    When scaling neuroevolution to complex behaviors, cognitive capabilities such as learning, communication, and memory become increasingly important. However, successfully evolving such cognitive abilities remains difficult. This paper argues that a main cause for such difficulty is deception, i.......e. evolution converges to a behavior unrelated to the desired solution. More specifically, cognitive behaviors often require accumulating neural structure that provides no immediate fitness benefit, and evolution often thus converges to non-cognitive solutions. To investigate this hypothesis, a common...... evolutionary robotics T-Maze domain is adapted in three separate ways to require agents to communicate, remember, and learn. Indicative of deception, evolution driven by objective-based fitness often converges upon simple non- cognitive behaviors. In contrast, evolution driven to explore novel behaviors, i...

  8. The ethics of deception in cyberspace

    OpenAIRE

    Rowe, Neil C.

    2008-01-01

    This paper appeared in the Handbook of Research on Technoethics, ed. R. Luppicini, Hershey, PA: Information Science Reference, 2008. We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on comput...

  9. IS SELF-DECEPTION PRETENSE?

    Directory of Open Access Journals (Sweden)

    JOSÉ EDUARDO PORCHER

    2015-01-01

    Full Text Available I assess Tamar Gendler's (2007 account of self-deception according to which its characteristic state is not belief, but imaginative pretense. After giving an overview of the literature and presenting the conceptual puzzles engendered by the notion of self-deception, I introduce Gendler's account, which emerges as a rival to practically all extant accounts of self-deception. I object to it by first arguing that her argument for abandoning belief as the characteristic state of self-deception conflates the state of belief and the process of belief-formation when interpreting David Velleman's (2000 thesis that belief is an essentially truth-directed attitude. I then call attention to the fact that Velleman's argument for the identity of motivational role between belief and imagining, on which Gendler's argument for self-deception as pretense depends, conflates two senses of 'motivational role'-a stronger but implausible sense and a weaker but explanatorily irrelevant sense. Finally, I introduce Neil Van Leeuwen's (2009 argument to the effect that belief is the practical ground of all non-belief cognitive attitudes in circum-stances wherein the latter prompt action. I apply this framework to Gendler's account to ultimately show that imaginative pretense fails to explain the existence of voluntary actions which result from self-deception.

  10. Effects of Deceptive Advertising on Consumer Loyalty in Telecommunication Industry of Pakistan

    OpenAIRE

    Hasan, Syed Akif; Subhani, Muhammad Imtiaz

    2011-01-01

    This study is an attempt to interrogate the effects of deceptive advertising on consumer loyalty in telecommunication industry of Pakistan. Four variables, Call Charges (CC), Network Coverage (NC), Network Quality (NQ) and Customer Service (CS) were used to measure deception in Telecom Ads and then its effect on consumer loyalty while the consumer preference is used as the proxy of consumer loyalty. 10,000 random individuals from telecom industry were selected to conclude the results. Testing...

  11. You can’t kid a kidder: Association between production and detection of deception in an interactive deception task

    Directory of Open Access Journals (Sweden)

    Gordon R.T. Wright

    2012-04-01

    Full Text Available Both the ability to deceive others, and the ability to detect deception, have long been proposed to confer an evolutionary advantage. Deception detection has been studied extensively, and the finding that typical individuals fare little better than chance in detecting deception is one of the more robust in the behavioral sciences. Surprisingly, little research has examined individual differences in lie-production ability. As a consequence, as far as we are aware, no previous study has investigated whether there exists an association between the ability to lie successfully and the ability to detect lies. Furthermore, only a minority of studies have examined deception as it naturally occurs; in a social, interactive setting. The present study therefore explored the relationship between these two facets of deceptive behavior by employing a novel competitive interactive deception task. For the first time, signal-detection theory was used to measure performance in both the detection and production of deception. A significant relationship was found between the deception-related abilities; those who could accurately detect a lie were able to produce statements that others found difficult to classify as deceptive or truthful. Furthermore, neither ability was related to measures of intelligence or emotional ability. We therefore suggest the existence of an underlying deception-general ability that varies across individuals.

  12. Experimental economics' inconsistent ban on deception.

    Science.gov (United States)

    Hersch, Gil

    2015-08-01

    According to what I call the 'argument from public bads', if a researcher deceived subjects in the past, there is a chance that subjects will discount the information that a subsequent researcher provides, thus compromising the validity of the subsequent researcher's experiment. While this argument is taken to justify an existing informal ban on explicit deception in experimental economics, it can also apply to implicit deception, yet implicit deception is not banned and is sometimes used in experimental economics. Thus, experimental economists are being inconsistent when they appeal to the argument from public bads to justify banning explicit deception but not implicit deception. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Web of Deception: Social Media and Implications for Military Deception

    Science.gov (United States)

    2012-12-01

    additional deception and OPSEC concerns. 35 Beyond just the open source intelligence ( OSINT ) that can be collected by other entities, there is also a...witting participants, in an effort to mislead or confuse the enemy. Just as the United States would be monitoring social media for OSINT , the...deception. Exploiting adversary use of social media OSINT through DISO is another lower threat avenue to examine as a starting point. As previously

  14. Deception and Retribution in Repeated Ultimatum Bargaining.

    Science.gov (United States)

    Boles; Croson; Murnighan

    2000-11-01

    This paper investigates the dynamics of deception and retribution in repeated ultimatum bargaining. Anonymous dyads exchanged messages and offers in a series of four ultimatum bargaining games that had prospects for relatively large monetary outcomes. Variations in each party's knowledge of the other's resources and alternatives created opportunities for deception. Revelation of prior unknowns exposed deceptions and created opportunities for retribution in subsequent interactions. Results showed that although proposers and responders chose deceptive strategies almost equally, proposers told more outright lies. Both were more deceptive when their private information was never revealed, and proposers were most deceptive when their potential profits were largest. Revelation of proposers' lies had little effect on their subsequent behavior even though responders rejected their offers more than similar offers from truthful proposers or proposers whose prior deceit was never revealed. The discussion and conclusions address the dynamics of deception and retribution in repeated bargaining interactions. Copyright 2000 Academic Press.

  15. An Analysis of Trust in Deception Operations

    Science.gov (United States)

    2009-03-01

    presents an overview of deception, both from the military and academic perspectives. The importance of the adversarial mind to a successful deception is...to most literature on deception. This section will introduce both military and academic theories of deception and discuss their relevance to trust...claim, faking documentation, plagiarism , and purchasing one (p. 226). A doctorate is regarded as a valuable item for establishing reputational

  16. The effect of Linkedin on deception in resumes.

    Science.gov (United States)

    Guillory, Jamie; Hancock, Jeffrey T

    2012-03-01

    This study explores how Linkedin shapes patterns of deception in resumes. The general self-presentation goal to appear favorably to others motivates deception when one's true characteristics are inconsistent with their desired impression. Because Linkedin makes resume claims public, deception patterns should be altered relative to traditional resumes. Participants (n=119) in a between-subjects experiment created resumes in one of three resume settings: a traditional (offline) resume, private Linkedin profiles, or publicly available Linkedin profiles. Findings suggest that the public nature of Linkedin resume claims affected the kinds of deception used to create positive impressions, but did not affect the overall frequency of deception. Compared with traditional resumes, Linkedin resumes were less deceptive about the kinds of information that count most to employers, namely an applicant's prior work experience and responsibilities, but more deceptive about interests and hobbies. The results stand in contrast to assumptions that Internet-based communication is more deceptive than traditional formats, and suggests that a framework that considers deception as a resource for self-presentation can account for the findings.

  17. Orchid pollination by sexual deception: pollinator perspectives.

    Science.gov (United States)

    Gaskett, A C

    2011-02-01

    The extraordinary taxonomic and morphological diversity of orchids is accompanied by a remarkable range of pollinators and pollination systems. Sexually deceptive orchids are adapted to attract specific male insects that are fooled into attempting to mate with orchid flowers and inadvertently acting as pollinators. This review summarises current knowledge, explores new hypotheses in the literature, and introduces some new approaches to understanding sexual deception from the perspective of the duped pollinator. Four main topics are addressed: (1) global patterns in sexual deception, (2) pollinator identities, mating systems and behaviours, (3) pollinator perception of orchid deceptive signals, and (4) the evolutionary implications of pollinator responses to orchid deception, including potential costs imposed on pollinators by orchids. A global list of known and putative sexually deceptive orchids and their pollinators is provided and methods for incorporating pollinator perspectives into sexual deception research are provided and reviewed. At present, almost all known sexually deceptive orchid taxa are from Australia or Europe. A few sexually deceptive species and genera are reported for New Zealand and South Africa. In Central and Southern America, Asia, and the Pacific many more species are likely to be identified in the future. Despite the great diversity of sexually deceptive orchid genera in Australia, pollination rates reported in the literature are similar between Australian and European species. The typical pollinator of a sexually deceptive orchid is a male insect of a species that is polygynous, monandrous, haplodiploid, and solitary rather than social. Insect behaviours involved in the pollination of sexually deceptive orchids include pre-copulatory gripping of flowers, brief entrapment, mating, and very rarely, ejaculation. Pollinator behaviour varies within and among pollinator species. Deception involving orchid mimicry of insect scent signals is

  18. Multifrequency OFDM SAR in Presence of Deception Jamming

    Directory of Open Access Journals (Sweden)

    Schuerger Jonathan

    2010-01-01

    Full Text Available Orthogonal frequency division multiplexing (OFDM is considered in this paper from the perspective of usage in imaging radar scenarios with deception jamming. OFDM radar signals are inherently multifrequency waveforms, composed of a number of subbands which are orthogonal to each other. While being employed extensively in communications, OFDM has not found comparatively wide use in radar, and, particularly, in synthetic aperture radar (SAR applications. In this paper, we aim to show the advantages of OFDM-coded radar signals with random subband composition when used in deception jamming scenarios. Two approaches to create a radar signal by the jammer are considered: instantaneous frequency (IF estimator and digital-RF-memory- (DRFM- based reproducer. In both cases, the jammer aims to create a copy of a valid target image via resending the radar signal at prescribed time intervals. Jammer signals are derived and used in SAR simulations with three types of signal models: OFDM, linear frequency modulated (LFM, and frequency-hopped (FH. Presented results include simulated peak side lobe (PSL and peak cross-correlation values for random OFDM signals, as well as simulated SAR imagery with IF and DRFM jammers'-induced false targets.

  19. Online deception: prevalence, motivation, and emotion.

    Science.gov (United States)

    Caspi, Avner; Gorsky, Paul

    2006-02-01

    This research has three goals: first, to find out how prevalent online deception is within a sample of Israeli users, second, to explore the underlying motivations to deceive online, and third, to discover the emotions that accompany online deception. A web-based survey was distributed in 14 discussion groups, and the answers of 257 respondents were analyzed. It was found that, while most of the respondents believe that online deception is very widespread, only about one-third of them reported engaging in online deception. Frequent users deceive online more than infrequent users, young users more than old, and competent users more than non-competent. The most common motivations to deceive online were "play" on the one hand and privacy concerns on the other. Most people felt a sense of enjoyment while engaging in online deception. The results are discussed in light of a possible mechanism for changing personal moral standards.

  20. Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.

    Science.gov (United States)

    Számadó, Szabolcs; Szalai, Ferenc; Scheuring, István

    2016-01-01

    Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.

  1. Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.

    Directory of Open Access Journals (Sweden)

    Szabolcs Számadó

    Full Text Available Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.

  2. SCRAED - Simple and Complex Random Assignment in Experimental Designs

    OpenAIRE

    Alferes, Valentim R.

    2009-01-01

    SCRAED is a package of 37 self-contained SPSS syntax files that performs simple and complex random assignment in experimental designs. For between-subjects designs, SCRAED includes simple random assignment (no restrictions, forced equal sizes, forced unequal sizes, and unequal probabilities), block random assignment (simple and generalized blocks), and stratified random assignment (no restrictions, forced equal sizes, forced unequal sizes, and unequal probabilities). For within-subject...

  3. Types of deception and underlying motivation: what people think

    NARCIS (Netherlands)

    Utz, S.

    2005-01-01

    In computer-mediated communication, there are various types of possible deception such as category deception (gender switching), attractiveness deception, or identity concealment. The present article argues that it is meaningful to differentiate among these types of deception. More specifically, it

  4. The Use of Deception in Public Health Behavioral Intervention Trials: A Case Study of Three Online Alcohol Trials

    Science.gov (United States)

    McCambridge, Jim; Kypri, Kypros; Bendtsen, Preben; Porter, John

    2013-01-01

    Some public health behavioral intervention research studies involve deception. A methodological imperative to minimize bias can be in conflict with the ethical principle of informed consent. As a case study, we examine the specific forms of deception used in three online randomized controlled trials evaluating brief alcohol interventions. We elaborate our own decision making about the use of deception in these trials, and present our ongoing findings and uncertainties. We discuss the value of the approach of pragmatism for examining these kinds of ethical issues that can arise in research on public health interventions. PMID:24161181

  5. Medicine, lies and deceptions.

    Science.gov (United States)

    Benn, P

    2001-04-01

    This article offers a qualified defence of the view that there is a moral difference between telling lies to one's patients, and deceiving them without lying. However, I take issue with certain arguments offered by Jennifer Jackson in support of the same conclusion. In particular, I challenge her claim that to deny that there is such a moral difference makes sense only within a utilitarian framework, and I cast doubt on the aptness of some of her examples of non-lying deception. But I argue that lies have a greater tendency to damage trust than does non-lying deception, and suggest that since many doctors do believe there is a moral boundary between the two types of deception, encouraging them to violate that boundary may have adverse general effects on their moral sensibilities.

  6. Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated?

    Directory of Open Access Journals (Sweden)

    Sabine Ströfer

    Full Text Available Can deceitful intentions be discriminated from truthful ones? Previous work consistently demonstrated that deceiving others is accompanied by nervousness/stress and cognitive load. Both are related to increased sympathetic nervous system (SNS activity. We hypothesized that SNS activity already rises during intentions to lie and, consequently, cues to deception can be detected before stating an actual lie. In two experiments, controlling for prospective memory, we monitored SNS activity during lying, truth telling, and truth telling with the aim of lying at a later instance. Electrodermal activity (EDA was used as an indicator of SNS. EDA was highest during lying, and compared to the truth condition, EDA was also raised during the intention to deceive. Moreover, the switch from truth telling toward lying in the intention condition evoked higher EDA than switching toward non-deception related tasks in the lie or truth condition. These results provide first empirical evidence that increased SNS activity related to deception can be monitored before a lie is stated. This implies that cues to deception are already present during the mere intention to lie.

  7. Markers of Deception in Italian Speech

    Directory of Open Access Journals (Sweden)

    Katelyn eSpence

    2012-10-01

    Full Text Available Lying is a universal activity and the detection of lying a universal concern. Presently, there is great interest in determining objective measures of deception. The examination of speech, in particular, holds promise in this regard; yet, most of what we know about the relationship between speech and lying is based on the assessment of English-speaking participants. Few studies have examined indicators of deception in languages other than English. The world’s languages differ in significant ways, and cross-linguistic studies of deceptive communications are a research imperative. Here we review some of these differences amongst the world’s languages, and provide an overview of a number of recent studies demonstrating that cross-linguistic research is a worthwhile endeavour. In addition, we report the results of an empirical investigation of pitch, response latency, and speech rate as cues to deception in Italian speech. True and false opinions were elicited in an audio-taped interview. A within subjects analysis revealed no significant difference between the average pitch of the two conditions; however, speech rate was significantly slower, while response latency was longer, during deception compared with truth-telling. We explore the implications of these findings and propose directions for future research, with the aim of expanding the cross-linguistic branch of research on markers of deception.

  8. Deceptive Advertising: Unprotected and Unknown.

    Science.gov (United States)

    Ducoffe, Robert Hal

    The Supreme Court tentatively extended First Amendment protection to commercial speech, but left the issue of defining and regulating deceptive advertising to the Federal Trade Commission (FTC), which has employed tools such as the cease-and-desist order, affirmative disclosure, and corrective advertising. The FTC Act did not define deception, but…

  9. Detection of deception based on fMRI activation patterns underlying the production of a deceptive response and receiving feedback about the success of the deception after a mock murder crime

    Science.gov (United States)

    Cui, Qian; Vanman, Eric J.; Wei, Dongtao; Yang, Wenjing; Jia, Lei

    2014-01-01

    The ability of a deceiver to track a victim’s ongoing judgments about the truthfulness of the deceit can be critical for successful deception. However, no study has yet investigated the neural circuits underlying receiving a judgment about one’s lie. To explore this issue, we used a modified Guilty Knowledge Test in a mock murder situation to simultaneously record the neural responses involved in producing deception and later when judgments of that deception were made. Producing deception recruited the bilateral inferior parietal lobules (IPLs), right ventral lateral prefrontal (VLPF) areas and right striatum, among which the activation of the right VLPF contributed mostly to diagnosing the identities of the participants, correctly diagnosing 81.25% of ‘murderers’ and 81.25% of ‘innocents’. Moreover, the participant’s response when their deception was successful uniquely recruited the right middle frontal gyrus, bilateral IPLs, bilateral orbitofrontal cortices, bilateral middle temporal gyrus and left cerebellum, among which the right IPL contributed mostly to diagnosing participants’ identities, correctly diagnosing 93.75% of murderers and 87.5% of innocents. This study shows that neural activity associated with being a successful liar (or not) is a feasible indicator for detecting lies and may be more valid than neural activity associated with producing deception. PMID:23946002

  10. Deception Detection in Videos

    OpenAIRE

    Wu, Zhe; Singh, Bharat; Davis, Larry S.; Subrahmanian, V. S.

    2017-01-01

    We present a system for covert automated deception detection in real-life courtroom trial videos. We study the importance of different modalities like vision, audio and text for this task. On the vision side, our system uses classifiers trained on low level video features which predict human micro-expressions. We show that predictions of high-level micro-expressions can be used as features for deception prediction. Surprisingly, IDT (Improved Dense Trajectory) features which have been widely ...

  11. Self-deception as pseudo-rational regulation of belief.

    Science.gov (United States)

    Michel, Christoph; Newen, Albert

    2010-09-01

    Self-deception is a special kind of motivational dominance in belief-formation. We develop criteria which set paradigmatic self-deception apart from related phenomena of auto-manipulation such as pretense and motivational bias. In self-deception rational subjects defend or develop beliefs of high subjective importance in response to strong counter-evidence. Self-deceivers make or keep these beliefs tenable by putting prima-facie rational defense-strategies to work against their established standards of rational evaluation. In paradigmatic self-deception, target-beliefs are made tenable via reorganizations of those belief-sets that relate relevant data to target-beliefs. This manipulation of the evidential value of relevant data goes beyond phenomena of motivated perception of data. In self-deception belief-defense is pseudo-rational. Self-deceivers will typically apply a dual standard of evaluation that remains intransparent to the subject. The developed model of self-deception as pseudo-rational belief-defense is empirically anchored. So, we hope to put forward a promising candidate. Copyright © 2010 Elsevier Inc. All rights reserved.

  12. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  13. Lagrangian modelling of plankton motion: From deceptively simple random walks to Fokker-Planck and back again

    DEFF Research Database (Denmark)

    Visser, Andre

    2008-01-01

    The movement of plankton, either by turbulent mixing or their own inherent motility, can be simulated in a Lagrangian framework as a random walk. Validation of random walk simulations is essential. There is a continuum of mathematically valid stochastic integration schemes upon which random walk...

  14. Informing consumers: Protection from deceptive advertising

    Directory of Open Access Journals (Sweden)

    Stanković Ljiljana

    2013-01-01

    Full Text Available It is widely accepted that only informed consumers are protected from potential violation of their consumer rights. Advertising represents one of the main ways of informing consumers, so it is of crutial importance for it to include adequate information that can facilitate decision making proces regarding the purchase. With aim of preventing violation of basic consumer rights, advertising is regulated by legislation, both on EU level and on national level in Republic of Serbia, and while so special attention is dedicated to defining advertising that can possibly lead to deception of consumers. Authors of this paper are focused on analysing legislation and theoretical explanations of deceptive advertising. Results of the research regarding advertising in Serbia and ability of consumers to protect themselves from deceptive advertising are presented. The main aim of the authors is to contribute to increasing level of consumers' self-protection through increasing level of their counciousness on deceptive advertising and its concequences.

  15. When it pays to cheat: Examining how generalized food deception increases male and female fitness in a terrestrial orchid.

    Science.gov (United States)

    Walsh, Ryan P; Michaels, Helen J

    2017-01-01

    Experimental manipulations of floral nectar in food deceptive species can reveal insights into the evolutionary consequences of the deceptive strategy. When coupled to pollen tracking, the effects of the deceptive pollination syndrome on both male and female reproductive success may be quantified. Attraction of pollinators in deceit-pollinated species often relies on producing a conspicuous floral display which may increase visibility to pollinators, but in-turn may increase within plant selfing. To understand the role of deception in Orchidaceae reproduction we studied Cypripedium candidum. All species of the Cypripedium genus employ a generalized food deceptive pollination strategy and have been suggested as a model system for the study of pollinator deception. We conducted a nectar addition experiment that randomly assigned the four plants closest to a transect point to receive one of four histochemical dyes. Two individuals selected for nectar addition in each of altogether 25 blocks received 2μl of 25% sucrose solution in the labellum of each flower, while two others received no artificial nectar. Number of fruits produced, fruit mass and fruit abortion were scored at the end of the four-month experiment. Nectar addition increased (p<0.0001) self-pollination and pollen discounting by nearly 3x, while plants not receiving nectar had greater (p<0.0001) numbers of non-self pollinia deposited and lower rates of pollen discounting. There was a non-significant (p = 0.0645) trend for deceptive plants to set more fruit, while presence of nectar did not affect pollen export. This study demonstrates the adaptive advantages of food deception by showing a concurrent reduction in particular male and female functions when a food reward is restored to a deceptive flower. We found generalized food deception to not only decrease inbreeding depression in the system, but concurrently have no effect on pollinator attraction and fruit set when compared with rewarding flowers.

  16. Deception in medical and behavioral research: is it ever acceptable?

    Science.gov (United States)

    Wendler, D

    1996-01-01

    Ethicists argue that deception is unacceptable, whereas researchers regard it as a necessary part of (certain kinds of) research. This impasse could be resolved by establishing the specific conditions under which deception in medical and behavioral research can be tolerated. An approach based on a consideration of the "Ethical Principles of Psychologists and Code of Conduct," one of the few writings on this topic, would satisfy the needs of both parties. It takes the form of a requirement that subjects be informed of the use of deception before enrolling in a deceptive study. This "second order consent" approach to acceptable deception represents our best chance for reconciling respect for subjects with the occasional scientific need for deceptive research.

  17. Military Deception Reconsidered

    National Research Council Canada - National Science Library

    Martin, Charmaine L

    2008-01-01

    ...: focus, integration, timeliness, security, objective, and centralized control. However, I propose that operational advantage, consisting of surprise, information advantage and security, are essential elements of a successful military deception...

  18. Determination of the Trainability of Deception Detection Cues

    National Research Council Canada - National Science Library

    Ford, Christopher

    2004-01-01

    .... The officers were tested to determine their baseline deception detection abilities, then trained on the deception cues, Arousal, Emotion, Cognitive Effort, Communicator Tactics, and Memory Processes...

  19. Deception in Advertising: A Receiver Oriented Approach to Understanding.

    Science.gov (United States)

    Gardner, David M.

    The purpose of this paper is to examine deception in advertising from a behavioral perspective, and to attempt to formulate a definition that can guide both research and governmental regulation. Whether or not an advertisement is said to be "deceptive" depends on the definition of deception being used. The position advocated here is that…

  20. Neural correlates of self-deception and impression-management.

    Science.gov (United States)

    Farrow, Tom F D; Burgess, Jenny; Wilkinson, Iain D; Hunter, Michael D

    2015-01-01

    Self-deception and impression-management comprise two types of deceptive, but generally socially acceptable behaviours, which are common in everyday life as well as being present in a number of psychiatric disorders. We sought to establish and dissociate the 'normal' brain substrates of self-deception and impression-management. Twenty healthy participants underwent fMRI scanning at 3T whilst completing the 'Balanced Inventory of Desirable Responding' test under two conditions: 'fake good', giving the most desirable impression possible and 'fake bad' giving an undesirable impression. Impression-management scores were more malleable to manipulation via 'faking' than self-deception scores. Response times to self-deception questions and 'fake bad' instructions were significantly longer than to impression-management questions and 'fake good' instructions respectively. Self-deception and impression-management manipulation and 'faking bad' were associated with activation of medial prefrontal cortex (mPFC) and left ventrolateral prefrontal cortex (vlPFC). Impression-management manipulation was additionally associated with activation of left dorsolateral prefrontal cortex and left posterior middle temporal gyrus. 'Faking bad' was additionally associated with activation of right vlPFC, left temporo-parietal junction and right cerebellum. There were no supra-threshold activations associated with 'faking good'. Our neuroimaging data suggest that manipulating self-deception and impression-management and more specifically 'faking bad' engages a common network comprising mPFC and left vlPFC. Shorter response times and lack of dissociable neural activations suggests that 'faking good', particularly when it comes to impression-management, may be our most practiced 'default' mode. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. The Art of Deception and the Role of Intelligence Education

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    2016-01-01

    Is deception an art? And if so, what role might it have in military intelligence education? To offer some answers to the these questions, the paper draws upon the discovery phase of efforts to synchronize deception theory, research, practice, in order to develop a post-graduate military deception...... course for a military intelligence studies. In doing so, it reflects upon the recognition afforded from discovery to creativity, innovation, science, doctrine, and ethics, within the studies of deception and the construct of military deception itself. It follows with bridge building between theory...... and practice through the adaptive use of Boyds Observe-Orient-Decide-Act (OODA) and a target centric intelligence approach to explain the dynamics concerning military intelligence in warfighting. These initial findings suggest that deception, as part of a post-graduate military intelligence education, not only...

  2. Deception in research: distinctions and solutions from the perspective of utilitarianism.

    Science.gov (United States)

    Pittenger, David J

    2002-01-01

    The use of deception in psychological research continues to be a controversial topic. Using Rawls's explication of utilitarianism, I attempt to demonstrate how professional organizations, such as the American Psychological Association, can provide more specific standards that determine the permissibility of deception in research. Specifically, I argue that researchers should examine the costs and benefits of creating and applying specific rules governing deception. To that end, I offer 3 recommendations. First, that researchers who use deception provide detailed accounts of the procedures they used to minimize the harm created by deception in their research reports. Second, that the American Psychological Association offer a definition of deception that describes techniques commonly used in research. Finally, I recommend that the informed consent procedure be revised to indicate that the researcher may use deception as part of the study.

  3. Making Activity Recognition Robust against Deceptive Behavior.

    Directory of Open Access Journals (Sweden)

    Sohrab Saeb

    Full Text Available Healthcare services increasingly use the activity recognition technology to track the daily activities of individuals. In some cases, this is used to provide incentives. For example, some health insurance companies offer discount to customers who are physically active, based on the data collected from their activity tracking devices. Therefore, there is an increasing motivation for individuals to cheat, by making activity trackers detect activities that increase their benefits rather than the ones they actually do. In this study, we used a novel method to make activity recognition robust against deceptive behavior. We asked 14 subjects to attempt to trick our smartphone-based activity classifier by making it detect an activity other than the one they actually performed, for example by shaking the phone while seated to make the classifier detect walking. If they succeeded, we used their motion data to retrain the classifier, and asked them to try to trick it again. The experiment ended when subjects could no longer cheat. We found that some subjects were not able to trick the classifier at all, while others required five rounds of retraining. While classifiers trained on normal activity data predicted true activity with ~38% accuracy, training on the data gathered during the deceptive behavior increased their accuracy to ~84%. We conclude that learning the deceptive behavior of one individual helps to detect the deceptive behavior of others. Thus, we can make current activity recognition robust to deception by including deceptive activity data from a few individuals.

  4. When it pays to cheat: Examining how generalized food deception increases male and female fitness in a terrestrial orchid.

    Directory of Open Access Journals (Sweden)

    Ryan P Walsh

    Full Text Available Experimental manipulations of floral nectar in food deceptive species can reveal insights into the evolutionary consequences of the deceptive strategy. When coupled to pollen tracking, the effects of the deceptive pollination syndrome on both male and female reproductive success may be quantified. Attraction of pollinators in deceit-pollinated species often relies on producing a conspicuous floral display which may increase visibility to pollinators, but in-turn may increase within plant selfing.To understand the role of deception in Orchidaceae reproduction we studied Cypripedium candidum. All species of the Cypripedium genus employ a generalized food deceptive pollination strategy and have been suggested as a model system for the study of pollinator deception. We conducted a nectar addition experiment that randomly assigned the four plants closest to a transect point to receive one of four histochemical dyes. Two individuals selected for nectar addition in each of altogether 25 blocks received 2μl of 25% sucrose solution in the labellum of each flower, while two others received no artificial nectar. Number of fruits produced, fruit mass and fruit abortion were scored at the end of the four-month experiment.Nectar addition increased (p<0.0001 self-pollination and pollen discounting by nearly 3x, while plants not receiving nectar had greater (p<0.0001 numbers of non-self pollinia deposited and lower rates of pollen discounting. There was a non-significant (p = 0.0645 trend for deceptive plants to set more fruit, while presence of nectar did not affect pollen export.This study demonstrates the adaptive advantages of food deception by showing a concurrent reduction in particular male and female functions when a food reward is restored to a deceptive flower. We found generalized food deception to not only decrease inbreeding depression in the system, but concurrently have no effect on pollinator attraction and fruit set when compared with

  5. NEW APPROACHES IN DECEPTION DETECTION II. ACTIVE INTERVIEWING STRATEGIES AND CONTEXTUAL INFORMATION

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2015-05-01

    Full Text Available Meta-analytical evidence shows that behavioural indicators of deception are scant, poorly diagnostic and inconsistent. This has yielded a shift in deception detection research. Rather than passively scrutinising the communication sender to find tell-tale behavioural indicators of deception, the deception judge needs to (a adopt an active role by using interviewing techniques specifically designed to detect deception, or (b focus on contextual (rather than behavioural deception cues. In the previous paper (Masip & Herrero, 2015a, we reviewed the antecedents of this change in focus, as well as the theoretical grounding of the new approaches. Here we describe specific interviewing strategies for detecting deception, as well as the (still scant research on contextual deception indicia. In doing this, we hope to offer the reader a detailed perspective on the recent developments in this specific area of psychology and law.

  6. Group Performance in Military Scenarios Under Deceptive Conditions

    National Research Council Canada - National Science Library

    Hass, Michael

    2004-01-01

    ... (warnings of player deception) relate to perceptions of deception and task difficulty and in turn how these perceptions relate to the final group game scores in a cooperative effort with conflicting goals...

  7. Temporal view of the costs and benefits of self-deception

    Science.gov (United States)

    Chance, Zoë; Norton, Michael I.; Gino, Francesca; Ariely, Dan

    2011-01-01

    Researchers have documented many cases in which individuals rationalize their regrettable actions. Four experiments examine situations in which people go beyond merely explaining away their misconduct to actively deceiving themselves. We find that those who exploit opportunities to cheat on tests are likely to engage in self-deception, inferring that their elevated performance is a sign of intelligence. This short-term psychological benefit of self-deception, however, can come with longer-term costs: when predicting future performance, participants expect to perform equally well—a lack of awareness that persists even when these inflated expectations prove costly. We show that although people expect to cheat, they do not foresee self-deception, and that factors that reinforce the benefits of cheating enhance self-deception. More broadly, the findings of these experiments offer evidence that debates about the relative costs and benefits of self-deception are informed by adopting a temporal view that assesses the cumulative impact of self-deception over time. PMID:21383150

  8. From Tactical to Strategic Deception Detection: Application of Psychological Synthesis

    Directory of Open Access Journals (Sweden)

    Iain Reid

    2017-03-01

    Full Text Available Deception detection has ubiquitously focussed upon detecting deceit in the individual, whether in national security, forensic or business-related environments. In contrast an understanding of how to identify deception committed by multiple individuals or groups challenging strategic interests has been neglected. In this article - to enhance understanding of practitioners working across security, intelligence and forensic areas - a process of psychological synthesis is advocated. Psychological synthesis incorporates a multitude of approaches reflecting contextual requirements towards deception detection across verbal/linguistic behavior, non-verbal behavior, online interactions and intelligence analysis approaches. These combined with in-depth understanding of individuals’ cultures, personality and manner of presentation can be understood in challenging environments. Juxtaposed to these factors psychological synthesis considers how intelligence, surveillance and evidence may be used in detecting deception and identifying links between individuals engaging in deception and related activities. An illustration of how such an approach may work is provided through a scenario of a terrorist incident and how a tailored deception detection approach may seek to counter such a threat.

  9. Explicit instructions increase cognitive costs of deception in predictable social context

    Directory of Open Access Journals (Sweden)

    Marcel eFalkiewicz

    2015-12-01

    Full Text Available Convincing participants to deceive remains one of the biggest and most important challenges of laboratory-based deception research. The simplest and most prevalent method involves explicitly instructing participants to lie or tell the truth before presenting each task item. The usual finding of such experiments is increased cognitive load associated with deceptive responses, explained by necessity to inhibit default and automatic honest responses. However, explicit instructions are usually coupled with the absence of social context in the experimental task. Context plays a key role in social cognition by activating prior knowledge, which facilitates behaviors consistent with the latter. We hypothesized that in the presence of social context, both honest and deceptive responses can be produced on the basis of prior knowledge, without reliance on truth and without additional cognitive load during deceptive responses. In order to test the hypothesis, we have developed Speed-Dating Task (SDT, which is based on a real-life social event. In SDT, participants respond both honestly and deceptively to questions in order to appear similar to each of the dates. The dates are predictable and represent well-known categories (i.e. atheist or conservative. In one condition participants rely on explicit instructions preceding each question (external cue. In the second condition no explicit instructions are present, so the participants need to adapt based on prior knowledge about the category the dates belong to (internal cue. With internal cues, reaction times are similar for both honest and deceptive responses. However, in the presence of external cues, reaction times are longer for deceptive than honest responses, suggesting that deceptive responses are associated with increased cognitive load. Compared to internal cues, deception costs were higher when external cues were present. However, the effect was limited to the first part of the experiment, only

  10. The Utility of Military Deception During Counterinsurgency

    Science.gov (United States)

    2007-03-29

    ZAPU constituency was part of the Matabeles ( Zulu ) warrior class ( tribe ) that dominated the Shona tribes in pre-colonial times. Thus their...MILDEC is useful to counterinsurgents. In particular, the most effective deceptions in counterinsurgent history involve the prudent use of pseudo...In particular, the most effective deceptions in counterinsurgent history involve the prudent use of pseudo operators who are able to generate

  11. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Science.gov (United States)

    2010-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and...; deceptive use of a color additive for which a regulation has issued. The Commissioner shall refuse to issue... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...

  12. The slow decay and quick revival of self-deception

    Science.gov (United States)

    Chance, Zoë; Gino, Francesca; Norton, Michael I.; Ariely, Dan

    2015-01-01

    People demonstrate an impressive ability to self-deceive, distorting misbehavior to reflect positively on themselves—for example, by cheating on a test and believing that their inflated performance reflects their true ability. But what happens to self-deception when self-deceivers must face reality, such as when taking another test on which they cannot cheat? We find that self-deception diminishes over time only when self-deceivers are repeatedly confronted with evidence of their true ability (Study 1); this learning, however, fails to make them less susceptible to future self-deception (Study 2). PMID:26347666

  13. Examining well-being, anxiety, and self-deception in university students

    Directory of Open Access Journals (Sweden)

    Zachariah Sheridan

    2015-12-01

    Full Text Available This study examined the combined influence of six positive psychology variables (optimism, hope, self-efficacy, grit, gratitude, and subjective life satisfaction, termed covitality, in relation to buffering individuals against anxiety symptoms. In addition, the influence of self-deception was examined to test whether this construct had an influence on the reporting of these positive psychology variables. A total of 268 individuals (203 females and 65 males with a mean age of 22.2 years (SD = 7.4 years from one Queensland university took part in the study. The participants completed an online questionnaire, which included a battery of positive psychological measures, plus a measure of anxiety and self-deception. The results indicated that the covitality constructs had a moderation effect on anxiety. In a regression analysis, the six covitality constructs explained an additional 24.5% of the variance in anxiety, after controlling for self-deception. Further analyses revealed that those higher in self-deception scored higher in self-efficacy and all positive covitality measures and lower in anxiety, than those lower in self-deception. These findings illustrate the importance of considering the role that self-deception might play in the reporting of positive psychology variables.

  14. Deceptive body movements reverse spatial cueing in soccer.

    Directory of Open Access Journals (Sweden)

    Michael J Wright

    Full Text Available The purpose of the experiments was to analyse the spatial cueing effects of the movements of soccer players executing normal and deceptive (step-over turns with the ball. Stimuli comprised normal resolution or point-light video clips of soccer players dribbling a football towards the observer then turning right or left with the ball. Clips were curtailed before or on the turn (-160, -80, 0 or +80 ms to examine the time course of direction prediction and spatial cueing effects. Participants were divided into higher-skilled (HS and lower-skilled (LS groups according to soccer experience. In experiment 1, accuracy on full video clips was higher than on point-light but results followed the same overall pattern. Both HS and LS groups correctly identified direction on normal moves at all occlusion levels. For deceptive moves, LS participants were significantly worse than chance and HS participants were somewhat more accurate but nevertheless substantially impaired. In experiment 2, point-light clips were used to cue a lateral target. HS and LS groups showed faster reaction times to targets that were congruent with the direction of normal turns, and to targets incongruent with the direction of deceptive turns. The reversed cueing by deceptive moves coincided with earlier kinematic events than cueing by normal moves. It is concluded that the body kinematics of soccer players generate spatial cueing effects when viewed from an opponent's perspective. This could create a reaction time advantage when anticipating the direction of a normal move. A deceptive move is designed to turn this cueing advantage into a disadvantage. Acting on the basis of advance information, the presence of deceptive moves primes responses in the wrong direction, which may be only partly mitigated by delaying a response until veridical cues emerge.

  15. 14 CFR 399.81 - Unrealistic or deceptive scheduling.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unrealistic or deceptive scheduling. 399.81... Unrealistic or deceptive scheduling. (a) It is the policy of the Board to consider unrealistic scheduling of... to the advertising of scheduled performance, it is the policy of the Board to regard as an unfair or...

  16. Misleading or Falsification? Inferring Deceptive Strategies and Types in Online News and Social Media

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Jang, Jin Yea

    2018-04-27

    Deceptive information in online news and social media has had dramatic effect on our society in recent years. This study is the first to gain deeper insights into writers' intent behind digital misinformation by analyzing psycholinguistic signals: moral foundations and connotations extracted from different types of deceptive news ranging from strategic disinformation to propaganda and hoaxes. To ensure consistency of our findings and generalizability across domains, we experiment with data from: (1) confirmed cases of disinformation in news summaries, (2) {propaganda}, hoax, and disinformation news pages, and (3) social media news. We first contrast lexical markers of biased language, syntactic and stylistic signals, and connotations across deceptive news types including disinformation, propaganda, and hoaxes, and {deceptive} strategies including misleading or falsification. We then incorporate these insights to build machine learning and deep learning predictive models to infer deception strategies and deceptive news types. Our experimental results demonstrate that unlike earlier work on deception detection, content combined with biased language markers, moral foundations, and connotations leads to better predictive performance of deception strategies compared to syntactic and stylistic signals (as reported in earlier work on deceptive reviews). Falsification strategy is easier to identify than misleading strategy. Disinformation is more difficult to predict than to propaganda or hoaxes. Deceptive news types (disinformation, propaganda, and hoaxes), unlike deceptive strategies (falsification and misleading), are more salient, and thus easier to identify in tweets than in news reports. Finally, our novel connotation analysis across deception types provides deeper understanding of writers' perspectives and therefore reveals the intentions behind digital misinformation.

  17. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O' Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  18. When deception influences memory: the implication of theory of mind.

    Science.gov (United States)

    El Haj, Mohamad; Antoine, Pascal; Nandrino, Jean Louis

    2017-07-01

    When deceiving, one should remember to whom a falsified story was previously told; otherwise he or she may include inconsistencies, and the deception will probably be discovered. Bearing this in mind, we investigated the potential relationship between deception and the ability to remember to whom a piece of information was previously told (i.e., destination memory). Forty-one adults were given a destination memory task in which they had to decide to whom proverbs had previously been told. They were also given a questionnaire about deception (e.g., "I sometimes tell lies if I have to) and a cognitive theory of mind task in which they had to predict the behaviour of protagonists who hold a mistaken belief about the state of the world. Results showed a positive correlation between deception and destination memory (p theory of mind ability (p theory of mind) results in better processing of the target and consequently better destination memory. By showing the involvement of deception and theory of mind in destination memory, our findings emphasize the memory variations in social and interpersonal interactions.

  19. The Slow Decay and Quick Revival of Self-Deception

    Directory of Open Access Journals (Sweden)

    Zoe eChance

    2015-08-01

    Full Text Available People demonstrate an impressive ability to self-deceive, distorting misbehavior to reflect positively on themselves—for example, by cheating on a test and believing that their inflated performance reflects their true ability. But what happens to self-deception when self-deceivers must face reality, such as when taking another test on which they cannot cheat? We find that self-deception diminishes over time only when self-deceivers are repeatedly confronted with evidence of their true ability (Study 1; this learning, however, fails to make them less susceptible to future self-deception (Study 2.

  20. Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence

    OpenAIRE

    Pawlick, Jeffrey; Zhu, Quanyan

    2017-01-01

    Deception plays a critical role in many interactions in communication and network security. Game-theoretic models called "cheap talk signaling games" capture the dynamic and information asymmetric nature of deceptive interactions. But signaling games inherently model undetectable deception. In this paper, we investigate a model of signaling games in which the receiver can detect deception with some probability. This model nests traditional signaling games and complete information Stackelberg ...

  1. Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children

    Science.gov (United States)

    Babkirk, Sarah; Saunders, Lauren V.; Solomon, Beylul; Kessel, Ellen M.; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A.

    2015-01-01

    The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function (EF) and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to…

  2. The neural basis of deception in strategic interactions.

    Science.gov (United States)

    Volz, Kirsten G; Vogeley, Kai; Tittgemeyer, Marc; von Cramon, D Yves; Sutter, Matthias

    2015-01-01

    Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ), the dorsal anterior cingulate cortex (ACC), the (pre)cuneus (CUN), and the anterior frontal gyrus (aFG) when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth-when the sender does not expect the receiver to believe her (true) message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender's veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not.

  3. The Neural Basis of Deception in Strategic Interactions

    Directory of Open Access Journals (Sweden)

    Kirsten G Volz

    2015-02-01

    Full Text Available Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ, the dorsal anterior cingulate cortex (ACC, the (precuneus (CUN, and the anterior frontal gyrus (aFG when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth—when the sender does not expect the receiver to believe her (true message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender’s veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not.

  4. Hazard of deceptive advertising of athletic footwear.

    Science.gov (United States)

    Robbins, S; Waked, E

    1997-12-01

    Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.

  5. Communication, compassion, and computers: Adolescents' and adults' evaluations of online and face-to-face deception.

    Science.gov (United States)

    O'Rourke, Sean; Eskritt, Michelle; Bosacki, Sandra

    2018-06-01

    We explored Canadian adolescents', emergent adults', and adults' understandings of deception in computer mediated communication (CMC) compared to face to face (FtF). Participants between 13 and 50 years read vignettes of different types of questionable behaviour that occurred online or in real life, and were asked to judge whether deception was involved, and the acceptability of the behaviour. Age groups evaluated deception similarly; however, adolescents held slightly different views from adults about what constitutes deception, suggesting that the understanding of deception continues to develop into adulthood. Furthermore, CMC behaviour was rated as more deceptive than FtF in general, and participants scoring higher on compassion perceived vignettes to be more deceptive. This study is a step towards better understanding the relationships between perceptions of deception across adolescence into adulthood, mode of communication, and compassion, and may have implications for how adults communicate with youth about deception in CMC and FtF contexts. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  6. Estimates of Inequality Indices Based on Simple Random, Ranked Set, and Systematic Sampling

    OpenAIRE

    Bansal, Pooja; Arora, Sangeeta; Mahajan, Kalpana K.

    2013-01-01

    Gini index, Bonferroni index, and Absolute Lorenz index are some popular indices of inequality showing different features of inequality measurement. In general simple random sampling procedure is commonly used to estimate the inequality indices and their related inference. The key condition that the samples must be drawn via simple random sampling procedure though makes calculations much simpler but this assumption is often violated in practice as the data does not always yield simple random ...

  7. An alternative procedure for estimating the population mean in simple random sampling

    Directory of Open Access Journals (Sweden)

    Housila P. Singh

    2012-03-01

    Full Text Available This paper deals with the problem of estimating the finite population mean using auxiliary information in simple random sampling. Firstly we have suggested a correction to the mean squared error of the estimator proposed by Gupta and Shabbir [On improvement in estimating the population mean in simple random sampling. Jour. Appl. Statist. 35(5 (2008, pp. 559-566]. Later we have proposed a ratio type estimator and its properties are studied in simple random sampling. Numerically we have shown that the proposed class of estimators is more efficient than different known estimators including Gupta and Shabbir (2008 estimator.

  8. Human Deception Detection from Whole Body Motion Analysis

    Science.gov (United States)

    2015-12-01

    associated with incentivized deception, an initial reward /punishment protocol was designed to apply a level of stakes/significance to the checkpoint...questionnaire asking them about their emotions and deception strategy . Once completed, the participants removed all the markers and changed into their... Sony MiniDV Handycam® Camcorder, Model # DCR-HC38. All camera footage were saved to MiniDV tape and then transferred to a PC for processing. Once

  9. Cognitive simplicity and self-deception are crucial in martyrdom and suicide terrorism.

    Science.gov (United States)

    Fink, Bernhard; Trivers, Robert

    2014-08-01

    Suicide attacks and terrorism are characterized by cognitive simplicity, which is related to self-deception. In justifying violence in pursuit of ideologically and/or politically driven commitment, people with high religious commitment may be particularly prone to mechanisms of self-deception. Related megalomania and glorious self-perception are typical of self-deception, and are thus crucial in the emergence and expression of (suicide) terrorism.

  10. Measuring cues for stand-off deception detection based on full-body nonverbal features in body-worn cameras

    Science.gov (United States)

    Bouma, Henri; Burghouts, Gertjan; den Hollander, Richard; van der Zee, Sophie; Baan, Jan; ten Hove, Johan-Martijn; van Diepen, Sjaak; van den Haak, Paul; van Rest, Jeroen

    2016-10-01

    Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support. However, psychological research has shown that humans can hardly perform better than random guessing. Deception detection is a multi-disciplinary research area with an interest from different fields, such as psychology and computer science. In the last decade, several developments have helped to improve the accuracy of lie detection (e.g., with a concealed information test, increasing the cognitive load, or measurements with motion capture suits) and relevant cues have been discovered (e.g., eye blinking or fiddling with the fingers). With an increasing presence of mobile phones and bodycams in society, a mobile, stand-off, automatic deception detection methodology based on various cues from the whole body would create new application opportunities. In this paper, we study the feasibility of measuring these visual cues automatically on different parts of the body, laying the groundwork for stand-off deception detection in more flexible and mobile deployable sensors, such as body-worn cameras. We give an extensive overview of recent developments in two communities: in the behavioral-science community the developments that improve deception detection with a special attention to the observed relevant non-verbal cues, and in the computer-vision community the recent methods that are able to measure these cues. The cues are extracted from several body parts: the eyes, the mouth, the head and the fullbody pose. We performed an experiment using several state-of-the-art video-content-analysis (VCA) techniques to assess the quality of robustly measuring these visual cues.

  11. Emergence of an optimal search strategy from a simple random walk.

    Science.gov (United States)

    Sakiyama, Tomoko; Gunji, Yukio-Pegio

    2013-09-06

    In reports addressing animal foraging strategies, it has been stated that Lévy-like algorithms represent an optimal search strategy in an unknown environment, because of their super-diffusion properties and power-law-distributed step lengths. Here, starting with a simple random walk algorithm, which offers the agent a randomly determined direction at each time step with a fixed move length, we investigated how flexible exploration is achieved if an agent alters its randomly determined next step forward and the rule that controls its random movement based on its own directional moving experiences. We showed that our algorithm led to an effective food-searching performance compared with a simple random walk algorithm and exhibited super-diffusion properties, despite the uniform step lengths. Moreover, our algorithm exhibited a power-law distribution independent of uniform step lengths.

  12. Cooperation and deception in primates.

    Science.gov (United States)

    Hall, Katie; Brosnan, Sarah F

    2017-08-01

    Though competition and cooperation are often considered opposing forces in an arms race driving natural selection, many animals, including humans, cooperate in order to mitigate competition with others. Understanding others' psychological states, such as seeing and knowing, others' goals and intentions, and coordinating actions are all important for complex cooperation-as well as for predicting behavior in order to take advantage of others through tactical deception, a form of competition. We outline evidence of primates' understanding of how others perceive the world, and then consider how the evidence from both deception and cooperation fits this framework to give us a more complete understanding of the evolution of complex social cognition in primates. In experimental food competitions, primates flexibly manipulate group-mates' behavior to tactically deceive them. Deception can infiltrate cooperative interactions, such as when one takes an unfair share of meat after a coordinated hunt. In order to counter competition of this sort, primates maintain cooperation through partner choice, partner control, and third party punishment. Yet humans appear to stand alone in their ability to understand others' beliefs, which allows us not only to deceive others with the explicit intent to create a false belief, but it also allows us to put ourselves in others' shoes to determine when cheaters need to be punished, even if we are not directly disadvantaged by the cheater. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. "Playing Hooky" Health Messages: Apprehension, Impression Management, and Deception.

    Science.gov (United States)

    Barrett, Ashley; Murphy, Melissa; Blackburn, Kate

    2018-03-01

    This study investigates playing hooky in higher education classrooms and associates this behavior with students' communicative dispositions, instructor perceptions, and language use. We define "playing hooky" as students skipping class and explaining their absence to their instructor with deceptive health messages. The purpose of Study 1, an online survey (N = 177), is to further understand the characteristics of students who engage in this type of deceptive health communication. Study 1 measures communication apprehension and perceived instructor credibility in students who had played hooky from class and those who had not. Findings reveal that students who communicate playing hooky health messages (a) reported more instructor communication apprehension and (b) perceived the instructors with whom they had played hooky to be less credible. Study 2 uses facework theory and MEH analysis to reveal the different linguistic strategies students use to communicate (a) truthful health messages (N = 165) and (b) deceptive heath messages (N = 82) to their instructor following an absence. Results demonstrate that students' facework strategies are more geared toward saving instructors' negative face in the deceptive health message condition. Implications of both studies are offered.

  14. Deception Detection in a Computer-Mediated Environment: Gender, Trust, and Training Issues

    National Research Council Canada - National Science Library

    Dziubinski, Monica

    2003-01-01

    .... This research draws on communication and deception literature to develop a conceptual model proposing relationships between deception detection abilities in a computer-mediated environment, gender, trust, and training...

  15. Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model

    OpenAIRE

    Sporer, Siegfried L.

    2016-01-01

    Deception and Cognitive Load: Expanding our Horizon with a Working Memory ModelAbstractRecently, studies on deception and its detection have increased dramatically. Many of these studies rely on the cognitive load approach as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies...

  16. Entropy estimates for simple random fields

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Justesen, Jørn

    1995-01-01

    We consider the problem of determining the maximum entropy of a discrete random field on a lattice subject to certain local constraints on symbol configurations. The results are expected to be of interest in the analysis of digitized images and two dimensional codes. We shall present some examples...... of binary and ternary fields with simple constraints. Exact results on the entropies are known only in a few cases, but we shall present close bounds and estimates that are computationally efficient...

  17. Children's reasoning about deception and defiance as ways of resisting parents' and teachers' directives.

    Science.gov (United States)

    Gingo, Matthew

    2017-09-01

    This research presented 8-, 10-, and 12-year-olds (N = 120) with hypothetical situations depicting comparably aged children engaging in defiance and deception to circumvent authorities' directives that they disagreed with. The nature of the situations varied in terms of domain (personal, moral, or prudential) and type of authority figure (parent or teacher). Evaluations and justifications for the legitimacy of the directives, defiance, and deception were examined, as were general evaluations of deception. Across domains, increased age was associated with decreased acceptance of directives, and increased acceptance of defiance and deception. Participants judged that defiance and deception were legitimate ways to resist immoral directives. Directives about personal acts were also widely rejected, particularly teachers' directives. Defiance and deception were seen by some as legitimate ways to resist unwarranted control over children's personal choices. Prudential directives were widely accepted, whereas defiance and deception in those situations was generally rejected. Results indicate that children value honesty and authority but sometimes prioritize moral and personal considerations when deciding whether or not to lie. Findings are discussed in terms of the ways children coordinate multiple competing rules and motivations when making moral judgments about honesty. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. A functional MRI study of deception among offenders with antisocial personality disorders.

    Science.gov (United States)

    Jiang, W; Liu, H; Liao, J; Ma, X; Rong, P; Tang, Y; Wang, W

    2013-08-06

    Deceit is a core feature of antisocial personality disorder (ASPD), and the study of deception in ASPD has important implications for identifying the underlying mechanism of ASPD. A great deal of functional neuroimaging literature has described the neural correlates of deception in healthy volunteers, but there have been few imaging studies examining people with ASPD. The neural correlates of lie-telling in ASPD, and which specific brain activities are related to the capacity to lie, are unclear. In this study, 32 offenders who satisfied the Personality Diagnostic Questionaire-4 and PDI-IV (Personality Disorder Interview) criteria for ASPD were divided into three groups based on their capacity for deception, which was evaluated based on the deceitfulness criterion of the PDI-IV ASPD. All offenders underwent functional magnetic resonance imaging (fMRI) while responding to questions in a truthful, inverse, or deceitful manner. We primarily created contrasts in the brain activities between truth-telling and lie-telling, and then computed the Pearson's correlation coefficients between activities contrasts of individual, i.e. BOLD (blood-oxygen-level-dependent) strength during deception minus that during truth-telling, and the capacity for deception. Our results indicated that the bilateral dorsolateral prefrontal cortex extending to the middle frontal gyrus, the left inferior parietal lobule, and the bilateral anterior cingulate gyrus/medial superior frontal gyrus were associated with deception among people with ASPD. As the capacity for deception increased, the contrasted brain activities of the above regions decreased. This study found that truthful and untruthful communications of ASPD subjects can be differentiated in terms of brain BOLD activities, and more importantly, this study is the first to use fMRI to discover that BOLD activities during deception are correlated with the capacity to lie. The latter finding might challenge the diagnostic accuracy of lie

  19. Spontaneous innovation for future deception in a male chimpanzee.

    Science.gov (United States)

    Osvath, Mathias; Karvonen, Elin

    2012-01-01

    The ability to invent means to deceive others, where the deception lies in the perceptually or contextually detached future, appears to require the coordination of sophisticated cognitive skills toward a single goal. Meanwhile innovation for a current situation has been observed in a wide range of species. Planning, on the one hand, and the social cognition required for deception on the other, have been linked to one another, both from a co-evolutionary and a neuroanatomical perspective. Innovation and deception have also been suggested to be connected in their nature of relying on novelty. We report on systematic observations suggesting innovation for future deception by a captive male chimpanzee (Pan troglodytes). As an extension of previously described behaviour--caching projectiles for later throwing at zoo visitors--the chimpanzee, again in advance, manufactured concealments from hay, as well as used naturally occurring concealments. All were placed near the visitors' observation area, allowing the chimpanzee to make throws before the crowd could back off. We observed what was likely the first instance of this innovation. Further observations showed that the creation of future-oriented concealments became the significantly preferred strategy. What is more, the chimpanzee appeared consistently to combine two deceptive strategies: hiding projectiles and inhibiting dominance display behaviour. The findings suggest that chimpanzees can represent the future behaviours of others while those others are not present, as well as take actions in the current situation towards such potential future behaviours. Importantly, the behaviour of the chimpanzee produced a future event, rather than merely prepared for an event that had been reliably re-occurring in the past. These findings might indicate that the chimpanzee recombined episodic memories in perceptual simulations.

  20. Plagiarism and Source Deception Detection Based on Syntax Analysis

    Directory of Open Access Journals (Sweden)

    Eman Salih Al-Shamery

    2017-02-01

    Full Text Available In this research, the shingle algorithm with Jaccard method are employed as a new approach to detect deception in sources in addition to detect plagiarism . Source deception occurs as a result of taking a particular text from a source and relative it to another source, while plagiarism occurs in the documents as a result of taking part or all of the text belong to another research, this approach is based on Shingle algorithm with Jaccard coefficient , Shingling is an efficient way to compare the set of shingle in the files that contain text which are used as a feature to measure the syntactic similarity of the documents and it will work with Jaccard coefficient that measures similarity between sample sets . In this proposed system, text will be checked whether it contains syntax plagiarism or not and gives a percentage of similarity with other documents , As well as research sources will be checked to detect deception in source , by matching it with available sources from Turnitin report of the same research by using shingle algorithm with Jaccard coefficient. The motivations of this work is to discovery of literary thefts that occur on the researches , especially what students are doing in their researches , also discover the deception that occurs in the sources.

  1. Action simulation plays a critical role in deceptive action recognition.

    Science.gov (United States)

    Tidoni, Emmanuele; Borgomaneri, Sara; di Pellegrino, Giuseppe; Avenanti, Alessio

    2013-01-09

    The ability to infer deceptive intents from nonverbal behavior is critical for social interactions. By combining single-pulse and repetitive transcranial magnetic stimulation (TMS) in healthy humans, we provide both correlational and causative evidence that action simulation is actively involved in the ability to recognize deceptive body movements. We recorded motor-evoked potentials during a faked-action discrimination (FAD) task: participants watched videos of actors lifting a cube and judged whether the actors were trying to deceive them concerning the real weight of the cube. Seeing faked actions facilitated the observers' motor system more than truthful actions in a body-part-specific manner, suggesting that motor resonance was sensitive to deceptive movements. Furthermore, we found that TMS virtual lesion to the anterior node of the action observation network, namely the left inferior frontal cortex (IFC), reduced perceptual sensitivity in the FAD task. In contrast, no change in FAD task performance was found after virtual lesions to the left temporoparietal junction (control site). Moreover, virtual lesion to the IFC failed to affect performance in a difficulty-matched spatial-control task that did not require processing of spatiotemporal (acceleration) and configurational (limb displacement) features of seen actions, which are critical to detecting deceptive intent in the actions of others. These findings indicate that the human IFC is critical for recognizing deceptive body movements and suggest that FAD relies on the simulation of subtle changes in action kinematics within the motor system.

  2. Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks.

    Science.gov (United States)

    Li, Yunji; Wu, QingE; Peng, Li

    2018-01-23

    In this paper, a synthesized design of fault-detection filter and fault estimator is considered for a class of discrete-time stochastic systems in the framework of event-triggered transmission scheme subject to unknown disturbances and deception attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring deception attacks. To achieve a fault-detection residual is only sensitive to faults while robust to disturbances, a coordinate transformation approach is exploited. This approach can transform the considered system into two subsystems and the unknown disturbances are removed from one of the subsystems. The gain of fault-detection filter is derived by minimizing an upper bound of filter error covariance. Meanwhile, system faults can be reconstructed by the remote fault estimator. An recursive approach is developed to obtain fault estimator gains as well as guarantee the fault estimator performance. Furthermore, the corresponding event-triggered sensor data transmission scheme is also presented for improving working-life of the wireless sensor node when measurement information are aperiodically transmitted. Finally, a scaled version of an industrial system consisting of local PC, remote estimator and wireless sensor node is used to experimentally evaluate the proposed theoretical results. In particular, a novel fault-alarming strategy is proposed so that the real-time capacity of fault-detection is guaranteed when the event condition is triggered.

  3. 75 FR 68560 - Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based Swaps

    Science.gov (United States)

    2010-11-08

    ... 3235-AK77 Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based... fraud, manipulation, and deception in connection with the offer, purchase or sale of any security-based... measured and reasonable means to prevent fraud, manipulation, and deception in connection with security...

  4. Use of "um" in the Deceptive Speech of a Convicted Murderer

    Science.gov (United States)

    Villar, Gina; Arciuli, Joanne; Mallard, David

    2012-01-01

    Previous studies have demonstrated a link between language behaviors and deception; however, questions remain about the role of specific linguistic cues, especially in real-life high-stakes lies. This study investigated use of the so-called filler, "um," in externally verifiable truthful versus deceptive speech of a convicted murderer. The data…

  5. Spontaneous innovation for future deception in a male chimpanzee.

    Directory of Open Access Journals (Sweden)

    Mathias Osvath

    Full Text Available BACKGROUND: The ability to invent means to deceive others, where the deception lies in the perceptually or contextually detached future, appears to require the coordination of sophisticated cognitive skills toward a single goal. Meanwhile innovation for a current situation has been observed in a wide range of species. Planning, on the one hand, and the social cognition required for deception on the other, have been linked to one another, both from a co-evolutionary and a neuroanatomical perspective. Innovation and deception have also been suggested to be connected in their nature of relying on novelty. METHODOLOGY/PRINCIPAL FINDINGS: We report on systematic observations suggesting innovation for future deception by a captive male chimpanzee (Pan troglodytes. As an extension of previously described behaviour--caching projectiles for later throwing at zoo visitors--the chimpanzee, again in advance, manufactured concealments from hay, as well as used naturally occurring concealments. All were placed near the visitors' observation area, allowing the chimpanzee to make throws before the crowd could back off. We observed what was likely the first instance of this innovation. Further observations showed that the creation of future-oriented concealments became the significantly preferred strategy. What is more, the chimpanzee appeared consistently to combine two deceptive strategies: hiding projectiles and inhibiting dominance display behaviour. CONCLUSIONS/SIGNIFICANCE: The findings suggest that chimpanzees can represent the future behaviours of others while those others are not present, as well as take actions in the current situation towards such potential future behaviours. Importantly, the behaviour of the chimpanzee produced a future event, rather than merely prepared for an event that had been reliably re-occurring in the past. These findings might indicate that the chimpanzee recombined episodic memories in perceptual simulations.

  6. Discerning truth from deception: The sincere witness profile

    Directory of Open Access Journals (Sweden)

    Fiorella Giusberti

    2009-01-01

    Full Text Available During the last twenty years, we have assisted to a growing interest in the detection of verbal cues under deception. In this context, we focused our attention on the truth vs. deception topic in adults. In particular, we were interested in discrepant findings concerning some verbal indicators. The aim of the present study was to investigate whether different experimental designs may yield different results regarding the presence or absence of CBCA criteria. Forty participants were shown a video of a robbery and were asked to give a truthful and a deceitful statement of the criminal event. The participants’ performances were recorded in order to analyze content of the reports. Results showed more changes in verbal behaviour under within-subjects design compared to between-subjects one, though the presence/absence of some criteria was the same across the two statistical procedures. The different results yielded by between- and within-subjects analyses can provide some hints as regards the discrepancy in deception literature on verbal cues. Implications for applied settings are discussed.

  7. An unbiased estimator of the variance of simple random sampling using mixed random-systematic sampling

    OpenAIRE

    Padilla, Alberto

    2009-01-01

    Systematic sampling is a commonly used technique due to its simplicity and ease of implementation. The drawback of this simplicity is that it is not possible to estimate the design variance without bias. There are several ways to circumvent this problem. One method is to suppose that the variable of interest has a random order in the population, so the sample variance of simple random sampling without replacement is used. By means of a mixed random - systematic sample, an unbiased estimator o...

  8. The Makara of Hizballah: Deception in the 2006 Summer War

    Science.gov (United States)

    2007-06-01

    another example of the interaction between information activities. The use of the internet covers over into the realm of computer network operations...the Internet and home computers . Furthermore, the individual can use technology to network with others to counter deceptive acts by an opponent...use of information technologies greatly enhanced their ability to wield deception. Finally, this paper will address the interrelation of various

  9. Pollinator-Driven Speciation in Sexually Deceptive Orchids

    Directory of Open Access Journals (Sweden)

    Shuqing Xu

    2012-01-01

    Full Text Available Pollinator-mediated selection has been suggested to play a major role for the origin and maintenance of the species diversity in orchids. Sexually deceptive orchids are one of the prime examples for rapid, pollinator-mediated plant radiations, with many species showing little genetic differentiation, lack of postzygotic barriers, but strong prezygotic reproductive isolation. These orchids mimic mating signals of female insects and employ male insects as pollinators. This kind of sexual mimicry leads to highly specialised pollination and provides a good system for investigating the process of pollinator-driven speciation. Here, we summarise the knowledge of key processes of speciation in this group of orchids and conduct a meta-analysis on traits that contribute to species differentiation, and thus potentially to speciation. Our study suggests that pollinator shift through changes in floral scent is predominant among closely related species in sexually deceptive orchids. Such shifts can provide a mechanism for pollinator-driven speciation in plants, if the resulting floral isolation is strong. Furthermore, changes in floral scent in these orchids are likely controlled by few genes. Together these factors suggest speciation in sexually deceptive orchids may happen rapidly and even in sympatry, which may explain the remarkable species diversity observed in this plant group.

  10. When Pinocchio's nose does not grow: belief regarding lie-detectability modulates production of deception

    Science.gov (United States)

    Sip, Kamila E.; Carmel, David; Marchant, Jennifer L.; Li, Jian; Petrovic, Predrag; Roepstorff, Andreas; McGregor, William B.; Frith, Christopher D.

    2013-01-01

    Does the brain activity underlying the production of deception differ depending on whether or not one believes their deception can be detected? To address this question, we had participants commit a mock theft in a laboratory setting, and then interrogated them while they underwent functional MRI (fMRI) scanning. Crucially, during some parts of the interrogation participants believed a lie-detector was activated, whereas in other parts they were told it was switched-off. We were thus able to examine the neural activity associated with the contrast between producing true vs. false claims, as well as the independent contrast between believing that deception could and could not be detected. We found increased activation in the right amygdala and inferior frontal gyrus (IFG), as well as the left posterior cingulate cortex (PCC), during the production of false (compared to true) claims. Importantly, there was a significant interaction between the effects of deception and belief in the left temporal pole and right hippocampus/parahippocampal gyrus, where activity increased during the production of deception when participants believed their false claims could be detected, but not when they believed the lie-detector was switched-off. As these regions are associated with binding socially complex perceptual input and memory retrieval, we conclude that producing deceptive behavior in a context in which one believes this deception can be detected is associated with a cognitively taxing effort to reconcile contradictions between one's actions and recollections. PMID:23382715

  11. Deceptive Business Practices: Federal Regulations.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    Federal regulations to prevent deceptive advertising seek to balance the advertiser's freedom of speech with protection of the consumer. This paper discusses what the Federal Trade Commission (FTC) has done to regulate advertising and evaluates the adequacy of its controls. The commission uses cease-and-desist orders, affirmative disclosure,…

  12. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  13. Deception and price in a market with asymmetric information

    Directory of Open Access Journals (Sweden)

    Kimmo Eriksson

    2007-02-01

    Full Text Available In markets with asymmetric information, only sellers have knowledge about the quality of goods. Sellers may of course make a declaration of the quality, but unless there are sanctions imposed on false declarations or reputations are at stake, such declarations are tantamount to cheap talk. Nonetheless, in an experimental study we find that most people make honest declarations, which is in line with recent findings that lies damaging another party are costly in terms of the liar's utility. Moreover, we find in this experimental market that deceptive sellers offer lower prices than honest sellers, which could possibly be explained by the same wish to limit the damage to the other party. However, when the recipient of the offer is a social tie we find no evidence for lower prices of deceptive offers, which seems to indicate that the rationale for the lower price in deceptive offers to strangers is in fact profit-seeking (by making the deal more attractive rather than moral.

  14. How to Trick Your Opponent: A Review Article on Deceptive Actions in Interactive Sports

    Directory of Open Access Journals (Sweden)

    Iris Güldenpenning

    2017-05-01

    Full Text Available Performing deceptive actions is a wide-spread phenomenon in sports and it is of considerable practical relevance to know whether or not a fake or a disguised action decreases the opponents’ performance. Therefore, research on deceptive actions for various sport disciplines (e.g., cricket, rugby, martial arts, soccer, and basketball has been conducted. This research is scattered, both across time and scientific disciplines. Here, we aim to systematically review the empirical work on deceptive actions in interactive sports and want to give an overview about several issues investigated in the last decades. Three main topics of the detected literature were discussed here: (1 the role of expertise for the recognition of deceptive actions, (2 the cognitive mechanisms underlying the processing of deceptive actions, and (3 the pros and cons of in situ research designs. None of these themes seems to be settled and therefore, they should be considered in future research agendas.

  15. Deceptive Business Practices: State Regulations.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    Although much has been done at the federal level to control deceptive advertising practices, many states have no criminal laws designed to regulate advertising, and several states recently repealed such laws. This paper examines states' efforts to balance the advertiser's freedom of speech with the consumer's need for information about products by…

  16. Federal Trade Commission's authority to regulate marketing to children: deceptive vs. unfair rulemaking.

    Science.gov (United States)

    Pomeranz, Jennifer L

    2011-01-01

    Food and beverage marketing directed at children is of increasing concern to the public health and legal communities. The new administration at the Federal Trade Commission and abundant science on the topic make it a particularly opportune time for the government to reconsider regulating marketing directed at youth. This Article analyzes the Commission's authority to regulate food and beverage marketing directed at children under its jurisdiction over unfair and deceptive acts and practices to determine which avenue is most viable. The author finds that the Federal Trade Commission has the authority to regulate deceptive marketing practices directed at vulnerable populations. Although the Commission can issue individual orders, its remedial power to initiate rules would better address the pervasiveness of modern marketing practices. The Commission does not currently have the power to regulate unfair marketing to children; however, even if Congress reinstated this authority, the Commission's authority over deceptive marketing may be preferable to regulate these practices. Deceptive communications are not protected by the First Amendment and the deceptive standard matches the science associated with marketing to children. The Federal Trade Commission has the authority to initiate rulemaking in the realm of food and beverage marketing to children as deceptive communications in interstate commerce, in violation of the Federal Trade Commission Act. However, to effectuate this process, Congress would need to grant the Commission the authority to do so under the Administrative Procedures Act.

  17. Information asymmetry and deception.

    Science.gov (United States)

    Clots-Figueras, Irma; Hernán-González, Roberto; Kujal, Praveen

    2015-01-01

    Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (or investee). The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a non-binding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution.

  18. Information Asymmetry and Deception

    Directory of Open Access Journals (Sweden)

    Irma eClots Figueras

    2015-07-01

    Full Text Available Situations such as an entrepreneur overstating a project’s value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor can send a given amount of money to a trustee (or investee. The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a nonbinding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution.

  19. Response bias in judging deceptive movements

    NARCIS (Netherlands)

    Canal Bruland, R.; Schmidt, M.

    2009-01-01

    Two not mutually exclusive explanations, perceptual and motor expertise, account for the finding that experts outperform novices in recognizing deceptive actions from bodily (kinematic) cues. The aim of the present study was twofold: First, we sought to examine the impact of motor and perceptual

  20. Historic hydrovolcanism at Deception Island (Antarctica): implications for eruption hazards

    Science.gov (United States)

    Pedrazzi, Dario; Németh, Károly; Geyer, Adelina; Álvarez-Valero, Antonio M.; Aguirre-Díaz, Gerardo; Bartolini, Stefania

    2018-01-01

    Deception Island (Antarctica) is the southernmost island of the South Shetland Archipelago in the South Atlantic. Volcanic activity since the eighteenth century, along with the latest volcanic unrest episodes in the twentieth and twenty-first centuries, demonstrates that the volcanic system is still active and that future eruptions are likely. Despite its remote location, the South Shetland Islands are an important touristic destination during the austral summer. In addition, they host several research stations and three summer field camps. Deception Island is characterised by a Quaternary caldera system with a post-caldera succession and is considered to be part of an active, dispersed (monogenetic), volcanic field. Historical post-caldera volcanism on Deception Island involves monogenetic small-volume (VEI 2-3) eruptions such forming cones and various types of hydrovolcanic edifices. The scientific stations on the island were destroyed, or severely damaged, during the eruptions in 1967, 1969, and 1970 mainly due to explosive activity triggered by the interaction of rising (or erupting) magma with surface water, shallow groundwater, and ice. We conducted a detailed revision (field petrology and geochemistry) of the historical hydrovolcanic post-caldera eruptions of Deception Island with the aim to understand the dynamics of magma-water interaction, as well as characterise the most likely eruptive scenarios from future eruptions. We specifically focused on the Crimson Hill (estimated age between 1825 and 1829), and Kroner Lake (estimated age between 1829 and 1912) eruptions and 1967, 1969, and 1970 events by describing the eruption mechanisms related to the island's hydrovolcanic activity. Data suggest that the main hazards posed by volcanism on the island are due to fallout, ballistic blocks and bombs, and subordinate, dilute PDCs. In addition, Deception Island can be divided into five areas of expected activity due to magma-water interaction, providing additional

  1. When Pinocchio’s nose does not grow: Belief regarding lie detectability modulates production of deception.

    Directory of Open Access Journals (Sweden)

    Kamila Ewa Sip

    2013-02-01

    Full Text Available Does the brain activity underlying the production of deception differ depending on whether or not one believes their deception can be detected? To address this question, we had participants commit a mock theft in a laboratory setting, and then interrogated them while they underwent functional MRI (fMRI scanning. Crucially, during some parts of the interrogation participants believed a lie detector was activated, whereas in other parts they were told it was switched off. We were thus able to examine the neural activity associated with the contrast between producing true versus false claims, as well as the independent contrast between believing that deception could and could not be detected. We found increased activation in the right amygdala and inferior frontal gyrus (IFG, as well as the left posterior cingulate cortex (PCC, during the production of false (compared to true claims. Importantly, there was a significant interaction between the effects of deception and belief in the left temporal pole and right hippocampus/parahippocampal gyrus, where activity increased during the production of deception when participants believed their false claims could be detected, but not when they believed the lie detector was switched off. As these regions are associated with binding socially complex perceptual input and memory retrieval, we conclude that producing deceptive behavior in a context in which one believes this deception can be detected is associated with a cognitively taxing effort to reconcile contradictions between one’s actions and recollections.

  2. Deception studies manipulating centrally acting performance modifiers: a review.

    Science.gov (United States)

    Williams, Emily L; Jones, Hollie S; Sparks, Sandy; Marchant, David C; Micklewright, Dominic; McNaughton, Lars R

    2014-07-01

    Athletes anticipatorily set and continuously adjust pacing strategies before and during events to produce optimal performance. Self-regulation ensures maximal effort is exerted in correspondence with the end point of exercise, while preventing physiological changes that are detrimental and disruptive to homeostatic control. The integration of feedforward and feedback information, together with the proposed brain's performance modifiers is said to be fundamental to this anticipatory and continuous regulation of exercise. The manipulation of central, regulatory internal and external stimuli has been a key focus within deception research, attempting to influence the self-regulation of exercise and induce improvements in performance. Methods of manipulating performance modifiers such as unknown task end point, deceived duration or intensity feedback, self-belief, or previous experience create a challenge within research, as although they contextualize theoretical propositions, there are few ecological and practical approaches which integrate theory with practice. In addition, the different methods and measures demonstrated in manipulation studies have produced inconsistent results. This review examines and critically evaluates the current methods of how specific centrally controlled performance modifiers have been manipulated, within previous deception studies. From the 31 studies reviewed, 10 reported positive effects on performance, encouraging future investigations to explore the mechanisms responsible for influencing pacing and consequently how deceptive approaches can further facilitate performance. The review acts to discuss the use of expectation manipulation not only to examine which methods of deception are successful in facilitating performance but also to understand further the key components used in the regulation of exercise and performance.

  3. Teachers' Beliefs about Cues to Deception and the Ability to Detect Deceit

    Science.gov (United States)

    Ulatowska, Joanna

    2017-01-01

    This study aimed to test beliefs about cues to deception and the ability to detect lies in a group of teachers with different teaching experience. Their results were compared with the results of non-teachers matched in age and with the results of educational studies and psychology students. Both the beliefs of deception indicators and overall…

  4. Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty

    Directory of Open Access Journals (Sweden)

    Jennifer M. C. Vendemia

    2005-01-01

    Full Text Available Deception research has focused on identifying peripheral nervous system markers while ignoring cognitive mechanisms underlying those markers. Cognitive theorists argue that the process of deception may involve such constructs as attentional capture, working memory load, or perceived incongruity with memory, while psychophysiologists argue for stimulus salience, arousal, and emotion. Three studies were conducted to assess reaction time (RT in relation to deception, response congruity, and preparedness to deceive. Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. Findings indicate that deceptive responses have a longer RT than truthful responses, and that this relationship remains constant across response type and preparedness to deceive. The authors use these findings in preliminary support of a comprehensive cognitive model of deception.

  5. Are computers effective lie detectors? A meta-analysis of linguistic cues to deception.

    Science.gov (United States)

    Hauch, Valerie; Blandón-Gitlin, Iris; Masip, Jaume; Sporer, Siegfried L

    2015-11-01

    This meta-analysis investigates linguistic cues to deception and whether these cues can be detected with computer programs. We integrated operational definitions for 79 cues from 44 studies where software had been used to identify linguistic deception cues. These cues were allocated to six research questions. As expected, the meta-analyses demonstrated that, relative to truth-tellers, liars experienced greater cognitive load, expressed more negative emotions, distanced themselves more from events, expressed fewer sensory-perceptual words, and referred less often to cognitive processes. However, liars were not more uncertain than truth-tellers. These effects were moderated by event type, involvement, emotional valence, intensity of interaction, motivation, and other moderators. Although the overall effect size was small, theory-driven predictions for certain cues received support. These findings not only further our knowledge about the usefulness of linguistic cues to detect deception with computers in applied settings but also elucidate the relationship between language and deception. © 2014 by the Society for Personality and Social Psychology, Inc.

  6. Digging in the Dark Triad: A Replication of ``Machiavellianism and Dating: Deception and Intimacy''

    Directory of Open Access Journals (Sweden)

    Durand, Guillaume

    2016-10-01

    Full Text Available The present study is a replication and an extension of Dussault, Hojjat, and Boone (2013. Machiavellianism and dating: Deception and intimacy. Social Behavior and Personality: an international journal, 41(2, 283-294. The results support the positive association between Machiavellianism and the use of deceptive dating strategies, but fail to detect a correlation between Machiavellianism and perceived intimacy. The extension to the Dark Triad reveals that psychopathy is a stronger predictor than Machiavellianism to assess deceptive dating strategies, and supports a relationship between higher degrees of narcissism and history of intimate behaviors.

  7. The Art of Darkness Deception and Urban Operations

    National Research Council Canada - National Science Library

    Gerwehr, Scott

    2000-01-01

    .... Both the battle on friendly urban terrain and the employment of deception might be fairly characterized as asymmetric strategies, aimed at reducing an opponent's strengths and exposing his weaknesses...

  8. Assessment of Psychophysiological Detection of Deception (PDD) Pretest

    National Research Council Canada - National Science Library

    2007-01-01

    The Defense Academy for Credibility Assessment (DACA) Research Division contracted with Battelle to conduct scientific research to determine the relationship between the content of the Psychophysiological Detection of Deception (PDD...

  9. Are Celebrities Criminally Responsible For Deceptive Advertising?

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The State Administration for Industry and Commerce recently said it has suggested the addition of an article in the Advertising Law to make celebrities who represent fake products in deceptive advertising criminally responsible for their actions if it is confirmed

  10. Deceptive but Not Honest Manipulative Actions Are Associated with Increased Interaction between Middle and Inferior Frontal gyri

    Directory of Open Access Journals (Sweden)

    Maxim Kireev

    2017-08-01

    Full Text Available The prefrontal cortex is believed to be responsible for execution of deceptive behavior and its involvement is associated with greater cognitive efforts. It is also generally assumed that deception is associated with the inhibition of default honest actions. However, the precise neurophysiological mechanisms underlying this process remain largely unknown. The present study was aimed to use functional magnetic resonance imaging to reveal the underlying functional integration within the prefrontal cortex during the task which requires that subjects to deliberately mislead an opponent through the sequential execution of deceptive and honest claims. To address this issue, we performed psychophysiological interaction (PPI analysis, which allows for statistical assessment of changes in functional relationships between active brain areas in changing psychological contexts. As a result the whole brain PPI-analysis established that both manipulative honest and deceptive claiming were associated with an increase in connectivity between the left middle frontal gyrus and right temporo-parietal junction (rTPJ. Taking into account the role played by rTPJ in processes associated with the theory of mind the revealed data can reflect possible influence of socio-cognitive context on the process of selecting manipulative claiming regardless their honest or deceptive nature. Direct comparison between deceptive and honest claims revealed pattern enhancement of coupling between the left middle frontal gyrus and the left inferior frontal gyrus. This finding provided evidence that the execution of deception relies to a greater extent on higher-order hierarchically-organized brain mechanisms of executive control required to select between two competing deceptive or honest task sets.

  11. Effects of deceptive packaging and product involvement on purchase intention: an elaboration likelihood model perspective.

    Science.gov (United States)

    Lammers, H B

    2000-04-01

    From an Elaboration Likelihood Model perspective, it was hypothesized that postexposure awareness of deceptive packaging claims would have a greater negative effect on scores for purchase intention by consumers lowly involved rather than highly involved with a product (n = 40). Undergraduates who were classified as either highly or lowly (ns = 20 and 20) involved with M&Ms examined either a deceptive or non-deceptive package design for M&Ms candy and were subsequently informed of the deception employed in the packaging before finally rating their intention to purchase. As anticipated, highly deceived subjects who were low in involvement rated intention to purchase lower than their highly involved peers. Overall, the results attest to the robustness of the model and suggest that the model has implications beyond advertising effects and into packaging effects.

  12. 16 CFR 23.1 - Deception (general).

    Science.gov (United States)

    2010-01-01

    ... misrepresent the type, kind, grade, quality, quantity, metallic content, size, weight, cut, color, character..., distribution, or any other material aspect of an industry product. Note 1 to § 23.1: If, in the sale or..., the identity of the grading system used should be disclosed. Note 2 to § 23.1: To prevent deception...

  13. What if I get busted? Deception, choice and decision-making in social interaction

    DEFF Research Database (Denmark)

    Sip, Kamila Ewa; Skewes, Joshua; Agustus, Jennifer L Marchant

    2012-01-01

    Deception is an essentially social act, yet little is known about how social consequences affect the decision to deceive. In this study, participants played a computerized game of deception without constraints on whether or when to attempt to deceive their opponent. Participants were questioned...... by an opponent outside the scanner about their knowledge of the content of a display. Importantly, questions were posed so that, in some conditions, it was possible to be deceptive, while in other conditions it was not. To simulate a realistic interaction, participants could be confronted about their claims...... findings suggest the decision to deceive is affected by the potential risk of social confrontation rather than the claim itself....

  14. 14 CFR 257.4 - Unfair and deceptive practice.

    Science.gov (United States)

    2010-01-01

    ... violation of 49 U.S.C. 41712 unless, in conjunction with such holding out or sale, carriers and ticket... Unfair and deceptive practice. The holding out or sale of scheduled passenger air transportation...

  15. How Tactile and Function Information Affect Young Children's Ability to Understand the Nature of Food-Appearing, Deceptive Objects

    Science.gov (United States)

    Krause, Christina Miles

    2008-01-01

    Preschool children's (N = 64) ability to use tactile information and function cues on less-realistic and more-realistic food-appearing, deceptive objects was examined before and after training on the function of deceptive objects. They also responded to appearance and reality questions about deceptive objects. Half of the children (F-S:…

  16. Web Of Deception: Misinformation On The Internet | Chete ...

    African Journals Online (AJOL)

    Web Of Deception: Misinformation On The Internet. ... Parodies/spoofs, malicious misinformation, promotion of false products on commercial sites, ... greatly reduced since most people do not believe every information they read on the internet, ...

  17. How children with head injury represent real and deceptive emotion in short narratives.

    Science.gov (United States)

    Dennis, M; Barnes, M A; Wilkinson, M; Humphreys, R P

    1998-02-15

    Narratives are not only about events, but also about the emotions those events elicit. Understanding a narrative involves not just the affective valence of implied emotional states, but the formation of an explicit mental representation of those states. In turn, this representation provides a mechanism that particularizes emotion and modulates its display, which then allows emotional expression to be modified according to particular contexts. This includes understanding that a character may feel an emotion but inhibit its display or even express a deceptive emotion. We studied how 59 school-aged children with head injury and 87 normally-developing age-matched controls understand real and deceptive emotions in brief narratives. Children with head injury showed less sensitivity than controls to how emotions are expressed in narratives. While they understood the real emotions in the text, and could recall what provoked the emotion and the reason for concealing it, they were less able than controls to identify deceptive emotions. Within the head injury group, factors such as an earlier age at head injury and frontal lobe contusions were associated with poor understanding of deceptive emotions. The results are discussed in terms of the distinction between emotions as felt and emotions as a cognitive framework for understanding other people's actions and mental states. We conclude that children with head injury understand emotional communication, the spontaneous externalization of real affect, but not emotive communication, the conscious, strategic modification of affective signals to influence others through deceptive facial expressions.

  18. A search for the volcanomagnetic signal at Deception volcano (South Shetland I., Antarctica

    Directory of Open Access Journals (Sweden)

    J. M. Ibáñez

    1997-06-01

    Full Text Available After the increase in seismic activity detected during the 1991-1992 summer survey at Deception Island, the continuous measurement of total magnetic intensity was included among the different techniques used to monitor this active volcano. The Polish geomagnetic observatory Arctowski, located on King George Island, served as a reference station, and changes in the differences between the daily mean values at both stations were interpreted as indicators of volcanomagnetic effects at Deception. A magnetic station in continuous recording mode was also installed during the 1993-1994 and 1994-1995 surveys. During the latter, a second magnetometer was deployed on Deception Island, and a third one in the vicinity of the Spanish Antarctic Station on Livingston Island (at a distance of 35 km and was used as a reference station. The results from the first survey suggest that a small magma injection, responsible for the seismic re-activation, could produce a volcanomagnetic effect, detected as a slight change in the difference between Deception and Arctowski. On the other hand, a long term variation starting at that moment seems to indicate a thermomagnetic effect. However the short register period of only two stations do not allow the sources to be modelled. The future deployment of a magnetic array during the austral summer surveys, throughout the volcano, and of a permanent geomagnetic observatory at Livingston I. is aimed at further observations of magnetic transients of volcanic origin at Deception Island.

  19. Cortical network during deception detection by functional neuroimaging

    International Nuclear Information System (INIS)

    Saito, Keiichi

    2008-01-01

    We examined the coherence of cortical network during deception detection. First, we performed combined EEG-MRI experiments during the Guilty Knowledge Test (GKT) using number cards which has been used to model deception and 5 right-handed healthy participants performed the experiment. The superior frontal gyrus, the anterior cingulate cortex and the inferior parietal lobule were activated and the P 300 event-related brain potential (300-450 ms) was detected at only 'Lie' card. Secondary, we measured magnetoencephalography (MEG) data during GKT and the other 5 right-handed healthy subjects participated in the next experiment. The coherence between the superior frontal gyrus and the inferior parietal lobule showed significant differences between 'Lie' card and 'truth' cards during P 300 emerging. This results indicates that the coherence of cortical network is useful for GKT. (author)

  20. A game theoretic investigation of deception in network security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Grosu, Daniel

    2010-12-03

    We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. Finally, we discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network.

  1. An examination of motor and perceptual contributions to the recognition of deception from others' actions

    NARCIS (Netherlands)

    Canal Bruland, R.; van der Kamp, J.; van Kesteren, J.

    2010-01-01

    Most empirical studies thus far have confounded motor and perceptual experience when examining their contributions to the recognition of deceptive and non-deceptive intentions from another person's movements. In the present study, we manipulated viewing perspective as an additional demarcation to

  2. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Science.gov (United States)

    2010-01-01

    ... misrepresentation as to source or origin (e.g., “Colorado Blue Spruce,” “Arizona Cypress,” “Black Hills Spruce... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is...

  3. Statistical deception at work

    CERN Document Server

    Mauro, John

    2013-01-01

    Written to reveal statistical deceptions often thrust upon unsuspecting journalists, this book views the use of numbers from a public perspective. Illustrating how the statistical naivete of journalists often nourishes quantitative misinformation, the author's intent is to make journalists more critical appraisers of numerical data so that in reporting them they do not deceive the public. The book frequently uses actual reported examples of misused statistical data reported by mass media and describes how journalists can avoid being taken in by them. Because reports of survey findings seldom g

  4. Subarray-based FDA radar to counteract deceptive ECM signals

    Science.gov (United States)

    Abdalla, Ahmed; Wang, Wen-Qin; Yuan, Zhao; Mohamed, Suhad; Bin, Tang

    2016-12-01

    In recent years, the frequency diverse array (FDA) radar concept has attracted extensive attention, as it may benefit from a small frequency increment, compared to the carrier frequency across the array elements and thereby achieve an array factor that is a function of the angle, the time, and the range which is superior to the conventional phase array radar (PAR). However, limited effort on the subject of FDA in electronic countermeasure scenarios, especially in the presence of mainbeam deceptive jamming, has been published. Basic FDA is not desirable for anti-jamming applications, due to the range-angle coupling response of targets. In this paper, a novel method based on subarrayed FDA signal processing is proposed to counteract deceptive ECM signals. We divide the FDA array into multiple subarrays, each of which employs a distinct frequency increment. As a result, in the subarray-based FDA, the desired target can be distinguished at subarray level in joint range-angle-Doppler domain by utilizing the fact that the jammer generates false targets with the same ranges to each subarray without reparations. The performance assessment shows that the proposed solution is effective for deceptive ECM targets suppression. The effectiveness is verified by simulation results.

  5. The biology of deception: emotion and morphine.

    Science.gov (United States)

    Stefano, G B; Fricchione, G L

    1995-01-01

    The biology of deception suggests that denial-like processes are at the core of the cognitive coping. In this regard, with cognitive ability, one associates or assumes that this process occurs by way of a 'rational' mind. Such a detailed cognitive process as being rational would also lead, counter intuitively, to inactivity and or major delays in conclusion reaching. Thus, our perceived rationality may also be a deceptive behavioral response. Of equal noteworthyness, man is also 'emotional'. We surmise that emotion represents the pre-cognitive short-cut to overcome this potential for excessive rationality. In this light, we may explain certain psychiatric disorders such as obsessive-compulsive behavior as emotional extremes dealing with cognitive habits used to bind anxiety operating most probably at the pre-cognitive level. Given recent discoveries in neuroimmunology and an understanding of naturally occurring morphine as both an immune and neurological down-regulatory substance we hypothesize that abnormalities associated with emotional extremes may be due, in part, to morphinergic imbalances.

  6. The Ethics of Military Deception

    Science.gov (United States)

    1998-06-05

    comment directly on the moral dimensions of military deception is the great Roman orator, Marcus Tullius Cicero (106-43 B.C.). Of paramount...action is to be commended, if what is 1 Marcus Tullius Cicero, De Officiis, I.xiii.40, trans. Walter Miller (Cambridge: Harvard University Press, 1913... Aurelius Augustinus (A.D. 354-430), later known as Saint Augustine, the Catholic bishop of Hippo in North Africa, is in many ways the pivotal

  7. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    Science.gov (United States)

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  8. Destination memory and deception: when I lie to Barack Obama about the moon.

    Science.gov (United States)

    Haj, Mohamad El; Saloppé, Xavier; Nandrino, Jean Louis

    2018-05-01

    This study investigates whether deceivers demonstrate high memory of the person to whom lies have been told (i.e., high destination memory). Participants were asked to tell true information (e.g., the heart is a vital organ) and false information (e.g., the moon is bigger than the sun) to pictures of famous people (e.g., Barack Obama) and, in a subsequent recognition test, they had to remember to whom each type of information had previously been told. Participants were also assessed on a deception scale to divide them into two populations (i.e., those with high vs. those with low deception). Participants with high tendency to deceive demonstrated similar destination memory for both false and true information, whereas those with low deception demonstrated higher destination memory for lies than for true information. Individuals with a high tendency to deceive seem to keep track of the destination of both true information and lies to be consistent in their future social interactions, and thus to avoid discovery of their deception. However, the inconsistency between deceiving and the moral standard of individuals with a low tendency to deceive may result in high destination memory in these individuals.

  9. Using G-Theory to Enhance Evidence of Reliability and Validity for Common Uses of the Paulhus Deception Scales.

    Science.gov (United States)

    Vispoel, Walter P; Morris, Carrie A; Kilinc, Murat

    2018-01-01

    We applied a new approach to Generalizability theory (G-theory) involving parallel splits and repeated measures to evaluate common uses of the Paulhus Deception Scales based on polytomous and four types of dichotomous scoring. G-theory indices of reliability and validity accounting for specific-factor, transient, and random-response measurement error supported use of polytomous over dichotomous scores as contamination checks; as control, explanatory, and outcome variables; as aspects of construct validation; and as indexes of environmental effects on socially desirable responding. Polytomous scoring also provided results for flagging faking as dependable as those when using dichotomous scoring methods. These findings argue strongly against the nearly exclusive use of dichotomous scoring for the Paulhus Deception Scales in practice and underscore the value of G-theory in demonstrating this. We provide guidelines for applying our G-theory techniques to other objectively scored clinical assessments, for using G-theory to estimate how changes to a measure might improve reliability, and for obtaining software to conduct G-theory analyses free of charge.

  10. Non-invasive brain stimulation in the detection of deception: scientific challenges and ethical consequences.

    Science.gov (United States)

    Luber, Bruce; Fisher, Carl; Appelbaum, Paul S; Ploesser, Marcus; Lisanby, Sarah H

    2009-01-01

    Tools for noninvasive stimulation of the brain, such as transcranial magnetic stimulation (TMS) and transcranial direct current stimulation (tDCS), have provided new insights in the study of brain-behavior relationships due to their ability to directly alter cortical activity. In particular, TMS and tDCS have proven to be useful tools for establishing causal relationships between behavioral and brain imaging measures. As such, there has been interest in whether these tools may represent novel technologies for deception detection by altering a person's ability to engage brain networks involved in conscious deceit. Investigation of deceptive behavior using noninvasive brain stimulation is at an early stage. Here we review the existing literature on the application of noninvasive brain stimulation in the study of deception. Whether such approaches could be usefully applied to the detection of deception by altering a person's ability to engage brain networks involved in conscious deceit remains to be validated. Ethical and legal consequences of the development of such a technology are discussed. Copyright 2009 John Wiley & Sons, Ltd.

  11. Group Performance in Military Scenarios Under Deceptive Conditions

    National Research Council Canada - National Science Library

    Hass, Michael

    2004-01-01

    .... The analysis of the post-game surveys showed support for participants in games using a face-to-face communication method to have lower perceptions of deception and task difficulty when compared to games using real-time plain text chat.

  12. Mechanisms and evolution of deceptive pollination in orchids

    Czech Academy of Sciences Publication Activity Database

    Jersáková, Jana; Johnson, S.D.; Kindlmann, Pavel

    2006-01-01

    Roč. 81, - (2006), s. 219-235 ISSN 1464-7931 Institutional research plan: CEZ:AV0Z60870520 Keywords : cross-pollination * floral deception * geitonogamy * inbreeding * nectar * Orchidaceae * pollinaria * reward * self-pollination Subject RIV: EF - Botanics Impact factor: 5.565, year: 2006

  13. The contribution of self-deceptive enhancement to display rules in the United States and Japan.

    Science.gov (United States)

    Chung, Joanne M

    2012-03-01

    Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings highlight the role of self-deceptive enhancement in contributing to expressive display rules and support the point of view that socially desirable responding is a reflection of one's personality and culture rather than a statistical nuisance.

  14. The application of fractional Mel cepstral coefficient in deceptive speech detection.

    Science.gov (United States)

    Pan, Xinyu; Zhao, Heming; Zhou, Yan

    2015-01-01

    The inconvenience operation of EEG P300 or functional magnetic resonance imaging (FMRI) will be overcome, when the deceptive information can be effectively detected from speech signal analysis. In this paper, the fractional Mel cepstral coefficient (FrCC) is proposed as the speech character for deception detection. The different fractional order can reveal various personalities of the speakers. The linear discriminant analysis (LDA) model (which has the ability of global optimal vector mapping) is introduced, and the performance of FrCC and MFCC in deceptive detection is compared when all the data are mapped to low dimensional. Then, the hidden Markov model (HMM) is introduced as a long-term signal analysis tool. Twenty-five male and 25 female participants are involved in the experiment. The results show that the clustering effect of optimal fractional order FrCC is better than that of MFCC. The average accuracy for male and female speaker is 59.9% and 56.2%, respectively, by using the FrCC under the LDA model. When MFCC is used, the accuracy is reduced by 3.2% and 5.9%, respectively, for male and female. The accuracy can be increased to 71.0% and 70.2% for male and female speakers when HMM is used. Moreover, some individual accuracy is increased over 20%, or even more than 85%, when FrCC is introduced. The results show that the deceptive information is indeed hidden in the speech signals. Therefore, speech-based psychophysiology calculating may be a valuable research field.

  15. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management.

    Science.gov (United States)

    Luo, Qiang; Ma, Yina; Bhatt, Meghana A; Montague, P Read; Feng, Jianfeng

    2017-01-01

    Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN), which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition.

  16. In Defense of Children's Lies: On Ethics and Methods of Studying Children's Communication of Deception.

    Science.gov (United States)

    Feldman, Robert S.

    Studies of children's deceptive behavior have scientific merit and can be carried out in an ethically defensible manner. Many arguments against studies requiring children to deceive others in an experimental context are relatively easy to refute. It is true, though, that the debriefing phase of deception studies presents ethical problems,…

  17. DOES THE INFERIOR FRONTAL SULCUS PLAY A FUNCTIONAL ROLE IN DECEPTION? A NEURONAVIGATED THETA-BURST TRANSCRANIAL MAGNETIC STIMULATION STUDY

    Directory of Open Access Journals (Sweden)

    Bruno eVerschuere

    2012-10-01

    Full Text Available Background. By definition, lying involves withholding the truth. Response inhibition may therefore be the cognitive function at the heart of deception. Neuroimaging research has shown that the same brain region that is activated during response inhibition tasks, namely the inferior frontal region, is also activated during deception paradigms. This led to the hypothesis that the inferior frontal region is the neural substrate critically involved in withholding the truth. Objective. We critically examine the functional necessity of the inferior frontal region in withholding the truth during deception. Method. We experimentally manipulated the neural activity level in right inferior frontal sulcus (IFS by means of neuronavigated continuous theta burst stimulation (cTBS. Individual structural magnetic resonance brain images (MRI were used to allow precise stimulation in each participant. Twenty-six participants answered autobiographical questions truthfully or deceptively before and after sham and real cTBS. Results. Deception was reliably associated with more errors, longer and more variable response times than truth telling. Despite the potential role of IFS in deception as suggested by neuroimaging data, the cTBS-induced disruption of right IFS did not affect response times or error rates, when compared to sham stimulation. Conclusions. The present findings do not support the hypothesis that the right inferior frontal sulcus is critically involved in deception.

  18. Authority, Autonomy, and Deception: Evaluating the Legitimacy of Parental Authority and Adolescent Deceit.

    Science.gov (United States)

    Gingo, Matthew; Roded, Alona D; Turiel, Elliot

    2017-12-01

    This research examined adolescents' judgments about lying to avoid parental control over different types of activities. Participants (N = 66, M age  = 16.38, 73% European American) were interviewed about hypothetical situations describing adolescents who defied parental directives and lied about their defiance. Judgments about the legitimacy of parents' directives and protagonists' deception differed by types of parent relationship with adolescents (mutual or unilateral). Directives were least accepted, and deception was most accepted, in the context of unilateral relationships. Judgments also differed by domain of the action (personal, prudential, or conventional). Participants were least accepting of parental directives, and most accepting of deception about personal activities. Findings indicate that adolescents value honesty and parental authority, but sometimes give priority to concerns with autonomy and mutuality. © 2017 The Authors. Journal of Research on Adolescence © 2017 Society for Research on Adolescence.

  19. Stimulating the Right Temporoparietal Junction with tDCS Decreases Deception in Moral Hypocrisy and Unfairness

    Directory of Open Access Journals (Sweden)

    Honghong Tang

    2017-11-01

    Full Text Available Self-centered and other-regarding concerns play important roles in decisions of deception. To investigate how these two motivations affect deception in fairness related moral hypocrisy, we modulated the brain activity in the right temporoparietal junction (rTPJ, the key region for decision making involved in self-centered and other-regarding concerns. After receiving brain stimulation with transcranial direct current stimulation (tDCS, participants finished a modified dictator game. In the game, they played as proposers to make allocations between themselves and recipients and had a chance to deceive by misreporting their totals for allocations. Results show that deception in moral hypocrisy was decreased after anodal stimulation than sham and cathodal stimulation, only when participants know that their reported totals (appearing fair would be revealed to recipients rather than being unrevealed. Anodal stimulation also increased offers to recipients than cathodal stimulation regardless of the revelation of reported totals. These findings suggest that enhancing the activity of rTPJ decreased deception caused by impression management rather than self-deception in moral hypocrisy and unfairness through facilitating other-regarding concerns and weakening non-material self-centered motivations. They provide causal evidence for the role of rTPJ in both other-regarding concerns and non-material self-centered motivations, shedding light on the way to decrease moral hypocrisy.

  20. A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

    OpenAIRE

    Pawlick, Jeffrey; Colbert, Edward; Zhu, Quanyan

    2017-01-01

    Cyber attacks on both databases and critical infrastructure have threatened public and private sectors. Meanwhile, ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this paper, we survey 24 articles from 200...

  1. Extended Research on Detection of Deception Using Volatile Organic Compound (VOC) Emissions

    Energy Technology Data Exchange (ETDEWEB)

    Center for Human Reliability Studies

    2006-06-01

    A system that captures and analyzes volatile organic compound (VOC) emissions from skin surfaces may offer a viable alternative method to the polygraph instrument currently in use for detecting deception in U.S. government settings. Like the involuntary autonomic central nervous system response data gathered during polygraph testing, VOC emissions from the skin may provide data that can be used to detect stress caused by deception. Detecting VOCs, then, may present a noninvasive, non-intrusive method for observing, recording, and quantifying evidence of stress or emotional change.

  2. Approximate design theory for a simple block design with random block effects

    OpenAIRE

    Christof, Karin

    1985-01-01

    Approximate design theory for a simple block design with random block effects / K. Christof ; F. Pukelsheim. - In: Linear statistical inference / ed. by T. Calinski ... - Berlin u. a. : Springer, 1985. - S. 20-28. - (Lecture notes in statistics ; 35)

  3. Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    OpenAIRE

    Huang, TonTon Hsien-De; Yu, Chia-Mu; Kao, Hung-Yu

    2017-01-01

    The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake ads that tricks users to install unnecessary apps via either alluring or daunting texts and pictur...

  4. Perceptual training effects on anticipation of direct and deceptive 7-m throws in handball.

    Science.gov (United States)

    Alsharji, Khaled E; Wade, Michael G

    2016-01-01

    We examined the effectiveness of perceptual training on the performance of handball goalkeepers when anticipating the direction of both direct and deceptive 7-m throws. Skilled goalkeepers were assigned equally to three matched-ability groups based on their pre-test performance: a perceptual training group (n = 14) received video-based perceptual training, a placebo training group (n = 14) received video-based regular training and a control group received no training. Participants in the perceptual training group significantly improved their performance compared to both placebo and control groups; however, anticipation of deceptive throws improved less than for direct throws. The results confirm that although anticipating deception in handball is a challenging task for goalkeepers, task-specific perceptual training can minimise its effect and improve performance.

  5. Effects of deception in social networks.

    Science.gov (United States)

    Iñiguez, Gerardo; Govezensky, Tzipe; Dunbar, Robin; Kaski, Kimmo; Barrio, Rafael A

    2014-09-07

    Honesty plays a crucial role in any situation where organisms exchange information or resources. Dishonesty can thus be expected to have damaging effects on social coherence if agents cannot trust the information or goods they receive. However, a distinction is often drawn between prosocial lies ('white' lies) and antisocial lying (i.e. deception for personal gain), with the former being considered much less destructive than the latter. We use an agent-based model to show that antisocial lying causes social networks to become increasingly fragmented. Antisocial dishonesty thus places strong constraints on the size and cohesion of social communities, providing a major hurdle that organisms have to overcome (e.g. by evolving counter-deception strategies) in order to evolve large, socially cohesive communities. In contrast, white lies can prove to be beneficial in smoothing the flow of interactions and facilitating a larger, more integrated network. Our results demonstrate that these group-level effects can arise as emergent properties of interactions at the dyadic level. The balance between prosocial and antisocial lies may set constraints on the structure of social networks, and hence the shape of society as a whole. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  6. Deception Detection: The Relationship of Levels of Trust and Perspective Taking in Real-Time Online and Offline Communication Environments.

    Science.gov (United States)

    Friend, Catherine; Fox Hamilton, Nicola

    2016-09-01

    Where humans have been found to detect lies or deception only at the rate of chance in offline face-to-face communication (F2F), computer-mediated communication (CMC) online can elicit higher rates of trust and sharing of personal information than F2F. How do levels of trust and empathetic personality traits like perspective taking (PT) relate to deception detection in real-time CMC compared to F2F? A between groups correlational design (N = 40) demonstrated that, through a paired deceptive conversation task with confederates, levels of participant trust could predict accurate detection online but not offline. Second, participant PT abilities could not predict accurate detection in either conversation medium. Finally, this study found that conversation medium also had no effect on deception detection. This study finds support for the effects of the Truth Bias and online disinhibition in deception, and further implications in law enforcement are discussed.

  7. Anaplasma phagocytophilum: deceptively simple or simply deceptive?

    Czech Academy of Sciences Publication Activity Database

    Severo, M. S.; Stephens, K. D.; Kotsyfakis, Michalis; Pedra, J. H. F.

    2012-01-01

    Roč. 7, č. 6 (2012), s. 719-731 ISSN 1746-0913 Institutional support: RVO:60077344 Keywords : obligate intracellular bacterium * rickettsial agents * ticks * vector-borne diseases Subject RIV: GJ - Animal Vermins ; Diseases, Veterinary Medicine Impact factor: 4.018, year: 2012

  8. The Role of Power and Negotiation in Online Deception

    Directory of Open Access Journals (Sweden)

    Chad Albrecht

    2006-12-01

    Full Text Available The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception.  By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet on the communication process that takes place between perpetrator and victim. Finally, the article discusses some of the major tactics employed to appeal to each power type in predominant fraud forms, as well exploring future types of fraud.

  9. Least squares estimation in a simple random coefficient autoregressive model

    DEFF Research Database (Denmark)

    Johansen, S; Lange, T

    2013-01-01

    The question we discuss is whether a simple random coefficient autoregressive model with infinite variance can create the long swings, or persistence, which are observed in many macroeconomic variables. The model is defined by yt=stρyt−1+εt,t=1,…,n, where st is an i.i.d. binary variable with p...... we prove the curious result that View the MathML source. The proof applies the notion of a tail index of sums of positive random variables with infinite variance to find the order of magnitude of View the MathML source and View the MathML source and hence the limit of View the MathML source...

  10. Managing Uncertainity: Soviet Views on Deception, Surprise, and Control

    National Research Council Canada - National Science Library

    Hull, Andrew

    1989-01-01

    .... In the first two cases (deception and surprise), the emphasis is on how the Soviets seek to sow uncertainty in the minds of the enemy and how the Soviets then plan to use that uncertainty to gain military advantage...

  11. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management

    Directory of Open Access Journals (Sweden)

    Qiang Luo

    2017-11-01

    Full Text Available Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN, which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition.

  12. Emotional Intelligence and Mismatching Expressive and Verbal Messages: A Contribution to Detection of Deception

    Science.gov (United States)

    Wojciechowski, Jerzy; Stolarski, Maciej; Matthews, Gerald

    2014-01-01

    Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI). However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test) that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception. PMID:24658500

  13. Emotional intelligence and mismatching expressive and verbal messages: a contribution to detection of deception.

    Directory of Open Access Journals (Sweden)

    Jerzy Wojciechowski

    Full Text Available Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI. However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception.

  14. Worthless donations: male deception and female counter play in a nuptial gift-giving spider.

    Science.gov (United States)

    Albo, Maria J; Winther, Gudrun; Tuni, Cristina; Toft, Søren; Bilde, Trine

    2011-11-14

    In nuptial gift-giving species, benefits of acquiring a mate may select for male deception by donation of worthless gifts. We investigated the effect of worthless gifts on mating success in the spider Pisaura mirabilis. Males usually offer an insect prey wrapped in silk; however, worthless gifts containing inedible items are reported. We tested male mating success in the following experimental groups: protein enriched fly gift (PG), regular fly gift (FG), worthless gift (WG), or no gift (NG). Males that offered worthless gifts acquired similar mating success as males offering nutritional gifts, while males with no gift experienced reduced mating success. The results suggest that strong selection on the nuptial gift-giving trait facilitates male deception by donation of worthless gifts. Females terminated matings faster when males offered worthless donations; this demonstrate a cost of deception for the males as shorter matings lead to reduced sperm transfer and thus give the deceiving males a disadvantage in sperm competition. We propose that the gift wrapping trait allows males to exploit female foraging preference by disguising the gift content thus deceiving females into mating without acquiring direct benefits. Female preference for a genuine prey gift combined with control over mating duration, however, counteracts the male deception.

  15. Detecting deception in movement: the case of the side-step in rugby.

    Directory of Open Access Journals (Sweden)

    Sébastien Brault

    Full Text Available Although coordinated patterns of body movement can be used to communicate action intention, they can also be used to deceive. Often known as deceptive movements, these unpredictable patterns of body movement can give a competitive advantage to an attacker when trying to outwit a defender. In this particular study, we immersed novice and expert rugby players in an interactive virtual rugby environment to understand how the dynamics of deceptive body movement influence a defending player's decisions about how and when to act. When asked to judge final running direction, expert players who were found to tune into prospective tau-based information specified in the dynamics of 'honest' movement signals (Centre of Mass, performed significantly better than novices who tuned into the dynamics of 'deceptive' movement signals (upper trunk yaw and out-foot placement (p<.001. These findings were further corroborated in a second experiment where players were able to move as if to intercept or 'tackle' the virtual attacker. An analysis of action responses showed that experts waited significantly longer before initiating movement (p<.001. By waiting longer and picking up more information that would inform about future running direction these experts made significantly fewer errors (p<.05. In this paper we not only present a mathematical model that describes how deception in body-based movement is detected, but we also show how perceptual expertise is manifested in action expertise. We conclude that being able to tune into the 'honest' information specifying true running action intention gives a strong competitive advantage.

  16. Modulation of financial deprivation on deception and its neural correlates.

    Science.gov (United States)

    Sun, Peng; Ling, Xiaoli; Zheng, Li; Chen, Jia; Li, Lin; Liu, Zhiyuan; Cheng, Xuemei; Guo, Xiuyan

    2017-11-01

    Deception is a universal phenomenon in human society and plays an important role in everyday life. Previous studies have revealed that people might have an internalized moral norm of keeping honest and the deceptive behavior was reliably correlated with activation in executive brain regions of prefrontal cortices to over-ride intuitive honest responses. Using functional magnetic resonance imaging, this study sought to investigate how financial position modulated the neural responses during deceptive decision. Twenty-one participants were scanned when they played a series of adapted Dictator Game with different partners after a ball-guess game. Specifically, participants gained or lost money in the ball-guess game, and had opportunities to get more financial gains through cheating in the following adapted Dictator Game. Behavioral results indicated that participants did not cheat to the full extent; instead they were more likely to lie after losing money compared with gaining money. At the neural level, weaker activities in the dorsolateral prefrontal cortices were observed when participants lied after losing money than gaining money. Together, our data indicated that, people really had an internalized norm of keeping honest, but it would be lenient when people feel financial deprivation. And suppressing the truthful response originating from moral norm of keeping honest was associated with increased level of activation in the dorsolateral prefrontal cortices, but this association became weaker when people were under financial deprivation.

  17. 17 CFR 240.10b-3 - Employment of manipulative and deceptive devices by brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... deceptive devices by brokers or dealers. 240.10b-3 Section 240.10b-3 Commodity and Securities Exchanges... Contrivances § 240.10b-3 Employment of manipulative and deceptive devices by brokers or dealers. (a) It shall be unlawful for any broker or dealer, directly or indirectly, by the use of any means or...

  18. Deception in experiments: revisiting the arguments in its defense

    Czech Academy of Sciences Publication Activity Database

    Hertwig, R.; Ortmann, Andreas

    2008-01-01

    Roč. 18, č. 1 (2008), s. 59-92 ISSN 1050-8422 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : deception * experimental control * research ethics Subject RIV: AH - Economics Impact factor: 0.512, year: 2008

  19. Games Con Men Play: The Semiosis of Deceptive Interaction.

    Science.gov (United States)

    Hankiss, Agnes

    1980-01-01

    Analyzes some of the most frequent deceptive interactions as rendered through case histories of male con artists and their victims taken from police records. Discusses the recurrent elements in both the con-games strategies and victims' way of interpreting those strategies. (JMF)

  20. 16 CFR 424.1 - Unfair or deceptive acts or practices.

    Science.gov (United States)

    2010-01-01

    ... ADVERTISING AND MARKETING PRACTICES § 424.1 Unfair or deceptive acts or practices. In connection with the sale... advertisement, if those stores do not have the advertised products in stock and readily available to customers...

  1. On the Runtime of Randomized Local Search and Simple Evolutionary Algorithms for Dynamic Makespan Scheduling

    DEFF Research Database (Denmark)

    Neumann, Frank; Witt, Carsten

    2015-01-01

    combinatorial optimization problem, namely makespan scheduling. We study the model of a strong adversary which is allowed to change one job at regular intervals. Furthermore, we investigate the setting of random changes. Our results show that randomized local search and a simple evolutionary algorithm are very...

  2. A Mosaic of Geothermal and Marine Features Shapes Microbial Community Structure on Deception Island Volcano, Antarctica

    Directory of Open Access Journals (Sweden)

    Amanda G. Bendia

    2018-05-01

    Full Text Available Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, and geochemistry in polar marine volcanoes. Thereby, we collected surface sediment samples associated with fumaroles and glaciers at two sites on Deception, with temperatures ranging from 0 to 98°C. Sequencing of the 16S rRNA gene was performed to assess the composition and diversity of Bacteria and Archaea. Our results revealed that Deception harbors a combination of taxonomic groups commonly found both in cold and geothermal environments of continental Antarctica, and also groups normally identified at deep and shallow-sea hydrothermal vents, such as hyperthermophilic archaea. We observed a clear separation in microbial community structure across environmental gradients, suggesting that microbial community structure is strongly niche driven on Deception. Bacterial community structure was significantly associated with temperature, pH, salinity, and chemical composition; in contrast, archaeal community structure was strongly associated only with temperature. Our work suggests that Deception represents a peculiar “open-air” laboratory to elucidate central questions regarding molecular adaptability, microbial evolution, and biogeography of extremophiles in polar regions.

  3. Gotcha! Findings from an exploratory investigation on the dangers of using deceptive practices in the mail-order business

    NARCIS (Netherlands)

    Vanhamme, J.; Lindgreen, A.

    2001-01-01

    This exploratory investigation examines the impact of some Belgian mail-order companies' deceptive practices - specifically, the use of gifts - on long-term relationships with their customers. The results support the premise that the use of deceptive gifts first elicits negative surprise and,

  4. The contribution of self-deceptive enhancement to display rules in the United States and Japan

    OpenAIRE

    Chung, Joanne M.

    2012-01-01

    Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings hig...

  5. A sacred command of reason? Deceit, deception, and dishonesty in nurse education.

    Science.gov (United States)

    Rolfe, Gary

    2016-07-01

    Kant (Grounding for the Metaphysics of Morals. Hackett, Indianapolis, 1797) described honesty as 'a sacred command of reason' which should be obeyed at all times and at any cost. This study inquires into the practice of dishonesty, deception, and deceit by universities in the UK in the pursuit of quality indicators such as league table positions, Research Excellence Framework (REF) scores, and student satisfaction survey results. Deception occurs when the metrics which inform these tables and surveys are manipulated to suggest an improvement in quality when, in fact, the raised scores are merely the result of clever strategic planning. Deceit occurs when these manipulated scores are deliberately and knowingly presented as real improvements in research and educational quality. It might be argued that, within the context of the artificial ivory tower world of academe, this is a game played by almost every academic in every higher education institution with no real losers and little wider consequence. However, this study suggests that some of the strategies employed by institutions to improve their scores without directly addressing the issue of quality can, in certain practice-based disciplines such as nursing, result in dire consequences for practitioners and service users. It concludes with a number of suggestions taken from personal experience to resolve the tension between the contractual demands placed on nurse academics by their employers and the moral and practical obligations of their professional body, most notably the use of subversion. The conclusion, contra Kant, is that the most effective strategy against dishonesty and deception is often more dishonesty and deception. © 2016 John Wiley & Sons Ltd.

  6. An Examination of Behavioral Responses to Stereotypical Deceptive Displays.

    Science.gov (United States)

    Huddleston, Bill M.

    A study investigated whether receivers who detect senders behaving deceitfully will automatically become more resistent to the message being presented. By developing predictions derived from the Elaboration Likelihood Model (ELM), the study hypothesized that only noninvolved receivers would respond negatively to deceptive nonverbal cues in a…

  7. “Time for Some Traffic Problems": Enhancing E-Discovery and Big Data Processing Tools with Linguistic Methods for Deception Detection

    Directory of Open Access Journals (Sweden)

    Erin Smith Crabb

    2014-09-01

    Full Text Available Linguistic deception theory provides methods to discover potentially deceptive texts to make them accessible to clerical review. This paper proposes the integration of these linguistic methods with traditional e-discovery techniques to identify deceptive texts within a given author’s larger body of written work, such as their sent email box. First, a set of linguistic features associated with deception are identified and a prototype classifier is constructed to analyze texts and describe the features’ distributions, while avoiding topic-specific features to improve recall of relevant documents. The tool is then applied to a portion of the Enron Email Dataset to illustrate how these strategies identify records, providing an example of its advantages and capability to stratify the large data set at hand.

  8. Functional treatment versus plaster for simple elbow dislocations (FuncSiE: a randomized trial

    Directory of Open Access Journals (Sweden)

    Verleisdonk Egbert JMM

    2010-11-01

    Full Text Available Abstract Background Elbow dislocations can be classified as simple or complex. Simple dislocations are characterized by the absence of fractures, while complex dislocations are associated with fractures. After reduction of a simple dislocation, treatment options include immobilization in a static plaster for different periods of time or so-called functional treatment. Functional treatment is characterized by early active motion within the limits of pain with or without the use of a sling or hinged brace. Theoretically, functional treatment should prevent stiffness without introducing increased joint instability. The primary aim of this randomized controlled trial is to compare early functional treatment versus plaster immobilization following simple dislocations of the elbow. Methods/Design The design of the study will be a multicenter randomized controlled trial of 100 patients who have sustained a simple elbow dislocation. After reduction of the dislocation, patients are randomized between a pressure bandage for 5-7 days and early functional treatment or a plaster in 90 degrees flexion, neutral position for pro-supination for a period of three weeks. In the functional group, treatment is started with early active motion within the limits of pain. Function, pain, and radiographic recovery will be evaluated at regular intervals over the subsequent 12 months. The primary outcome measure is the Quick Disabilities of the Arm, Shoulder, and Hand score. The secondary outcome measures are the Mayo Elbow Performance Index, Oxford elbow score, pain level at both sides, range of motion of the elbow joint at both sides, rate of secondary interventions and complication rates in both groups (secondary dislocation, instability, relaxation, health-related quality of life (Short-Form 36 and EuroQol-5D, radiographic appearance of the elbow joint (degenerative changes and heterotopic ossifications, costs, and cost-effectiveness. Discussion The successful

  9. Cognitive Biases and Nonverbal Cue Availability in Detecting Deception

    Science.gov (United States)

    Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E.

    2008-01-01

    In potentially deceptive situations, people rely on mental shortcuts to help process information. These heuristic judgments are often biased and result in inaccurate assessments of sender veracity. Four such biases--truth bias, visual bias, demeanor bias, and expectancy violation bias--were examined in a judgment experiment that varied nonverbal…

  10. Improvements in Cycling Time Trial Performance Are Not Sustained Following the Acute Provision of Challenging and Deceptive Feedback

    Directory of Open Access Journals (Sweden)

    Hollie S Jones

    2016-09-01

    Full Text Available TThe provision of performance-related feedback during exercise is acknowledged as an influential external cue used to inform pacing decisions. The provision of this feedback in a challenging or deceptive context allows research to explore how feedback can be used to improve performance and influence perceptual responses. However, the effects of deception on both acute and residual responses have yet to be explored, despite potential application for performance enhancement. Therefore, this study investigated the effects of challenging and deceptive feedback on perceptual responses and performance in self-paced cycling time trials (TT and explored whether changes in performance are sustained in a subsequent TT following the disclosure of the deception.Seventeen trained male cyclists were assigned to either an accurate or deceptive feedback group and performed four 16.1 km cycling TTs; 1 and 2 ride-alone baseline TTs where a fastest baseline (FBL performance was identified, 3 a TT against a virtual avatar representing 102% of their FBL performance (PACER, and 4 a subsequent ride-alone TT (SUB. The deception group, however, were initially informed that the avatar accurately represented their FBL, but prior to SUB were correctly informed of the nature of the avatar. Affect, self-efficacy and RPE were measured every quartile. Both groups performed PACER faster than FBL and SUB (p < 0.05 and experienced lower affect (p = 0.016, lower self-efficacy (p = 0.011, and higher RPE (p < 0.001 in PACER than FBL. No significant differences were found between FBL and SUB for any variable. The presence of the pacer rather than the manipulation of performance beliefs acutely facilitates TT performance and perceptual responses. Revealing that athletes’ performance beliefs were falsely negative due to deceptive feedback provision has no effect on subsequent perceptions or performance. A single experiential exposure may not be sufficient to produce meaningful

  11. 75 FR 23565 - Unfair or Deceptive Acts or Practices; Amendment

    Science.gov (United States)

    2010-05-04

    ... are subsumed within, though not identical to, the protections of the Credit CARD Act and the Board's... protection, Credit, Credit cards, Deception, Intergovernmental relations, Savings associations, Trade... ``Prohibited Consumer Credit Practices'' to avoid duplication and inconsistency with the Credit Card...

  12. Action Simulation Plays a Critical Role in Deceptive Action Recognition

    NARCIS (Netherlands)

    Tidoni, Emmanuele; Borgomaneri, Sara; Di Pellegrino, Giuseppe; Avenanti, Alessio

    2013-01-01

    The ability to infer deceptive intents from nonverbal behavior is critical for social interactions. By combining single-pulse and repetitive transcranial magnetic stimulation (TMS) in healthy humans, we provide both correlational and causative evidence that action simulation is actively involved in

  13. The use of the truth and deception in dementia care amongst general hospital staff.

    Science.gov (United States)

    Turner, Alex; Eccles, Fiona; Keady, John; Simpson, Jane; Elvish, Ruth

    2017-08-01

    Deceptive practice has been shown to be endemic in long-term care settings. However, little is known about the use of deception in dementia care within general hospitals and staff attitudes towards this practice. This study aimed to develop understanding of the experiences of general hospital staff and explore their decision-making processes when choosing whether to tell the truth or deceive a patient with dementia. This qualitative study drew upon a constructivist grounded theory approach to analyse data gathered from semi-structured interviews with a range of hospital staff. A model, grounded in participant experiences, was developed to describe their decision-making processes. Participants identified particular triggers that set in motion the need for a response. Various mediating factors influenced how staff chose to respond to these triggers. Overall, hospital staff were reluctant to either tell the truth or to lie to patients. Instead, 'distracting' or 'passing the buck' to another member of staff were preferred strategies. The issue of how truth and deception are defined was identified. The study adds to the growing research regarding the use of lies in dementia care by considering the decision-making processes for staff in general hospitals. Various factors influence how staff choose to respond to patients with dementia and whether deception is used. Similarities and differences with long-term dementia care settings are discussed. Clinical and research implications include: opening up the topic for further debate, implementing staff training about communication and evaluating the impact of these processes.

  14. Sex, Lies and fMRI—Gender Differences in Neural Basis of Deception

    Science.gov (United States)

    Falkiewicz, Marcel; Szeszkowski, Wojciech; Grabowska, Anna; Szatkowska, Iwona

    2012-01-01

    Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants’ subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG). Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization. PMID:22952631

  15. Sex, lies and fMRI--gender differences in neural basis of deception.

    Directory of Open Access Journals (Sweden)

    Artur Marchewka

    Full Text Available Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants' subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG. Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization.

  16. Consumers' behavioural intentions after experiencing deception or cognitive disonance caused by deceptive packaging, package downsizing or slack filling

    OpenAIRE

    Wilkins, SJK; Beckenuyte, C; Butt, MM

    2016-01-01

    Purpose – The purpose of this study is to discover the extent to which consumers are aware of air filling in food packaging, the extent to which deceptive packaging and slack filling – which often result from package downsizing – lead to cognitive dissonance, and the extent to which feelings of cognitive dissonance and being deceived lead consumers to engage in negative post purchase behaviours. Design/methodology/approach – The study analysed respondents’ reactions to a series of images of a...

  17. Random walks and a simple chirally invariant lattice Hamiltonian without fermion doubling

    International Nuclear Information System (INIS)

    Belyea, C.I.

    1992-01-01

    It is shown that there is a simple chirally-invariant lattice Hamiltonian for fermions which is doubling-free but non-Hermitian and which may be valuable in lattice Hamiltonian studies of quantum chromodynamics. A connection is established between the existence of random walk representations of spinor propagators and this doubling-free formulation, in analogy with Wilson fermions. 15 refs

  18. 48 CFR 1652.203-70 - Misleading, deceptive, or unfair advertising.

    Science.gov (United States)

    2010-10-01

    ... unfair advertising. 1652.203-70 Section 1652.203-70 Federal Acquisition Regulations System OFFICE OF... CLAUSES Texts of FEHBP Clauses 1652.203-70 Misleading, deceptive, or unfair advertising. As prescribed in... Unfair Advertising (JAN 1991) (a) The Carrier agrees that any advertising material, including that...

  19. Temporal trends and bioavailability assessment of heavy metals in the sediments of Deception Bay, Queensland, Australia.

    Science.gov (United States)

    Brady, James P; Ayoko, Godwin A; Martens, Wayde N; Goonetilleke, Ashantha

    2014-12-15

    Thirteen sites in Deception Bay, Queensland, Australia were sampled three times over a period of 7 months and assessed for contamination by a range of heavy metals, primarily As, Cd, Cr, Cu, Pb and Hg. Fraction analysis, enrichment factors and Principal Components Analysis-Absolute Principal Component Scores (PCA-APCS) analysis were conducted in order to identify the potential bioavailability of these elements of concern and their sources. Hg and Te were identified as the elements of highest enrichment in Deception Bay while marine sediments, shipping and antifouling agents were identified as the sources of the Weak Acid Extractable Metals (WE-M), with antifouling agents showing long residence time for mercury contamination. This has significant implications for the future of monitoring and regulation of heavy metal contamination within Deception Bay. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Joseph Jastrow, the psychology of deception, and the racial economy of observation.

    Science.gov (United States)

    Pettit, Michael

    2007-01-01

    This article reconstructs the recurring themes in the career of Joseph Jastrow, both inside and outside the laboratory. His psychology of deception provides the bridge between his experimental and popular pursuits. Furthermore, Jastrow's career illustrates the complex ways in which scientific psychology and pragmatist philosophy operated within the constraints of a moral economy deeply marked by notions of "race." Psychological investigations of deception were grafted onto two of the human sciences' leading tools: the evolutionary narrative and the statistical analysis of populations. Such associations abetted the racialization of the acts of deceiving and being deceived. These connections also were used to craft moral lessons about how individuals ought to behave in relationship to the aggregate population and natural selection's endowment.

  1. Robot Lies in Health Care: When Is Deception Morally Permissible?

    Science.gov (United States)

    Matthias, Andreas

    2015-06-01

    Autonomous robots are increasingly interacting with users who have limited knowledge of robotics and are likely to have an erroneous mental model of the robot's workings, capabilities, and internal structure. The robot's real capabilities may diverge from this mental model to the extent that one might accuse the robot's manufacturer of deceiving the user, especially in cases where the user naturally tends to ascribe exaggerated capabilities to the machine (e.g. conversational systems in elder-care contexts, or toy robots in child care). This poses the question, whether misleading or even actively deceiving the user of an autonomous artifact about the capabilities of the machine is morally bad and why. By analyzing trust, autonomy, and the erosion of trust in communicative acts as consequences of deceptive robot behavior, we formulate four criteria that must be fulfilled in order for robot deception to be morally permissible, and in some cases even morally indicated.

  2. 48 CFR 2152.203-70 - Misleading, deceptive, or unfair advertising.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Misleading, deceptive, or unfair advertising. 2152.203-70 Section 2152.203-70 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL EMPLOYEES GROUP LIFE INSURANCE FEDERAL ACQUISITION REGULATION CLAUSES AND FORMS PRECONTRACT PROVISIONS AND CONTRACT...

  3. Deception and Cognitive Load: Expanding our Horizon with a Working Memory Model

    Directory of Open Access Journals (Sweden)

    Siegfried Ludwig Sporer

    2016-04-01

    Full Text Available Deception and Cognitive Load: Expanding our Horizon with a Working Memory ModelAbstractRecently, studies on deception and its detection have increased dramatically. Many of these studies rely on the cognitive load approach as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes. Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley's (2000, 2007, 2012 working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009, the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed. Predictions regarding several moderator variables and methods to investigate them are proposed.

  4. Deception, efficiency, and random groups - Psychology and the gradual origination of the random group design

    NARCIS (Netherlands)

    Dehue, T

    1997-01-01

    In the life sciences, psychology, and large parts of the other social sciences, the ideal experiment is a comparative experiment with randomly composed experimental and control groups. Historians and practitioners of these sciences generally attribute the invention of this "random group design" to

  5. Presence of Spotters Improves Bench Press Performance: A Deception Study.

    Science.gov (United States)

    Sheridan, Andrew; Marchant, David C; Williams, Emily L; Jones, Hollie S; Hewitt, Phil A; Sparks, S Andy

    2017-10-24

    Sheridan, A, Marchant, DC, Williams, EL, Jones, HS, Hewitt, PA, and Sparks, SA. Presence of spotters improves bench press performance: a deception study. J Strength Cond Res XX(X): 000-000, 2017-Resistance exercise is a widely used method of physical training in both recreational exercise and athletic populations. The use of training partners and spotters during resistance exercise is widespread, but little is known about the effect of the presence of these individuals on exercise performance. The purpose of the current study was to investigate the effect of spotter presence on bench press performance. Twelve recreationally trained participants (age, 21.3 ± 0.8 years, height, 1.82 ± 0.1 m, and weight, 84.8 ± 11.1 kg) performed 2 trials of 3 sets to failure at 60% of 1 repetition maximum on separate occasions. The 2 trials consisted of spotters being explicitly present or hidden from view (deception). During the trials, total repetitions (reps), total weight lifted, ratings of perceived exertion (RPE), and self-efficacy were measured. Total reps and weight lifted were significantly greater with spotters (difference = 4.5 reps, t = 5.68, p < 0.001 and difference = 209.6 kg, t = 5.65, p < 0.001, respectively). Although RPE and local RPE were significantly elevated in the deception trials (difference = 0.78, f = 6.16, p = 0.030 and difference = 0.81, f = 5.89, p = 0.034, respectively), self-efficacy was significantly reduced (difference = 1.58, f = 26.90, p < 0.001). This study demonstrates that resistance exercise is improved by the presence of spotters, which is facilitated by reduced RPE and increased self-efficacy. This has important implications for athletes and clients, who should perform resistance exercise in the proximity of others, to maximize total work performed.

  6. Looking for truth and finding lies: the prospects for a nascent neuroimaging of deception.

    Science.gov (United States)

    Spence, Sean A; Kaylor-Hughes, Catherine J

    2008-01-01

    Lying is ubiquitous and has acquired many names. In 'natural experiments', both pathological lying and truthfulness implicate prefrontal cortices. Recently, the advent of functional neuroimaging has allowed investigators to study deception in the non-pathological state. Prefrontal cortices are again implicated, although the regions identified vary across experiments. Forensic application of such technology (to the detection of deceit) requires the solution of tractable technical problems. Whether we 'should' detect deception remains an ethical problem: one for societies to resolve. However, such a procedure would only appear to be ethical when subjects volunteer to participate, as might occur during the investigation of alleged miscarriages of justice. We demonstrate how this might be approached.

  7. Deception Recognition: Rethinking the Operational Commander’s Approach

    Science.gov (United States)

    2010-10-27

    Understanding this cultural relativism gives us insight into intent. Social norms tend to be tacitly established and maintained through body...the concept of ―face‖ in dealing with people in a personal or professional relationship is first and foremost in the Chinese culture . The western... morality ,‖5 the operational commander can be and usually is directly affected by both political deception and MILDEC and must be able to recognize and

  8. 14 CFR 399.80 - Unfair and deceptive practices of ticket agents.

    Science.gov (United States)

    2010-01-01

    ... (AVIATION PROCEEDINGS) POLICY STATEMENTS STATEMENTS OF GENERAL POLICY Policies Relating to Enforcement § 399.80 Unfair and deceptive practices of ticket agents. It is the policy of the Board to regard any of... are available, when such discounts or reductions are not specific in the lawful tariffs of the air...

  9. A Cognitive Model for Exposition of Human Deception and Counterdeception

    Science.gov (United States)

    1987-10-01

    sampled from 160 documents representing over 40 disciplines. The areas of magic, mentalism, paranormal phenomena, and confidence games are particularly...Skeptical Inquirer, the (formerly the Zetetic) ( Paranormal phenomena); P.O. Box 29, Kensington Station, Buffalo, NY. . . Military Deception...happening, is perceived as unlikely (and perhaps paranormal ) because of a failure to realize the very large . number of opportunities for matches. A

  10. Registered Report: Measuring Unconscious Deception Detection by Skin Temperature

    Directory of Open Access Journals (Sweden)

    Anna Elisabeth Van 't Veer

    2014-05-01

    Full Text Available Findings from the deception detection literature suggest that although people are not skilled in consciously detecting a liar, they may intuit that something about the person telling a lie is off. In the current proposal, we argue that observing a liar influences the observer’s physiology even though the observer may not be consciously aware of being lied to (i.e., the observers’ direct deception judgment does not accurately differentiate between liars and truth-tellers. To test this hypothesis, participants’ finger temperature will be measured while they watch videos of persons who are either honest or dishonest about their identity. We hypothesize that skin temperature will be lower when observing a liar than when observing a truth-teller. Additionally, we test whether perceiving a liar influences finger skin temperature differently when an individual is, or is not, alerted to the possibility of deceit. We do this by varying participants’ awareness of the fact that they might be lied to. Next to measuring physiological responses to liars and truth-tellers, self-reported direct and indirect veracity judgments (i.e., trustworthiness and liking of the target persons will be assessed. We hypothesize that indirect veracity judgments will better distinguish between liars and truth-tellers than direct veracity judgments.

  11. Strategic Interviewing to Detect Deception: Cues to Deception across Repeated Interviews

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2016-11-01

    Full Text Available Previous deception research on repeated interviews found that liars are not less consistent than truth tellers, presumably because liars use a repeat strategy to be consistent across interviews. The goal of this study was to design an interview procedure to overcome this strategy. Innocent participants (truth tellers and guilty participants (liars had to convince an interviewer that they had performed several innocent activities rather than committing a mock crime. The interview focused on the innocent activities (alibi, contained specific central and peripheral questions, and was repeated after one week without forewarning. Cognitive load was increased by asking participants to reply quickly. The liars’ answers in replying to both central and peripheral questions were significantly less accurate, less consistent, and more evasive than the truth tellers’ answers. Logistic regression analyses yielded classification rates ranging from around 70% (with consistency as the predictor variable, 85% (with evasive answers as the predictor variable, to over 90% (with an improved measure of consistency that incorporated evasive answers as the predictor variable, as well as with response accuracy as the predictor variable. These classification rates were higher than the interviewers’ accuracy rate (54%.

  12. By Force or by Fraud: Optimizing U.S. Information Strategy With Deception

    Science.gov (United States)

    2016-06-01

    WITH DECEPTION Ryan Q. Flaherty Major, United States Army B.S., Sacred Heart University, 2001 M.B.A., Sacred Heart University, 2004...to hide their religious agenda of establishing an Islamic Republic under the cloak of Lebanese nationalism.163 B. UNITY OF EFFORT State Unity of

  13. Evolutionary relationships among pollinators and repeated pollinator sharing in sexually deceptive orchids.

    Science.gov (United States)

    Phillips, R D; Brown, G R; Dixon, K W; Hayes, C; Linde, C C; Peakall, R

    2017-09-01

    The mechanism of pollinator attraction is predicted to strongly influence both plant diversification and the extent of pollinator sharing between species. Sexually deceptive orchids rely on mimicry of species-specific sex pheromones to attract their insect pollinators. Given that sex pheromones tend to be conserved among related species, we predicted that in sexually deceptive orchids, (i) pollinator sharing is rare, (ii) closely related orchids use closely related pollinators and (iii) there is strong bias in the wasp lineages exploited by orchids. We focused on species that are pollinated by sexual deception of thynnine wasps in the distantly related genera Caladenia and Drakaea, including new field observations for 45 species of Caladenia. Specialization was extreme with most orchids using a single pollinator species. Unexpectedly, seven cases of pollinator sharing were found, including two between Caladenia and Drakaea, which exhibit strikingly different floral morphology. Phylogenetic analysis of pollinators using four nuclear sequence loci demonstrated that although orchids within major clades primarily use closely related pollinator species, up to 17% of orchids within these clades are pollinated by a member of a phylogenetically distant wasp genus. Further, compared to the total diversity of thynnine wasps within the study region, orchids show a strong bias towards exploiting certain genera. Although these patterns may arise through conservatism in the chemical classes used in sex pheromones, apparent switches between wasp clades suggest unexpected flexibility in floral semiochemical production. Alternatively, wasp sex pheromones within lineages may exhibit greater chemical diversity than currently appreciated. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  14. Self-deception in terminal patients: belief system at stake

    Directory of Open Access Journals (Sweden)

    Luis E Echarte

    2016-02-01

    Full Text Available A substantial minority of patients with terminal illness hold unrealistically hopeful beliefs about the severity of their disease or the nature of its treatment, considering therapy as curative rather than palliative. We propose that this attitude may be understood as self-deception, following the current psychological theories about this topic. In this article we suggest that the reason these patients deceive themselves is to preserve their belief systems. According to some philosophical accounts, the human belief system (HBS is constituted as a web with a few stable central nodes –deep seated beliefs– intimately related with the self. We hypothesize that the mind may possess defensive mechanisms, mostly non-conscious, that reject certain sensory inputs (e.g., a fatal diagnosis that may undermine deep-seated beliefs. This interpretation is in line with the theory of cognitive dissonance. Following this reasoning, we also propose that HBS-related self-deception would entail a lower cognitive load than that associated with confronting the truth: whereas the latter would engage a myriad of high cognitive functions to re-configure crucial aspects of the self, including the setting of plans, goals, or even a behavioral output, the former would be mostly non-conscious. Overall, we believe that our research supports the hypothesis that in cases of terminal illness, (self-deceiving requires less effort than accepting the truth.

  15. Waving the Red Flag: FTC Regulation of Deceptive Weight-Loss Advertising 1951-2009.

    Science.gov (United States)

    Lellis, Julie C

    2016-01-01

    This article documents the historical role of the Federal Trade Commission (FTC) in regulating deceptive weight-loss advertising, which the commission began to prioritize in the 1990s after a dramatic rise in complaints. It also includes the results of a content analysis of more than 150 FTC complaints filed between 1951 and 2009, which were used to analyze trends in advertising content, liability for deceptive practices, and outcomes. Regulatory efforts may not have curbed the use of bogus weight-loss claims, which have only increased over time. The FTC has made attempts to apply broad liability, but advertisers and corporate leaders continue to be named most frequently over other respondents, including advertising agencies, media outlets, and product endorsers. Although the number of complaints that result in financial penalties is increasing, the FTC lacks systematic and specific policies to adequately deter advertisers and address what continues to be a growing problem.

  16. The fundamental attribution error in detecting deception: the boy-who-cried-wolf effect.

    Science.gov (United States)

    O'Sullivan, Maureen

    2003-10-01

    Most people are unable to detect accurately when others are lying. Many explanations for this inability have been suggested but the cognitive heuristics involved in lie detection have received little attention. The present study offers evidence from two experiments, based on two different groups of observers, judging two different kinds of lies, presented in two different testing situations, that the fundamental attribution error significantly undermines the ability to detect honesty and deception accurately. Trait judgments of trustworthiness were highly correlated with state judgments of truthfulness, leading, as predicted, to positive correlations with honest detection accuracy and negative correlations with deception detection accuracy. More accurate lie detectors were significantly more likely than less accurate lie detectors to separate state and trait judgments of honesty. The effect of other biases, such as the halo effect and the truthfulness bias, also are examined. Implications for future research and practice are discussed.

  17. STATISTICAL LANDMARKS AND PRACTICAL ISSUES REGARDING THE USE OF SIMPLE RANDOM SAMPLING IN MARKET RESEARCHES

    Directory of Open Access Journals (Sweden)

    CODRUŢA DURA

    2010-01-01

    Full Text Available The sample represents a particular segment of the statistical populationchosen to represent it as a whole. The representativeness of the sample determines the accuracyfor estimations made on the basis of calculating the research indicators and the inferentialstatistics. The method of random sampling is part of probabilistic methods which can be usedwithin marketing research and it is characterized by the fact that it imposes the requirementthat each unit belonging to the statistical population should have an equal chance of beingselected for the sampling process. When the simple random sampling is meant to be rigorouslyput into practice, it is recommended to use the technique of random number tables in order toconfigure the sample which will provide information that the marketer needs. The paper alsodetails the practical procedure implemented in order to create a sample for a marketingresearch by generating random numbers using the facilities offered by Microsoft Excel.

  18. A simple rule of thumb for elegant prehension.

    Science.gov (United States)

    Mon-Williams, M; Tresilian, J R

    2001-07-10

    Reaching out to grasp an object (prehension) is a deceptively elegant and skilled behavior. The movement prior to object contact can be described as having two components, the movement of the hand to an appropriate location for gripping the object, the "transport" component, and the opening and closing of the aperture between the fingers as they prepare to grip the target, the "grasp" component. The grasp component is sensitive to the size of the object, so that a larger grasp aperture is formed for wider objects; the maximum grasp aperture (MGA) is a little wider than the width of the target object and occurs later in the movement for larger objects. We present a simple model that can account for the temporal relationship between the transport and grasp components. We report the results of an experiment providing empirical support for our "rule of thumb." The model provides a simple, but plausible, account of a neural control strategy that has been the center of debate over the last two decades.

  19. 17 CFR 240.10b-5 - Employment of manipulative and deceptive devices.

    Science.gov (United States)

    2010-04-01

    ... fraud or deceit upon any person, in connection with the purchase or sale of any security. (Sec. 10; 48... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Employment of manipulative and deceptive devices. 240.10b-5 Section 240.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  20. Caldera unrest detected with seawater temperature anomalies at Deception Island, Antarctic Peninsula

    Science.gov (United States)

    Berrocoso, M.; Prates, G.; Fernández-Ros, A.; Peci, L. M.; de Gil, A.; Rosado, B.; Páez, R.; Jigena, B.

    2018-04-01

    Increased thermal activity was detected to coincide with the onset of volcano inflation in the seawater-filled caldera at Deception Island. This thermal activity was manifested in pulses of high water temperature that coincided with ocean tide cycles. The seawater temperature anomalies were detected by a thermometric sensor attached to the tide gauge (bottom pressure sensor). This was installed where the seawater circulation and the locations of known thermal anomalies, fumaroles and thermal springs, together favor the detection of water warmed within the caldera. Detection of the increased thermal activity was also possible because sea ice, which covers the entire caldera during the austral winter months, insulates the water and thus reduces temperature exchange between seawater and atmosphere. In these conditions, the water temperature data has been shown to provide significant information about Deception volcano activity. The detected seawater temperature increase, also observed in soil temperature readings, suggests rapid and near-simultaneous increase in geothermal activity with onset of caldera inflation and an increased number of seismic events observed in the following austral summer.

  1. The Biosynthesis of Unusual Floral Volatiles and Blends Involved in Orchid Pollination by Deception: Current Progress and Future Prospects.

    Science.gov (United States)

    Wong, Darren C J; Pichersky, Eran; Peakall, Rod

    2017-01-01

    Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen) in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few) by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems.

  2. Quenched Large Deviations for Simple Random Walks on Percolation Clusters Including Long-Range Correlations

    Science.gov (United States)

    Berger, Noam; Mukherjee, Chiranjib; Okamura, Kazuki

    2018-03-01

    We prove a quenched large deviation principle (LDP) for a simple random walk on a supercritical percolation cluster (SRWPC) on {Z^d} ({d ≥ 2}). The models under interest include classical Bernoulli bond and site percolation as well as models that exhibit long range correlations, like the random cluster model, the random interlacement and the vacant set of random interlacements (for {d ≥ 3}) and the level sets of the Gaussian free field ({d≥ 3}). Inspired by the methods developed by Kosygina et al. (Commun Pure Appl Math 59:1489-1521, 2006) for proving quenched LDP for elliptic diffusions with a random drift, and by Yilmaz (Commun Pure Appl Math 62(8):1033-1075, 2009) and Rosenbluth (Quenched large deviations for multidimensional random walks in a random environment: a variational formula. Ph.D. thesis, NYU, arXiv:0804.1444v1) for similar results regarding elliptic random walks in random environment, we take the point of view of the moving particle and prove a large deviation principle for the quenched distribution of the pair empirical measures of the environment Markov chain in the non-elliptic case of SRWPC. Via a contraction principle, this reduces easily to a quenched LDP for the distribution of the mean velocity of the random walk and both rate functions admit explicit variational formulas. The main difficulty in our set up lies in the inherent non-ellipticity as well as the lack of translation-invariance stemming from conditioning on the fact that the origin belongs to the infinite cluster. We develop a unifying approach for proving quenched large deviations for SRWPC based on exploiting coercivity properties of the relative entropies in the context of convex variational analysis, combined with input from ergodic theory and invoking geometric properties of the supercritical percolation cluster.

  3. Facial markings in the social cuckoo wasp Polistes sulcifer: No support for the visual deception and the assessment hypotheses.

    Science.gov (United States)

    Cini, Alessandro; Ortolani, Irene; Zechini, Luigi; Cervo, Rita

    2015-02-01

    Insect social parasites have to conquer a host colony by overcoming its defensive barriers. In addition to increased fighting abilities, many social parasites evolved sophisticated sensory deception mechanisms to elude host colonies defenses by exploiting host communication channels. Recently, it has been shown that the conspicuous facial markings of a paper wasp social parasite, Polistes sulcifer, decrease the aggressiveness of host foundresses. Two main hypotheses stand as explanations of this phenomenon: visual sensory deception (i.e. the black patterning reduces host aggression by exploiting the host visual communication system) and visual quality assessment (i.e. facial markings reduce aggressiveness as they signal the increased fighting ability of parasites). Through behavioral assays and morphological measurements we tested three predictions resulting from these hypotheses and found no support either for the visual sensory deception or for the quality assessment to explain the reduction in host aggressiveness towards the parasite. Our results suggest that other discrimination processes may explain the observed phenomenon. Copyright © 2014 Elsevier B.V. All rights reserved.

  4. Toward a Robust Method of Presenting a Rich, Interconnected Deceptive Network Topology

    Science.gov (United States)

    2015-03-01

    SDN Software - Defined Networking SNOS Systemic Network Obfuscation System SSH Secure Shell TCP Transmission Control Protocol TTL time to...same DeTracer functionality directly on routers. One particularly interesting research area would be the use of Software - Defined Networking ( SDN ) to...Hughes, “Employing deceptive dynamic network topology through software - defined networking ,” M.S. thesis, Dept. Comput. Sci., Naval

  5. Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective

    Science.gov (United States)

    Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li

    2017-01-01

    Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD)…

  6. The Biosynthesis of Unusual Floral Volatiles and Blends Involved in Orchid Pollination by Deception: Current Progress and Future Prospects

    Directory of Open Access Journals (Sweden)

    Darren C. J. Wong

    2017-11-01

    Full Text Available Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems.

  7. Catching a Deceiver in the Act: Processes Underlying Deception in an Interactive Interview Setting

    NARCIS (Netherlands)

    Ströfer, Sabine; Ufkes, Elze Gooitzen; Noordzij, Matthijs Leendert; Giebels, Ellen

    2016-01-01

    Lying is known to evoke stress and cognitive load. Both form cues to deception and lead to an increase in sympathetic nervous system (SNS) activity. But in reality, deceivers stick to the truth most the time and only lie occasionally. The present study therefore examined in an interactive suspect

  8. Between reality and deception: the anamorphosis in visual communication

    Directory of Open Access Journals (Sweden)

    Helena Ferreira

    2016-06-01

    Full Text Available This article aims to reflect on the use of anamorphosis in the context of the graphic and visual communication by presenting a brief evolution of anamorphosis in visual communication, from its origin to the present time, through the analysis of historical and contemporary examples of anamorphic representations used in art and design. This is a reflection on the potential of the mechanism of anamorphosis as a vehicle of visual communication based on perceptive game between reality and deception. Thus, we propose the possibility of this perceptual mechanism to fit in a more comprehensive history, the history of visuality.

  9. Second thoughts about privacy, safety and deception

    Science.gov (United States)

    Sorell, Tom; Draper, Heather

    2017-07-01

    In this paper, we point out some difficulties with interpreting three of five principles formulated at a retreat on robot ethics sponsored by the Arts and Humanities Council and the Engineering and Physical Sciences Research Council. We also attempt to iron out some conflicts between the principles. Some of the difficulties arise from the way that the autonomy of robot users - their capacity to live by their own choices - can be a goal in the design of care robots. We discuss (a) problems for Principle 2 that arise from competing legal and philosophical understandings of privacy; (b) a tension between privacy and safety (Principles 2 and 3) and (c) some scepticism about the application of Principle 4, which addresses robot design that might result in the deception of vulnerable users.

  10. An object cue is more effective than a word in ERP-based detection of deception.

    Science.gov (United States)

    Cutmore, Tim R H; Djakovic, Tatjana; Kebbell, Mark R; Shum, David H K

    2009-03-01

    Recent studies of deception have used a form of the guilty knowledge test along with the oddball P300 event-related potential (ERP) to uncover hidden memories. These studies typically have used words as the cuing stimuli. In the present study, a mock crime was enacted by participants to prime their episodic memory and different memory cue types (Words, Pictures of Objects and Faces) were created to investigate their relative efficacy in identifying guilt. A peak-to peak (p-p) P300 response was computed for rare known non-guilty item (target), rare guilty knowledge item (probe) and frequently presented unknown items (irrelevant). Difference in this P300 measure between the probe and irrelevant was the key dependent variable. Object cues were found to be the most effective, particularly at the parietal site. A bootstrap procedure commonly used to detect deception in individual participants by comparing their probe and irrelevant P300 p-p showed the object cues to provide the best discrimination. Furthermore, using all three of the cue types together provided high detection accuracy (94%). These results confirm prior findings on the utility of ERPs for detecting deception. More importantly, they provide support for the hypothesis that direct cueing with a picture of the crime object may be more effective than using a word (consistent with the picture superiority effect reported in the literature). Finally, a face cue (e.g., crime victim) may also provide a useful probe for detection of guilty knowledge but this stimulus form needs to be chosen with due caution.

  11. When is Deceptive Message Production More Effortful than Truth-Telling? A Baker's Dozen of Moderators.

    Science.gov (United States)

    Burgoon, Judee K

    2015-01-01

    Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker's dozen of moderators that may alter the degree of cognitive difficulty associated with producing deceptive messages. Among sender-related factors are memory processes, motivation, incentives, and consequences. Lying increases activation of a network of brain regions related to executive memory, suppression of unwanted behaviors, and task switching that is not observed with truth-telling. High motivation coupled with strong incentives or the risk of adverse consequences also prompts more cognitive exertion-for truth-tellers and deceivers alike-to appear credible, with associated effects on performance and message production effort, depending on the magnitude of effort, communicator skill, and experience. Factors related to message and communication context include discourse genre, type of prevarication, expected response length, communication medium, preparation, and recency of target event/issue. These factors can attenuate the degree of cognitive taxation on senders so that truth-telling and deceiving are similarly effortful. Factors related to the interpersonal relationship among interlocutors include whether sender and receiver are cooperative or adversarial and how well-acquainted they are with one another. A final consideration is whether the unit of analysis is the utterance, turn at talk, episode, entire interaction, or series of interactions. Taking these factors into account should produce a more nuanced answer to the question of when deception is more difficult than truth-telling.

  12. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management

    OpenAIRE

    Qiang Luo; Qiang Luo; Yina Ma; Yina Ma; Meghana A. Bhatt; Meghana A. Bhatt; P. Read Montague; P. Read Montague; P. Read Montague; Jianfeng Feng; Jianfeng Feng; Jianfeng Feng; Jianfeng Feng; Jianfeng Feng

    2017-01-01

    Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent...

  13. Transcriptome and proteome data reveal candidate genes for pollinator attraction in sexually deceptive orchids.

    Science.gov (United States)

    Sedeek, Khalid E M; Qi, Weihong; Schauer, Monica A; Gupta, Alok K; Poveda, Lucy; Xu, Shuqing; Liu, Zhong-Jian; Grossniklaus, Ueli; Schiestl, Florian P; Schlüter, Philipp M

    2013-01-01

    Sexually deceptive orchids of the genus Ophrys mimic the mating signals of their pollinator females to attract males as pollinators. This mode of pollination is highly specific and leads to strong reproductive isolation between species. This study aims to identify candidate genes responsible for pollinator attraction and reproductive isolation between three closely related species, O. exaltata, O. sphegodes and O. garganica. Floral traits such as odour, colour and morphology are necessary for successful pollinator attraction. In particular, different odour hydrocarbon profiles have been linked to differences in specific pollinator attraction among these species. Therefore, the identification of genes involved in these traits is important for understanding the molecular basis of pollinator attraction by sexually deceptive orchids. We have created floral reference transcriptomes and proteomes for these three Ophrys species using a combination of next-generation sequencing (454 and Solexa), Sanger sequencing, and shotgun proteomics (tandem mass spectrometry). In total, 121 917 unique transcripts and 3531 proteins were identified. This represents the first orchid proteome and transcriptome from the orchid subfamily Orchidoideae. Proteome data revealed proteins corresponding to 2644 transcripts and 887 proteins not observed in the transcriptome. Candidate genes for hydrocarbon and anthocyanin biosynthesis were represented by 156 and 61 unique transcripts in 20 and 7 genes classes, respectively. Moreover, transcription factors putatively involved in the regulation of flower odour, colour and morphology were annotated, including Myb, MADS and TCP factors. Our comprehensive data set generated by combining transcriptome and proteome technologies allowed identification of candidate genes for pollinator attraction and reproductive isolation among sexually deceptive orchids. This includes genes for hydrocarbon and anthocyanin biosynthesis and regulation, and the development of

  14. Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model.

    Science.gov (United States)

    Sporer, Siegfried L

    2016-01-01

    Recently, studies on deception and its detection have increased dramatically. Many of these studies rely on the "cognitive load approach" as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley's (2000, 2007, 2012) working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal, and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009), the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed). Predictions regarding several moderator variables and methods to investigate them are proposed.

  15. Multiple shifts to different pollinators fuelled rapid diversification in sexually deceptive Ophrys orchids.

    Science.gov (United States)

    Breitkopf, Hendrik; Onstein, Renske E; Cafasso, Donata; Schlüter, Philipp M; Cozzolino, Salvatore

    2015-07-01

    Episodes of rapid speciation provide unique insights into evolutionary processes underlying species radiations and patterns of biodiversity. Here we investigated the radiation of sexually deceptive bee orchids (Ophrys). Based on a time-calibrated phylogeny and by means of ancestral character reconstruction and divergence time estimation, we estimated the tempo and mode of this radiation within a state-dependent evolutionary framework. It appears that, in the Pleistocene, the evolution of Ophrys was marked by episodes of rapid diversification coinciding with shifts to different pollinator types: from wasps to Eucera bees to Andrena and other bees. An abrupt increase in net diversification rate was detected in three clades. Among these, two phylogenetically distant lineages switched from Eucera to Andrena and other bees in a parallel fashion and at about the same time in their evolutionary history. Lack of early radiation associated with the evolution of the key innovation of sexual deception suggests that Ophrys diversification was mainly driven by subsequent ecological opportunities provided by the exploitation of novel pollinator groups, encompassing many bee species slightly differing in their sex pheromone communication systems, and by spatiotemporal fluctuations in the pollinator mosaic. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  16. Mad Men’s Deceptive (Critique Of Creativity

    Directory of Open Access Journals (Sweden)

    Julie Robert

    2012-09-01

    Full Text Available This article analyses Mad Men’s relationship to creativity. Considering popular, industry-specific and scholarly understandings, it uses close readings of the show and its narratological techniques to demonstrate how these potentially contradictory concepts and practices of creativity overlap in the show’s fourth season. The points at which these understandings collide become sources of tension between characters and are marked by narrative gaps that conceal deceptive creativity. The conflicts centre on three primary debates: a the role of alcohol in the creative process, b industry-specific norms of creativity, and c the popular perception that creativity is about expression. Consequently, this article approaches questions about creativity using the show’s own partially elided debates and undermines widely-held romantic beliefs about the creative ‘type’ and the what exactly it means to sell creativity in a corporate setting.

  17. Prokaryotic communities and operating metabolisms in the surface and the permafrost of Deception Island (Antarctica)

    NARCIS (Netherlands)

    Blanco, Yolanda; Prieto-Ballesteros, Olga; Gómez, Manuel J.; Moreno-Paz, Mercedes; García-Villadangos, Miriam; Rodríguez-Manfredi, José Antonio; Cruz-Gil, Patricia; Sánchez-Román, Mónica; Rivas, Luis A.; Parro, Victor

    In this study we examined the microbial community composition and operating metabolisms on the surface and in the permafrost of Deception Island, (Antarctica) with an on site antibody microarray biosensor. Samples (down to a depth of 4.2m) were analysed with LDChip300 (Life Detector Chip), an

  18. Modelling the Antecedent and Consequence of Consumer Perceived Deception in Loan Services

    OpenAIRE

    Mbawuni Joseph; Simon Gyasi Nimako

    2015-01-01

    This paper assesses the antecedent and consequence of consumer perceived deception (CPD) on consumer trust, satisfaction, attitude recommendation and intentions to acquire future loans from financial service providers. The proposed research model was tested using data from a survey of 371 loan customers of leading financial service providers in Ghana. Data were analysed using SmartPLS 2.0 for Partial Least Squares Structural Equation Modelling. The results show high information quality could ...

  19. A simple and efficient alternative to implementing systematic random sampling in stereological designs without a motorized microscope stage.

    Science.gov (United States)

    Melvin, Neal R; Poda, Daniel; Sutherland, Robert J

    2007-10-01

    When properly applied, stereology is a very robust and efficient method to quantify a variety of parameters from biological material. A common sampling strategy in stereology is systematic random sampling, which involves choosing a random sampling [corrected] start point outside the structure of interest, and sampling relevant objects at [corrected] sites that are placed at pre-determined, equidistant intervals. This has proven to be a very efficient sampling strategy, and is used widely in stereological designs. At the microscopic level, this is most often achieved through the use of a motorized stage that facilitates the systematic random stepping across the structure of interest. Here, we report a simple, precise and cost-effective software-based alternative to accomplishing systematic random sampling under the microscope. We believe that this approach will facilitate the use of stereological designs that employ systematic random sampling in laboratories that lack the resources to acquire costly, fully automated systems.

  20. Random walk on random walks

    NARCIS (Netherlands)

    Hilário, M.; Hollander, den W.Th.F.; Sidoravicius, V.; Soares dos Santos, R.; Teixeira, A.

    2014-01-01

    In this paper we study a random walk in a one-dimensional dynamic random environment consisting of a collection of independent particles performing simple symmetric random walks in a Poisson equilibrium with density ¿¿(0,8). At each step the random walk performs a nearest-neighbour jump, moving to

  1. When is deceptive message production more effortful than truth-telling? A baker’s dozen of moderators

    Directory of Open Access Journals (Sweden)

    Judee K Burgoon

    2015-12-01

    Full Text Available Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker’s dozen of moderators that may alter the degree of cognitive difficulty associated with producing deceptive messages. Among sender-related factors are memory processes, motivation, incentives, and consequences. Lying increases activation of a network of brain regions related to executive memory, suppression of unwanted behaviors, and task switching that is not observed with truth-telling. High motivation coupled with strong incentives or the risk of adverse consequences also prompts more cognitive exertion--for truth-tellers and deceivers alike--to appear credible, with associated effects on performance and message production effort, depending on the magnitude of effort, communicator skill and experience. Factors related to message and communication context include discourse genre, type of prevarication, expected response length, communication medium, preparation, and recency of target event/issue. These factors can attenuate the degree of cognitive taxation on senders so that truth-telling and deceiving are similarly effortful. Factors related to the interpersonal relationship among interlocutors include whether sender and receiver are cooperative or adversarial and how well-acquainted they are with one another. A final consideration is whether the unit of analysis is the utterance, turn at talk, episode, entire interaction, or series of interactions. Taking these factors into account should produce a more nuanced answer to the question of when deception is more difficult than truth-telling.

  2. Equating Efficiency with Reduction: A Self-Deception in Energy Policy

    DEFF Research Database (Denmark)

    Wilhite, Harold; Nørgaard, Jørgen

    2004-01-01

    power, mobility and so on). The policy makers at the centre of the policy discourse on energy sustainability suffer from a form for self-deception which revolves around the equation of ‘efficiency’ with ‘reduction’ and ‘sustainability’, i.e., the untenable contention that technological and market...... and infrastructure for homes, businesses, transport, health and public services, so that it is neither ethical nor even practical to argue for restrictions in overall energy growth in these and other developing countries. This places the onus for deep reductions in energy use on Europe, North America and the other...

  3. A Simulation Study on the Performance of the Simple Difference and Covariance-Adjusted Scores in Randomized Experimental Designs

    Science.gov (United States)

    Petscher, Yaacov; Schatschneider, Christopher

    2011-01-01

    Research by Huck and McLean (1975) demonstrated that the covariance-adjusted score is more powerful than the simple difference score, yet recent reviews indicate researchers are equally likely to use either score type in two-wave randomized experimental designs. A Monte Carlo simulation was conducted to examine the conditions under which the…

  4. On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-Mediated Communication

    Science.gov (United States)

    Hancock, Jeffrey T.; Curry, Lauren E.; Goorha, Saurabh; Woodworth, Michael

    2008-01-01

    This study investigated changes in both the liar's and the conversational partner's linguistic style across truthful and deceptive dyadic communication in a synchronous text-based setting. An analysis of 242 transcripts revealed that liars produced more words, more sense-based words (e.g., seeing, touching), and used fewer self-oriented but more…

  5. 16 CFR 301.43 - Use of deceptive trade or corporate names, trademarks or graphic representations prohibited.

    Science.gov (United States)

    2010-01-01

    ..., trademarks or graphic representations prohibited. 301.43 Section 301.43 Commercial Practices FEDERAL TRADE... Regulations § 301.43 Use of deceptive trade or corporate names, trademarks or graphic representations prohibited. No person shall use in labeling, invoicing or advertising any fur or fur product a trade name...

  6. Deception Detection, Transmission, & Modality in Age & Sex

    Directory of Open Access Journals (Sweden)

    Charlotte Dorothy Sweeney

    2014-06-01

    Full Text Available This study is the first to create and use spontaneous (i.e. unrehearsed pro-social lies in an ecological setting. Creation of the stimuli involved fifty-one older adult and forty-four college student senders who lied authentically in that their lies were spontaneous in the service of protecting a research assistant. In the main study, seventy-seven older adult and eighty-four college raters attempted to detect lies in the older adult and college senders in three modalities: audio, visual, and audiovisual. Raters of both age groups were best at detecting lies in the audiovisual and worst in the visual modalities. Overall, college students were better detectors than older adults. There was an age-matching effect for college students but not for older adults. Older adult males were the hardest to detect. The older the adult was the worse the ability to detect deception.

  7. Theodramatic Rehearsal: Fighting Self-Deception through the Dramatic Imagination

    Directory of Open Access Journals (Sweden)

    Brett Vaden

    2014-03-01

    Full Text Available This paper seeks to appropriate the insights of dramatic theology for Christian psychology and soul care. According to Kevin Vanhoozer, Scripture is the ‘script’ for human beings’ fitting participation in the acts and deeds of God in the world (i.e., ‘theodrama’. Keeping with this dramatic paradigm, the author will explore what ‘rehearsal’ might entail by drawing from a branch of psychotherapy called ‘psychodrama.’ The main question to be addressed in this appropriation of dramatic theology is, “How might dramatic rehearsal combat self-deception?” The author will only begin to answer this question, but in the attempt it is hoped that further reflection and clarity will be induced.

  8. Once an Impression Manager, Always an Impression Manager? Antecedents of Honest and Deceptive Impression Management Use and Variability across Multiple Job Interviews.

    Science.gov (United States)

    Roulin, Nicolas; Bourdage, Joshua S

    2017-01-01

    Research has examined the antecedents of applicants' use of impression management (IM) tactics in employment interviews. All existing empirical studies have measured IM in one particular interview. Yet, applicants generally interview multiple times for different positions, and thus have multiple opportunities to engage in IM, before they can secure a job. Similarly, recent theoretical advances in personnel selection and IM research have suggested that applicant behaviors should be considered as dynamic and adaptive in nature. In line with this perspective, the present study is the first to examine the role of individual differences in both applicants' use of IM tactics and the variability in IM use across multiple interviews. It also highlights which honest and deceptive IM tactics remain stable vs. vary in consecutive interviews with different interviewers and organizations. Results suggest that applicants high in Extraversion or core self-evaluations tend to engage in more honest self-promotion but do not adapt their IM approach across interviews. In contrast, applicants who possess more undesirable personality traits (i.e., low on Honesty-Humility and Conscientiousness, but high on Machiavellianism, Narcissism, Psychopathy, or Competitive Worldviews) tend to use more deceptive IM (and especially image creation tactics) and are also more likely to adapt their IM strategy across interviews. Because deceptive IM users can obtain better evaluations from interviewers and the personality profile of those users is often associated with undesirable workplace outcomes, this study provides additional evidence for the claim that deceptive IM (or faking) is a potential threat for organizations.

  9. How Can Men Convicted of Violence Against Women Feel Moral While Holding Sexist and Violent Attitudes? A Homeostatic Moral Model Based on Self-Deception.

    Science.gov (United States)

    Vecina, María L

    2018-05-01

    A moral model is proposed to understand how men convicted of violence against the partner can feel moral in spite of their past violent behavior and their current violent and sexist attitudes. Because of its appeal to the role of self-deception and its relationship to psychological well-being, it was hypothesized that a rigid conception about what is right and wrong (moral absolutism) is associated with ambivalent outcomes that keep their psychological system in homeostasis. The relationships were specified a priori and tested using path analysis. Several fit indices supported the adequacy of the model and showed that moral absolutism was indirectly related to both psychological well-being and a good moral self-conceptualization through self-deception. At the same time, moral absolutism was related to sexist and violent attitudes and a poor moral self-conceptualization. Future interventions could include strategies to reduce the resistances to change based on the reduction of moral absolutism and self-deception.

  10. Self-Deception in the Classroom: Educational Manifestations of Sartre's Concept of Bad Faith

    Science.gov (United States)

    Blenkinsop, Sean; Waddington, Tim

    2014-01-01

    This article explores an important section of Jean-Paul Sartre's famous early work, "Being and Nothingness." In that section Sartre proposes that part of the human condition is to actively engage in a particular kind of self-deception he calls bad faith. Bad faith is recognized by the obvious inconsistency between the purported…

  11. Being asked to tell an unpleasant truth about another person activates anterior insula and medial prefrontal cortex.

    Science.gov (United States)

    Littlefield, Melissa M; Dietz, Martin J; Fitzgerald, Des; Knudsen, Kasper J; Tonks, James

    2015-01-01

    "Truth" has been used as a baseline condition in several functional magnetic resonance imaging (fMRI) studies of deception. However, like deception, telling the truth is an inherently social construct, which requires consideration of another person's mental state, a phenomenon known as Theory of Mind. Using a novel ecological paradigm, we examined blood oxygenation level dependent (BOLD) responses during social and simple truth telling. Participants (n = 27) were randomly divided into two competing teams. Post-competition, each participant was scanned while evaluating performances from in-group and out-group members. Participants were asked to be honest and were told that their evaluations would be made public. We found increased BOLD responses in the medial prefrontal cortex, bilateral anterior insula and precuneus when participants were asked to tell social truths compared to simple truths about another person. At the behavioral level, participants were slower at responding to social compared to simple questions about another person. These findings suggest that telling the truth is a nuanced cognitive operation that is dependent on the degree of mentalizing. Importantly, we show that the cortical regions engaged by truth telling show a distinct pattern when the task requires social reasoning.

  12. Isolation and characterization of Campylobacter spp. from Antarctic fur seals (Arctocephalus gazella) at Deception Island, Antarctica.

    Science.gov (United States)

    García-Peña, F J; Pérez-Boto, D; Jiménez, C; San Miguel, E; Echeita, A; Rengifo-Herrera, C; García-Párraga, D; Ortega-Mora, L M; Pedraza-Díaz, S

    2010-09-01

    The presence of Campylobacter spp. was investigated in 41 Antarctic fur seals (Arctocephalus gazella) and 9 Weddell seals (Leptonychotes weddellii) at Deception Island, Antarctica. Infections were encountered in six Antarctic fur seals. The isolates, the first reported from marine mammals in the Antarctic region, were identified as Campylobacter insulaenigrae and Campylobacter lari.

  13. When Worldviews Collide: What Linguistic Style Matching and Distal Language Reveal about Deception in Political Discourse

    Science.gov (United States)

    Booker, Lucille M.

    2012-01-01

    Political discourse is an observable, measurable, and testable manifestation of political worldviews. However, when worldviews collide, notions of truth and of lies are put to the test. The challenge for researchers is how to establish confidence in their analysis. Despite the growing interest in deception research from a diversity of fields and…

  14. When deception becomes easy : The effects of task switching and goal neglect on the truth proportion effect

    NARCIS (Netherlands)

    van Bockstaele, B.; Wilhelm, C.; Meijer, E.; Debey, E.; Verschuere, B.

    2015-01-01

    Lying is typically more cognitively demanding than truth telling. Yet, recent cognitive models of lying propose that lying can be just as easy as truth telling, depending on contextual factors. In line with this idea, research has shown that the cognitive cost of deception decreases when people

  15. Deception Detection: Accuracy Levels Among International Military Officers Using Content and Contextual Questioning Methods

    Science.gov (United States)

    2016-12-01

    deception than any one method on its own. This research project focuses on students at the Naval Postgraduate School (NPS) in Monterey, CA, to...international military officers were also limited on the type of contextual questioning methods and scenarios. These scenarios were not a very good ...research received participation from 52 students . Although the sample size was small, proportionally, 24% is a good response rate for lab research

  16. Deceptive vibratory communication: pupae of a beetle exploit the freeze response of larvae to protect themselves.

    Science.gov (United States)

    Kojima, Wataru; Ishikawa, Yukio; Takanashi, Takuma

    2012-10-23

    It is argued that animal signals may have evolved so as to manipulate the response of receivers in a way that increases the fitness of the signallers. In deceptive communication, receivers incur costs by responding to false signals. Recently, we reported that pupae of the soil-inhabiting Japanese rhinoceros beetle Trypoxylus dichotoma produce vibratory signals to deter burrowing larvae, thereby protecting themselves. In the present study, monitoring of vibrations associated with larval movement revealed that T. dichotoma larvae remained motionless for ca 10 min when pupal vibratory signals were played back transiently (freeze response). Furthermore, pupal signals of T. dichotoma elicited a freeze response in three other scarabaeid species, whose pupae do not produce vibratory signals. This indicates that the freeze response to certain types of vibration evolved before the divergence of these species and has been evolutionarily conserved, presumably because of the fitness advantage in avoiding predators. Pupae of T. dichotoma have probably exploited pre-existing anti-predator responses of conspecific larvae to protect themselves by emitting deceptive vibratory signals.

  17. Relational Aggression, Physical Aggression and Deception during Early Childhood: A Multimethod, Multi-Informant Short-Term Longitudinal Study

    Science.gov (United States)

    Ostrov, Jamie M.; Ries, Emily E.; Stauffacher, Kirstin; Godleski, Stephanie A.; Mullins, Adam D.

    2008-01-01

    A short-term longitudinal study examined relational and physical aggression and deceptive behavior among 120 preschool-aged children (M = 44.36 months old, SD = 11.07). Multiple informants and methods (i.e., observational, teacher reports) were used. Evidence for discriminant validity of the observations of aggression subtypes was found. For…

  18. A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases

    Science.gov (United States)

    Humpherys, Sean LaMarc

    2010-01-01

    Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification…

  19. Simple rANDom wALk simulation

    Energy Technology Data Exchange (ETDEWEB)

    2016-05-20

    SANDAL is a particle-mesh simulation mini-app. The simple simulated physics propagates a set of particles in a constant, 2D wind field with Gaussian turbulence. SANDAL demonstrates the feasibility of formulating a computational physics problem using an alternative, modern design. Specifically, it is implemented using relational tables and queries, rather than array-based data model. It also is implemented with functional language design and cloud deployment, Scala and Apache Spark, rather than Fortran and MPI+X.

  20. A simple model of global cascades on random networks

    Science.gov (United States)

    Watts, Duncan J.

    2002-04-01

    The origin of large but rare cascades that are triggered by small initial shocks is a phenomenon that manifests itself as diversely as cultural fads, collective action, the diffusion of norms and innovations, and cascading failures in infrastructure and organizational networks. This paper presents a possible explanation of this phenomenon in terms of a sparse, random network of interacting agents whose decisions are determined by the actions of their neighbors according to a simple threshold rule. Two regimes are identified in which the network is susceptible to very large cascadesherein called global cascadesthat occur very rarely. When cascade propagation is limited by the connectivity of the network, a power law distribution of cascade sizes is observed, analogous to the cluster size distribution in standard percolation theory and avalanches in self-organized criticality. But when the network is highly connected, cascade propagation is limited instead by the local stability of the nodes themselves, and the size distribution of cascades is bimodal, implying a more extreme kind of instability that is correspondingly harder to anticipate. In the first regime, where the distribution of network neighbors is highly skewed, it is found that the most connected nodes are far more likely than average nodes to trigger cascades, but not in the second regime. Finally, it is shown that heterogeneity plays an ambiguous role in determining a system's stability: increasingly heterogeneous thresholds make the system more vulnerable to global cascades; but an increasingly heterogeneous degree distribution makes it less vulnerable.

  1. New sophistry: self-deception in the nursing academy.

    Science.gov (United States)

    Garrett, Bernard M

    2016-07-01

    In this essay, I advance an argument against the expansion and acceptance of postmodern metaphysical antirealist ideologies in the development of nursing theory in North America. I suggest mystical theoretical explanations of care, the rejection of empirical epistemology, and a return to divinity in nursing represent an intellectual dead end, as these ideas do little to help resolve real-world health issues and also negate the need for the academic discrimination of bad ideas. I examine some of the philosophical foundations of nursing theory and deconstruct some of the more preternatural theories that have become established as the dominant conventional wisdom in the academy. It is argued that this can be characterized as a form of self-deception, and overall has had a negative impact on advancement of the nursing profession and public health care. Reasons behind the widespread acceptance of these irrational theoretical stances in nursing and the ongoing support for mystical therapeutic interventions are explored. © 2016 John Wiley & Sons Ltd.

  2. Effect of nectar supplementation on male and female components of pollination success in the deceptive orchid Dactylorhiza sambucina

    Czech Academy of Sciences Publication Activity Database

    Jersáková, Jana; Johnson, S.D.; Kindlmann, Pavel; Pupin, A.C.

    2008-01-01

    Roč. 33, - (2008), s. 300-306 ISSN 1146-609X R&D Projects: GA MŠk(CZ) LC06073 Institutional research plan: CEZ:AV0Z60870520 Keywords : Dactylorhiza sambucina * Deception * Nectar supplementation * Pollination * Pollen removal and deposition Subject RIV: EH - Ecology, Behaviour Impact factor: 1.456, year: 2008

  3. A Mosaic of Geothermal and Marine Features Shapes Microbial Community Structure on Deception Island Volcano, Antarctica

    OpenAIRE

    Amanda G. Bendia; Camila N. Signori; Diego C. Franco; Rubens T. D. Duarte; Brendan J. M. Bohannan; Vivian H. Pellizari

    2018-01-01

    Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, an...

  4. The Myth of Offenders' Deception on Self-Report Measure Predicting Recidivism: Example from the Self-Appraisal Questionnaire (SAQ)

    Science.gov (United States)

    Loza, Wagdy; Loza-Fanous, Amel; Heseltine, Karen

    2007-01-01

    Two studies were conducted to investigate the vulnerability of the Self-Appraisal Questionnaire (SAQ) to deception and self-presentation biases. The SAQ is a self-report measure used to predict recidivism and guide institutional and program assignments. In the first study, comparisons were made between 429 volunteer offenders who completed the SAQ…

  5. Nothing Happens by Accident, or Does It? A Low Prior for Randomness Does Not Explain Belief in Conspiracy Theories.

    Science.gov (United States)

    Dieguez, Sebastian; Wagner-Egger, Pascal; Gauvrit, Nicolas

    2015-11-01

    Belief in conspiracy theories has often been associated with a biased perception of randomness, akin to a nothing-happens-by-accident heuristic. Indeed, a low prior for randomness (i.e., believing that randomness is a priori unlikely) could plausibly explain the tendency to believe that a planned deception lies behind many events, as well as the tendency to perceive meaningful information in scattered and irrelevant details; both of these tendencies are traits diagnostic of conspiracist ideation. In three studies, we investigated this hypothesis and failed to find the predicted association between low prior for randomness and conspiracist ideation, even when randomness was explicitly opposed to malevolent human intervention. Conspiracy believers' and nonbelievers' perceptions of randomness were not only indistinguishable from each other but also accurate compared with the normative view arising from the algorithmic information framework. Thus, the motto "nothing happens by accident," taken at face value, does not explain belief in conspiracy theories. © The Author(s) 2015.

  6. Simple, efficient estimators of treatment effects in randomized trials using generalized linear models to leverage baseline variables.

    Science.gov (United States)

    Rosenblum, Michael; van der Laan, Mark J

    2010-04-01

    Models, such as logistic regression and Poisson regression models, are often used to estimate treatment effects in randomized trials. These models leverage information in variables collected before randomization, in order to obtain more precise estimates of treatment effects. However, there is the danger that model misspecification will lead to bias. We show that certain easy to compute, model-based estimators are asymptotically unbiased even when the working model used is arbitrarily misspecified. Furthermore, these estimators are locally efficient. As a special case of our main result, we consider a simple Poisson working model containing only main terms; in this case, we prove the maximum likelihood estimate of the coefficient corresponding to the treatment variable is an asymptotically unbiased estimator of the marginal log rate ratio, even when the working model is arbitrarily misspecified. This is the log-linear analog of ANCOVA for linear models. Our results demonstrate one application of targeted maximum likelihood estimation.

  7. Simple, Efficient Estimators of Treatment Effects in Randomized Trials Using Generalized Linear Models to Leverage Baseline Variables

    Science.gov (United States)

    Rosenblum, Michael; van der Laan, Mark J.

    2010-01-01

    Models, such as logistic regression and Poisson regression models, are often used to estimate treatment effects in randomized trials. These models leverage information in variables collected before randomization, in order to obtain more precise estimates of treatment effects. However, there is the danger that model misspecification will lead to bias. We show that certain easy to compute, model-based estimators are asymptotically unbiased even when the working model used is arbitrarily misspecified. Furthermore, these estimators are locally efficient. As a special case of our main result, we consider a simple Poisson working model containing only main terms; in this case, we prove the maximum likelihood estimate of the coefficient corresponding to the treatment variable is an asymptotically unbiased estimator of the marginal log rate ratio, even when the working model is arbitrarily misspecified. This is the log-linear analog of ANCOVA for linear models. Our results demonstrate one application of targeted maximum likelihood estimation. PMID:20628636

  8. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  9. Positive Response Distortion by Police Officer Applicants: Association of Paulhus Deception Scales with MMPI-2 and Inwald Personality Inventory Validity Scales

    Science.gov (United States)

    Detrick, Paul; Chibnall, John T.

    2008-01-01

    Interpretation of positive response distortion (socially desirable responding) in employment evaluations is an important validity issue. This study of police officer applicants examined the construct validity of the Paulhus Deception Scales (PDS)--Moralistic Bias (MB; exaggerated adjustment/agreeableness) and Egoistic Bias (EB; exaggerated…

  10. Curvature of random walks and random polygons in confinement

    International Nuclear Information System (INIS)

    Diao, Y; Ernst, C; Montemayor, A; Ziegler, U

    2013-01-01

    The purpose of this paper is to study the curvature of equilateral random walks and polygons that are confined in a sphere. Curvature is one of several basic geometric properties that can be used to describe random walks and polygons. We show that confinement affects curvature quite strongly, and in the limit case where the confinement diameter equals the edge length the unconfined expected curvature value doubles from π/2 to π. To study curvature a simple model of an equilateral random walk in spherical confinement in dimensions 2 and 3 is introduced. For this simple model we derive explicit integral expressions for the expected value of the total curvature in both dimensions. These expressions are functions that depend only on the radius R of the confinement sphere. We then show that the values obtained by numeric integration of these expressions agrees with numerical average curvature estimates obtained from simulations of random walks. Finally, we compare the confinement effect on curvature of random walks with random polygons. (paper)

  11. Implications of Self-Deception for Self-Reported Intrinsic and Extrinsic Motivational Dispositions and Actual Learning Performance: A Higher Order Structural Model

    Science.gov (United States)

    Hirschfeld, Robert R.; Thomas, Christopher H.; McNatt, D. Brian

    2008-01-01

    The authors explored implications of individuals' self-deception (a trait) for their self-reported intrinsic and extrinsic motivational dispositions and their actual learning performance. In doing so, a higher order structural model was developed and tested in which intrinsic and extrinsic motivational dispositions were underlying factors that…

  12. When Appearances Are not Deceptive: A Comparative History of School Uniforms in Argentina and the United States (Nineteenth--Twentieth Centuries)

    Science.gov (United States)

    Dussel, Ines

    2005-01-01

    Appearances are deceptive, the saying goes. However, we devote much time to the presentation of ourselves, and ties and necklaces can take up more energy than other "substantial" matters. This article analyzes the history of the presentation of selves in schools through the study of school uniforms. It will be claimed that modernity…

  13. Random magnetism

    International Nuclear Information System (INIS)

    Tahir-Kheli, R.A.

    1975-01-01

    A few simple problems relating to random magnetic systems are presented. Translational symmetry, only on the macroscopic scale, is assumed for these systems. A random set of parameters, on the microscopic scale, for the various regions of these systems is also assumed. A probability distribution for randomness is obeyed. Knowledge of the form of these probability distributions, is assumed in all cases [pt

  14. A Deceptive Initiation: An Ecological Paradigm in Howard O’Hagan’s Tay John

    Directory of Open Access Journals (Sweden)

    Sergiy Yakovenko

    2017-11-01

    Full Text Available Howard O’Hagan’s novel Tay John has been widely discussed as a modernist work of deconstruction that undermines the established concepts of broadly understood mythology, narrative, and gender. In this article, I focus on one of the previously neglected aspects of the novel’s mythological drama – the clash of the pre-modern and modern ecological epistemai, which unfolds as an originary event of entering into modernity. I argue that the dramatic irony of a recoded indigenous myth introduces the aboriginal Shuswaps to the colonialist perception of the environment, deceptively making them hostages of their own beliefs and thereby drastically changing their temporal-spatial continuum.

  15. Crustal Structure Picture of Deception Island [western Bransfield Strait] From Gravimetric and Magnetic Data.

    Science.gov (United States)

    Catalán, M.; Carbó, A.; Martín, Davila; Muñoz, A.; Agudo, L.

    Bransfield Strait constitutes a marginal basin that separates the South Shetland archipielago from the Antarctic Peninsula. Since the beginning of its geological record, due to the presence of several submarine and above sea surface volcanoes, eruptions could be appointed easily. All these aspects turn the area as one of the most active at Antarctic region. During 1999 austral summer a seismic crisis was developed. It caused the organisation of a geophysical campaign called DECVOL, where several Spanish scientific institutions participated. Along this, several kinds of studies were carried out. Onland: geodesic GPS and gravity measurements, sampling and gases analysis, continuous seismic recording and geomagnetic measurements. Additionally a geophysical marine campaign [inside and outside Deception island] was carried out. Bathymetry and geopotential information [earth gravity field and geomagnetis m data] were acquired. The multi-disciplinar campaign goal was to perform a fast geophysical evaluation of the volcanic risk. This aspect was important particularly, because the emplacement of Spanish and Argentinean semi -permanent stations around its inner bay. In this study, potential field data recorded along this cruise have been used, together with satellite borne altimetry derived data for gravity, seismic bibliography information of the area, and finally magnetic data compiled in previous campaigns, that were processed until homogeneity could be guaranteed. All these gives a deep detail vision of the structure of the crust at Deception surroundings. In this communication the Bouguer gravity anomaly and scalar magnetic maps are presented, compared and discussed, as well as three gravity and magnetic marine profiles are 2D 1/2 modelled.

  16. Are Eyes Windows to a Deceiver's Soul? Children's Use of Another's Eye Gaze Cues in a Deceptive Situation

    Science.gov (United States)

    Freire, Alejo; Eskritt, Michelle; Lee, Kang

    2004-01-01

    Three experiments examined 3- to 5-year-olds' use of eye gaze cues to infer truth in a deceptive situation. Children watched a video of an actor who hid a toy in 1 of 3 cups. In Experiments 1 and 2, the actor claimed ignorance about the toy's location but looked toward 1 of the cups, without (Experiment 1) and with (Experiment 2) head movement. In…

  17. Effects of Disfluency in Online Interpretation of Deception.

    Science.gov (United States)

    Loy, Jia E; Rohde, Hannah; Corley, Martin

    2017-05-01

    A speaker's manner of delivery of an utterance can affect a listener's pragmatic interpretation of the message. Disfluencies (such as filled pauses) influence a listener's off-line assessment of whether the speaker is truthful or deceptive. Do listeners also form this assessment during the moment-by-moment processing of the linguistic message? Here we present two experiments that examined listeners' judgments of whether a speaker was indicating the true location of the prize in a game during fluent and disfluent utterances. Participants' eye and mouse movements were biased toward the location named by the speaker during fluent utterances, whereas the opposite bias was observed during disfluent utterances. This difference emerged rapidly after the onset of the critical noun. Participants were similarly sensitive to disfluencies at the start of the utterance (Experiment 1) and in the middle (Experiment 2). Our findings support recent research showing that listeners integrate pragmatic information alongside semantic content during the earliest moments of language processing. Unlike prior work which has focused on pragmatic effects in the interpretation of the literal message, here we highlight disfluency's role in guiding a listener to an alternative non-literal message. Copyright © 2016 Cognitive Science Society, Inc.

  18. Radiocarbon and thermoluminescence dating of quaternary sediments in Deception Bay, southeast Queensland: some problems encountered

    International Nuclear Information System (INIS)

    Cotter, M.M.

    1999-01-01

    Full text: Radiocarbon and Thermoluminescence dating of sediment facies were utilised to develop a chronometric framework for the quaternary coastal evolution of Deception Bay southeast Queensland (Cotter 1996). This chronometric framework was developed in the context of a broader geoarchaeological and palaeogeographical investigation of the indigenous cultural landscape of the area. The TL analysis confirmed the presence of previously undated Pleistocene sands within the study area. However in the course of dating one sedimentary sequence, conventional radiocarbon analysis of Notispisula sheldls produced an age of 5190± 90 years BP (Beta-85415) whilst an overlying sandy unit (shown by particle size analysis and SEM surface textural analysis to be aeolian transported) subject to TL-dating produced an age of 14,900 ± 3300 years BP (W1942). This poster highlights the considerations made in order to reconcile this obvious anomaly. In effect, previously obtained radiometric data within the study area (Flood 1981; Hall 1996), in conjunction with an examination of the adequacy of the sampled materials for radiocarbon and TL age determinations point to the TL determination being in error. Similar anomalies have been shown to occur elsewhere in southeast Queensland (Tejan-Kella et al. 1990) explanations for which have been related to selective rather than total bleaching of Holocene sands (Prescott personal communication). Re-dating of the sand sequence using the selective bleach method is required to examine whether the dating anomaly shown for Deception Bay parallels selective bleaching effects determined for other sequences within southeast Queensland. Unfortunately this is beyond the scope and funds of this geoarchaeological study

  19. A Prospective Randomized Study on Operative Treatment for Simple Distal Tibial Fractures-Minimally Invasive Plate Osteosynthesis Versus Minimal Open Reduction and Internal Fixation.

    Science.gov (United States)

    Kim, Ji Wan; Kim, Hyun Uk; Oh, Chang-Wug; Kim, Joon-Woo; Park, Ki Chul

    2018-01-01

    To compare the radiologic and clinical results of minimally invasive plate osteosynthesis (MIPO) and minimal open reduction and internal fixation (ORIF) for simple distal tibial fractures. Randomized prospective study. Three level 1 trauma centers. Fifty-eight patients with simple and distal tibial fractures were randomized into a MIPO group (treatment with MIPO; n = 29) or a minimal group (treatment with minimal ORIF; n = 29). These numbers were designed to define the rate of soft tissue complication; therefore, validation of superiority in union time or determination of differences in rates of delayed union was limited in this study. Simple distal tibial fractures treated with MIPO or minimal ORIF. The clinical outcome measurements included operative time, radiation exposure time, and soft tissue complications. To evaluate a patient's function, the American Orthopedic Foot and Ankle Society ankle score (AOFAS) was used. Radiologic measurements included fracture alignment, delayed union, and union time. All patients acquired bone union without any secondary intervention. The mean union time was 17.4 weeks and 16.3 weeks in the MIPO and minimal groups, respectively. There was 1 case of delayed union and 1 case of superficial infection in each group. The radiation exposure time was shorter in the minimal group than in the MIPO group. Coronal angulation showed a difference between both groups. The American Orthopedic Foot and Ankle Society ankle scores were 86.0 and 86.7 in the MIPO and minimal groups, respectively. Minimal ORIF resulted in similar outcomes, with no increased rate of soft tissue problems compared to MIPO. Both MIPO and minimal ORIF have high union rates and good functional outcomes for simple distal tibial fractures. Minimal ORIF did not result in increased rates of infection and wound dehiscence. Therapeutic Level II. See Instructions for Authors for a complete description of levels of evidence.

  20. Do impression management and self-deception distort self-report measures with content of dynamic risk factors in offender samples? A meta-analytic review.

    Science.gov (United States)

    Hildebrand, Martin; Wibbelink, Carlijn J M; Verschuere, Bruno

    Self-report measures provide an important source of information in correctional/forensic settings, yet at the same time the validity of that information is often questioned because self-reports are thought to be highly vulnerable to self-presentation biases. Primary studies in offender samples have provided mixed results with regard to the impact of socially desirable responding on self-reports. The main aim of the current study was therefore to investigate-via a meta-analytic review of published studies-the association between the two dimensions of socially desirable responding, impression management and self-deceptive enhancement, and self-report measures with content of dynamic risk factors using the Balanced Inventory of Desirable Responding (BIDR) in offender samples. These self-report measures were significantly and negatively related with self-deception (r = -0.120, p impression management (r = -0.158, p impression management effect with the trim and fill method indicating that the relation is probably even smaller (r = -0.07). The magnitude of the effect sizes was small. Moderation analyses suggested that type of dynamic risk factor (e.g., antisocial cognition versus antisocial personality), incentives, and publication year affected the relationship between impression management and self-report measures with content of dynamic risk factors, whereas sample size, setting (e.g., incarcerated, community), and publication year influenced the relation between self-deception and these self-report measures. The results indicate that the use of self-report measures to assess dynamic risk factors in correctional/forensic settings is not inevitably compromised by socially desirable responding, yet caution is warranted for some risk factors (antisocial personality traits), particularly when incentives are at play. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Inter simple sequence repeats (ISSR) and random amplified ...

    African Journals Online (AJOL)

    21 of 30 random amplified polymorphic DNA (RAPD) primers produced 220 reproducible bands with average of 10.47 bands per primer and 80.12% of polymorphism. OPR02 primer showed the highest number of effective allele (Ne), Shannon index (I) and genetic diversity (H). Some of the cultivars had specific bands, ...

  2. Simple-MSSM: a simple and efficient method for simultaneous multi-site saturation mutagenesis.

    Science.gov (United States)

    Cheng, Feng; Xu, Jian-Miao; Xiang, Chao; Liu, Zhi-Qiang; Zhao, Li-Qing; Zheng, Yu-Guo

    2017-04-01

    To develop a practically simple and robust multi-site saturation mutagenesis (MSSM) method that enables simultaneously recombination of amino acid positions for focused mutant library generation. A general restriction enzyme-free and ligase-free MSSM method (Simple-MSSM) based on prolonged overlap extension PCR (POE-PCR) and Simple Cloning techniques. As a proof of principle of Simple-MSSM, the gene of eGFP (enhanced green fluorescent protein) was used as a template gene for simultaneous mutagenesis of five codons. Forty-eight randomly selected clones were sequenced. Sequencing revealed that all the 48 clones showed at least one mutant codon (mutation efficiency = 100%), and 46 out of the 48 clones had mutations at all the five codons. The obtained diversities at these five codons are 27, 24, 26, 26 and 22, respectively, which correspond to 84, 75, 81, 81, 69% of the theoretical diversity offered by NNK-degeneration (32 codons; NNK, K = T or G). The enzyme-free Simple-MSSM method can simultaneously and efficiently saturate five codons within one day, and therefore avoid missing interactions between residues in interacting amino acid networks.

  3. Evaluation of a Class of Simple and Effective Uncertainty Methods for Sparse Samples of Random Variables and Functions

    Energy Technology Data Exchange (ETDEWEB)

    Romero, Vicente [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bonney, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schroeder, Benjamin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Weirs, V. Gregory [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    When very few samples of a random quantity are available from a source distribution of unknown shape, it is usually not possible to accurately infer the exact distribution from which the data samples come. Under-estimation of important quantities such as response variance and failure probabilities can result. For many engineering purposes, including design and risk analysis, we attempt to avoid under-estimation with a strategy to conservatively estimate (bound) these types of quantities -- without being overly conservative -- when only a few samples of a random quantity are available from model predictions or replicate experiments. This report examines a class of related sparse-data uncertainty representation and inference approaches that are relatively simple, inexpensive, and effective. Tradeoffs between the methods' conservatism, reliability, and risk versus number of data samples (cost) are quantified with multi-attribute metrics use d to assess method performance for conservative estimation of two representative quantities: central 95% of response; and 10-4 probability of exceeding a response threshold in a tail of the distribution. Each method's performance is characterized with 10,000 random trials on a large number of diverse and challenging distributions. The best method and number of samples to use in a given circumstance depends on the uncertainty quantity to be estimated, the PDF character, and the desired reliability of bounding the true value. On the basis of this large data base and study, a strategy is proposed for selecting the method and number of samples for attaining reasonable credibility levels in bounding these types of quantities when sparse samples of random variables or functions are available from experiments or simulations.

  4. Is Italian regulation of Deceptive advertising Really Effective? A Content Analysis of the Authority’s Sentences (1999-2004) in Three Sectors: Mobile Communication, Cosmetics, Retailing

    OpenAIRE

    K. Premazzi

    2005-01-01

    Study involving a content analysis of the Italian Authority’s Sentences about deceptive advertising in the mobile communication, cosmetics, and retailing sector in the period 1999-2004, with the main aim to assess the effectiveness of the Italian regulation on this subject.

  5. Deception and Manipulation: The Arms of Leishmania, a Successful Parasite

    Science.gov (United States)

    Cecílio, Pedro; Pérez-Cabezas, Begoña; Santarém, Nuno; Maciel, Joana; Rodrigues, Vasco; Cordeiro da Silva, Anabela

    2014-01-01

    Leishmania spp. are intracellular parasitic protozoa responsible for a group of neglected tropical diseases, endemic in 98 countries around the world, called leishmaniasis. These parasites have a complex digenetic life cycle requiring a susceptible vertebrate host and a permissive insect vector, which allow their transmission. The clinical manifestations associated with leishmaniasis depend on complex interactions between the parasite and the host immune system. Consequently, leishmaniasis can be manifested as a self-healing cutaneous affliction or a visceral pathology, being the last one fatal in 85–90% of untreated cases. As a result of a long host–parasite co-evolutionary process, Leishmania spp. developed different immunomodulatory strategies that are essential for the establishment of infection. Only through deception and manipulation of the immune system, Leishmania spp. can complete its life cycle and survive. The understanding of the mechanisms associated with immune evasion and disease progression is essential for the development of novel therapies and vaccine approaches. Here, we revise how the parasite manipulates cell death and immune responses to survive and thrive in the shadow of the immune system. PMID:25368612

  6. Deception and Manipulation: the arms of Leishmania, a successful parasite

    Directory of Open Access Journals (Sweden)

    Pedro eCecílio

    2014-10-01

    Full Text Available Leishmania spp. are intracellular parasitic protozoa responsible for a group of neglected tropical diseases, endemic in 98 countries around the world, called leishmaniasis. These parasites have a complex digenetic life cycle requiring a susceptible vertebrate host and a permissive insect vector, which allow their transmission. The clinical manifestations associated with leishmaniasis depend on complex interactions between the parasite and the host immune system. Consequently, leishmaniasis can be manifested as a self-healing cutaneous affliction or a visceral pathology, being the last one fatal in 85-90% of untreated cases. As a result of a long host-parasite co-evolutionary process, Leishmania spp. developed different immunomodulatory strategies that are essential for the establishment of infection. Only through deception and manipulation of the immune system, Leishmania spp. can complete its life cycle and survive. The understanding of the mechanisms associated with immune evasion and disease progression is essential for the development of novel therapies and vaccine approaches. Here, we revise how the parasite manipulates cell death and immune responses to survive and thrive in the shadow of the immune system.

  7. The contribution of simple random sampling to observed variations in faecal egg counts.

    Science.gov (United States)

    Torgerson, Paul R; Paul, Michaela; Lewis, Fraser I

    2012-09-10

    It has been over 100 years since the classical paper published by Gosset in 1907, under the pseudonym "Student", demonstrated that yeast cells suspended in a fluid and measured by a haemocytometer conformed to a Poisson process. Similarly parasite eggs in a faecal suspension also conform to a Poisson process. Despite this there are common misconceptions how to analyse or interpret observations from the McMaster or similar quantitative parasitic diagnostic techniques, widely used for evaluating parasite eggs in faeces. The McMaster technique can easily be shown from a theoretical perspective to give variable results that inevitably arise from the random distribution of parasite eggs in a well mixed faecal sample. The Poisson processes that lead to this variability are described and illustrative examples of the potentially large confidence intervals that can arise from observed faecal eggs counts that are calculated from the observations on a McMaster slide. Attempts to modify the McMaster technique, or indeed other quantitative techniques, to ensure uniform egg counts are doomed to failure and belie ignorance of Poisson processes. A simple method to immediately identify excess variation/poor sampling from replicate counts is provided. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. Randomness at the root of things 1: Random walks

    Science.gov (United States)

    Ogborn, Jon; Collins, Simon; Brown, Mick

    2003-09-01

    This is the first of a pair of articles about randomness in physics. In this article, we use some variations on the idea of a `random walk' to consider first the path of a particle in Brownian motion, and then the random variation to be expected in radioactive decay. The arguments are set in the context of the general importance of randomness both in physics and in everyday life. We think that the ideas could usefully form part of students' A-level work on random decay and quantum phenomena, as well as being good for their general education. In the second article we offer a novel and simple approach to Poisson sequences.

  9. Use of electronic healthcare records in large-scale simple randomized trials at the point of care for the documentation of value-based medicine.

    Science.gov (United States)

    van Staa, T-P; Klungel, O; Smeeth, L

    2014-06-01

    A solid foundation of evidence of the effects of an intervention is a prerequisite of evidence-based medicine. The best source of such evidence is considered to be randomized trials, which are able to avoid confounding. However, they may not always estimate effectiveness in clinical practice. Databases that collate anonymized electronic health records (EHRs) from different clinical centres have been widely used for many years in observational studies. Randomized point-of-care trials have been initiated recently to recruit and follow patients using the data from EHR databases. In this review, we describe how EHR databases can be used for conducting large-scale simple trials and discuss the advantages and disadvantages of their use. © 2014 The Association for the Publication of the Journal of Internal Medicine.

  10. DU weaponry: a view on facts and deceptions

    International Nuclear Information System (INIS)

    Joksimovich, V.

    2002-01-01

    The paper summarizes the results of literature research conducted by the author on the use of depleted uranium (DU) weaponry. The research was initiated during the NATO bombing of Yugoslavia in 1999 with an objective of searching for facts in the presence of massive deceptions staged by the huge propaganda machinery of DU weaponry use proponents. The U.S. made use of DU penetrators in the Persian Gulf war as well as in the Balkan wars both in Bosnia and Kosovo. Brief science and history backgrounds are provided including overviews of DU uses and abuses in these three wars. The U.S./NATO public pronouncements have been centered around the theme that there has been no proven link between DU and cancers. In the author's view, these types of carefully word engineered statements are motivated by possible compensation and cleanup claims rather than supported by hard data and sound science. Since underlying causes of so called Gulf and Balkan syndromes have not been found despite a decade elapsed since conclusion of the Persian Gulf War, the DU must continue to be a front-line suspect. From the standpoint of public health and safety, it is prudent and responsible to call for a moratorium. DU use in the Kosovo war, which was not sanctioned by the UN Security Council, was reckless in the extreme. (author)

  11. Simple stochastic simulation.

    Science.gov (United States)

    Schilstra, Maria J; Martin, Stephen R

    2009-01-01

    Stochastic simulations may be used to describe changes with time of a reaction system in a way that explicitly accounts for the fact that molecules show a significant degree of randomness in their dynamic behavior. The stochastic approach is almost invariably used when small numbers of molecules or molecular assemblies are involved because this randomness leads to significant deviations from the predictions of the conventional deterministic (or continuous) approach to the simulation of biochemical kinetics. Advances in computational methods over the three decades that have elapsed since the publication of Daniel Gillespie's seminal paper in 1977 (J. Phys. Chem. 81, 2340-2361) have allowed researchers to produce highly sophisticated models of complex biological systems. However, these models are frequently highly specific for the particular application and their description often involves mathematical treatments inaccessible to the nonspecialist. For anyone completely new to the field to apply such techniques in their own work might seem at first sight to be a rather intimidating prospect. However, the fundamental principles underlying the approach are in essence rather simple, and the aim of this article is to provide an entry point to the field for a newcomer. It focuses mainly on these general principles, both kinetic and computational, which tend to be not particularly well covered in specialist literature, and shows that interesting information may even be obtained using very simple operations in a conventional spreadsheet.

  12. A Bayesian Justification for Random Sampling in Sample Survey

    Directory of Open Access Journals (Sweden)

    Glen Meeden

    2012-07-01

    Full Text Available In the usual Bayesian approach to survey sampling the sampling design, plays a minimal role, at best. Although a close relationship between exchangeable prior distributions and simple random sampling has been noted; how to formally integrate simple random sampling into the Bayesian paradigm is not clear. Recently it has been argued that the sampling design can be thought of as part of a Bayesian's prior distribution. We will show here that under this scenario simple random sample can be given a Bayesian justification in survey sampling.

  13. Asymptotic properties of a simple random motion

    International Nuclear Information System (INIS)

    Ravishankar, K.

    1988-01-01

    A random walker in R/sup N/ is considered. At each step the walker picks a point in R/sup N/ from a fixed finite set of destination points. Having chosen the point, the walker moves a fraction r (r < 1) of the distance toward the point along a straight line. Assuming that the successive destination points are chosen independently, it is shown that the asymptotic distribution of the walker's position has the same mean as the destination point distribution. An estimate is obtained for the fraction of time the walker stays within a ball centered at the mean value for almost every destination sequence. Examples show that the asymptotic distribution could have intricate structure

  14. A simple consensus algorithm for distributed averaging in random ...

    Indian Academy of Sciences (India)

    Random geographical networks are realistic models for wireless sensor ... work are cheap, unreliable, with limited computational power and limited .... signal xj from node j, j does not need to transmit its degree to i in order to let i compute.

  15. How do incentives lead to deception in advisor-client interactions? Explicit and implicit strategies of self-interested deception.

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors' motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor's self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients "self-interested," but they are influenced unconsciously by biased information processing - a tendency which even increased with high

  16. Interference and deception detection technology of satellite navigation based on deep learning

    Science.gov (United States)

    Chen, Weiyi; Deng, Pingke; Qu, Yi; Zhang, Xiaoguang; Li, Yaping

    2017-10-01

    Satellite navigation system plays an important role in people's daily life and war. The strategic position of satellite navigation system is prominent, so it is very important to ensure that the satellite navigation system is not disturbed or destroyed. It is a critical means to detect the jamming signal to avoid the accident in a navigation system. At present, the detection technology of jamming signal in satellite navigation system is not intelligent , mainly relying on artificial decision and experience. For this issue, the paper proposes a method based on deep learning to monitor the interference source in a satellite navigation. By training the interference signal data, and extracting the features of the interference signal, the detection sys tem model is constructed. The simulation results show that, the detection accuracy of our detection system can reach nearly 70%. The method in our paper provides a new idea for the research on intelligent detection of interference and deception signal in a satellite navigation system.

  17. It pays to cheat: tactical deception in a cephalopod social signalling system.

    Science.gov (United States)

    Brown, Culum; Garwood, Martin P; Williamson, Jane E

    2012-10-23

    Signals in intraspecific communication should be inherently honest; otherwise the system is prone to collapse. Theory predicts, however, that honest signalling systems are susceptible to invasion by cheats, the extent of which is largely mediated by fear of reprisal. Cuttlefish facultatively change their shape and colour, an ability that evolved to avoid predators and capture prey. Here, we show that this ability is tactically employed by male mourning cuttlefish (Sepia plangon) to mislead conspecifics during courtship in a specific social context amenable to cheating 39 per cent of the time, while it was never employed in other social contexts. Males deceive rival males by displaying male courtship patterns to receptive females on one side of the body, and simultaneously displaying female patterns to a single rival male on the other, thus preventing the rival from disrupting courtship. The use of tactical deception in such a complex communication network indicates that sociality has played a key role in the cognitive evolution of cephalopods.

  18. A new simple technique for improving the random properties of chaos-based cryptosystems

    Science.gov (United States)

    Garcia-Bosque, M.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Celma, S.

    2018-03-01

    A new technique for improving the security of chaos-based stream ciphers has been proposed and tested experimentally. This technique manages to improve the randomness properties of the generated keystream by preventing the system to fall into short period cycles due to digitation. In order to test this technique, a stream cipher based on a Skew Tent Map algorithm has been implemented on a Virtex 7 FPGA. The randomness of the keystream generated by this system has been compared to the randomness of the keystream generated by the same system with the proposed randomness-enhancement technique. By subjecting both keystreams to the National Institute of Standards and Technology (NIST) tests, we have proved that our method can considerably improve the randomness of the generated keystreams. In order to incorporate our randomness-enhancement technique, only 41 extra slices have been needed, proving that, apart from effective, this method is also efficient in terms of area and hardware resources.

  19. How do incentives lead to deception in advisors-client interactions? Explicit and implicit strategies of self-interested deception.

    Directory of Open Access Journals (Sweden)

    Barbara eMackinger

    2012-12-01

    Full Text Available When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information and to implicit strategic behavior (bias in information processing: evaluation and memory. In Study 1 explicit strategic behavior could be identified: Self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: Self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: When accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information, and to higher implicit strategic behavior (devaluated and remembered less conflicting information. Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients self-interested, but they are influenced unconsciously by biased information processing—a tendency which even increased with

  20. How Do Incentives Lead to Deception in Advisor–Client Interactions? Explicit and Implicit Strategies of Self-Interested Deception

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients “self-interested,” but they are influenced unconsciously by biased information processing – a tendency which even increased with high

  1. A massive experiment on choice blindness in political decisions: Confidence, confabulation, and unconscious detection of self-deception.

    Directory of Open Access Journals (Sweden)

    Andrés Rieznik

    Full Text Available We implemented a Choice Blindness Paradigm containing political statements in Argentina to reveal the existence of categorical ranges of introspective reports, identified by confidence and agreement levels, separating easy from very hard to manipulate decisions. CBP was implemented in both live and web-based forms. Importantly, and contrary to what was observed in Sweden, we did not observe changes in voting intentions. Also, confidence levels in the manipulated replies where significantly lower than in non-manipulated cases even in undetected manipulations. We name this phenomenon unconscious detection of self-deception. Results also show that females are more difficult to manipulate than men.

  2. Alzheimer random walk

    Science.gov (United States)

    Odagaki, Takashi; Kasuya, Keisuke

    2017-09-01

    Using the Monte Carlo simulation, we investigate a memory-impaired self-avoiding walk on a square lattice in which a random walker marks each of sites visited with a given probability p and makes a random walk avoiding the marked sites. Namely, p = 0 and p = 1 correspond to the simple random walk and the self-avoiding walk, respectively. When p> 0, there is a finite probability that the walker is trapped. We show that the trap time distribution can well be fitted by Stacy's Weibull distribution b(a/b){a+1}/{b}[Γ({a+1}/{b})]-1x^a\\exp(-a/bx^b)} where a and b are fitting parameters depending on p. We also find that the mean trap time diverges at p = 0 as p- α with α = 1.89. In order to produce sufficient number of long walks, we exploit the pivot algorithm and obtain the mean square displacement and its Flory exponent ν(p) as functions of p. We find that the exponent determined for 1000 step walks interpolates both limits ν(0) for the simple random walk and ν(1) for the self-avoiding walk as [ ν(p) - ν(0) ] / [ ν(1) - ν(0) ] = pβ with β = 0.388 when p ≪ 0.1 and β = 0.0822 when p ≫ 0.1. Contribution to the Topical Issue "Continuous Time Random Walk Still Trendy: Fifty-year History, Current State and Outlook", edited by Ryszard Kutner and Jaume Masoliver.

  3. A randomized controlled clinical trial evaluating quality of life when using a simple acupressure protocol in women with primary dysmenorrhea.

    Science.gov (United States)

    Bazarganipour, Fatemeh; Taghavi, Seyed-Abdolvahab; Allan, Helen; Hosseini, Nazafarin; Khosravi, Ahmad; Asadi, Rahimeh; Salari, Shohreh; Dehghani, Raziyeh; Jamshidi, Zahra; Rezaei, Marziyeh; Saberian, Mansoreh; Javedan, Fatemeh; Salari, Zahra; Miri, Fahimeh

    2017-10-01

    To evaluate a simple acupressure protocol in LIV3 and LI4 acupoints in women with primary dysmenorrhea. This paper reports a randomized, single blinded clinical trial. 90 young women with dysmenorrhea were recruited to three groups to receive 20min acupressure every day in either LIV3 or LI4, or placebo points. Acupressure was timed five days before menstruation for three successive menstrual cycles. On menstruation, each participant completed the Wong Baker faces pain scale, and the quality of life short form -12 (QOL SF-12). Intensity and duration of pain between the three groups in the second and third cycles during the intervention (pdysmenorrhea, and improve the QOL. Registration ID in IRCT: IRCT2016052428038N1. Copyright © 2017. Published by Elsevier Ltd.

  4. Programmable disorder in random DNA tilings

    Science.gov (United States)

    Tikhomirov, Grigory; Petersen, Philip; Qian, Lulu

    2017-03-01

    Scaling up the complexity and diversity of synthetic molecular structures will require strategies that exploit the inherent stochasticity of molecular systems in a controlled fashion. Here we demonstrate a framework for programming random DNA tilings and show how to control the properties of global patterns through simple, local rules. We constructed three general forms of planar network—random loops, mazes and trees—on the surface of self-assembled DNA origami arrays on the micrometre scale with nanometre resolution. Using simple molecular building blocks and robust experimental conditions, we demonstrate control of a wide range of properties of the random networks, including the branching rules, the growth directions, the proximity between adjacent networks and the size distribution. Much as combinatorial approaches for generating random one-dimensional chains of polymers have been used to revolutionize chemical synthesis and the selection of functional nucleic acids, our strategy extends these principles to random two-dimensional networks of molecules and creates new opportunities for fabricating more complex molecular devices that are organized by DNA nanostructures.

  5. Random Decrement Based FRF Estimation

    DEFF Research Database (Denmark)

    Brincker, Rune; Asmussen, J. C.

    to speed and quality. The basis of the new method is the Fourier transformation of the Random Decrement functions which can be used to estimate the frequency response functions. The investigations are based on load and response measurements of a laboratory model of a 3 span bridge. By applying both methods...... that the Random Decrement technique is based on a simple controlled averaging of time segments of the load and response processes. Furthermore, the Random Decrement technique is expected to produce reliable results. The Random Decrement technique will reduce leakage, since the Fourier transformation...

  6. Random Decrement Based FRF Estimation

    DEFF Research Database (Denmark)

    Brincker, Rune; Asmussen, J. C.

    1997-01-01

    to speed and quality. The basis of the new method is the Fourier transformation of the Random Decrement functions which can be used to estimate the frequency response functions. The investigations are based on load and response measurements of a laboratory model of a 3 span bridge. By applying both methods...... that the Random Decrement technique is based on a simple controlled averaging of time segments of the load and response processes. Furthermore, the Random Decrement technique is expected to produce reliable results. The Random Decrement technique will reduce leakage, since the Fourier transformation...

  7. Large deviation principle for one-dimensional random walk in dynamic random environment: attractive spin-flips and simple symmetric exclusion

    NARCIS (Netherlands)

    Avena, L.; Hollander, den W.Th.F.; Redig, F.H.J.

    2010-01-01

    Consider a one-dimensional shift-invariant attractive spin-flip system in equilibrium, constituting a dynamic random environment, together with a nearest-neighbor random walk that on occupied sites has a local drift to the right but on vacant sites has a local drift to the left. In previous work we

  8. Simulation of a directed random-walk model: the effect of pseudo-random-number correlations

    OpenAIRE

    Shchur, L. N.; Heringa, J. R.; Blöte, H. W. J.

    1996-01-01

    We investigate the mechanism that leads to systematic deviations in cluster Monte Carlo simulations when correlated pseudo-random numbers are used. We present a simple model, which enables an analysis of the effects due to correlations in several types of pseudo-random-number sequences. This model provides qualitative understanding of the bias mechanism in a class of cluster Monte Carlo algorithms.

  9. Impact of MLC leaf position errors on simple and complex IMRT plans for head and neck cancer

    International Nuclear Information System (INIS)

    Mu, G; Ludlum, E; Xia, P

    2008-01-01

    The dosimetric impact of random and systematic multi-leaf collimator (MLC) leaf position errors is relatively unknown for head and neck intensity-modulated radiotherapy (IMRT) patients. In this report we studied 17 head and neck IMRT patients, including 12 treated with simple plans ( 100 segments). Random errors (-2 to +2 mm) and systematic errors (±0.5 mm and ±1 mm) in MLC leaf positions were introduced into the clinical plans and the resultant dose distributions were analyzed based on defined endpoint doses. The dosimetric effect was insignificant for random MLC leaf position errors up to 2 mm for both simple and complex plans. However, for systematic MLC leaf position errors, we found significant dosimetric differences between the simple and complex IMRT plans. For 1 mm systematic error, the average changes in D 95% were 4% in simple plans versus 8% in complex plans. The average changes in D 0.1cc of the spinal cord and brain stem were 4% in simple plans versus 12% in complex plans. The average changes in parotid glands were 9% in simple plans versus 13% for the complex plans. Overall, simple IMRT plans are less sensitive to leaf position errors than complex IMRT plans

  10. Large deviation principle for one-dimensional random walk in dynamic random environment : attractive spin-flips and simple symmetric exclusion

    NARCIS (Netherlands)

    Avena, L.; Hollander, den W.Th.F.; Redig, F.H.J.

    2009-01-01

    Consider a one-dimensional shift-invariant attractive spin-ip system in equilibrium, constituting a dynamic random environment, together with a nearest-neighbor random walk that on occupied sites has a local drift to the right but on vacant sites has a local drift to the left. In [2] we proved a law

  11. Blocked Randomization with Randomly Selected Block Sizes

    Directory of Open Access Journals (Sweden)

    Jimmy Efird

    2010-12-01

    Full Text Available When planning a randomized clinical trial, careful consideration must be given to how participants are selected for various arms of a study. Selection and accidental bias may occur when participants are not assigned to study groups with equal probability. A simple random allocation scheme is a process by which each participant has equal likelihood of being assigned to treatment versus referent groups. However, by chance an unequal number of individuals may be assigned to each arm of the study and thus decrease the power to detect statistically significant differences between groups. Block randomization is a commonly used technique in clinical trial design to reduce bias and achieve balance in the allocation of participants to treatment arms, especially when the sample size is small. This method increases the probability that each arm will contain an equal number of individuals by sequencing participant assignments by block. Yet still, the allocation process may be predictable, for example, when the investigator is not blind and the block size is fixed. This paper provides an overview of blocked randomization and illustrates how to avoid selection bias by using random block sizes.

  12. Functional MRI analysis of deception among people with antisocial personality disorders%反社会人格障碍患者说谎的功能磁共振分析

    Institute of Scientific and Technical Information of China (English)

    蒋伟雄; 廖坚; 刘华生; 唐艳; 王维

    2012-01-01

    Objective: To investigate the functional magnetic resonance imaging (fMRI) data of deception in antisocial personality disorders (ASPD).Methods: A total of 32 criminals meeting the criteria for ASPD underwent fMRI at 1.5T while responding truthfully questions or lying. We compared the brain activities between truth-telling and lie-telling, and then computed the correlation coefficient between the contrast brain activities and the inclination to deception.Results: The left anterior cingulate gyrus, the bilateral dorsolateral prefrontal cortex, and left inferior parietal lobule were associated with the executive aspects of deception among people with ASPD. But with the greater inclination to deception, the blood oxygen level dependent (BOLD) activities in those regions decreased Conclusion: Evaluations of truthful and untruthful communications pertaining to ASPD subjects may be differentiated in terms of brain BOLD activities, though those activities may decrease in habitual liars, which remains a challenge to the diagnostic accuracy in lie detection.%目的:研究反社会人格的罪犯说谎时的功能磁共振情况.方法:对32个满足反社会人格标准的男性罪犯进行功能磁共振,分析他们在说真话和说假话时的脑区激活差异以及习惯性说谎程度与激活脑区强弱之间的关系.结果:反社会人格障碍患者左扣带回前部,双侧的背外侧前额叶,左顶下小叶与其欺骗行为的执行相关.并且随着善于说谎程度的加强,这些区域的激活强度呈下降趋势.结论:利用大脑的血氧水平依赖激活可对反社会人格障碍患者说谎和说真话行为进行识别,但是血氧水平依赖激活差异会随着善于说谎程度的增加而降低,这对测谎精确度提出了挑战.

  13. Simple CPR: A randomized, controlled trial of video self-instructional cardiopulmonary resuscitation training in an African American church congregation.

    Science.gov (United States)

    Todd, K H; Heron, S L; Thompson, M; Dennis, R; O'Connor, J; Kellermann, A L

    1999-12-01

    Despite the proven efficacy of cardiopulmonary resuscitation (CPR), only a small fraction of the population knows how to perform it. As a result, rates of bystander CPR and rates of survival from cardiac arrest are low. Bystander CPR is particularly uncommon in the African American community. Successful development of a simplified approach to CPR training could boost rates of bystander CPR and save lives. We conducted the following randomized, controlled study to determine whether video self-instruction (VSI) in CPR results in comparable or better performance than traditional CPR training. This randomized, controlled trial was conducted among congregational volunteers in an African American church in Atlanta, GA. Subjects were randomly assigned to receive either 34 minutes of VSI or the 4-hour American Heart Association "Heartsaver" CPR course. Two months after training, blinded observers used explicit criteria to assess CPR performance in a simulated cardiac arrest setting. A recording manikin was used to measure ventilation and chest compression characteristics. Participants also completed a written test of CPR-related knowledge and attitudes. VSI trainees displayed a comparable level of performance to that achieved by traditional trainees. Observers scored 40% of VSI trainees competent or better in performing CPR, compared with only 16% of traditional trainees (absolute difference 24%, 95% confidence interval 8% to 40%). Data from the recording manikin confirmed these observations. VSI trainees and traditional trainees achieved comparable scores on tests of CPR-related knowledge and attitudes. Thirty-four minutes of VSI can produce CPR of comparable quality to that achieved by traditional training methods. VSI provides a simple, quick, consistent, and inexpensive alternative to traditional CPR instruction, and may be used to extend CPR training to historically underserved populations.

  14. Routing of Physarum polycephalum “signals” using simple chemicals

    Science.gov (United States)

    de Lacy Costello, Ben; Adamatzky, Andrew I

    2014-01-01

    In previous work the chemotaxis toward simple organic chemicals was assessed. We utilize the knowledge gained from these chemotactic assays to route Physarum polycephalum “signals” at a series of junctions. By applying chemical inputs at a simple T-junction we were able to reproducibly control the path taken by the plasmodium of P. Polycephalum. Where the chemoattractant farnesene was used at one input a routed signal could be reproducibly generated i.e., P. Polycephalum moves toward the source of chemoattractant. Where the chemoattractant was applied at both inputs the signal was reproducibly split i.e., at the junction the plasmodium splits and moves toward both sources of chemoattractant. If a chemorepellent was used then the signal was reproducibly suppressed i.e., P. Polycephalum did not reach either output and was confined to the input channel. This was regardless of whether a chemoattractant was used in combination with the chemorepellent showing a hierarchy of inhibition over attraction. If no chemical input was used in the simple circuit then a random signal was generated, whereby P. Polycephalum would move toward one output at the junction, but the direction was randomly selected. PMID:25346788

  15. Liar, liar, working memory on fire: Investigating the role of working memory in childhood verbal deception.

    Science.gov (United States)

    Alloway, Tracy Packiam; McCallum, Fiona; Alloway, Ross G; Hoicka, Elena

    2015-09-01

    The aim of the current study was to investigate the role of working memory in verbal deception in children. We presented 6- and 7-year-olds with a temptation resistance paradigm; they played a trivia game and were then given an opportunity to peek at the final answers on the back of a card. Measures of both verbal and visuospatial working memory were included. The good liars performed better on the verbal working memory test in both processing and recall compared with the bad liars. However, there was no difference in visuospatial working scores between good liars and bad liars. This pattern suggests that verbal working memory plays a role in processing and manipulating the multiple pieces of information involved in lie-telling. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Secrecy in Educational Practices: Enacting Nested Black Boxes in Cheating and Deception Detection Systems

    Directory of Open Access Journals (Sweden)

    Jo An Oravec

    2018-02-01

    Full Text Available This paper covers secrecy from the vantage point of recent technological initiatives designed to detect cheating and deception in educational contexts as well as to monitor off-campus social media speech code violations. Many of these systems are developed and implemented by third-party corporate entities who claim practices to be proprietary and secret. The outsourcers involved in these efforts have provided one level of secrecy and educational administrators involved yet another level, thus constructing "nested black boxes." Also discussed in this paper is the “paranoid style” of administration, often supported by the surveillance and construction of rosters of potential non-conformists, such as alleged cheaters and speech code violators. The educational technologies described in this article are increasingly applied to workplace practices, with young people being trained in what is deemed acceptable conduct. Secrecy can serve to alter the character of relationships within the educational institutions involved as well as inside the workplaces in which the approaches are increasingly being integrated.

  17. Comparative effectiveness of inter-simple sequence repeat and ...

    African Journals Online (AJOL)

    A study to compare the effectiveness of inter-simple sequence repeats (ISSR) and randomly amplified polymorphic DNA (RAPD) profiling was carried out with a total of 65 DNA samples using 12 species of Indian Garcinia. ISSR and RAPD profiling were performed with 19 and 12 primers, respectively. ISSR markers ...

  18. A reverse order interview does not aid deception detection regarding intentions.

    Science.gov (United States)

    Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris

    2015-01-01

    Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques.

  19. A reverse order interview does not aid deception detection regarding intentions

    Science.gov (United States)

    Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris

    2015-01-01

    Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques PMID:26379610

  20. Potential ash impact from Antarctic volcanoes: Insights from Deception Island's most recent eruption.

    Science.gov (United States)

    Geyer, A; Marti, A; Giralt, S; Folch, A

    2017-11-28

    Ash emitted during explosive volcanic eruptions may disperse over vast areas of the globe posing a threat to human health and infrastructures and causing significant disruption to air traffic. In Antarctica, at least five volcanoes have reported historic activity. However, no attention has been paid to the potential socio-economic and environmental consequences of an ash-forming eruption occurring at high southern latitudes. This work shows how ash from Antarctic volcanoes may pose a higher threat than previously believed. As a case study, we evaluate the potential impacts of ash for a given eruption scenario from Deception Island, one of the most active volcanoes in Antarctica. Numerical simulations using the novel MMB-MONARCH-ASH model demonstrate that volcanic ash emitted from Antarctic volcanoes could potentially encircle the globe, leading to significant consequences for global aviation safety. Results obtained recall the need for performing proper hazard assessment on Antarctic volcanoes, and are crucial for understanding the patterns of ash distribution at high southern latitudes with strong implications for tephrostratigraphy, which is pivotal to synchronize palaeoclimatic records.

  1. Reflections on Phishing for Phools – The Economics of Manipulation and Deception

    Directory of Open Access Journals (Sweden)

    Thomas Klikauer

    2016-04-01

    Full Text Available Abstract: Nobel Prize winning economists Akerlof and Shiller’s phishing for phools explains the economics behind mass deception and manipulation in market economies. While “phishing” is commonly known as a form of internet fraught, their book ‘takes a new, broader meaning, i.e. getting people to do things that are in the interest of the phisherman, but not in the interest of the target. A phool is someone who, for whatever reason, is successfully phished. These are emotional phools (feelings override common sense and information phools (people act on information that is intentionally crafted to mislead them. Divided into “unpaid bills and financial crash”, “phishing in many contexts”, and “general lessons”, the book uses rafts of examples from economics, the media, and advertising to substantiate their claim. While it avoids linking their findings to capitalism, the book contains a few helpful hints when seeking to avoid being “phished as a phool”. In the end, and despite the economic analysis of the two Nobel Prize winners, the more illuminating book on the subject remains Lindstrom’s “Buyology”.

  2. Simple emergent power spectra from complex inflationary physics

    International Nuclear Information System (INIS)

    Dias, Mafalda; Frazer, Jonathan; Marsh, M.C. David

    2016-04-01

    We construct ensembles of random scalar potentials for N f interacting scalar fields using non-equilibrium random matrix theory, and use these to study the generation of observables during small-field inflation. For N f =O(few), these heavily featured scalar potentials give rise to power spectra that are highly non-linear, at odds with observations. For N f >>1, the superhorizon evolution of the perturbations is generically substantial, yet the power spectra simplify considerably and become more predictive, with most realisations being well approximated by a linear power spectrum. This provides proof of principle that complex inflationary physics can give rise to simple emergent power spectra. We explain how these results can be understood in terms of large N f universality of random matrix theory.

  3. A simple heuristic for Internet-based evidence search in primary care: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Eberbach A

    2016-08-01

    Full Text Available Andreas Eberbach,1 Annette Becker,1 Justine Rochon,2 Holger Finkemeler,1Achim Wagner,3 Norbert Donner-Banzhoff1 1Department of Family and Community Medicine, Philipp University of Marburg, Marburg, Germany; 2Institute of Medical Biometry and Informatics, University of Heidelberg, Heidelberg, Germany; 3Department of Sport Medicine, Justus-Liebig-University of Giessen, Giessen, Germany Background: General practitioners (GPs are confronted with a wide variety of clinical questions, many of which remain unanswered. Methods: In order to assist GPs in finding quick, evidence-based answers, we developed a learning program (LP with a short interactive workshop based on a simple ­three-step-heuristic to improve their search and appraisal competence (SAC. We evaluated the LP ­effectiveness with a randomized controlled trial (RCT. Participants (intervention group [IG] n=20; ­control group [CG] n=31 rated acceptance and satisfaction and also answered 39 ­knowledge ­questions to assess their SAC. We controlled for previous knowledge in content areas covered by the test. Results: Main outcome – SAC: within both groups, the pre–post test shows significant (P=0.00 improvements in correctness (IG 15% vs CG 11% and confidence (32% vs 26% to find evidence-based answers. However, the SAC difference was not significant in the RCT. Other measures: Most workshop participants rated “learning atmosphere” (90%, “skills acquired” (90%, and “relevancy to my practice” (86% as good or very good. The ­LP-recommendations were implemented by 67% of the IG, whereas 15% of the CG already conformed to LP recommendations spontaneously (odds ratio 9.6, P=0.00. After literature search, the IG showed a (not significantly higher satisfaction regarding “time spent” (IG 80% vs CG 65%, “quality of information” (65% vs 54%, and “amount of information” (53% vs 47%.Conclusion: Long-standing established GPs have a good SAC. Despite high acceptance, strong

  4. Coronary bifurcation lesions treated with simple or complex stenting

    DEFF Research Database (Denmark)

    Behan, Miles W; Holm, Niels R; de Belder, Adam J

    2016-01-01

    AIMS: Randomized trials of coronary bifurcation stenting have shown better outcomes from a simple (provisional) strategy rather than a complex (planned two-stent) strategy in terms of short-term efficacy and safety. Here, we report the 5-year all-cause mortality based on pooled patient-level data...

  5. Adult smokers' responses to "corrective statements" regarding tobacco industry deception.

    Science.gov (United States)

    Kollath-Cattano, Christy L; Abad-Vivero, Erika N; Thrasher, James F; Bansal-Travers, Maansi; O'Connor, Richard J; Krugman, Dean M; Berg, Carla J; Hardin, James W

    2014-07-01

    To inform consumers, U.S. Federal Courts have ordered the tobacco industry to disseminate "corrective statements" (CSs) about their deception regarding five topics: smoker health effects, nonsmoker health effects, cigarette addictiveness, design of cigarettes to increase addiction, and relative safety of light cigarettes. To determine how smokers from diverse backgrounds respond to the final, court-mandated wording of these CSs. Data were analyzed from an online consumer panel of 1,404 adult smokers who evaluated one of five CS topics (n=280-281) by reporting novelty, relevance, anger at the industry, and motivation to quit because of the CS. Logistic and linear regression models assessed main and interactive effects of race/ethnicity, gender, education, and CS topic on these responses. Data were collected in January 2013 and analyzed in March 2013. Thirty percent to 54% of participants reported that each CS provided novel information, and novelty was associated with greater relevance, anger at the industry, and motivation to quit because of the message. African Americans and Latinos were more likely than non-Hispanic whites to report that CSs were novel, and they had stronger responses to CSs across all indicators. Compared to men, women reported that CSs were more relevant and motivated them to quit. This study suggests that smokers would value and respond to CSs, particularly smokers from groups that suffer from tobacco-related health disparities. Copyright © 2014. Published by Elsevier Inc.

  6. Simple emergent power spectra from complex inflationary physics

    Energy Technology Data Exchange (ETDEWEB)

    Dias, Mafalda; Frazer, Jonathan [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Marsh, M.C. David [Cambridge Univ. (United Kingdom). Dept. of Applied Mathematics and Theoretical Physics (DAMTP)

    2016-04-15

    We construct ensembles of random scalar potentials for N{sub f} interacting scalar fields using non-equilibrium random matrix theory, and use these to study the generation of observables during small-field inflation. For N{sub f}=O(few), these heavily featured scalar potentials give rise to power spectra that are highly non-linear, at odds with observations. For N{sub f}>>1, the superhorizon evolution of the perturbations is generically substantial, yet the power spectra simplify considerably and become more predictive, with most realisations being well approximated by a linear power spectrum. This provides proof of principle that complex inflationary physics can give rise to simple emergent power spectra. We explain how these results can be understood in terms of large N{sub f} universality of random matrix theory.

  7. Random Item Generation Is Affected by Age

    Science.gov (United States)

    Multani, Namita; Rudzicz, Frank; Wong, Wing Yiu Stephanie; Namasivayam, Aravind Kumar; van Lieshout, Pascal

    2016-01-01

    Purpose: Random item generation (RIG) involves central executive functioning. Measuring aspects of random sequences can therefore provide a simple method to complement other tools for cognitive assessment. We examine the extent to which RIG relates to specific measures of cognitive function, and whether those measures can be estimated using RIG…

  8. Rack Protection Monitor - A Simple System

    International Nuclear Information System (INIS)

    Orr, S.

    1997-12-01

    The Rack Protection Monitor is a simple, fail-safe device to monitor smoke, temperature and ventilation sensors. It accepts inputs from redundant sensors and has a hardwired algorithm to prevent nuisance power trips due to random sensor failures. When a sensor is triggered the Rack Protection Monitor latches and annunicates the alarm. If another sensor is triggered, the Rack Protection Monitor locally shuts down the power to the relay rack and sends alarm to central control

  9. Roughening in random sine-Gordon systems

    International Nuclear Information System (INIS)

    Schwartz, M.; Nattermann, T.

    1991-01-01

    We consider the spatial correlations of the optimal solutions of the random sine-Gordon equation as an example of the usefulness of a very simple ansatz relating the Fourier transforms of certain functions of the field Φ to the Fourier transform of the random fields. The dramatic change in the correlations when going from above to below two dimensions is directly attributed to the transfer from dominance of long range fluctuations of the randomness to the dominance of short range fluctuations. (orig.)

  10. Locally Perturbed Random Walks with Unbounded Jumps

    OpenAIRE

    Paulin, Daniel; Szász, Domokos

    2010-01-01

    In \\cite{SzT}, D. Sz\\'asz and A. Telcs have shown that for the diffusively scaled, simple symmetric random walk, weak convergence to the Brownian motion holds even in the case of local impurities if $d \\ge 2$. The extension of their result to finite range random walks is straightforward. Here, however, we are interested in the situation when the random walk has unbounded range. Concretely we generalize the statement of \\cite{SzT} to unbounded random walks whose jump distribution belongs to th...

  11. Analysis of cause-specific failure endpoints using simple proportions: an example from a randomized controlled clinical trial in early breast cancer

    International Nuclear Information System (INIS)

    Panzarella, Tony; Meakin, J. William

    1998-01-01

    Purpose: To describe a statistically valid method for analyzing cause-specific failure data based on simple proportions, that is easy to understand and apply, and outline under what conditions its implementation is well-suited. Methods and Materials: In the comparison of treatment groups, time to first failure (in any site) was analyzed first, followed by an analysis of the pattern of first failure, preferably at the latest complete follow-up time common to each group. Results: A retrospective analysis of time to contralateral breast cancer in 777 early breast cancer patients was undertaken. Patients previously treated by mastectomy plus radiation therapy to the chest wall and regional nodal areas were randomized to receive further radiation and prednisone (R+P), radiation alone (R), or no further treatment (NT). Those randomized to R+P had a statistically significantly delayed time to first failure compared to the group randomized to NT (p = 0.0008). Patients randomized to R also experienced a delayed time to first failure compared to NT, but the difference was not statistically significant (p 0.14). At 14 years from the date of surgery (the latest common complete follow-up time) the distribution of first failures was statistically significantly different between R+P and NT (p = 0.005), but not between R and NT (p = 0.09). The contralateral breast cancer first failure rate at 14 years from surgery was 7.2% for NT, 4.6% for R, and 3.7% for R+P. The corresponding Kaplan-Meier estimates were 13.2%, 8.2%, and 5.4%, respectively. Conclusion: Analyzing cause-specific failure data using methods developed for survival endpoints is problematic. We encourage the use of the two-step analysis strategy described when, as in the example presented, competing causes of failure are not likely to be statistically independent, and when a treatment comparison at a single time-point is clinically relevant and feasible; that is, all patients have complete follow-up to this point

  12. Turning around Newton's Second Law

    Science.gov (United States)

    Goff, John Eric

    2004-01-01

    Conceptual and quantitative difficulties surrounding Newton's second law often arise among introductory physics students. Simply turning around how one expresses Newton's second law may assist students in their understanding of a deceptively simple-looking equation.

  13. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  14. Double Deception: Ant-Mimicking Spiders Elude Both Visually- and Chemically-Oriented Predators

    Science.gov (United States)

    Uma, Divya; Durkee, Caitlin; Herzner, Gudrun; Weiss, Martha

    2013-01-01

    Biological mimicry is often multimodal, in that a mimic reinforces its resemblance to another organism via different kinds of signals that can be perceived by a specific target audience. In this paper we describe a novel scenario, in which a mimic deceives at least two distinct audiences, each of which relies primarily on a different sensory modality for decision-making. We have previously shown that Peckhamia picata, a myrmecomorphic spider that morphologically and behaviorally resembles the ant Camponotus nearcticus, experiences reduced predation by visually-oriented jumping spiders. Here we report that Peckhamia also faces reduced aggression from spider-hunting sphecid wasps as well as from its model ant, both of which use chemical cues to identify prey. We also report that Peckhamia does not chemically resemble its model ants, and that its total cuticular hydrocarbons are significantly lower than those of the ants and non-mimic spiders. Although further studies are needed to clarify the basis of Peckhamia's chemically-mediated protection, to our knowledge, such ‘double deception,’ in which a single organism sends misleading visual cues to one set of predators while chemically misleading another set, has not been reported; however, it is likely to be common among what have until now been considered purely visual mimics. PMID:24236152

  15. A simple approximation method for dilute Ising systems

    International Nuclear Information System (INIS)

    Saber, M.

    1996-10-01

    We describe a simple approximate method to analyze dilute Ising systems. The method takes into consideration the fluctuations of the effective field, and is based on a probability distribution of random variables which correctly accounts for all the single site kinematic relations. It is shown that the simplest approximation gives satisfactory results when compared with other methods. (author). 12 refs, 2 tabs

  16. Linear Programming, the Simplex Algorithm and Simple Polytopes

    Directory of Open Access Journals (Sweden)

    Das Bhusan

    2010-09-01

    Full Text Available In the first part of the paper we survey some far reaching applications of the basis facts of linear programming to the combinatorial theory of simple polytopes. In the second part we discuss some recent developments concurring the simplex algorithm. We describe sub-exponential randomized pivot roles and upper bounds on the diameter of graphs of polytopes.

  17. Seismic monitoring at Deception Island volcano (Antarctica): the 2010-2011 survey

    Science.gov (United States)

    Martín, R.; Carmona, E.; Almendros, J.; Serrano, I.; Villaseñor, A.; Galeano, J.

    2012-04-01

    As an example of the recent advances introduced in seismic monitoring of Deception Island volcano (Antarctica) during recent years, we describe the instrumental network deployed during the 2010-2011 survey by the Instituto Andaluz de Geofísica of University of Granada, Spain (IAG-UGR). The period of operation extended from December 19, 2010 to March 5, 2011. We deployed a wireless seismic network composed by four three-component seismic stations. These stations are based on 24-bit SL04 SARA dataloggers sampling at 100 sps. They use a PC with embedded linux and SEISLOG data acquisition software. We use two types of three-component seismometers: short-period Mark L4C with natural frequency of 1 Hz and medium-period Lennartz3D/5s with natural frequency of 0.2 Hz. The network was designed for an optimum spatial coverage of the northern half of Deception, where a magma chamber has been reported. Station locations include the vicinity of the Spanish base "Gabriel de Castilla" (GdC), Obsidianas Beach, a zone near the craters from the 1970 eruptions, and the Chilean Shelter located south of Pendulum Cove. Continuous data from the local seismic network are received in real-time in the base by wifi transmission. We used Ubiquiti Networks Nanostation2 antennas with 2.4 GHz, dual-polarity, 10 dBi gain, and 54 Mbps transmission rate. They have shown a great robustness and speed for real-time applications. To prioritize data acquisition when the battery level is low, we have designed a circuit that allows independent power management for the seismic station and wireless transmission system. The reception antenna located at GdC is connected to a computer running SEISCOMP. This software supports several transmission protocols and manages the visualization and recording of seismic data, including the generation of summary plots to show the seismic activity. These twelve data channels are stored in miniseed format and displayed in real time, which allows for a rapid evaluation of

  18. Comparison of polygraph data obtained from individuals involved in mock crimes and actual criminal investigations.

    Science.gov (United States)

    Pollina, Dean A; Dollins, Andrew B; Senter, Stuart M; Krapohl, Donald J; Ryan, Andrew H

    2004-12-01

    In a preliminary attempt to determine the generalizability of data from laboratory mock-crime studies, the authors examined the similarities and differences among the cardiovascular, electrodermal, and respiration responses of deceptive and nondeceptive individuals elicited to crime-relevant and crime-irrelevant questions. Participants in the laboratory group were randomly assigned to nondeceptive (n = 28) or deceptive (n = 27) treatment groups, and a mock-crime scenario was used. The field participants were confirmed nondeceptive (n = 28) or deceptive (n = 39) criminal suspects who underwent polygraph examinations between 1993 and 1997. The results indicated that there were salient differences between field and similarly obtained laboratory polygraph response measures. However, accuracy of laboratory participants' classifications using logistic regression analysis was not significantly different from field participants' classification accuracy. 2004 APA, all rights reserved

  19. Predict or classify: The deceptive role of time-locking in brain signal classification

    Science.gov (United States)

    Rusconi, Marco; Valleriani, Angelo

    2016-06-01

    Several experimental studies claim to be able to predict the outcome of simple decisions from brain signals measured before subjects are aware of their decision. Often, these studies use multivariate pattern recognition methods with the underlying assumption that the ability to classify the brain signal is equivalent to predict the decision itself. Here we show instead that it is possible to correctly classify a signal even if it does not contain any predictive information about the decision. We first define a simple stochastic model that mimics the random decision process between two equivalent alternatives, and generate a large number of independent trials that contain no choice-predictive information. The trials are first time-locked to the time point of the final event and then classified using standard machine-learning techniques. The resulting classification accuracy is above chance level long before the time point of time-locking. We then analyze the same trials using information theory. We demonstrate that the high classification accuracy is a consequence of time-locking and that its time behavior is simply related to the large relaxation time of the process. We conclude that when time-locking is a crucial step in the analysis of neural activity patterns, both the emergence and the timing of the classification accuracy are affected by structural properties of the network that generates the signal.

  20. A randomized controlled trial of two simple mind-body programs, Kirtan Kriya meditation and music listening, for adults with subjective cognitive decline: Feasibility and acceptability.

    Science.gov (United States)

    Innes, Kim E; Selfe, Terry Kit; Khalsa, Dharma Singh; Kandati, Sahiti

    2016-06-01

    In this randomized controlled trial (RCT), we assessed the feasibility and acceptability of two simple home-based relaxation programs in adults experiencing subjective cognitive decline, a strong predictor of Alzheimer's disease. Sixty participants were randomized to a beginner Kirtan Kriya meditation (KK) program or a music listening (ML) program. Participants were asked to practice 12min daily for the first 12 weeks, then as often as they liked for the following 3 months. Participants underwent assessments at baseline, 12 weeks, and 6 months to evaluate changes in key outcomes. Feasibility and acceptability were evaluated by measuring recruitment and retention rates, assessment visit attendance, practice adherence, and treatment expectancy; exit questionnaires completed at 12 weeks and 6 months provided additional data regarding participant experience with the study, perceived barriers to and facilitators of practice, reasons for drop-out, and views regarding the assigned intervention. Fifty-three participants (88%) completed the 6 month study. Adherence in both groups was excellent, with participants completing 93% (91% KK, 94% ML) of sessions on average in the first 12 weeks, and 71% (68% KK, 74% ML) during the 3 month, practice-optional, follow-up period. At week 12, over 80% of participants indicated they were likely to continue practicing following study completion. Responses to both structured and open-ended exit questionnaire items also suggested high satisfaction with both programs. Findings of this RCT of a beginner meditation practice and a simple ML program suggest that both programs were well accepted and the practices are feasible in adults with early memory loss. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. The sample ACF of a simple bilinear process

    NARCIS (Netherlands)

    Basrak, B; Davis, RA; Mikosch, T

    1999-01-01

    We consider a simple bilinear process X-t = aX(t-1) + bX(t-1)Z(t-1) +Z(t), where (Z(t)) is a sequence of iid N(0, 1) random variables. It follows from a result by Kesten (1973, Acta Math. 131, 207-248) that X-t has a distribution with regularly varying tails of index alpha > 0 provided the equation

  2. Local lattice relaxations in random metallic alloys: Effective tetrahedron model and supercell approach

    DEFF Research Database (Denmark)

    Ruban, Andrei; Simak, S.I.; Shallcross, S.

    2003-01-01

    We present a simple effective tetrahedron model for local lattice relaxation effects in random metallic alloys on simple primitive lattices. A comparison with direct ab initio calculations for supercells representing random Ni0.50Pt0.50 and Cu0.25Au0.75 alloys as well as the dilute limit of Au-ri......-rich CuAu alloys shows that the model yields a quantitatively accurate description of the relaxtion energies in these systems. Finally, we discuss the bond length distribution in random alloys....

  3. Random packing of digitized particles

    NARCIS (Netherlands)

    Korte, de A.C.J.; Brouwers, H.J.H.

    2013-01-01

    The random packing of regularly and irregularly shaped particles has been studied extensively. Within this paper, packing is studied from the perspective of digitized particles. These digitized particles are developed for and used in cellular automata systems, which are employed for the simple

  4. Random packing of digitized particles

    NARCIS (Netherlands)

    de Korte, A.C.J.; Brouwers, Jos

    2012-01-01

    The random packing of regularly and irregularly shaped particles has been studied extensively. Within this paper, packing is studied from the perspective of digitized particles. These digitized particles are developed for and used in cellular automata systems, which are employed for the simple

  5. The science of ethics: Deception, the resilient self, and the APA code of ethics, 1966-1973.

    Science.gov (United States)

    Stark, Laura

    2010-01-01

    This paper has two aims. The first is to shed light on a remarkable archival source, namely survey responses from thousands of American psychologists during the 1960s in which they described their contemporary research practices and discussed whether the practices were "ethical." The second aim is to examine the process through which the American Psychological Association (APA) used these survey responses to create principles on how psychologists should treat human subjects. The paper focuses on debates over whether "deception" research was acceptable. It documents how members of the committee that wrote the principles refereed what was, in fact, a disagreement between two contemporary research orientations. The paper argues that the ethics committee ultimately built the model of "the resilient self" into the APA's 1973 ethics code. At the broadest level, the paper explores how prevailing understandings of human nature are written into seemingly universal and timeless codes of ethics. © 2010 Wiley Periodicals, Inc.

  6. Learning from simple ebooks, online cases or classroom teaching when acquiring complex knowledge. A randomized controlled trial in respiratory physiology and pulmonology.

    Science.gov (United States)

    Worm, Bjarne Skjødt

    2013-01-01

    E-learning is developing fast because of the rapid increased use of smartphones, tablets and portable computers. We might not think of it as e-learning, but today many new e-books are in fact very complex electronic teaching platforms. It is generally accepted that e-learning is as effective as classroom teaching methods, but little is known about its value in relaying contents of different levels of complexity to students. We set out to investigate e-learning effects on simple recall and complex problem-solving compared to classroom teaching. 63 nurses specializing in anesthesiology were evenly randomized into three groups. They were given internet-based knowledge tests before and after attending a teaching module about respiratory physiology and pulmonology. The three groups was either an e-learning group with eBook teaching material, an e-learning group with case-based teaching or a group with face-to-face case-based classroom teaching. After the module the students were required to answer a post-test. Time spent and the number of logged into the system was also measured. For simple recall, all methods were equally effective. For problem-solving, the eCase group achieved a comparable knowledge level to classroom teaching, while textbook learning was inferior to both (p<0.01). The textbook group also spent the least amount of time on acquiring knowledge (33 minutes, p<0.001), while the eCase group spent significantly more time on the subject (53 minutes, p<0.001) and logged into the system significantly more (2.8 vs 1.6, p<0.001). E-learning based cases are an effective tool for teaching complex knowledge and problem-solving ability, but future studies using higher-level e-learning are encouraged.Simple recall skills, however, do not require any particular learning method.

  7. Learning from simple ebooks, online cases or classroom teaching when acquiring complex knowledge. A randomized controlled trial in respiratory physiology and pulmonology.

    Directory of Open Access Journals (Sweden)

    Bjarne Skjødt Worm

    Full Text Available BACKGROUND AND AIMS: E-learning is developing fast because of the rapid increased use of smartphones, tablets and portable computers. We might not think of it as e-learning, but today many new e-books are in fact very complex electronic teaching platforms. It is generally accepted that e-learning is as effective as classroom teaching methods, but little is known about its value in relaying contents of different levels of complexity to students. We set out to investigate e-learning effects on simple recall and complex problem-solving compared to classroom teaching. METHODS: 63 nurses specializing in anesthesiology were evenly randomized into three groups. They were given internet-based knowledge tests before and after attending a teaching module about respiratory physiology and pulmonology. The three groups was either an e-learning group with eBook teaching material, an e-learning group with case-based teaching or a group with face-to-face case-based classroom teaching. After the module the students were required to answer a post-test. Time spent and the number of logged into the system was also measured. RESULTS: For simple recall, all methods were equally effective. For problem-solving, the eCase group achieved a comparable knowledge level to classroom teaching, while textbook learning was inferior to both (p<0.01. The textbook group also spent the least amount of time on acquiring knowledge (33 minutes, p<0.001, while the eCase group spent significantly more time on the subject (53 minutes, p<0.001 and logged into the system significantly more (2.8 vs 1.6, p<0.001. CONCLUSIONS: E-learning based cases are an effective tool for teaching complex knowledge and problem-solving ability, but future studies using higher-level e-learning are encouraged.Simple recall skills, however, do not require any particular learning method.

  8. A simple method for analyzing data from a randomized trial with a missing binary outcome

    Directory of Open Access Journals (Sweden)

    Freedman Laurence S

    2003-05-01

    Full Text Available Abstract Background Many randomized trials involve missing binary outcomes. Although many previous adjustments for missing binary outcomes have been proposed, none of these makes explicit use of randomization to bound the bias when the data are not missing at random. Methods We propose a novel approach that uses the randomization distribution to compute the anticipated maximum bias when missing at random does not hold due to an unobserved binary covariate (implying that missingness depends on outcome and treatment group. The anticipated maximum bias equals the product of two factors: (a the anticipated maximum bias if there were complete confounding of the unobserved covariate with treatment group among subjects with an observed outcome and (b an upper bound factor that depends only on the fraction missing in each randomization group. If less than 15% of subjects are missing in each group, the upper bound factor is less than .18. Results We illustrated the methodology using data from the Polyp Prevention Trial. We anticipated a maximum bias under complete confounding of .25. With only 7% and 9% missing in each arm, the upper bound factor, after adjusting for age and sex, was .10. The anticipated maximum bias of .25 × .10 =.025 would not have affected the conclusion of no treatment effect. Conclusion This approach is easy to implement and is particularly informative when less than 15% of subjects are missing in each arm.

  9. Adult Smokers' Responses to “Corrective Statements” Regarding Tobacco Industry Deception

    Science.gov (United States)

    Kollath-Cattano, Christy L.; Abad-Vivero, Erika N.; Thrasher, James F.; Bansal-Travers, Maansi; O'Connor, Richard J.; Krugman, Dean M.; Berg, Carla J.; Hardin, James W.

    2014-01-01

    Background To inform consumers, U.S. Federal Courts have ordered the tobacco industry to disseminate “corrective statements” (CSs) about their deception regarding five topics: smoker health effects, nonsmoker health effects, cigarette addictiveness, design of cigarettes to increase addiction, and relative safety of light cigarettes. Purpose To determine how smokers from diverse backgrounds respond to the final, court-mandated wording of these CSs. Methods Data were analyzed from an online consumer panel of 1,404 adult smokers who evaluated one of five CS topics (n=280–281) by reporting novelty, relevance, anger at the industry, and motivation to quit because of the CS. Logistic and linear regression models assessed main and interactive effects of race/ethnicity, gender, education, and CS topic on these responses. Data were collected in January 2013 and analyzed in March 2013. Results Thirty percent to 54% of participants reported that each CS provided novel information, and novelty was associated with greater relevance, anger at the industry, and motivation to quit because of the message. African Americans and Latinos were more likely than non-Hispanic whites to report that CSs were novel, and they had stronger responses to CSs across all indicators. Compared to men, women reported that CSs were more relevant and motivated them to quit. Conclusions This study suggests that smokers would value and respond to CSs, particularly smokers from groups that suffer from tobacco–related health disparities. PMID:24746372

  10. Reputation management promotes strategic adjustment of service quality in cleaner wrasse.

    Science.gov (United States)

    Binning, Sandra A; Rey, Olivia; Wismer, Sharon; Triki, Zegni; Glauser, Gaétan; Soares, Marta C; Bshary, Redouan

    2017-08-21

    Adjusting one's behaviour in response to eavesdropping bystanders is considered a sophisticated social strategy, yet the underlying mechanisms are not well studied. Cleaner wrasse, Labroides dimidiatus, cooperate by eating ectoparasites off "client" fishes, or cheat (i.e. bite) and eat client mucus. Image scoring by bystander clients generally causes cleaners from socially-complex (i.e. high cleaner and client abundance; high client species richness) habitats to increase levels of cooperation. However, some individuals may periodically provide tactile stimulation to small resident clients, which attract bystanders close that are bitten, a form of tactical deception. Cortisol injection can reproduce this pattern. Here, we tested whether cleaners from socially-complex versus simple habitats respond differently to cortisol injections in terms of their cleaning interactions with clients. We found that only cleaners from the socially-complex habitat respond to cortisol injection with strategies functioning as tactical deception: i.e. increased tactile stimulation to small clients and increased cheating of large clients relative to small ones. At the socially-simple site, where reputation management is less important, cortisol-treated fish increased their overall levels of cheating, especially of small clients. Thus, strategic adjustments to cooperative behaviour and tactical deception are likely context-dependent, forming part of general reputation management abilities in cleaner wrasse.

  11. Interplay of Determinism and Randomness: From Irreversibility to Chaos, Fractals, and Stochasticity

    Science.gov (United States)

    Tsonis, A.

    2017-12-01

    We will start our discussion into randomness by looking exclusively at our formal mathematical system to show that even in this pure and strictly logical system one cannot do away with randomness. By employing simple mathematical models, we will identify the three possible sources of randomness: randomness due to inability to find the rules (irreversibility), randomness due to inability to have infinite power (chaos), and randomness due to stochastic processes. Subsequently we will move from the mathematical system to our physical world to show that randomness, through the quantum mechanical character of small scales, through chaos, and because of the second law of thermodynamics, is an intrinsic property of nature as well. We will subsequently argue that the randomness in the physical world is consistent with the three sources of randomness suggested from the study of simple mathematical systems. Many examples ranging from purely mathematical to natural processes will be presented, which clearly demonstrate how the combination of rules and randomness produces the world we live in. Finally, the principle of least effort or the principle of minimum energy consumption will be suggested as the underlying principle behind this symbiosis between determinism and randomness.

  12. Qubits in a random environment

    International Nuclear Information System (INIS)

    Akhalwaya, I; Fannes, M; Petruccione, F

    2007-01-01

    Decoherence phenomena in a small quantum system coupled to a complex environment can be modelled with random matrices. We propose a simple deterministic model in the limit of a high dimensional environment. The model is investigated numerically and some analytically addressable questions are singled out

  13. A super-assembly of Whi3 encodes memory of deceptive encounters by single cells during yeast courtship.

    Science.gov (United States)

    Caudron, Fabrice; Barral, Yves

    2013-12-05

    Cellular behavior is frequently influenced by the cell's history, indicating that single cells may memorize past events. We report that budding yeast permanently escape pheromone-induced cell-cycle arrest when experiencing a deceptive mating attempt, i.e., not reaching their putative partner within reasonable time. This acquired behavior depends on super-assembly and inactivation of the G1/S inhibitor Whi3, which liberates the G1 cyclin Cln3 from translational inhibition. Super-assembly of Whi3 is a slow response to pheromone, driven by polyQ and polyN domains, counteracted by Hsp70, and stable over generations. Unlike prion aggregates, Whi3 super-assemblies are not inherited mitotically but segregate to the mother cell. We propose that such polyQ- and polyN-based elements, termed here mnemons, act as cellular memory devices to encode previous environmental conditions. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. The Effect of Herrmann Whole Brain Teaching Method on Students' Understanding of Simple Electric Circuits

    Science.gov (United States)

    Bawaneh, Ali Khalid Ali; Nurulazam Md Zain, Ahmad; Salmiza, Saleh

    2011-01-01

    The purpose of this study was to investigate the effect of Herrmann Whole Brain Teaching Method over conventional teaching method on eight graders in their understanding of simple electric circuits in Jordan. Participants (N = 273 students; M = 139, F = 134) were randomly selected from Bani Kenanah region-North of Jordan and randomly assigned to…

  15. Reconstructing random media

    International Nuclear Information System (INIS)

    Yeong, C.L.; Torquato, S.

    1998-01-01

    We formulate a procedure to reconstruct the structure of general random heterogeneous media from limited morphological information by extending the methodology of Rintoul and Torquato [J. Colloid Interface Sci. 186, 467 (1997)] developed for dispersions. The procedure has the advantages that it is simple to implement and generally applicable to multidimensional, multiphase, and anisotropic structures. Furthermore, an extremely useful feature is that it can incorporate any type and number of correlation functions in order to provide as much morphological information as is necessary for accurate reconstruction. We consider a variety of one- and two-dimensional reconstructions, including periodic and random arrays of rods, various distribution of disks, Debye random media, and a Fontainebleau sandstone sample. We also use our algorithm to construct heterogeneous media from specified hypothetical correlation functions, including an exponentially damped, oscillating function as well as physically unrealizable ones. copyright 1998 The American Physical Society

  16. Response of stiff piles to random two-way lateral loading

    DEFF Research Database (Denmark)

    Bakmar, Christian LeBlanc; Byrne, B.W.; Houlsby, G. T.

    2010-01-01

    A model for predicting the accumulated rotation of stiff piles under random two-way loading is presented. The model is based on a strain superposition rule similar to Miner's rule and uses rainflow-counting to decompose a random time-series of varying loads into a set of simple load reversals. Th....... The method is consistent with the work of LeBlanc et al. (2010) and is supported by 1g laboratory tests. An example is given for an offshore wind turbine indicating that accumulated pile rotation during the life of the turbine is dominated by the worst expected load.......A model for predicting the accumulated rotation of stiff piles under random two-way loading is presented. The model is based on a strain superposition rule similar to Miner's rule and uses rainflow-counting to decompose a random time-series of varying loads into a set of simple load reversals...

  17. Random walks and diffusion on networks

    Science.gov (United States)

    Masuda, Naoki; Porter, Mason A.; Lambiotte, Renaud

    2017-11-01

    Random walks are ubiquitous in the sciences, and they are interesting from both theoretical and practical perspectives. They are one of the most fundamental types of stochastic processes; can be used to model numerous phenomena, including diffusion, interactions, and opinions among humans and animals; and can be used to extract information about important entities or dense groups of entities in a network. Random walks have been studied for many decades on both regular lattices and (especially in the last couple of decades) on networks with a variety of structures. In the present article, we survey the theory and applications of random walks on networks, restricting ourselves to simple cases of single and non-adaptive random walkers. We distinguish three main types of random walks: discrete-time random walks, node-centric continuous-time random walks, and edge-centric continuous-time random walks. We first briefly survey random walks on a line, and then we consider random walks on various types of networks. We extensively discuss applications of random walks, including ranking of nodes (e.g., PageRank), community detection, respondent-driven sampling, and opinion models such as voter models.

  18. An urban geography of globalisation : New urban structures in the age of hyper-connectivity

    NARCIS (Netherlands)

    Rocco, R.

    2008-01-01

    How is Globalisation changing the form and spatial structure of cities today? Deceptively simple, this question presents us with a number of methodological challenges and unanswered theoretical problems. What is globalization? Can we define a series of distinctive new phenomena constituting a

  19. Estimating Genetic Conformism of Korean Mulberry Cultivars Using Random Amplified Polymorphic DNA and Inter-Simple Sequence Repeat Profiling

    Directory of Open Access Journals (Sweden)

    Sunirmal Sheet

    2018-03-01

    Full Text Available Apart from being fed to silkworms in sericulture, the ecologically important Mulberry plant has been used for traditional medicine in Asian countries as well as in manufacturing wine, food, and beverages. Germplasm analysis among Mulberry cultivars originating from South Korea is crucial in the plant breeding program for cultivar development. Hence, the genetic deviations and relations among 8 Morus alba plants, and one Morus lhou plant, of different cultivars collected from South Korea were investigated using 10 random amplified polymorphic DNA (RAPD and 10 inter-simple sequence repeat (ISSR markers in the present study. The ISSR markers exhibited a higher polymorphism (63.42% among mulberry genotypes in comparison to RAPD markers. Furthermore, the similarity coefficient was estimated for both markers and found to be varying between 0.183 and 0.814 for combined pooled data of ISSR and RAPD. The phenogram drawn using the UPGMA cluster method based on combined pooled data of RAPD and ISSR markers divided the nine mulberry genotypes into two divergent major groups and the two individual independent accessions. The distant relationship between Dae-Saug (SM1 and SangchonJo Sang Saeng (SM5 offers a possibility of utilizing them in mulberry cultivar improvement of Morus species of South Korea.

  20. "To Bluff like a Man or Fold like a Girl?" - Gender Biased Deceptive Behavior in Online Poker.

    Science.gov (United States)

    Palomäki, Jussi; Yan, Jeff; Modic, David; Laakasuo, Michael

    2016-01-01

    Evolutionary psychology suggests that men are more likely than women to deceive to bolster their status and influence. Also gender perception influences deceptive behavior, which is linked to pervasive gender stereotypes: women are typically viewed as weaker and more gullible than men. We assessed bluffing in an online experiment (N = 502), where participants made decisions to bluff or not in simulated poker tasks against opponents represented by avatars. Participants bluffed on average 6% more frequently at poker tables with female-only avatars than at tables with male-only or gender mixed avatars-a highly significant effect in games involving repeated decisions. Nonetheless, participants did not believe the avatar genders affected their decisions. Males bluffed 13% more frequently than females. Unlike most economic games employed exclusively in research contexts, online poker is played for money by tens of millions of people worldwide. Thus, gender effects in bluffing have significant monetary consequences for poker players.

  1. "To Bluff like a Man or Fold like a Girl?" - Gender Biased Deceptive Behavior in Online Poker.

    Directory of Open Access Journals (Sweden)

    Jussi Palomäki

    Full Text Available Evolutionary psychology suggests that men are more likely than women to deceive to bolster their status and influence. Also gender perception influences deceptive behavior, which is linked to pervasive gender stereotypes: women are typically viewed as weaker and more gullible than men. We assessed bluffing in an online experiment (N = 502, where participants made decisions to bluff or not in simulated poker tasks against opponents represented by avatars. Participants bluffed on average 6% more frequently at poker tables with female-only avatars than at tables with male-only or gender mixed avatars-a highly significant effect in games involving repeated decisions. Nonetheless, participants did not believe the avatar genders affected their decisions. Males bluffed 13% more frequently than females. Unlike most economic games employed exclusively in research contexts, online poker is played for money by tens of millions of people worldwide. Thus, gender effects in bluffing have significant monetary consequences for poker players.

  2. Randomized controlled trial of changes in dietary carbohydrate/fat ratio and simple vs complex carbohydrates on body weight and blood lipids: the CARMEN study. The Carbohydrate Ratio Management in European National diets.

    Science.gov (United States)

    Saris, W H; Astrup, A; Prentice, A M; Zunft, H J; Formiguera, X; Verboeket-van de Venne, W P; Raben, A; Poppitt, S D; Seppelt, B; Johnston, S; Vasilaras, T H; Keogh, G F

    2000-10-01

    To investigate the long-term effects of changes in dietary carbohydrate/fat ratio and simple vs complex carbohydrates. Randomized controlled multicentre trial (CARMEN), in which subjects were allocated for 6 months either to a seasonal control group (no intervention) or to one of three experimental groups: a control diet group (dietary intervention typical of the average national intake); a low-fat high simple carbohydrate group; or a low-fat high complex carbohydrate group. Three hundred and ninety eight moderately obese adults. The change in body weight was the primary outcome; changes in body composition and blood lipids were secondary outcomes. Body weight loss in the low-fat high simple carbohydrate and low-fat high complex carbohydrate groups was 0.9 kg (P Fat mass changed by -1.3kg (Plow-fat high simple carbohydrate, low-fat high complex carbohydrate and control diet groups, respectively. Changes in blood lipids did not differ significantly between the dietary treatment groups. Our findings suggest that reduction of fat intake results in a modest but significant reduction in body weight and body fatness. The concomitant increase in either simple or complex carbohydrates did not indicate significant differences in weight change. No adverse effects on blood lipids were observed. These findings underline the importance of this dietary change and its potential impact on the public health implications of obesity.

  3. Evidence of significant bias in an elementary random number generator

    International Nuclear Information System (INIS)

    Borgwaldt, H.; Brandl, V.

    1981-03-01

    An elementary pseudo random number generator for isotropically distributed unit vectors in 3-dimensional space has ben tested for bias. This generator uses the IBM-suplied routine RANDU and a transparent rejection technique. The tests show clearly that non-randomness in the pseudo random numbers generated by the primary IBM generator leads to bias in the order of 1 percent in estimates obtained from the secondary random number generator. FORTRAN listings of 4 variants of the random number generator called by a simple test programme and output listings are included for direct reference. (orig.) [de

  4. Analgesic effectiveness of prophylactic therapy and continued therapy with naproxen sodium post simple extraction.

    Directory of Open Access Journals (Sweden)

    Angel Asmat-Abanto

    2015-02-01

    Full Text Available To compare the analgesic effectiveness of the prophylactic therapy and continued therapy with naproxen sodium after a simple dental extraction. Material and methods: This prospective randomized, parallel, single-blind clinical trial was developed in the Dental Clinic of the Universidad Alas Peruanas in Trujillo (Peru. The patients, who required simple extraction due to dental caries, were randomly distributed into three groups: 30 of them took 550mg naproxen sodium in the preoperative period and then every 12 hours, other 30 took 550mg naproxen sodium in the postoperative period and then every 12 hours, and 30(control group, received 400mg ibuprofen in the postoperative period and then every 8 hours, depending on the established criteria. The procedure was standardized, analgesic effectiveness was assessed by visual analog scale and the presence of adverse drug reactions was evaluated as well. Data were analyzed using ANOVA and Duncan’s test using IBM SPSS 22 with a significance level of 5%. Results: Continued therapy with naproxen sodium showed greater analgesic effectiveness after a simple extraction at 1, 8 and 24 hours (p<0.005. Conclusion: Continued therapy with naproxen sodium presented greater effectiveness than prophylactic therapy with naproxen sodium after a simple extraction.

  5. Simulation of random walks in field theory

    International Nuclear Information System (INIS)

    Rensburg, E.J.J. van

    1988-01-01

    The numerical simulation of random walks is considered using the Monte Carlo method previously proposed. The algorithm is tested and then generalised to generate Edwards random walks. The renormalised masses of the Edwards model are calculated and the results are compared with those obtained from a simple perturbation theory calculation for small values of the bare coupling constant. The efficiency of this algorithm is discussed and compared with an alternative approach. (author)

  6. Mobile access to virtual randomization for investigator-initiated trials.

    Science.gov (United States)

    Deserno, Thomas M; Keszei, András P

    2017-08-01

    Background/aims Randomization is indispensable in clinical trials in order to provide unbiased treatment allocation and a valid statistical inference. Improper handling of allocation lists can be avoided using central systems, for example, human-based services. However, central systems are unaffordable for investigator-initiated trials and might be inaccessible from some places, where study subjects need allocations. We propose mobile access to virtual randomization, where the randomization lists are non-existent and the appropriate allocation is computed on demand. Methods The core of the system architecture is an electronic data capture system or a clinical trial management system, which is extended by an R interface connecting the R server using the Java R Interface. Mobile devices communicate via the representational state transfer web services. Furthermore, a simple web-based setup allows configuring the appropriate statistics by non-statisticians. Our comprehensive R script supports simple randomization, restricted randomization using a random allocation rule, block randomization, and stratified randomization for un-blinded, single-blinded, and double-blinded trials. For each trial, the electronic data capture system or the clinical trial management system stores the randomization parameters and the subject assignments. Results Apps are provided for iOS and Android and subjects are randomized using smartphones. After logging onto the system, the user selects the trial and the subject, and the allocation number and treatment arm are displayed instantaneously and stored in the core system. So far, 156 subjects have been allocated from mobile devices serving five investigator-initiated trials. Conclusion Transforming pre-printed allocation lists into virtual ones ensures the correct conduct of trials and guarantees a strictly sequential processing in all trial sites. Covering 88% of all randomization models that are used in recent trials, virtual randomization

  7. From complex to simple: interdisciplinary stochastic models

    International Nuclear Information System (INIS)

    Mazilu, D A; Zamora, G; Mazilu, I

    2012-01-01

    We present two simple, one-dimensional, stochastic models that lead to a qualitative understanding of very complex systems from biology, nanoscience and social sciences. The first model explains the complicated dynamics of microtubules, stochastic cellular highways. Using the theory of random walks in one dimension, we find analytical expressions for certain physical quantities, such as the time dependence of the length of the microtubules, and diffusion coefficients. The second one is a stochastic adsorption model with applications in surface deposition, epidemics and voter systems. We introduce the ‘empty interval method’ and show sample calculations for the time-dependent particle density. These models can serve as an introduction to the field of non-equilibrium statistical physics, and can also be used as a pedagogical tool to exemplify standard statistical physics concepts, such as random walks or the kinetic approach of the master equation. (paper)

  8. A Review on asymptotic normality of sums of associated random ...

    African Journals Online (AJOL)

    Association between random variables is a generalization of independence of these random variables. This concept is more and more commonly used in current trends in any research elds in Statistics. In this paper, we proceed to a simple, clear and rigorous introduction to it. We will present the fundamental asymptotic ...

  9. True random numbers from amplified quantum vacuum.

    Science.gov (United States)

    Jofre, M; Curty, M; Steinlechner, F; Anzolin, G; Torres, J P; Mitchell, M W; Pruneri, V

    2011-10-10

    Random numbers are essential for applications ranging from secure communications to numerical simulation and quantitative finance. Algorithms can rapidly produce pseudo-random outcomes, series of numbers that mimic most properties of true random numbers while quantum random number generators (QRNGs) exploit intrinsic quantum randomness to produce true random numbers. Single-photon QRNGs are conceptually simple but produce few random bits per detection. In contrast, vacuum fluctuations are a vast resource for QRNGs: they are broad-band and thus can encode many random bits per second. Direct recording of vacuum fluctuations is possible, but requires shot-noise-limited detectors, at the cost of bandwidth. We demonstrate efficient conversion of vacuum fluctuations to true random bits using optical amplification of vacuum and interferometry. Using commercially-available optical components we demonstrate a QRNG at a bit rate of 1.11 Gbps. The proposed scheme has the potential to be extended to 10 Gbps and even up to 100 Gbps by taking advantage of high speed modulation sources and detectors for optical fiber telecommunication devices.

  10. Random number generation and creativity.

    Science.gov (United States)

    Bains, William

    2008-01-01

    A previous paper suggested that humans can generate genuinely random numbers. I tested this hypothesis by repeating the experiment with a larger number of highly numerate subjects, asking them to call out a sequence of digits selected from 0 through 9. The resulting sequences were substantially non-random, with an excess of sequential pairs of numbers and a deficit of repeats of the same number, in line with previous literature. However, the previous literature suggests that humans generate random numbers with substantial conscious effort, and distractions which reduce that effort reduce the randomness of the numbers. I reduced my subjects' concentration by asking them to call out in another language, and with alcohol - neither affected the randomness of their responses. This suggests that the ability to generate random numbers is a 'basic' function of the human mind, even if those numbers are not mathematically 'random'. I hypothesise that there is a 'creativity' mechanism, while not truly random, provides novelty as part of the mind's defence against closed programming loops, and that testing for the effects seen here in people more or less familiar with numbers or with spontaneous creativity could identify more features of this process. It is possible that training to perform better at simple random generation tasks could help to increase creativity, through training people to reduce the conscious mind's suppression of the 'spontaneous', creative response to new questions.

  11. Views about scientists and scientific work in the novel Deception Point by Dan Brown: possibilities to insert History and Philosophy of Science elements

    Directory of Open Access Journals (Sweden)

    Wilmo Ernesto Francisco Junior

    2015-02-01

    Full Text Available Considering the influence of literature on people lives, this study investigates elements concerning views about scientists and scientific work presented in Deception Point, a novel by Dan Brown. Multiple aspects to represent the scientist figure, life and work, emerge from the novel and problematize characteristics that can be considered as a common sense view, or others perspectives based on more contemporaneous philosophical thoughts on science. Reading and analyzing this novel could be an interesting opportunity to insert elements of history and philosophy of science under different focus. This study discusses some elements, from excerpts of the novel, which may become possibilities for debates in Science classes at schools, and in teacher education.

  12. The Shark Random Swim - (Lévy Flight with Memory)

    Science.gov (United States)

    Businger, Silvia

    2018-05-01

    The Elephant Random Walk (ERW), first introduced by Schütz and Trimper (Phys Rev E 70:045101, 2004), is a one-dimensional simple random walk on Z having a memory about the whole past. We study the Shark Random Swim, a random walk with memory about the whole past, whose steps are α -stable distributed with α \\in (0,2] . Our aim in this work is to study the impact of the heavy tailed step distributions on the asymptotic behavior of the random walk. We shall see that, as for the ERW, the asymptotic behavior of the Shark Random Swim depends on its memory parameter p, and that a phase transition can be observed at the critical value p=1/α.

  13. Skew-orthogonal polynomials and random matrix theory

    CERN Document Server

    Ghosh, Saugata

    2009-01-01

    Orthogonal polynomials satisfy a three-term recursion relation irrespective of the weight function with respect to which they are defined. This gives a simple formula for the kernel function, known in the literature as the Christoffel-Darboux sum. The availability of asymptotic results of orthogonal polynomials and the simple structure of the Christoffel-Darboux sum make the study of unitary ensembles of random matrices relatively straightforward. In this book, the author develops the theory of skew-orthogonal polynomials and obtains recursion relations which, unlike orthogonal polynomials, depend on weight functions. After deriving reduced expressions, called the generalized Christoffel-Darboux formulas (GCD), he obtains universal correlation functions and non-universal level densities for a wide class of random matrix ensembles using the GCD. The author also shows that once questions about higher order effects are considered (questions that are relevant in different branches of physics and mathematics) the ...

  14. Non-periodic pseudo-random numbers used in Monte Carlo calculations

    Science.gov (United States)

    Barberis, Gaston E.

    2007-09-01

    The generation of pseudo-random numbers is one of the interesting problems in Monte Carlo simulations, mostly because the common computer generators produce periodic numbers. We used simple pseudo-random numbers generated with the simplest chaotic system, the logistic map, with excellent results. The numbers generated in this way are non-periodic, which we demonstrated for 1013 numbers, and they are obtained in a deterministic way, which allows to repeat systematically any calculation. The Monte Carlo calculations are the ideal field to apply these numbers, and we did it for simple and more elaborated cases. Chemistry and Information Technology use this kind of simulations, and the application of this numbers to quantum Monte Carlo and cryptography is immediate. I present here the techniques to calculate, analyze and use these pseudo-random numbers, show that they lack periodicity up to 1013 numbers and that they are not correlated.

  15. Non-periodic pseudo-random numbers used in Monte Carlo calculations

    International Nuclear Information System (INIS)

    Barberis, Gaston E.

    2007-01-01

    The generation of pseudo-random numbers is one of the interesting problems in Monte Carlo simulations, mostly because the common computer generators produce periodic numbers. We used simple pseudo-random numbers generated with the simplest chaotic system, the logistic map, with excellent results. The numbers generated in this way are non-periodic, which we demonstrated for 10 13 numbers, and they are obtained in a deterministic way, which allows to repeat systematically any calculation. The Monte Carlo calculations are the ideal field to apply these numbers, and we did it for simple and more elaborated cases. Chemistry and Information Technology use this kind of simulations, and the application of this numbers to quantum Monte Carlo and cryptography is immediate. I present here the techniques to calculate, analyze and use these pseudo-random numbers, show that they lack periodicity up to 10 13 numbers and that they are not correlated

  16. A simple sample size formula for analysis of covariance in cluster randomized trials.

    NARCIS (Netherlands)

    Teerenstra, S.; Eldridge, S.; Graff, M.J.; Hoop, E. de; Borm, G.F.

    2012-01-01

    For cluster randomized trials with a continuous outcome, the sample size is often calculated as if an analysis of the outcomes at the end of the treatment period (follow-up scores) would be performed. However, often a baseline measurement of the outcome is available or feasible to obtain. An

  17. Simple machines

    CERN Document Server

    Graybill, George

    2007-01-01

    Just how simple are simple machines? With our ready-to-use resource, they are simple to teach and easy to learn! Chocked full of information and activities, we begin with a look at force, motion and work, and examples of simple machines in daily life are given. With this background, we move on to different kinds of simple machines including: Levers, Inclined Planes, Wedges, Screws, Pulleys, and Wheels and Axles. An exploration of some compound machines follows, such as the can opener. Our resource is a real time-saver as all the reading passages, student activities are provided. Presented in s

  18. A hybrid-type quantum random number generator

    Science.gov (United States)

    Hai-Qiang, Ma; Wu, Zhu; Ke-Jin, Wei; Rui-Xue, Li; Hong-Wei, Liu

    2016-05-01

    This paper proposes a well-performing hybrid-type truly quantum random number generator based on the time interval between two independent single-photon detection signals, which is practical and intuitive, and generates the initial random number sources from a combination of multiple existing random number sources. A time-to-amplitude converter and multichannel analyzer are used for qualitative analysis to demonstrate that each and every step is random. Furthermore, a carefully designed data acquisition system is used to obtain a high-quality random sequence. Our scheme is simple and proves that the random number bit rate can be dramatically increased to satisfy practical requirements. Project supported by the National Natural Science Foundation of China (Grant Nos. 61178010 and 11374042), the Fund of State Key Laboratory of Information Photonics and Optical Communications (Beijing University of Posts and Telecommunications), China, and the Fundamental Research Funds for the Central Universities of China (Grant No. bupt2014TS01).

  19. Stochastic space interval as a link between quantum randomness and macroscopic randomness?

    Science.gov (United States)

    Haug, Espen Gaarder; Hoff, Harald

    2018-03-01

    For many stochastic phenomena, we observe statistical distributions that have fat-tails and high-peaks compared to the Gaussian distribution. In this paper, we will explain how observable statistical distributions in the macroscopic world could be related to the randomness in the subatomic world. We show that fat-tailed (leptokurtic) phenomena in our everyday macroscopic world are ultimately rooted in Gaussian - or very close to Gaussian-distributed subatomic particle randomness, but they are not, in a strict sense, Gaussian distributions. By running a truly random experiment over a three and a half-year period, we observed a type of random behavior in trillions of photons. Combining our results with simple logic, we find that fat-tailed and high-peaked statistical distributions are exactly what we would expect to observe if the subatomic world is quantized and not continuously divisible. We extend our analysis to the fact that one typically observes fat-tails and high-peaks relative to the Gaussian distribution in stocks and commodity prices and many aspects of the natural world; these instances are all observable and documentable macro phenomena that strongly suggest that the ultimate building blocks of nature are discrete (e.g. they appear in quanta).

  20. Diffusion in randomly perturbed dissipative dynamics

    Science.gov (United States)

    Rodrigues, Christian S.; Chechkin, Aleksei V.; de Moura, Alessandro P. S.; Grebogi, Celso; Klages, Rainer

    2014-11-01

    Dynamical systems having many coexisting attractors present interesting properties from both fundamental theoretical and modelling points of view. When such dynamics is under bounded random perturbations, the basins of attraction are no longer invariant and there is the possibility of transport among them. Here we introduce a basic theoretical setting which enables us to study this hopping process from the perspective of anomalous transport using the concept of a random dynamical system with holes. We apply it to a simple model by investigating the role of hyperbolicity for the transport among basins. We show numerically that our system exhibits non-Gaussian position distributions, power-law escape times, and subdiffusion. Our simulation results are reproduced consistently from stochastic continuous time random walk theory.

  1. Thermophoresis as persistent random walk

    International Nuclear Information System (INIS)

    Plyukhin, A.V.

    2009-01-01

    In a simple model of a continuous random walk a particle moves in one dimension with the velocity fluctuating between +v and -v. If v is associated with the thermal velocity of a Brownian particle and allowed to be position dependent, the model accounts readily for the particle's drift along the temperature gradient and recovers basic results of the conventional thermophoresis theory.

  2. Simple method to generate and fabricate stochastic porous scaffolds

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Nan, E-mail: y79nzw@163.com; Gao, Lilan; Zhou, Kuntao

    2015-11-01

    Considerable effort has been made to generate regular porous structures (RPSs) using function-based methods, although little effort has been made for constructing stochastic porous structures (SPSs) using the same methods. In this short communication, we propose a straightforward method for SPS construction that is simple in terms of methodology and the operations used. Using our method, we can obtain a SPS with functionally graded, heterogeneous and interconnected pores, target pore size and porosity distributions, which are useful for applications in tissue engineering. The resulting SPS models can be directly fabricated using additive manufacturing (AM) techniques. - Highlights: • Random porous structures are constructed based on their regular counterparts. • Functionally graded random pores can be constructed easily. • The scaffolds can be directly fabricated using additive manufacturing techniques.

  3. The efficacy of electroacupuncture for the treatment of simple female stress urinary incontinence - comparison with pelvic floor muscle training: study protocol for a multicenter randomized controlled trial.

    Science.gov (United States)

    Su, Tongsheng; Zhou, Jing; Liu, Zhishun; Chen, Yuelai; Zhang, Wei; Chu, Haoran; Luo, Qiong; Lu, Jin; An, Junming; Liu, Baoyan

    2015-02-08

    Previous research has shown that electroacupuncture therapy has a potential therapeutic effect for simple female stress urinary incontinence. In this study, pelvic floor muscle training, the first-line treatment for stress urinary incontinence in women based on meta-analysis of numerous randomized control trials and recommended by international clinical practice, is used as a control group to demonstrate whether electroacupuncture therapy is a better method for female stress urinary incontinence. A randomized controlled trial has been designed to evaluate the therapeutic benefit of electroacupuncture for female stress urinary incontinence compared with pelvic floor muscle training. The safety of electroacupuncture and patient compliance will also be evaluated. Untoward reaction to the electroacupuncture, including a broken needle, fainting on acupuncture, or pain during acupuncture, will be recorded and the therapy will be stopped if an untoward reaction occurs. After we have received full ethical approval and patient consent, participants will be randomized to receive a series of 24 electroacupuncture or pelvic floor muscle training interventions. The frequency and amount of leakage will be measured as the primary outcome parameters. Secondary outcome parameters include the 1-hour pad test, the short-form of the International Consultation on Incontinence Questionnaire, patient subjective effectiveness evaluation, weekly usage of pad, and usage of specialty therapy for female stress urinary incontinence. This trial will help to determine whether electroacupuncture is a more effective treatment than pelvic floor muscle training for patients with female stress urinary incontinence. ClinicalTrials.gov NCT01940432 (12 September 2013).

  4. SIMPLE ESTIMATOR AND CONSISTENT STRONGLY OF STABLE DISTRIBUTIONS

    Directory of Open Access Journals (Sweden)

    Cira E. Guevara Otiniano

    2016-06-01

    Full Text Available Stable distributions are extensively used to analyze earnings of financial assets, such as exchange rates and stock prices assets. In this paper we propose a simple and strongly consistent estimator for the scale parameter of a symmetric stable L´evy distribution. The advantage of this estimator is that your computational time is minimum thus it can be used to initialize intensive computational procedure such as maximum likelihood. With random samples of sized n we tested the efficacy of these estimators by Monte Carlo method. We also included applications for three data sets.

  5. Anharmonic stabilization and band gap renormalization in the perovskite CsSnI3

    DEFF Research Database (Denmark)

    Patrick, Christopher; Jacobsen, Karsten Wedel; Thygesen, Kristian Sommer

    2015-01-01

    Amongst the X(Sn,Pb)Y3 perovskites currently under scrutiny for their photovoltaic applications, the cubic B−α phase of CsSnI3 is arguably the best characterized experimentally. Yet, according to the standard harmonic theory of phonons, this deceptively simple phase should not exist at all due to...

  6. Negotiating triple roles as activists, managers and researchers in Vietnam's LGBT movement

    NARCIS (Netherlands)

    Hoang, T.A.; Oosterhoff, P.; Lalor, K.; Mills, E.; Sánchez García, A.; Haste, P.

    2016-01-01

    The contributions to this Edited Collection reveal the complexity of the deceptively simple question posed by its title: Gender, Sexuality and Social Justice: What’s Law Got to Do With It? Many of those involved in this publication are directly involved in and affected by the issues to which the

  7. Friendship after a friends with benefits relationship: deception, psychological functioning, and social connectedness.

    Science.gov (United States)

    Owen, Jesse; Fincham, Frank D; Manthos, Megan

    2013-11-01

    Friends with benefits (FWB) relationships are formed by an integration of friendship and sexual intimacy, typically without the explicit commitments characteristic of an exclusive romantic relationship. The majority of these relationships do not transition into committed romantic relationships, raising questions about what happens to the relationship after the FWB ends. In a sample of 119 men and 189 women university students, with a median age of 19 years and the majority identified as Caucasian (63.6 %), we assessed relationship adjustment, feelings of deception, perception of the FWB relationship and friendship, social connectedness, psychological distress, and loneliness. Results demonstrated that the majority of FWB relationships continued as friendships after the sexual intimacy ceased and that about 50 % of the participants reported feeling as close or closer to their FWB partner. Those who did not remain friends were more likely to report that their FWB relationship was more sex- than friendship-based; they also reported higher levels of feeling deceived by their FWB partner and higher levels of loneliness and psychological distress, but lower levels of mutual social connectedness. Higher levels of feeling deceived were related to feeling less close to the post-FWB friend; also, more sex-based FWB relationships were likely to result in post-FWB friendships that were either more or less close (as opposed to unchanged). FWB relationships, especially those that include more attention to friendship based intimacy, do not appear to negatively impact the quality of the friendship after the "with benefits" ends.

  8. Effects of a simple home-based exercise program on fall prevention in older adults: A 12-month primary care setting, randomized controlled trial.

    Science.gov (United States)

    Boongird, Chitima; Keesukphan, Prasit; Phiphadthakusolkul, Soontraporn; Rattanasiri, Sasivimol; Thakkinstian, Ammarin

    2017-11-01

    To investigate the effects of a simple home-based exercise program on falls, physical functioning, fear of falling and quality of life in a primary care setting. Participants (n = 439), aged ≥65 years with mild-to-moderate balance dysfunction were randomly assigned to an exercise (n = 219) or control (n = 220) group. The program consisted of five combined exercises, which progressed in difficulty, and a walking plan. Controls received fall prevention education. Physical functioning and other outcomes were measured at 3- and 6-month follow-up visits. Falls were monitored with fall diaries and phone interviews at 3, 6, 9, and 12 months respectively. The 12 months of the home-based exercise program showed the incidence of falls was 0.30 falls per person year in the exercise group, compared with 0.40 in the control group. The estimated incidence rate ratio was 0.75 (95% CI 0.55-1.04), which was not statistically significant. The fear of falling (measured by the Thai fall efficacy scale) was significantly lower in the exercise than control group (24.7 vs 27.0, P = 0.003). Also, the trend of program adherence increased in the exercise group. (29.6% to 56.8%). This simple home-based exercise program showed a reduction in fear of falling and a positive trend towards exercise adherence. Further studies should focus on factors associated with exercise adherence, the benefits of increased home visits and should follow participants longer in order to evaluate the effects of the program. Geriatr Gerontol Int 2017; 17: 2157-2163. © 2017 Japan Geriatrics Society.

  9. Mesoscopic description of random walks on combs

    Science.gov (United States)

    Méndez, Vicenç; Iomin, Alexander; Campos, Daniel; Horsthemke, Werner

    2015-12-01

    Combs are a simple caricature of various types of natural branched structures, which belong to the category of loopless graphs and consist of a backbone and branches. We study continuous time random walks on combs and present a generic method to obtain their transport properties. The random walk along the branches may be biased, and we account for the effect of the branches by renormalizing the waiting time probability distribution function for the motion along the backbone. We analyze the overall diffusion properties along the backbone and find normal diffusion, anomalous diffusion, and stochastic localization (diffusion failure), respectively, depending on the characteristics of the continuous time random walk along the branches, and compare our analytical results with stochastic simulations.

  10. Stability of reaction fronts in random walk simulations

    NARCIS (Netherlands)

    Nagy, Noemi; Izsak, F.

    A model of propagating reaction fronts is given for simple autocatalytic reactions and the stability of the propagating reaction fronts are studied in several numerical experiments. The corresponding random walk simulations - extending of a recent algorithm - make possible the simultaneous treatment

  11. Impression management ("lie") scales are associated with interpersonally oriented self-control, not other-deception.

    Science.gov (United States)

    Uziel, Liad

    2014-06-01

    This article explores the status of impression management (IM) scales ("lie scales," notably, BIDR-IM) as measures of response bias, offers theory-driven substantive meaning to them, and compares them with self-deception enhancement (SDE). Study 1 (N = 99) compared self-descriptions of actual self and ideal self given in a non-anonymous setting. High similarity indicates self-enhancement. Study 2 (70 dyads) analyzed self-other agreement about IM and SDE. Agreement indicates substantive basis to the scales' scores. Study 3 (N = 182) explored the centrality of self-control in the self-perception of individuals varying in IM and SDE. Study 4 (95 dyads) corroborated self-reports about self-control using informants' reports. In Study 1, IM was associated with relative humility, whereas SDE was associated with self-enhancement. In Study 2, strong self-other agreement was found only for IM, indicating that high IM (but not SDE) is grounded in real-life behavior. In Study 3, self-control was central in the self-perception of high IM and high SDE individuals. In Study 4, strong relations with self-control were corroborated by informants only for IM. IM scales measure substantive content associated with self-control aimed at social adaptation, whereas the SDE scale depicts individuals with a grandiose self-perception, who fail to impress knowledgeable others. © 2013 Wiley Periodicals, Inc.

  12. Linking of uniform random polygons in confined spaces

    International Nuclear Information System (INIS)

    Arsuaga, J; Blackstone, T; Diao, Y; Karadayi, E; Saito, M

    2007-01-01

    In this paper, we study the topological entanglement of uniform random polygons in a confined space. We derive the formula for the mean squared linking number of such polygons. For a fixed simple closed curve in the confined space, we rigorously show that the linking probability between this curve and a uniform random polygon of n vertices is at least 1-O(1/√n). Our numerical study also indicates that the linking probability between two uniform random polygons (in a confined space), of m and n vertices respectively, is bounded below by 1-O(1/√(mn)). In particular, the linking probability between two uniform random polygons, both of n vertices, is bounded below by 1-O(1/n)

  13. Electrical conductivity in random alloys

    International Nuclear Information System (INIS)

    Mookerjee, A.; Thakur, P.K.; Yussouff, M.

    1984-12-01

    Based on the augmented space formalism introduced by one of us and the use of the Ward identity and the Bethe-Sapeter equation, a formalism has been developed for the calculation of electrical conductivity for random alloys. A simple application is made to a model case, and it is argued that the formalism enables us to carry out viable calculations on more realistic models of alloys. (author)

  14. Red Rural, Blue Rural: The Geography of Presidential Voting in Rural America

    Science.gov (United States)

    Scala, Dante J.; Johnson, Kenneth M.

    2016-01-01

    Political commentators routinely treat rural America as an undifferentiated bastion of strength for Republicans. In fact, rural America is a deceptively simple term describing a remarkably diverse collection of places encompassing nearly 75 percent of the U.S. land area and 50 million people. Voting trends in this vast area are far from…

  15. A 'simple' hybrid model for power derivatives

    International Nuclear Information System (INIS)

    Lyle, Matthew R.; Elliott, Robert J.

    2009-01-01

    This paper presents a method for valuing power derivatives using a supply-demand approach. Our method extends work in the field by incorporating randomness into the base load portion of the supply stack function and equating it with a noisy demand process. We obtain closed form solutions for European option prices written on average spot prices considering two different supply models: a mean-reverting model and a Markov chain model. The results are extensions of the classic Black-Scholes equation. The model provides a relatively simple approach to describe the complicated price behaviour observed in electricity spot markets and also allows for computationally efficient derivatives pricing. (author)

  16. Spherically symmetric random walks. II. Dimensionally dependent critical behavior

    International Nuclear Information System (INIS)

    Bender, C.M.; Boettcher, S.; Meisinger, P.N.

    1996-01-01

    A recently developed model of random walks on a D-dimensional hyperspherical lattice, where D is not restricted to integer values, is extended to include the possibility of creating and annihilating random walkers. Steady-state distributions of random walkers are obtained for all dimensions D approx-gt 0 by solving a discrete eigenvalue problem. These distributions exhibit dimensionally dependent critical behavior as a function of the birth rate. This remarkably simple model exhibits a second-order phase transition with a universal, nontrivial critical exponent for all dimensions D approx-gt 0. copyright 1996 The American Physical Society

  17. Human mammary epithelial cells exhibit a bimodal correlated random walk pattern.

    Science.gov (United States)

    Potdar, Alka A; Jeon, Junhwan; Weaver, Alissa M; Quaranta, Vito; Cummings, Peter T

    2010-03-10

    Organisms, at scales ranging from unicellular to mammals, have been known to exhibit foraging behavior described by random walks whose segments confirm to Lévy or exponential distributions. For the first time, we present evidence that single cells (mammary epithelial cells) that exist in multi-cellular organisms (humans) follow a bimodal correlated random walk (BCRW). Cellular tracks of MCF-10A pBabe, neuN and neuT random migration on 2-D plastic substrates, analyzed using bimodal analysis, were found to reveal the BCRW pattern. We find two types of exponentially distributed correlated flights (corresponding to what we refer to as the directional and re-orientation phases) each having its own correlation between move step-lengths within flights. The exponential distribution of flight lengths was confirmed using different analysis methods (logarithmic binning with normalization, survival frequency plots and maximum likelihood estimation). Because of the presence of non-uniform turn angle distribution of move step-lengths within a flight and two different types of flights, we propose that the epithelial random walk is a BCRW comprising of two alternating modes with varying degree of correlations, rather than a simple persistent random walk. A BCRW model rather than a simple persistent random walk correctly matches the super-diffusivity in the cell migration paths as indicated by simulations based on the BCRW model.

  18. Human mammary epithelial cells exhibit a bimodal correlated random walk pattern.

    Directory of Open Access Journals (Sweden)

    Alka A Potdar

    2010-03-01

    Full Text Available Organisms, at scales ranging from unicellular to mammals, have been known to exhibit foraging behavior described by random walks whose segments confirm to Lévy or exponential distributions. For the first time, we present evidence that single cells (mammary epithelial cells that exist in multi-cellular organisms (humans follow a bimodal correlated random walk (BCRW.Cellular tracks of MCF-10A pBabe, neuN and neuT random migration on 2-D plastic substrates, analyzed using bimodal analysis, were found to reveal the BCRW pattern. We find two types of exponentially distributed correlated flights (corresponding to what we refer to as the directional and re-orientation phases each having its own correlation between move step-lengths within flights. The exponential distribution of flight lengths was confirmed using different analysis methods (logarithmic binning with normalization, survival frequency plots and maximum likelihood estimation.Because of the presence of non-uniform turn angle distribution of move step-lengths within a flight and two different types of flights, we propose that the epithelial random walk is a BCRW comprising of two alternating modes with varying degree of correlations, rather than a simple persistent random walk. A BCRW model rather than a simple persistent random walk correctly matches the super-diffusivity in the cell migration paths as indicated by simulations based on the BCRW model.

  19. Analysis of genetic diversity of Sclerotinia sclerotiorum from eggplant by mycelial compatibility, random amplification of polymorphic DNA (RAPD and simple sequence repeat (SSR analyses

    Directory of Open Access Journals (Sweden)

    Fatih Mehmet Tok

    2016-09-01

    Full Text Available The genetic diversity and pathogenicity/virulence among 60 eggplant Sclerotinia sclerotiorum isolates collected from six different geographic regions of Turkey were analysed using mycelial compatibility groupings (MCGs, random amplified polymorphic DNA (RAPD and simple sequence repeat (SSR polymorphism. By MCG tests, the isolates were classified into 22 groups. Out of 22 MCGs, 36% were represented each by a single isolate. The isolates showed great variability for virulence regardless of MCG and geographic origin. Based on the results of RAPD and SSR analyses, 60 S. sclerotiorum isolates representing 22 MCGs were grouped in 2 and 3 distinct clusters, respectively. Analyses using RAPD and SSR markers illustrated that cluster groupings or genetic distance of S. sclerotiorum populations from eggplant were not distinctly relative to the MCG, geographical origin and virulence diversity. The patterns obtained revealed a high heterogeneity of genetic composition and suggested the occurrence of clonal and sexual reproduction of S. sclerotiorum on eggplant in the areas surveyed.

  20. Linking of uniform random polygons in confined spaces

    Science.gov (United States)

    Arsuaga, J.; Blackstone, T.; Diao, Y.; Karadayi, E.; Saito, M.

    2007-03-01

    In this paper, we study the topological entanglement of uniform random polygons in a confined space. We derive the formula for the mean squared linking number of such polygons. For a fixed simple closed curve in the confined space, we rigorously show that the linking probability between this curve and a uniform random polygon of n vertices is at least 1-O\\big(\\frac{1}{\\sqrt{n}}\\big) . Our numerical study also indicates that the linking probability between two uniform random polygons (in a confined space), of m and n vertices respectively, is bounded below by 1-O\\big(\\frac{1}{\\sqrt{mn}}\\big) . In particular, the linking probability between two uniform random polygons, both of n vertices, is bounded below by 1-O\\big(\\frac{1}{n}\\big) .

  1. Conditional Monte Carlo randomization tests for regression models.

    Science.gov (United States)

    Parhat, Parwen; Rosenberger, William F; Diao, Guoqing

    2014-08-15

    We discuss the computation of randomization tests for clinical trials of two treatments when the primary outcome is based on a regression model. We begin by revisiting the seminal paper of Gail, Tan, and Piantadosi (1988), and then describe a method based on Monte Carlo generation of randomization sequences. The tests based on this Monte Carlo procedure are design based, in that they incorporate the particular randomization procedure used. We discuss permuted block designs, complete randomization, and biased coin designs. We also use a new technique by Plamadeala and Rosenberger (2012) for simple computation of conditional randomization tests. Like Gail, Tan, and Piantadosi, we focus on residuals from generalized linear models and martingale residuals from survival models. Such techniques do not apply to longitudinal data analysis, and we introduce a method for computation of randomization tests based on the predicted rate of change from a generalized linear mixed model when outcomes are longitudinal. We show, by simulation, that these randomization tests preserve the size and power well under model misspecification. Copyright © 2014 John Wiley & Sons, Ltd.

  2. Effects of the Physical Laboratory versus the Virtual Laboratory in Teaching Simple Electric Circuits on Conceptual Achievement and Attitudes Towards the Subject

    Science.gov (United States)

    Tekbiyik, Ahmet; Ercan, Orhan

    2015-01-01

    Current study examined the effects of virtual and physical laboratory practices on students' conceptual achievement in the subject of electricity and their attitudes towards simple electric circuits. Two groups (virtual and physical) selected through simple random sampling was taught with web-aided material called "Electricity in Our…

  3. Excitations in a Two-Dimensional Random Antiferromagnet

    DEFF Research Database (Denmark)

    Birgeneau, R. J.; Walker, L. R.; Guggenheim, H. J.

    1975-01-01

    Inelastic neutron scattering studies of the magnetic excitations in the planar Heisenberg random antiferromagnet Rb2Mn0.5Ni0.5F4 at 7K are reported. Two well-defined bands of excitations are observed. A simple mean crystal model is found to predict accurately the measured dispersion relations using...

  4. Level density of random matrices for decaying systems

    International Nuclear Information System (INIS)

    Haake, F.; Izrailev, F.; Saher, D.; Sommers, H.-J.

    1991-01-01

    Analytical and numerical results for the level density of a certain class of random non-Hermitian matrices H=H+iΓ are presented. The conservative part H belongs to the Gaussian orthogonal ensemble while the damping piece Γ is quadratic in Gaussian random numbers and may describe the decay of resonances through various channels. In the limit of a large matrix dimension the level density assumes a surprisingly simple dependence on the relative strength of the damping and the number of channels. 18 refs.; 4 figs

  5. Fulltext PDF

    Indian Academy of Sciences (India)

    IAS Admin

    Although we often think that being an outlier in a sample would make one more attractive than the average, it appears that being average can make one just as attractive. An article in this issue on different types of faces of people asks a deceptively simple question: what makes certain faces more attractive than others?

  6. Spectral dimensionality of random superconducting networks

    International Nuclear Information System (INIS)

    Day, A.R.; Xia, W.; Thorpe, M.F.

    1988-01-01

    We compute the spectral dimensionality d of random superconducting-normal networks by directly examining the low-frequency density of states at the percolation threshold. We find that d = 4.1 +- 0.2 and 5.8 +- 0.3 in two and three dimensions, respectively, which confirms the scaling relation d = 2d/(2-s/ν), where s is the superconducting exponent and ν the correlation-length exponent for percolation. We also consider the one-dimensional problem where scaling arguments predict, and our numerical simulations confirm, that d = 0. A simple argument provides an expression for the density of states of the localized high-frequency modes in this special case. We comment on the connection between our calculations and the ''termite'' problem of a random walker on a random superconducting-normal network and point out difficulties in inferring d from simulations of the termite problem

  7. Black holes and random matrices

    Energy Technology Data Exchange (ETDEWEB)

    Cotler, Jordan S.; Gur-Ari, Guy [Stanford Institute for Theoretical Physics, Stanford University,Stanford, CA 94305 (United States); Hanada, Masanori [Stanford Institute for Theoretical Physics, Stanford University,Stanford, CA 94305 (United States); Yukawa Institute for Theoretical Physics, Kyoto University,Kyoto 606-8502 (Japan); The Hakubi Center for Advanced Research, Kyoto University,Kyoto 606-8502 (Japan); Polchinski, Joseph [Department of Physics, University of California,Santa Barbara, CA 93106 (United States); Kavli Institute for Theoretical Physics, University of California,Santa Barbara, CA 93106 (United States); Saad, Phil; Shenker, Stephen H. [Stanford Institute for Theoretical Physics, Stanford University,Stanford, CA 94305 (United States); Stanford, Douglas [Institute for Advanced Study,Princeton, NJ 08540 (United States); Streicher, Alexandre [Stanford Institute for Theoretical Physics, Stanford University,Stanford, CA 94305 (United States); Department of Physics, University of California,Santa Barbara, CA 93106 (United States); Tezuka, Masaki [Department of Physics, Kyoto University,Kyoto 606-8501 (Japan)

    2017-05-22

    We argue that the late time behavior of horizon fluctuations in large anti-de Sitter (AdS) black holes is governed by the random matrix dynamics characteristic of quantum chaotic systems. Our main tool is the Sachdev-Ye-Kitaev (SYK) model, which we use as a simple model of a black hole. We use an analytically continued partition function |Z(β+it)|{sup 2} as well as correlation functions as diagnostics. Using numerical techniques we establish random matrix behavior at late times. We determine the early time behavior exactly in a double scaling limit, giving us a plausible estimate for the crossover time to random matrix behavior. We use these ideas to formulate a conjecture about general large AdS black holes, like those dual to 4D super-Yang-Mills theory, giving a provisional estimate of the crossover time. We make some preliminary comments about challenges to understanding the late time dynamics from a bulk point of view.

  8. The effect of prosthetic rehabilitation and simple dietary counseling on food intake and oral health related quality of life among the edentulous individuals: A randomized controlled trial.

    Science.gov (United States)

    Amagai, Noriko; Komagamine, Yuriko; Kanazawa, Manabu; Iwaki, Maiko; Jo, Ayami; Suzuki, Hiroyuki; Minakuchi, Shunsuke

    2017-10-01

    To investigate the combined effect of complete denture renewal and simple dietary advice. A randomized controlled trial was performed with edentulous patients who required new complete dentures. All participants received complete denture treatment. In addition, the intervention group received dietary advice in a pamphlet form, while the control group received advice pertaining to the care and maintenance of the dentures. The advice was given by dentists for each group. The participants' food intake was assessed at baseline and 3 months after intervention using a diet history questionnaire and an oral health related quality of life assessment measured using the Japanese version of the Oral Health Impact Profile for edentulous people (OHIP-EDENT-J). Among 70 participants who were randomized, 62 participants finished all parts of this trial. At baseline, there was no significant difference in the food intake between the two groups. At the 3-month assessment, the intervention group showed significantly greater intake of chicken (P=0.013), fish with bones (P=0.012), and carrots and pumpkins (P=0.025) compared to the control group. However, at baseline and at the 3-month assessment, there was no significant difference in the OHIP-EDENT-J scores between the groups, but the OHIP-EDENT-J scores significantly improved for both groups at the 3-month assessment. There were more significant improved dimensions of OHIP-EDENT-J in the intervention group than in the control group at the 3-month assessment. Simple dietary advice combined with complete denture treatment could improve food intake of edentulous patients. The present study suggests that brief dietary advice provided by dentists can improve food intake of edentulous elderly. This simply diet advice is much easier compared to customized forms, might enable normal dentists provide patients it. The result of this study broadens possibility of nutritional counseling in daily clinical practice. Copyright © 2017 Elsevier Ltd

  9. Continuous-time quantum random walks require discrete space

    International Nuclear Information System (INIS)

    Manouchehri, K; Wang, J B

    2007-01-01

    Quantum random walks are shown to have non-intuitive dynamics which makes them an attractive area of study for devising quantum algorithms for long-standing open problems as well as those arising in the field of quantum computing. In the case of continuous-time quantum random walks, such peculiar dynamics can arise from simple evolution operators closely resembling the quantum free-wave propagator. We investigate the divergence of quantum walk dynamics from the free-wave evolution and show that, in order for continuous-time quantum walks to display their characteristic propagation, the state space must be discrete. This behavior rules out many continuous quantum systems as possible candidates for implementing continuous-time quantum random walks

  10. Continuous-time quantum random walks require discrete space

    Science.gov (United States)

    Manouchehri, K.; Wang, J. B.

    2007-11-01

    Quantum random walks are shown to have non-intuitive dynamics which makes them an attractive area of study for devising quantum algorithms for long-standing open problems as well as those arising in the field of quantum computing. In the case of continuous-time quantum random walks, such peculiar dynamics can arise from simple evolution operators closely resembling the quantum free-wave propagator. We investigate the divergence of quantum walk dynamics from the free-wave evolution and show that, in order for continuous-time quantum walks to display their characteristic propagation, the state space must be discrete. This behavior rules out many continuous quantum systems as possible candidates for implementing continuous-time quantum random walks.

  11. Simple, low-cost group-counselling programme vs treatment as usual for patients with newly notified occupational hand eczema-Exploratory analyses of effects on knowledge, behaviour and personal resources of the randomized PREVEX clinical trial

    DEFF Research Database (Denmark)

    Fisker, Maja H; Agner, Tove; Sørensen, Jennifer A

    2018-01-01

    and knowledge regarding skin protection and care, as well as personal resources, in patients with occupational hand eczema. METHODS: PREVEX is an individually randomized clinical trial investigating the 1-year effects of a simple, low-cost group-counselling programme vs treatment as usual for patients...... with notified occupational hand eczema. Exploratory outcomes were behaviour, knowledge, self-efficacy, and self-evaluated skin care ability. RESULTS: In total, 1668 patients with notified occupational skin disease were invited to participate, of whom 769 were randomized and 756 were analysed: intervention group...... (n = 376) vs control group (n = 380). Behaviour was improved and the knowledge score increased in the intervention group as compared with the control group (respectively: estimate 0.08; 95%CI: 0.02-0.19; P = .01; and estimate 0.49; 95%CI: 0.28-0.70; P 

  12. Decoding Algorithms for Random Linear Network Codes

    DEFF Research Database (Denmark)

    Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank

    2011-01-01

    We consider the problem of efficient decoding of a random linear code over a finite field. In particular we are interested in the case where the code is random, relatively sparse, and use the binary finite field as an example. The goal is to decode the data using fewer operations to potentially...... achieve a high coding throughput, and reduce energy consumption.We use an on-the-fly version of the Gauss-Jordan algorithm as a baseline, and provide several simple improvements to reduce the number of operations needed to perform decoding. Our tests show that the improvements can reduce the number...

  13. Simple heuristic for the viscosity of polydisperse hard spheres

    Science.gov (United States)

    Farr, Robert S.

    2014-12-01

    We build on the work of Mooney [Colloids Sci. 6, 162 (1951)] to obtain an heuristic analytic approximation to the viscosity of a suspension any size distribution of hard spheres in a Newtonian solvent. The result agrees reasonably well with rheological data on monodispserse and bidisperse hard spheres, and also provides an approximation to the random close packing fraction of polydisperse spheres. The implied packing fraction is less accurate than that obtained by Farr and Groot [J. Chem. Phys. 131(24), 244104 (2009)], but has the advantage of being quick and simple to evaluate.

  14. Can training improve laypersons helping behaviour in first aid? A randomised controlled deception trial.

    Science.gov (United States)

    Van de Velde, Stijn; Roex, Ann; Vangronsveld, Karoline; Niezink, Lidewij; Van Praet, Koen; Heselmans, Annemie; Donceel, Peter; Vandekerckhove, Philippe; Ramaekers, Dirk; Aertgeerts, Bert

    2013-04-01

    There is limited evidence indicating that laypersons trained in first aid provide better help, but do not help more often than untrained laypersons. This study investigated the effect of conventional first aid training versus conventional training plus supplementary training aimed at decreasing barriers to helping. The authors conducted a randomised controlled trial. After 24 h of conventional first aid training, the participants either attended an experimental lesson to reduce barriers to helping or followed a control lesson. The authors used a deception test to measure the time between the start of the unannounced simulated emergency and seeking help behaviour and the number of particular helping actions. The authors randomised 72 participants to both groups. 22 participants were included in the analysis for the experimental group and 36 in the control group. The authors found no statistically or clinically significant differences for any of the outcome measures. The time until seeking help (geometrical mean and 95% CI) was 55.5 s (42.9 to 72.0) in the experimental group and 56.5 s (43.0 to 74.3) in the control group. 57% of the participants asked a bystander to seek help, 40% left the victim to seek help themselves and 3% did not seek any help. Supplementary training on dealing with barriers to helping did not alter the helping behaviour. The timing and appropriateness of the aid provided can be improved. The authors registered this trial at ClinicalTrials.gov as NCT00954161.

  15. On the estimation variance for the specific Euler-Poincaré characteristic of random networks.

    Science.gov (United States)

    Tscheschel, A; Stoyan, D

    2003-07-01

    The specific Euler number is an important topological characteristic in many applications. It is considered here for the case of random networks, which may appear in microscopy either as primary objects of investigation or as secondary objects describing in an approximate way other structures such as, for example, porous media. For random networks there is a simple and natural estimator of the specific Euler number. For its estimation variance, a simple Poisson approximation is given. It is based on the general exact formula for the estimation variance. In two examples of quite different nature and topology application of the formulas is demonstrated.

  16. Random functions via Dyson Brownian Motion: progress and problems

    International Nuclear Information System (INIS)

    Wang, Gaoyuan; Battefeld, Thorsten

    2016-01-01

    We develope a computationally efficient extension of the Dyson Brownian Motion (DBM) algorithm to generate random function in C"2 locally. We further explain that random functions generated via DBM show an unstable growth as the traversed distance increases. This feature restricts the use of such functions considerably if they are to be used to model globally defined ones. The latter is the case if one uses random functions to model landscapes in string theory. We provide a concrete example, based on a simple axionic potential often used in cosmology, to highlight this problem and also offer an ad hoc modification of DBM that suppresses this growth to some degree.

  17. Random functions via Dyson Brownian Motion: progress and problems

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Gaoyuan; Battefeld, Thorsten [Institute for Astrophysics, University of Goettingen,Friedrich Hund Platz 1, D-37077 Goettingen (Germany)

    2016-09-05

    We develope a computationally efficient extension of the Dyson Brownian Motion (DBM) algorithm to generate random function in C{sup 2} locally. We further explain that random functions generated via DBM show an unstable growth as the traversed distance increases. This feature restricts the use of such functions considerably if they are to be used to model globally defined ones. The latter is the case if one uses random functions to model landscapes in string theory. We provide a concrete example, based on a simple axionic potential often used in cosmology, to highlight this problem and also offer an ad hoc modification of DBM that suppresses this growth to some degree.

  18. Learning from correlated patterns by simple perceptrons

    Energy Technology Data Exchange (ETDEWEB)

    Shinzato, Takashi; Kabashima, Yoshiyuki [Department of Computational Intelligence and Systems Science, Tokyo Institute of Technology, Yokohama 226-8502 (Japan)], E-mail: shinzato@sp.dis.titech.ac.jp, E-mail: kaba@dis.titech.ac.jp

    2009-01-09

    Learning behavior of simple perceptrons is analyzed for a teacher-student scenario in which output labels are provided by a teacher network for a set of possibly correlated input patterns, and such that the teacher and student networks are of the same type. Our main concern is the effect of statistical correlations among the input patterns on learning performance. For this purpose, we extend to the teacher-student scenario a methodology for analyzing randomly labeled patterns recently developed in Shinzato and Kabashima 2008 J. Phys. A: Math. Theor. 41 324013. This methodology is used for analyzing situations in which orthogonality of the input patterns is enhanced in order to optimize the learning performance.

  19. Learning from correlated patterns by simple perceptrons

    Science.gov (United States)

    Shinzato, Takashi; Kabashima, Yoshiyuki

    2009-01-01

    Learning behavior of simple perceptrons is analyzed for a teacher-student scenario in which output labels are provided by a teacher network for a set of possibly correlated input patterns, and such that the teacher and student networks are of the same type. Our main concern is the effect of statistical correlations among the input patterns on learning performance. For this purpose, we extend to the teacher-student scenario a methodology for analyzing randomly labeled patterns recently developed in Shinzato and Kabashima 2008 J. Phys. A: Math. Theor. 41 324013. This methodology is used for analyzing situations in which orthogonality of the input patterns is enhanced in order to optimize the learning performance.

  20. Learning from correlated patterns by simple perceptrons

    International Nuclear Information System (INIS)

    Shinzato, Takashi; Kabashima, Yoshiyuki

    2009-01-01

    Learning behavior of simple perceptrons is analyzed for a teacher-student scenario in which output labels are provided by a teacher network for a set of possibly correlated input patterns, and such that the teacher and student networks are of the same type. Our main concern is the effect of statistical correlations among the input patterns on learning performance. For this purpose, we extend to the teacher-student scenario a methodology for analyzing randomly labeled patterns recently developed in Shinzato and Kabashima 2008 J. Phys. A: Math. Theor. 41 324013. This methodology is used for analyzing situations in which orthogonality of the input patterns is enhanced in order to optimize the learning performance

  1. A method for generating skewed random numbers using two overlapping uniform distributions

    International Nuclear Information System (INIS)

    Ermak, D.L.; Nasstrom, J.S.

    1995-02-01

    The objective of this work was to implement and evaluate a method for generating skewed random numbers using a combination of uniform random numbers. The method provides a simple and accurate way of generating skewed random numbers from the specified first three moments without an a priori specification of the probability density function. We describe the procedure for generating skewed random numbers from unifon-n random numbers, and show that it accurately produces random numbers with the desired first three moments over a range of skewness values. We also show that in the limit of zero skewness, the distribution of random numbers is an accurate approximation to the Gaussian probability density function. Future work win use this method to provide skewed random numbers for a Langevin equation model for diffusion in skewed turbulence

  2. Learned Treatise and Legal Reform

    DEFF Research Database (Denmark)

    Münster-Swendsen, Mia

    2010-01-01

    of the royal court from the time of the reign of Cnut the Great to the author's present. In Danish as well as international scholarship this deceptively simple text has frequently been treated either as a ‘law code' or ‘law book' in itself or as a reflection of actual legal practice. Yet here I will contend...

  3. Cross-covariance functions for multivariate random fields based on latent dimensions

    KAUST Repository

    Apanasovich, T. V.; Genton, M. G.

    2010-01-01

    The problem of constructing valid parametric cross-covariance functions is challenging. We propose a simple methodology, based on latent dimensions and existing covariance models for univariate random fields, to develop flexible, interpretable

  4. Higher order moments of a sum of random variables: remarks and applications.

    Directory of Open Access Journals (Sweden)

    Luisa Tibiletti

    1996-02-01

    Full Text Available The moments of a sum of random variables depend on both the pure moments of each random addendum and on the addendum mixed moments. In this note we introduce a simple measure to evaluate the relative impedance to attach to the latter. Once the pure moments are fixed, the functional relation between the random addenda leading to the extreme values is also provided. Applications to Finance, Decision Theory and Actuarial Sciences are also suggested.

  5. A dynamic random effects multinomial logit model of household car ownership

    DEFF Research Database (Denmark)

    Bue Bjørner, Thomas; Leth-Petersen, Søren

    2007-01-01

    Using a large household panel we estimate demand for car ownership by means of a dynamic multinomial model with correlated random effects. Results suggest that the persistence in car ownership observed in the data should be attributed to both true state dependence and to unobserved heterogeneity...... (random effects). It also appears that random effects related to single and multiple car ownership are correlated, suggesting that the IIA assumption employed in simple multinomial models of car ownership is invalid. Relatively small elasticities with respect to income and car costs are estimated...

  6. Simple Kidney Cysts

    Science.gov (United States)

    ... Solitary Kidney Your Kidneys & How They Work Simple Kidney Cysts What are simple kidney cysts? Simple kidney cysts are abnormal, fluid-filled ... that form in the kidneys. What are the kidneys and what do they do? The kidneys are ...

  7. Can group-based reassuring information alter low back pain behavior? A cluster-randomized controlled trial

    DEFF Research Database (Denmark)

    Frederiksen, Pernille; Indahl, Aage; Andersen, Lars L

    2017-01-01

    -randomized controlled trial. METHODS: Publically employed workers (n = 505) from 11 Danish municipality centers were randomized at center-level (cluster) to either intervention (two 1-hour group-based talks at the workplace) or control. The talks provided reassuring information together with a simple non...

  8. The SimpleMix study with biphasic insulin aspart 30: a randomized controlled trial investigating patient-driven titration versus investigator-driven titration.

    Science.gov (United States)

    Gao, Yan; Luquez, Cecilia; Lynggaard, Helle; Andersen, Henning; Saboo, Banshi

    2014-12-01

    The study aimed to confirm the efficacy, through non-inferiority, of patient-driven versus investigator-driven titration of biphasic insulin aspart 30 (BIAsp 30) in terms of glycemic control assessed by HbA1c change. SimpleMix was a 20 week, open-label, randomized, two-armed, parallel-group, multicenter study in five countries (Argentina, China, India, Poland, and the UK). Patients with type 2 diabetes were randomized into either patient-driven or investigator-driven BIAsp 30 titration groups. Non-inferiority of patient-driven vs. investigator-driven titration based on change in HbA1c from baseline to week 20 could not be demonstrated. Mean (SE) estimated change from baseline to week 20 was -0.72 (0.08)% in the patient-driven group and -0.97 (0.08)% in the investigator-driven group; estimated difference 0.25% (95% CI: 0.04; 0.46). Estimated mean change (SE) in fasting plasma glucose from baseline to week 20 was similar between groups: -0.94 (0.21) mmol/L for patient-driven and -1.07 (0.22) mmol/L for investigator-driven (difference non-significant). Both treatment arms were well tolerated, and hypoglycemic episode rates were similar between groups, with a rate ratio of 0.77 (95% CI: 0.54; 1.09; p = 0.143) for all hypoglycemic episodes and 0.78 (95% CI: 0.42; 1.43; p = 0.417) for nocturnal hypoglycemic episodes. Non-inferiority of patient-driven versus investigator-driven titration with regard to change from baseline to end-of-treatment HbA1c could not be confirmed. It is possible that a clinic visit 12 weeks after intensification of treatment with BIAsp 30 in patients with type 2 diabetes inadequately treated with basal insulin may benefit patient-driven titration of BIAsp 30. A limitation of the study was the relatively small number of patients recruited in each country, which does not allow country-specific analyses to be performed. Overall, treatment with BIAsp 30 was well tolerated in both treatment groups.

  9. A randomized clinical trial comparing hydrocolloid, phenytoin and simple dressings for the treatment of pressure ulcers [ISRCTN33429693

    Directory of Open Access Journals (Sweden)

    Khedmat Hossein

    2004-12-01

    Full Text Available Abstract Background Pressure sores are important and common complications of spinal cord injury. Many preventive and therapeutic approaches have been tried and new trials are evolving. One relatively recent method is application of a hydrocolloid dressing (HD. In this study we compared the therapeutic effects of HD on pressure ulcer healing with two other topical applications, phenytoin cream (PC and simple dressing (SD. Methods Ninety-one stage I and stage II pressure ulcers of 83 paraplegic male victims of the Iran-Iraq war were randomly allocated to three treatment groups. Mean age and weight of the participants were 36.64 ± 6.04 years and 61.12 ± 5.08 kg, respectively. All the patients were managed in long term care units or in their homes for 8 weeks by a team of general practitioners and nurses, and the ulcer status was recorded as "Complete healing", "Partial healing", "Without improvement" and "Worsening". Results Complete healing of ulcers, regardless of location and stage, was better in the HD group than the PC [23/31(74.19% vs 12/30(40%; difference: 34.19%, 95% CI = 10.85–57.52, (P 0.05]. We performed a second analysis considering only one ulcer per patient (i.e. 83 ulcers in 83 patients. This "per patient" analysis showed that complete ulcer healing in the HD group was better than in the PC [20/28(71.4% vs 11/28 (39.3%; difference: 32.1%, 95% CI = 7.4–56.7, (P Conclusion We deduced that HD is the most effective method investigated for treating stage I and II pressure ulcers in young paraplegic men.

  10. Magnetic field line random walk in non-axisymmetric turbulence

    International Nuclear Information System (INIS)

    Tautz, R.C.; Lerche, I.

    2011-01-01

    Including a random component of a magnetic field parallel to an ambient field introduces a mean perpendicular motion to the average field line. This effect is normally not discussed because one customarily chooses at the outset to ignore such a field component in discussing random walk and diffusion of field lines. A discussion of the basic effect is given, indicating that any random magnetic field with a non-zero helicity will lead to such a non-zero perpendicular mean motion. Several exact analytic illustrations are given of the effect as well as a simple numerical illustration. -- Highlights: → For magnetic field line random walk all magnetic field components are important. → Non-vanishing magnetic helicity leads to mean perpendicular motion. → Analytically exact stream functions illustrate that the novel transverse effect exists.

  11. Quantum Entanglement Growth under Random Unitary Dynamics

    Directory of Open Access Journals (Sweden)

    Adam Nahum

    2017-07-01

    Full Text Available Characterizing how entanglement grows with time in a many-body system, for example, after a quantum quench, is a key problem in nonequilibrium quantum physics. We study this problem for the case of random unitary dynamics, representing either Hamiltonian evolution with time-dependent noise or evolution by a random quantum circuit. Our results reveal a universal structure behind noisy entanglement growth, and also provide simple new heuristics for the “entanglement tsunami” in Hamiltonian systems without noise. In 1D, we show that noise causes the entanglement entropy across a cut to grow according to the celebrated Kardar-Parisi-Zhang (KPZ equation. The mean entanglement grows linearly in time, while fluctuations grow like (time^{1/3} and are spatially correlated over a distance ∝(time^{2/3}. We derive KPZ universal behavior in three complementary ways, by mapping random entanglement growth to (i a stochastic model of a growing surface, (ii a “minimal cut” picture, reminiscent of the Ryu-Takayanagi formula in holography, and (iii a hydrodynamic problem involving the dynamical spreading of operators. We demonstrate KPZ universality in 1D numerically using simulations of random unitary circuits. Importantly, the leading-order time dependence of the entropy is deterministic even in the presence of noise, allowing us to propose a simple coarse grained minimal cut picture for the entanglement growth of generic Hamiltonians, even without noise, in arbitrary dimensionality. We clarify the meaning of the “velocity” of entanglement growth in the 1D entanglement tsunami. We show that in higher dimensions, noisy entanglement evolution maps to the well-studied problem of pinning of a membrane or domain wall by disorder.

  12. Quantum Entanglement Growth under Random Unitary Dynamics

    Science.gov (United States)

    Nahum, Adam; Ruhman, Jonathan; Vijay, Sagar; Haah, Jeongwan

    2017-07-01

    Characterizing how entanglement grows with time in a many-body system, for example, after a quantum quench, is a key problem in nonequilibrium quantum physics. We study this problem for the case of random unitary dynamics, representing either Hamiltonian evolution with time-dependent noise or evolution by a random quantum circuit. Our results reveal a universal structure behind noisy entanglement growth, and also provide simple new heuristics for the "entanglement tsunami" in Hamiltonian systems without noise. In 1D, we show that noise causes the entanglement entropy across a cut to grow according to the celebrated Kardar-Parisi-Zhang (KPZ) equation. The mean entanglement grows linearly in time, while fluctuations grow like (time )1/3 and are spatially correlated over a distance ∝(time )2/3. We derive KPZ universal behavior in three complementary ways, by mapping random entanglement growth to (i) a stochastic model of a growing surface, (ii) a "minimal cut" picture, reminiscent of the Ryu-Takayanagi formula in holography, and (iii) a hydrodynamic problem involving the dynamical spreading of operators. We demonstrate KPZ universality in 1D numerically using simulations of random unitary circuits. Importantly, the leading-order time dependence of the entropy is deterministic even in the presence of noise, allowing us to propose a simple coarse grained minimal cut picture for the entanglement growth of generic Hamiltonians, even without noise, in arbitrary dimensionality. We clarify the meaning of the "velocity" of entanglement growth in the 1D entanglement tsunami. We show that in higher dimensions, noisy entanglement evolution maps to the well-studied problem of pinning of a membrane or domain wall by disorder.

  13. PERMutation Using Transposase Engineering (PERMUTE): A Simple Approach for Constructing Circularly Permuted Protein Libraries.

    Science.gov (United States)

    Jones, Alicia M; Atkinson, Joshua T; Silberg, Jonathan J

    2017-01-01

    Rearrangements that alter the order of a protein's sequence are used in the lab to study protein folding, improve activity, and build molecular switches. One of the simplest ways to rearrange a protein sequence is through random circular permutation, where native protein termini are linked together and new termini are created elsewhere through random backbone fission. Transposase mutagenesis has emerged as a simple way to generate libraries encoding different circularly permuted variants of proteins. With this approach, a synthetic transposon (called a permuteposon) is randomly inserted throughout a circularized gene to generate vectors that express different permuted variants of a protein. In this chapter, we outline the protocol for constructing combinatorial libraries of circularly permuted proteins using transposase mutagenesis, and we describe the different permuteposons that have been developed to facilitate library construction.

  14. Efficiency of random amplified polymorphic DNA (RAPD) and inter ...

    African Journals Online (AJOL)

    Efficiency of random amplified polymorphic DNA (RAPD) and inter-simple sequence repeats (ISSR) markers for genotype fingerprinting and genetic diversity studies in canola ( ) ... The number of amplified fragments with RAPD primers ranged from 8 to 21, with the size of amplicons ranging from 162 to 3154 bp.

  15. Embedded ARM system for volcano monitoring in remote areas: application to the active volcano on Deception Island (Antarctica).

    Science.gov (United States)

    Peci, Luis Miguel; Berrocoso, Manuel; Fernández-Ros, Alberto; García, Alicia; Marrero, José Manuel; Ortiz, Ramón

    2014-01-02

    This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARM™ processor has been used, allowing a great flexibility in hardware configuration. The use of a complete Linux solution (Debian™) as Operating System permits a quick, easy application development to control sensors and communications. This provides all the capabilities required and great stability with relatively low energy consumption. The cost of the components and applications development is low since they are widely used in different fields. Sensors and commercial modules have been combined with other self-developed modules. The Modular Volcano Monitoring System (MVMS) described has been deployed on the active Deception Island (Antarctica) volcano, within the Spanish Antarctic Program, and has proved successful for monitoring the volcano, with proven reliability and efficient operation under extreme conditions. In another context, i.e., the recent volcanic activity on El Hierro Island (Canary Islands) in 2011, this technology has been used for the seismic equipment and GPS systems deployed, thus showing its efficiency in the monitoring of a volcanic crisis.

  16. Embedded ARM System for Volcano Monitoring in Remote Areas: Application to the Active Volcano on Deception Island (Antarctica

    Directory of Open Access Journals (Sweden)

    Luis Miguel Peci

    2014-01-01

    Full Text Available This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARMTM processor has been used, allowing a great flexibility in hardware configuration. The use of a complete Linux solution (DebianTM as Operating System permits a quick, easy application development to control sensors and communications. This provides all the capabilities required and great stability with relatively low energy consumption. The cost of the components and applications development is low since they are widely used in different fields. Sensors and commercial modules have been combined with other self-developed modules. The Modular Volcano Monitoring System (MVMS described has been deployed on the active Deception Island (Antarctica volcano, within the Spanish Antarctic Program, and has proved successful for monitoring the volcano, with proven reliability and efficient operation under extreme conditions. In another context, i.e., the recent volcanic activity on El Hierro Island (Canary Islands in 2011, this technology has been used for the seismic equipment and GPS systems deployed, thus showing its efficiency in the monitoring of a volcanic crisis.

  17. Multitrait, Random Regression, or Simple Repeatability Model in High-Throughput Phenotyping Data Improve Genomic Prediction for Wheat Grain Yield.

    Science.gov (United States)

    Sun, Jin; Rutkoski, Jessica E; Poland, Jesse A; Crossa, José; Jannink, Jean-Luc; Sorrells, Mark E

    2017-07-01

    High-throughput phenotyping (HTP) platforms can be used to measure traits that are genetically correlated with wheat ( L.) grain yield across time. Incorporating such secondary traits in the multivariate pedigree and genomic prediction models would be desirable to improve indirect selection for grain yield. In this study, we evaluated three statistical models, simple repeatability (SR), multitrait (MT), and random regression (RR), for the longitudinal data of secondary traits and compared the impact of the proposed models for secondary traits on their predictive abilities for grain yield. Grain yield and secondary traits, canopy temperature (CT) and normalized difference vegetation index (NDVI), were collected in five diverse environments for 557 wheat lines with available pedigree and genomic information. A two-stage analysis was applied for pedigree and genomic selection (GS). First, secondary traits were fitted by SR, MT, or RR models, separately, within each environment. Then, best linear unbiased predictions (BLUPs) of secondary traits from the above models were used in the multivariate prediction models to compare predictive abilities for grain yield. Predictive ability was substantially improved by 70%, on average, from multivariate pedigree and genomic models when including secondary traits in both training and test populations. Additionally, (i) predictive abilities slightly varied for MT, RR, or SR models in this data set, (ii) results indicated that including BLUPs of secondary traits from the MT model was the best in severe drought, and (iii) the RR model was slightly better than SR and MT models under drought environment. Copyright © 2017 Crop Science Society of America.

  18. Classical randomness in quantum measurements

    International Nuclear Information System (INIS)

    D'Ariano, Giacomo Mauro; Presti, Paoloplacido Lo; Perinotti, Paolo

    2005-01-01

    Similarly to quantum states, also quantum measurements can be 'mixed', corresponding to a random choice within an ensemble of measuring apparatuses. Such mixing is equivalent to a sort of hidden variable, which produces a noise of purely classical nature. It is then natural to ask which apparatuses are indecomposable, i.e. do not correspond to any random choice of apparatuses. This problem is interesting not only for foundations, but also for applications, since most optimization strategies give optimal apparatuses that are indecomposable. Mathematically the problem is posed describing each measuring apparatus by a positive operator-valued measure (POVM), which gives the statistics of the outcomes for any input state. The POVMs form a convex set, and in this language the indecomposable apparatuses are represented by extremal points-the analogous of 'pure states' in the convex set of states. Differently from the case of states, however, indecomposable POVMs are not necessarily rank-one, e.g. von Neumann measurements. In this paper we give a complete classification of indecomposable apparatuses (for discrete spectrum), by providing different necessary and sufficient conditions for extremality of POVMs, along with a simple general algorithm for the decomposition of a POVM into extremals. As an interesting application, 'informationally complete' measurements are analysed in this respect. The convex set of POVMs is fully characterized by determining its border in terms of simple algebraic properties of the corresponding POVMs

  19. Is simple nephrectomy truly simple? Comparison with the radical alternative.

    Science.gov (United States)

    Connolly, S S; O'Brien, M Frank; Kunni, I M; Phelan, E; Conroy, R; Thornhill, J A; Grainger, R

    2011-03-01

    The Oxford English dictionary defines the term "simple" as "easily done" and "uncomplicated". We tested the validity of this terminology in relation to open nephrectomy surgery. Retrospective review of 215 patients undergoing open, simple (n = 89) or radical (n = 126) nephrectomy in a single university-affiliated institution between 1998 and 2002. Operative time (OT), estimated blood loss (EBL), operative complications (OC) and length of stay in hospital (LOS) were analysed. Statistical analysis employed Fisher's exact test and Stata Release 8.2. Simple nephrectomy was associated with shorter OT (mean 126 vs. 144 min; p = 0.002), reduced EBL (mean 729 vs. 859 cc; p = 0.472), lower OC (9 vs. 17%; 0.087), and more brief LOS (mean 6 vs. 8 days; p < 0.001). All parameters suggest favourable outcome for the simple nephrectomy group, supporting the use of this terminology. This implies "simple" nephrectomies are truly easier to perform with less complication than their radical counterpart.

  20. A generator for unique quantum random numbers based on vacuum states

    DEFF Research Database (Denmark)

    Gabriel, C.; Wittmann, C.; Sych, D.

    2010-01-01

    the purity of a continuous-variable quantum vacuum state to generate unique random numbers. We use the intrinsic randomness in measuring the quadratures of a mode in the lowest energy vacuum state, which cannot be correlated to any other state. The simplicity of our source, combined with its verifiably......Random numbers are a valuable component in diverse applications that range from simulations(1) over gambling to cryptography(2,3). The quest for true randomness in these applications has engendered a large variety of different proposals for producing random numbers based on the foundational...... unpredictability of quantum mechanics(4-11). However, most approaches do not consider that a potential adversary could have knowledge about the generated numbers, so the numbers are not verifiably random and unique(12-15). Here we present a simple experimental setup based on homodyne measurements that uses...

  1. A Simple Exact Error Rate Analysis for DS-CDMA with Arbitrary Pulse Shape in Flat Nakagami Fading

    Science.gov (United States)

    Rahman, Mohammad Azizur; Sasaki, Shigenobu; Kikuchi, Hisakazu; Harada, Hiroshi; Kato, Shuzo

    A simple exact error rate analysis is presented for random binary direct sequence code division multiple access (DS-CDMA) considering a general pulse shape and flat Nakagami fading channel. First of all, a simple model is developed for the multiple access interference (MAI). Based on this, a simple exact expression of the characteristic function (CF) of MAI is developed in a straight forward manner. Finally, an exact expression of error rate is obtained following the CF method of error rate analysis. The exact error rate so obtained can be much easily evaluated as compared to the only reliable approximate error rate expression currently available, which is based on the Improved Gaussian Approximation (IGA).

  2. Nonequilibrium phase transition in directed small-world-Voronoi-Delaunay random lattices

    International Nuclear Information System (INIS)

    Lima, F.W.S.

    2016-01-01

    On directed small-world-Voronoi-Delaunay random lattices in two dimensions with quenched connectivity disorder we study the critical properties of the dynamics evolution of public opinion in social influence networks using a simple spin-like model. The system is treated by applying Monte Carlo simulations. We show that directed links on these random lattices may lead to phase diagram with first- and second-order social phase transitions out of equilibrium. (paper)

  3. Note on an Identity Between Two Unbiased Variance Estimators for the Grand Mean in a Simple Random Effects Model.

    Science.gov (United States)

    Levin, Bruce; Leu, Cheng-Shiun

    2013-01-01

    We demonstrate the algebraic equivalence of two unbiased variance estimators for the sample grand mean in a random sample of subjects from an infinite population where subjects provide repeated observations following a homoscedastic random effects model.

  4. ALOHA Random Access that Operates as a Rateless Code

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices. Slotted ALOHA and its derivatives represent a simple solution for distributed random access in wireless...... the contention when the instantaneous throughput is maximized. The paper presents the related analysis, providing heuristic criteria for terminating the contention period and showing that very high throughputs can be achieved, even for a low number for contending users. The demonstrated results potentially have...

  5. Homogenization of metasurfaces formed by random resonant particles in periodical lattices

    DEFF Research Database (Denmark)

    Andryieuski, Andrei; Lavrinenko, Andrei; Petrov, Mihail

    2016-01-01

    In this paper we suggest a simple analytical method for description of electromagnetic properties of a geometrically regular two-dimensional subwavelength arrays (metasurfaces) formed by particles with randomly fluctuating polarizabilities. We propose an analytical homogenization method applicable...

  6. Randomization Does Not Help Much, Comparability Does

    Science.gov (United States)

    Saint-Mont, Uwe

    2015-01-01

    According to R.A. Fisher, randomization “relieves the experimenter from the anxiety of considering innumerable causes by which the data may be disturbed.” Since, in particular, it is said to control for known and unknown nuisance factors that may considerably challenge the validity of a result, it has become very popular. This contribution challenges the received view. First, looking for quantitative support, we study a number of straightforward, mathematically simple models. They all demonstrate that the optimism surrounding randomization is questionable: In small to medium-sized samples, random allocation of units to treatments typically yields a considerable imbalance between the groups, i.e., confounding due to randomization is the rule rather than the exception. In the second part of this contribution, the reasoning is extended to a number of traditional arguments in favour of randomization. This discussion is rather non-technical, and sometimes touches on the rather fundamental Frequentist/Bayesian debate. However, the result of this analysis turns out to be quite similar: While the contribution of randomization remains doubtful, comparability contributes much to a compelling conclusion. Summing up, classical experimentation based on sound background theory and the systematic construction of exchangeable groups seems to be advisable. PMID:26193621

  7. a simple a simple excitation control excitation control excitation

    African Journals Online (AJOL)

    eobe

    field voltages determined follow a simple quadratic relationship that offer a very simple control scheme, dependent on only the stator current. Keywords: saturated reactances, no-load field voltage, excitation control, synchronous generators. 1. Introduction. Introduction. Introduction. The commonest generator in use today is ...

  8. Random close packing of hard spheres and disks

    International Nuclear Information System (INIS)

    Berryman, J.G.

    1983-01-01

    A simple definition of random close packing of hard spheres is presented, and the consequences of this definition are explored. According to this definition, random close packing occurs at the minimum packing fraction eta for which the median nearest-neighbor radius equals the diameter of the spheres. Using the radial distribution function at more dilute concentrations to estimate median nearest-neighbor radii, lower bounds on the critical packing fraction eta/sub RCP/ are obtained and the value of eta/sub RCP/ is estimated by extrapolation. Random close packing is predicted to occur for eta/sub RCP/ = 0.64 +- 0.02 in three dimensions and eta/sub RCP/ = 0.82 +- 0.02 in two dimensions. Both of these predictions are shown to be consistent with the available experimental data

  9. A New Random Walk for Replica Detection in WSNs

    Science.gov (United States)

    Aalsalem, Mohammed Y.; Saad, N. M.; Hossain, Md. Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram

    2016-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical. PMID:27409082

  10. A New Random Walk for Replica Detection in WSNs.

    Science.gov (United States)

    Aalsalem, Mohammed Y; Khan, Wazir Zada; Saad, N M; Hossain, Md Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram

    2016-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical.

  11. The spectral dimension of random trees

    International Nuclear Information System (INIS)

    Destri, Claudio; Donetti, Luca

    2002-01-01

    We present a simple yet rigorous approach to the determination of the spectral dimension of random trees, based on the study of the massless limit of the Gaussian model on such trees. As a by-product, we obtain evidence in favour of a new scaling hypothesis for the Gaussian model on generic bounded graphs and in favour of a previously conjectured exact relation between spectral and connectivity dimensions on more general tree-like structures

  12. The dilute random field Ising model by finite cluster approximation

    International Nuclear Information System (INIS)

    Benyoussef, A.; Saber, M.

    1987-09-01

    Using the finite cluster approximation, phase diagrams of bond and site diluted three-dimensional simple cubic Ising models with a random field have been determined. The resulting phase diagrams have the same general features for both bond and site dilution. (author). 7 refs, 4 figs

  13. Simulating intrafraction prostate motion with a random walk model

    Directory of Open Access Journals (Sweden)

    Tobias Pommer, PhD

    2017-07-01

    Conclusions: Random walk modeling is feasible and recreated the characteristics of the observed prostate motion. Introducing artificial transient motion did not improve the overall agreement, although the first 30 seconds of the traces were better reproduced. The model provides a simple estimate of prostate motion during delivery of radiation therapy.

  14. Google Power Search

    CERN Document Server

    Spencer, Stephan

    2011-01-01

    Behind Google's deceptively simple interface is immense power for both market and competitive research-if you know how to use it well. Sure, basic searches are easy, but complex searches require specialized skills. This concise book takes you through the full range of Google's powerful search-refinement features, so you can quickly find the specific information you need. Learn techniques ranging from simple Boolean logic to URL parameters and other advanced tools, and see how they're applied to real-world market research examples. Incorporate advanced search operators such as filetype:, intit

  15. Statistical theory of correlations in random packings of hard particles.

    Science.gov (United States)

    Jin, Yuliang; Puckett, James G; Makse, Hernán A

    2014-05-01

    A random packing of hard particles represents a fundamental model for granular matter. Despite its importance, analytical modeling of random packings remains difficult due to the existence of strong correlations which preclude the development of a simple theory. Here, we take inspiration from liquid theories for the n-particle angular correlation function to develop a formalism of random packings of hard particles from the bottom up. A progressive expansion into a shell of particles converges in the large layer limit under a Kirkwood-like approximation of higher-order correlations. We apply the formalism to hard disks and predict the density of two-dimensional random close packing (RCP), ϕ(rcp) = 0.85 ± 0.01, and random loose packing (RLP), ϕ(rlp) = 0.67 ± 0.01. Our theory also predicts a phase diagram and angular correlation functions that are in good agreement with experimental and numerical data.

  16. Analysis of random number generators in abnormal usage conditions

    International Nuclear Information System (INIS)

    Soucarros, M.

    2012-01-01

    Random numbers have been used through the ages for games of chance, more recently for secret codes and today they are necessary to the execution of computer programs. Random number generators have now evolved from simple dices to electronic circuits and algorithms. Accordingly, the ability to distinguish between random and non-random numbers has become more difficult. Furthermore, whereas in the past dices were loaded in order to increase winning chances, it is now possible to influence the outcome of random number generators. In consequence, this subject is still very much an issue and has recently made the headlines. Indeed, there was talks about the PS3 game console which generates constant random numbers and redundant distribution of secret keys on the internet. This thesis presents a study of several generators as well as different means to perturb them. It shows the inherent defects of their conceptions and possible consequences of their failure when they are embedded inside security components. Moreover, this work highlights problems yet to be solved concerning the testing of random numbers and the post-processing eliminating bias in these numbers distribution. (author) [fr

  17. Asymmetrically Dominated Choice Problems, the Isolation Hypothesis and Random Incentive Mechanisms

    OpenAIRE

    Cox, James C.; Sadiraj, Vjollca; Schmidt, Ulrich

    2014-01-01

    This paper presents an experimental study of the random incentive mechanisms which are a standard procedure in economic and psychological experiments. Random incentive mechanisms have several advantages but are incentive-compatible only if responses to the single tasks are independent. This is true if either the independence axiom of expected utility theory or the isolation hypothesis of prospect theory holds. We present a simple test of this in the context of choice under risk. In the baseli...

  18. Recurrence of random walks with long-range steps generated by fractional Laplacian matrices on regular networks and simple cubic lattices

    Science.gov (United States)

    Michelitsch, T. M.; Collet, B. A.; Riascos, A. P.; Nowakowski, A. F.; Nicolleau, F. C. G. A.

    2017-12-01

    We analyze a Markovian random walk strategy on undirected regular networks involving power matrix functions of the type L\\frac{α{2}} where L indicates a ‘simple’ Laplacian matrix. We refer to such walks as ‘fractional random walks’ with admissible interval 0walk. From these analytical results we establish a generalization of Polya’s recurrence theorem for fractional random walks on d-dimensional infinite lattices: The fractional random walk is transient for dimensions d > α (recurrent for d≤slantα ) of the lattice. As a consequence, for 0walk is transient for all lattice dimensions d=1, 2, .. and in the range 1≤slantα walk is transient only for lattice dimensions d≥slant 3 . The generalization of Polya’s recurrence theorem remains valid for the class of random walks with Lévy flight asymptotics for long-range steps. We also analyze the mean first passage probabilities, mean residence times, mean first passage times and global mean first passage times (Kemeny constant) for the fractional random walk. For an infinite 1D lattice (infinite ring) we obtain for the transient regime 0walk is generated by the non-diagonality of the fractional Laplacian matrix with Lévy-type heavy tailed inverse power law decay for the probability of long-range moves. This non-local and asymptotic behavior of the fractional random walk introduces small-world properties with the emergence of Lévy flights on large (infinite) lattices.

  19. Random sampling of quantum states: a survey of methods and some issues regarding the Overparametrized Method

    International Nuclear Information System (INIS)

    Maziero, Jonas

    2015-01-01

    The numerical generation of random quantum states (RQS) is an important procedure for investigations in quantum information science. Here, we review some methods that may be used for performing that task. We start by presenting a simple procedure for generating random state vectors, for which the main tool is the random sampling of unbiased discrete probability distributions (DPD). Afterwards, the creation of random density matrices is addressed. In this context, we first present the standard method, which consists in using the spectral decomposition of a quantum state for getting RQS from random DPDs and random unitary matrices. In the sequence, the Bloch vector parametrization method is described. This approach, despite being useful in several instances, is not in general convenient for RQS generation. In the last part of the article, we regard the overparametrized method (OPM) and the related Ginibre and Bures techniques. The OPM can be used to create random positive semidefinite matrices with unit trace from randomly produced general complex matrices in a simple way that is friendly for numerical implementations. We consider a physically relevant issue related to the possible domains that may be used for the real and imaginary parts of the elements of such general complex matrices. Subsequently, a too fast concentration of measure in the quantum state space that appears in this parametrization is noticed. (author)

  20. "De-Randomizing" Congestion Losses to Improve TCP Performance over Wired-Wireless Networks

    National Research Council Canada - National Science Library

    Biaz, Saad; Vaidya, Nitin H

    2004-01-01

    .... This paper proposes a simple biased queue management scheme that "de-randomizes" congestion losses and enables a TCP receiver to diagnose accurately the cause of a loss and inform the TCP sender to react appropriately...

  1. Catalytic micromotor generating self-propelled regular motion through random fluctuation

    Science.gov (United States)

    Yamamoto, Daigo; Mukai, Atsushi; Okita, Naoaki; Yoshikawa, Kenichi; Shioi, Akihisa

    2013-07-01

    Most of the current studies on nano/microscale motors to generate regular motion have adapted the strategy to fabricate a composite with different materials. In this paper, we report that a simple object solely made of platinum generates regular motion driven by a catalytic chemical reaction with hydrogen peroxide. Depending on the morphological symmetry of the catalytic particles, a rich variety of random and regular motions are observed. The experimental trend is well reproduced by a simple theoretical model by taking into account of the anisotropic viscous effect on the self-propelled active Brownian fluctuation.

  2. A Simple Spreadsheet Program to Simulate and Analyze the Far-UV Circular Dichroism Spectra of Proteins

    Science.gov (United States)

    Abriata, Luciano A.

    2011-01-01

    A simple algorithm was implemented in a spreadsheet program to simulate the circular dichroism spectra of proteins from their secondary structure content and to fit [alpha]-helix, [beta]-sheet, and random coil contents from experimental far-UV circular dichroism spectra. The physical basis of the method is briefly reviewed within the context of…

  3. Scattering in particle-hole space: simple approximations to nuclear RPA calculations in the continuum

    International Nuclear Information System (INIS)

    Toledo Piza, A.F.R. de.

    1987-01-01

    The Random Phase Approximation (RPA) treatment of nuclear small amplitude vibrations including particle-hole continua is handled in terms of previously developed techniques to treat single-particle resonances in a reaction theoretical framework. A hierarchy of interpretable approximations is derived and a simple working approximation is proposed which involves a numerical effort no larger than that involved in standard, discrete RPA calculations. (Author) [pt

  4. Critical behavior in a random field classical Heisenberg model for amorphous systems

    International Nuclear Information System (INIS)

    Albuquerque, Douglas F. de; Alves, Sandro Roberto L.; Arruda, Alberto S. de

    2005-01-01

    By using the differential operator technique and the effective field theory scheme, the critical behavior of amorphous classical Heisenberg ferromagnet of spin-1/2 in a random field is studied. The phase diagram in the T-H and T-α planes on a simple cubic lattice for a cluster with two spins is obtained. Tricritical points, reentrant phenomena and influence of the random field and amorphization on the transition temperature are discussed

  5. Efficient Raman generation in a waveguide: A route to ultrafast quantum random number generation

    Energy Technology Data Exchange (ETDEWEB)

    England, D. G.; Bustard, P. J.; Moffatt, D. J.; Nunn, J.; Lausten, R.; Sussman, B. J., E-mail: ben.sussman@nrc.ca [National Research Council of Canada, 100 Sussex Drive, Ottawa, Ontario K1A 0R6 (Canada)

    2014-02-03

    The inherent uncertainty in quantum mechanics offers a source of true randomness which can be used to produce unbreakable cryptographic keys. We discuss the development of a high-speed random number generator based on the quantum phase fluctuations in spontaneously initiated stimulated Raman scattering (SISRS). We utilize the tight confinement and long interaction length available in a Potassium Titanyl Phosphate waveguide to generate highly efficient SISRS using nanojoule pulse energies, reducing the high pump power requirements of the previous approaches. We measure the random phase of the Stokes output using a simple interferometric setup to yield quantum random numbers at 145 Mbps.

  6. rFerns: An Implementation of the Random Ferns Method for General-Purpose Machine Learning

    Directory of Open Access Journals (Sweden)

    Miron B. Kursa

    2014-11-01

    Full Text Available Random ferns is a very simple yet powerful classification method originally introduced for specific computer vision tasks. In this paper, I show that this algorithm may be considered as a constrained decision tree ensemble and use this interpretation to introduce a series of modifications which enable the use of random ferns in general machine learning problems. Moreover, I extend the method with an internal error approximation and an attribute importance measure based on corresponding features of the random forest algorithm. I also present the R package rFerns containing an efficient implementation of this modified version of random ferns.

  7. Optimizing Linear Functions with Randomized Search Heuristics - The Robustness of Mutation

    DEFF Research Database (Denmark)

    Witt, Carsten

    2012-01-01

    The analysis of randomized search heuristics on classes of functions is fundamental for the understanding of the underlying stochastic process and the development of suitable proof techniques. Recently, remarkable progress has been made in bounding the expected optimization time of the simple (1...

  8. The Nash Equilibrium Revisited: Chaos and Complexity Hidden in Simplicity

    Science.gov (United States)

    Fellman, Philip V.

    The Nash Equilibrium is a much discussed, deceptively complex, method for the analysis of non-cooperative games (McLennan and Berg, 2005). If one reads many of the commonly available definitions the description of the Nash Equilibrium is deceptively simple in appearance. Modern research has discovered a number of new and important complex properties of the Nash Equilibrium, some of which remain as contemporary conundrums of extraordinary difficulty and complexity (Quint and Shubik, 1997). Among the recently discovered features which the Nash Equilibrium exhibits under various conditions are heteroclinic Hamiltonian dynamics, a very complex asymptotic structure in the context of two-player bi-matrix games and a number of computationally complex or computationally intractable features in other settings (Sato, Akiyama and Farmer, 2002). This paper reviews those findings and then suggests how they may inform various market prediction strategies.

  9. Simple cellular automaton model for traffic breakdown, highway capacity, and synchronized flow

    Science.gov (United States)

    Kerner, Boris S.; Klenov, Sergey L.; Schreckenberg, Michael

    2011-10-01

    We present a simple cellular automaton (CA) model for two-lane roads explaining the physics of traffic breakdown, highway capacity, and synchronized flow. The model consists of the rules “acceleration,” “deceleration,” “randomization,” and “motion” of the Nagel-Schreckenberg CA model as well as “overacceleration through lane changing to the faster lane,” “comparison of vehicle gap with the synchronization gap,” and “speed adaptation within the synchronization gap” of Kerner's three-phase traffic theory. We show that these few rules of the CA model can appropriately simulate fundamental empirical features of traffic breakdown and highway capacity found in traffic data measured over years in different countries, like characteristics of synchronized flow, the existence of the spontaneous and induced breakdowns at the same bottleneck, and associated probabilistic features of traffic breakdown and highway capacity. Single-vehicle data derived in model simulations show that synchronized flow first occurs and then self-maintains due to a spatiotemporal competition between speed adaptation to a slower speed of the preceding vehicle and passing of this slower vehicle. We find that the application of simple dependences of randomization probability and synchronization gap on driving situation allows us to explain the physics of moving synchronized flow patterns and the pinch effect in synchronized flow as observed in real traffic data.

  10. Simple pulmonary eosinophilia (loeffler's syndrome): chest radiographic and CT findings

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Kyung Jae; Lee, Kyung Soo; Kim, Tae Sung; Chung, Man Pyo; Choi, Dong Chull; Kwon, O Jung [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2000-01-01

    The purpose of our study is to describe the chest radiographic and CT findings of simple pulmonary eosinophilia. Twenty-six patients with simple pulmonary eosinophilia underwent chest radiography and CT scanning; the results were analyzed retrospectively by two chest radiologists, focusing on the patterns and distribution of the parenchymal abnormalities. The chest radiographs were normal in eight patients (31%), while among the remaining 18 patients, they showed subtle opacity (n=3D9), nodules (n=3D8), consolidation (n=3D2), and mass (n=3D1). Follow-up chest radiographs (m=3D18) demonstrated complete (n=3D16) or partial (n=3D1) resolution of parenchymal lesions or migratory lesions (n=3D1). On CT, nodule(s) (n=3D19) were most commonly seen, followed by ground-glass opacity (n=3D16), consolidation (n=3D3), and mass (n=3D1). A peripheral halo surrounding a nodule or an area of consolidation was seen in 18 patients. The nodules(s) (n=3D19) were subpleural (n=3D13) or random (=3D6). Areas of ground-glass opacity (n=3D16) were subpleural (n=3D13), random (n=3D2), or central (n=3D1). All lesions were patchy rather than diffuse. Follow-up CT in nine patients showed complete (n=3D7) or partial (n=3D2) resolution of parenchymal lesions. Chest radiographs of patients with simple pulmonary eosinophilia often reveal no abnormality. The most common finding is subtle opacity or nodule(s), while CT reveals transient nodule(s) with a surrounding halo or transient areas of ground glass opacity. (author)

  11. The roles of shear and cross-correlations on the fluctuation levels in simple stochastic models. Revision

    International Nuclear Information System (INIS)

    Krommes, J.A.

    1999-01-01

    Highly simplified models of random flows interacting with background microturbulence are analyzed. In the limit of very rapid velocity fluctuations, it is shown rigorously that the fluctuation level of a passively advected scalar is not controlled by the rms shear. In a model with random velocities dependent only on time, the level of cross-correlations between the flows and the background turbulence regulates the saturation level. This effect is illustrated by considering a simple stochastic-oscillator model, both exactly and with analysis and numerical solutions of the direct-interaction approximation. Implications for the understanding of self-consistent turbulence are discussed briefly

  12. Crossing simple resonances

    International Nuclear Information System (INIS)

    Collins, T.

    1985-08-01

    A simple criterion governs the beam distortion and/or loss of protons on a fast resonance crossing. Results from numerical integrations are illustrated for simple sextupole, octupole, and 10-pole resonances

  13. Crossing simple resonances

    Energy Technology Data Exchange (ETDEWEB)

    Collins, T.

    1985-08-01

    A simple criterion governs the beam distortion and/or loss of protons on a fast resonance crossing. Results from numerical integrations are illustrated for simple sextupole, octupole, and 10-pole resonances.

  14. Deception, discrimination, and fear of reprisal: lessons in ethics from third-year medical students.

    Science.gov (United States)

    Caldicott, Catherine V; Faber-Langendoen, Kathy

    2005-09-01

    To systematically examine ethical conflicts reported by all State University of New York Upstate Medical University third-year students, compare them with conflicts reported in the literature, and identify content areas that compel new or renewed emphasis in national educational objectives, standard curricula, and texts. From 1999 to 2002, all third-year students submitted papers for a required bioethics course. These papers depicted ethical issues arising during clinical clerkships. The authors devised a checklist of ethical issues; after analyzing the students' papers, the authors applied the checklist to the papers to create a taxonomy. Three hundred twenty-seven students submitted 688 cases involving 40 ethical issues. The most common issues were deliberate lies or deceptions (n = 68), patients' right to refuse recommended treatment (n = 48), and insistence on futile treatment (n = 46). Students perceived overt and subtle discrimination toward patients, reflected in substandard or excessive treatment. In 81 cases (12%), students expressed reluctance to speak up about moral conflict for fear of reprisal. This fear was expressed in 18 (45%) of the 40 issues-particularly student-specific (36 [52% of 69]) and quality of care (7 [24% of 29])-and most frequently in cases involving surgery (p ethical dilemmas in both "usual and customary" and seemingly incidental situations. Students who described fear of speaking up perceived a tradeoff between academic survival and patients' interests. The cases demonstrated that students still lacked the tools to navigate ethical dilemmas effectively. The authors propose that moral courage is within the realm of professional expectations for medical students; its cultivation is an appropriate formal objective for medical education.

  15. Properties of promoters cloned randomly from the Saccharomyces cerevisiae genome.

    Science.gov (United States)

    Santangelo, G M; Tornow, J; McLaughlin, C S; Moldave, K

    1988-01-01

    Promoters were isolated at random from the genome of Saccharomyces cerevisiae by using a plasmid that contains a divergently arrayed pair of promoterless reporter genes. A comprehensive library was constructed by inserting random (DNase I-generated) fragments into the intergenic region upstream from the reporter genes. Simple in vivo assays for either reporter gene product (alcohol dehydrogenase or beta-galactosidase) allowed the rapid identification of promoters from among these random fragments. Poly(dA-dT) homopolymer tracts were present in three of five randomly cloned promoters. With two exceptions, each RNA start site detected was 40 to 100 base pairs downstream from a TATA element. All of the randomly cloned promoters were capable of activating reporter gene transcription bidirectionally. Interestingly, one of the promoter fragments originated in a region of the S. cerevisiae rDNA spacer; regulated divergent transcription (presumably by RNA polymerase II) initiated in the same region. Images PMID:2847031

  16. Simple techniques for improving deep neural network outcomes on commodity hardware

    Science.gov (United States)

    Colina, Nicholas Christopher A.; Perez, Carlos E.; Paraan, Francis N. C.

    2017-08-01

    We benchmark improvements in the performance of deep neural networks (DNN) on the MNIST data test upon imple-menting two simple modifications to the algorithm that have little overhead computational cost. First is GPU parallelization on a commodity graphics card, and second is initializing the DNN with random orthogonal weight matrices prior to optimization. Eigenspectra analysis of the weight matrices reveal that the initially orthogonal matrices remain nearly orthogonal after training. The probability distributions from which these orthogonal matrices are drawn are also shown to significantly affect the performance of these deep neural networks.

  17. An integrable low-cost hardware random number generator

    Science.gov (United States)

    Ranasinghe, Damith C.; Lim, Daihyun; Devadas, Srinivas; Jamali, Behnam; Zhu, Zheng; Cole, Peter H.

    2005-02-01

    A hardware random number generator is different from a pseudo-random number generator; a pseudo-random number generator approximates the assumed behavior of a real hardware random number generator. Simple pseudo random number generators suffices for most applications, however for demanding situations such as the generation of cryptographic keys, requires an efficient and a cost effective source of random numbers. Arbiter-based Physical Unclonable Functions (PUFs) proposed for physical authentication of ICs exploits statistical delay variation of wires and transistors across integrated circuits, as a result of process variations, to build a secret key unique to each IC. Experimental results and theoretical studies show that a sufficient amount of variation exits across IC"s. This variation enables each IC to be identified securely. It is possible to exploit the unreliability of these PUF responses to build a physical random number generator. There exists measurement noise, which comes from the instability of an arbiter when it is in a racing condition. There exist challenges whose responses are unpredictable. Without environmental variations, the responses of these challenges are random in repeated measurements. Compared to other physical random number generators, the PUF-based random number generators can be a compact and a low-power solution since the generator need only be turned on when required. A 64-stage PUF circuit costs less than 1000 gates and the circuit can be implemented using a standard IC manufacturing processes. In this paper we have presented a fast and an efficient random number generator, and analysed the quality of random numbers produced using an array of tests used by the National Institute of Standards and Technology to evaluate the randomness of random number generators designed for cryptographic applications.

  18. Simple unification

    International Nuclear Information System (INIS)

    Ponce, W.A.; Zepeda, A.

    1987-08-01

    We present the results obtained from our systematic search of a simple Lie group that unifies weak and electromagnetic interactions in a single truly unified theory. We work with fractionally charged quarks, and allow for particles and antiparticles to belong to the same irreducible representation. We found that models based on SU(6), SU(7), SU(8) and SU(10) are viable candidates for simple unification. (author). 23 refs

  19. Seasonal variation in biochemical indicators of physiological status in Euphausia superba from Port Foster, Deception Island, Antarctica

    Science.gov (United States)

    Cullen, M.; Kaufmann, R. S.; Lowery, M. S.

    2003-06-01

    Seasonal changes in biochemical indicators of physiological status were analyzed in abdominal muscle of the Antarctic krill, Euphausia superba, collected from Port Foster, Deception Island, an active volcano located in the Shetland Island chain west of the Antarctic Peninsula. Krill were collected with a 10 m 2 MOCNESS trawl during four cruises (November 1999, February, May, November 2000). RNA:DNA mirrored the chlorophyll a concentration, with the highest values found during seasons of abundant phytoplankton. Activities of the glycolytic enzyme lactate dehydrogenase (LDH) and the mitochondrial enzyme citrate synthase (CS) were significantly higher in male krill when compared to females of similar size, indicating that their burst and aerobic swimming performance may be higher than females throughout the year. RNA:DNA ratio and enzyme activities were highly elevated in summer as compared to the earliest spring sampling period. Krill showed significant seasonal changes in LDH activity, with lowest values in spring and highest values in summer (females) or autumn (males). Krill showed significant seasonal changes in CS activity with highest values in summer. Protein and % water varied significantly among seasons for both males and females. Lower CS activity and RNA:DNA ratio suggest krill exhibit reduced metabolism during the winter when phytoplankton production is reduced, perhaps enhancing survival. Lower enzyme activities in female krill in early spring suggest they may achieve greater metabolic suppression during overwintering.

  20. The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy.

    Science.gov (United States)

    Arnold, Denis G; Oakley, James L

    2013-06-01

    As the pharmaceutical industry lobbies European regulators to permit direct-to-consumer advertising (DTCA) of prescription drugs in the European Union, we found that five leading companies violated industry-developed and -promulgated standards for ethical advertising in the United States. Utilizing multiple data sources and methods, we demonstrate a consistent failure by companies that market erectile dysfunction drugs to comply with the industry's guiding principles for ethical DTCA over a four-year period despite pledges of compliance by company leaders. Noncompliance resulted in children being exposed to sexually themed promotional messages more than 100 billion times. We argue that the guidelines are a coordinated effort by the industry to prevent unwanted federal regulation, and we introduce the concept of a blocking strategy to explain company behavior and to advance theoretical understanding of firms' public affairs strategies. We recommend policy responses to prevent deceptive practices, protect children from adult content, and promote genuine health care education.

  1. Asymmetrically dominated choice problems, the isolation hypothesis and random incentive mechanisms.

    Directory of Open Access Journals (Sweden)

    James C Cox

    Full Text Available This paper presents an experimental study of the random incentive mechanisms which are a standard procedure in economic and psychological experiments. Random incentive mechanisms have several advantages but are incentive-compatible only if responses to the single tasks are independent. This is true if either the independence axiom of expected utility theory or the isolation hypothesis of prospect theory holds. We present a simple test of this in the context of choice under risk. In the baseline (one task treatment we observe risk behavior in a given choice problem. We show that by integrating a second, asymmetrically dominated choice problem in a random incentive mechanism risk behavior can be manipulated systematically. This implies that the isolation hypothesis is violated and the random incentive mechanism does not elicit true preferences in our example.

  2. Asymmetrically dominated choice problems, the isolation hypothesis and random incentive mechanisms.

    Science.gov (United States)

    Cox, James C; Sadiraj, Vjollca; Schmidt, Ulrich

    2014-01-01

    This paper presents an experimental study of the random incentive mechanisms which are a standard procedure in economic and psychological experiments. Random incentive mechanisms have several advantages but are incentive-compatible only if responses to the single tasks are independent. This is true if either the independence axiom of expected utility theory or the isolation hypothesis of prospect theory holds. We present a simple test of this in the context of choice under risk. In the baseline (one task) treatment we observe risk behavior in a given choice problem. We show that by integrating a second, asymmetrically dominated choice problem in a random incentive mechanism risk behavior can be manipulated systematically. This implies that the isolation hypothesis is violated and the random incentive mechanism does not elicit true preferences in our example.

  3. Exploring biological network structure with clustered random networks

    Directory of Open Access Journals (Sweden)

    Bansal Shweta

    2009-12-01

    Full Text Available Abstract Background Complex biological systems are often modeled as networks of interacting units. Networks of biochemical interactions among proteins, epidemiological contacts among hosts, and trophic interactions in ecosystems, to name a few, have provided useful insights into the dynamical processes that shape and traverse these systems. The degrees of nodes (numbers of interactions and the extent of clustering (the tendency for a set of three nodes to be interconnected are two of many well-studied network properties that can fundamentally shape a system. Disentangling the interdependent effects of the various network properties, however, can be difficult. Simple network models can help us quantify the structure of empirical networked systems and understand the impact of various topological properties on dynamics. Results Here we develop and implement a new Markov chain simulation algorithm to generate simple, connected random graphs that have a specified degree sequence and level of clustering, but are random in all other respects. The implementation of the algorithm (ClustRNet: Clustered Random Networks provides the generation of random graphs optimized according to a local or global, and relative or absolute measure of clustering. We compare our algorithm to other similar methods and show that ours more successfully produces desired network characteristics. Finding appropriate null models is crucial in bioinformatics research, and is often difficult, particularly for biological networks. As we demonstrate, the networks generated by ClustRNet can serve as random controls when investigating the impacts of complex network features beyond the byproduct of degree and clustering in empirical networks. Conclusion ClustRNet generates ensembles of graphs of specified edge structure and clustering. These graphs allow for systematic study of the impacts of connectivity and redundancies on network function and dynamics. This process is a key step in

  4. Cleptobiosis in Social Insects

    Directory of Open Access Journals (Sweden)

    Michael D. Breed

    2012-01-01

    Full Text Available In this review of cleptobiosis, we not only focus on social insects, but also consider broader issues and concepts relating to the theft of food among animals. Cleptobiosis occurs when members of a species steal food, or sometimes nesting materials or other items of value, either from members of the same or a different species. This simple definition is not universally used, and there is some terminological confusion among cleptobiosis, cleptoparasitism, brood parasitism, and inquilinism. We first discuss the definitions of these terms and the confusion that arises from varying usage of the words. We consider that cleptobiosis usually is derived evolutionarily from established foraging behaviors. Cleptobionts can succeed by deception or by force, and we review the literature on cleptobiosis by deception or force in social insects. We focus on the best known examples of cleptobiosis, the ectatommine ant Ectatomma ruidum, the harvester ant Messor capitatus, and the stingless bee Lestrimellita limão. Cleptobiosis is facilitated either by deception or physical force, and we discuss both mechanisms. Part of this discussion is an analysis of the ecological implications (competition by interference and the evolutionary effects of cleptobiosis. We conclude with a comment on how cleptobiosis can increase the risk of disease or parasite spread among colonies of social insects.

  5. Comparación de la cicatrización clínica alveolar post exodoncia simple con y sin sutura

    OpenAIRE

    Huamaní Muñoz, Balbín Wilder

    2008-01-01

    The purpose of the present research was to compare the characteristics the process of alveolar clinical healing post simple exodontia with and without suture. The research was a simple randomized clinico test and was made in the Hospital of Support I Albrecht — Trujillo of EsSalud, during the months of January to April of the 2008, with a sample of study of thirty insured patients between twenty to fifty years old of bot h sexes. The characteristics of the alveolar healing of hemostasia, ...

  6. Crowding with conjunctions of simple features.

    Science.gov (United States)

    Põder, Endel; Wagemans, Johan

    2007-11-20

    Several recent studies have related crowding with the feature integration stage in visual processing. In order to understand the mechanisms involved in this stage, it is important to use stimuli that have several features to integrate, and these features should be clearly defined and measurable. In this study, Gabor patches were used as target and distractor stimuli. The stimuli differed in three dimensions: spatial frequency, orientation, and color. A group of 3, 5, or 7 objects was presented briefly at 4 deg eccentricity of the visual field. The observers' task was to identify the object located in the center of the group. A strong effect of the number of distractors was observed, consistent with various spatial pooling models. The analysis of incorrect responses revealed that these were a mix of feature errors and mislocalizations of the target object. Feature errors were not purely random, but biased by the features of distractors. We propose a simple feature integration model that predicts most of the observed regularities.

  7. Simple aspiration versus intercostal tube drainage for primary spontaneous pneumothorax in adults.

    Science.gov (United States)

    Carson-Chahhoud, Kristin V; Wakai, Abel; van Agteren, Joseph Em; Smith, Brian J; McCabe, Grainne; Brinn, Malcolm P; O'Sullivan, Ronan

    2017-09-07

    For management of pneumothorax that occurs without underlying lung disease, also referred to as primary spontaneous pneumothorax, simple aspiration is technically easier to perform than intercostal tube drainage. In this systematic review, we seek to compare the clinical efficacy and safety of simple aspiration versus intercostal tube drainage for management of primary spontaneous pneumothorax. This review was first published in 2007 and was updated in 2017. To compare the clinical efficacy and safety of simple aspiration versus intercostal tube drainage for management of primary spontaneous pneumothorax. We searched the Cochrane Central Register of Controlled Trials (CENTRAL; 2017, Issue 1) in the Cochrane Library; MEDLINE (1966 to January 2017); and Embase (1980 to January 2017). We searched the World Health Organization (WHO) International Clinical Trials Registry for ongoing trials (January 2017). We checked the reference lists of included trials and contacted trial authors. We imposed no language restrictions. We included randomized controlled trials (RCTs) of adults 18 years of age and older with primary spontaneous pneumothorax that compared simple aspiration versus intercostal tube drainage. Two review authors independently selected studies for inclusion, assessed trial quality, and extracted data. We combined studies using the random-effects model. Of 2332 publications obtained through the search strategy, seven studies met the inclusion criteria; one study was ongoing and six studies of 435 participants were eligible for inclusion in the updated review. Data show a significant difference in immediate success rates of procedures favouring tube drainage over simple aspiration for management of primary spontaneous pneumothorax (risk ratio (RR) 0.78, 95% confidence interval (CI) 0.69 to 0.89; 435 participants, 6 studies; moderate-quality evidence). Duration of hospitalization however was significantly less for patients treated by simple aspiration (mean

  8. Infinite number of pure equilibrium states, Parisi order parameter and the ultrametric topology: a simple mean field model

    International Nuclear Information System (INIS)

    Cassandro, M.; Olivieri, E.; Picco, P.

    1984-10-01

    We discuss and solve by standard method a simple model with long range random interaction. In this model we can rigorously define and explicitly work out many peculiar features already found in the Sherrington-Kirpatrick model only by means of replica symmetry breaking and/or via numerical simulations

  9. Randomness in quantum mechanics: philosophy, physics and technology.

    Science.gov (United States)

    Bera, Manabendra Nath; Acín, Antonio; Kuś, Marek; Mitchell, Morgan W; Lewenstein, Maciej

    2017-12-01

    This progress report covers recent developments in the area of quantum randomness, which is an extraordinarily interdisciplinary area that belongs not only to physics, but also to philosophy, mathematics, computer science, and technology. For this reason the article contains three parts that will be essentially devoted to different aspects of quantum randomness, and even directed, although not restricted, to various audiences: a philosophical part, a physical part, and a technological part. For these reasons the article is written on an elementary level, combining simple and non-technical descriptions with a concise review of more advanced results. In this way readers of various provenances will be able to gain while reading the article.

  10. Randomness in quantum mechanics: philosophy, physics and technology

    Science.gov (United States)

    Nath Bera, Manabendra; Acín, Antonio; Kuś, Marek; Mitchell, Morgan W.; Lewenstein, Maciej

    2017-12-01

    This progress report covers recent developments in the area of quantum randomness, which is an extraordinarily interdisciplinary area that belongs not only to physics, but also to philosophy, mathematics, computer science, and technology. For this reason the article contains three parts that will be essentially devoted to different aspects of quantum randomness, and even directed, although not restricted, to various audiences: a philosophical part, a physical part, and a technological part. For these reasons the article is written on an elementary level, combining simple and non-technical descriptions with a concise review of more advanced results. In this way readers of various provenances will be able to gain while reading the article.

  11. Reading aloud and solving simple arithmetic calculation intervention (Learning therapy improves inhibition, verbal episodic memory, focus attention, and processing speed in healthy elderly people: Evidence from a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Rui eNouchi

    2016-05-01

    Full Text Available BackgroundPrevious reports have described that simple cognitive training using reading aloud and solving simple arithmetic calculations, so-called learning therapy, can improve executive functions and processing speed in the older adults. Nevertheless, it is not well-known whether learning therapy improve a wide range of cognitive functions or not. We investigated the beneficial effects of learning therapy on various cognitive functions in healthy older adults.MethodsWe used a single-blinded intervention with two groups (learning therapy group: LT and waiting list control group: WL. Sixty-four elderly were randomly assigned to LT or WL. In LT, participants performed reading Japanese aloud and solving simple calculations training tasks for 6 months. WL did not participate in the intervention. We measured several cognitive functions before and after 6 months intervention periods.ResultsCompared to WL, results revealed that LT improved inhibition performance in executive functions (Stroop: LT (Mean = 3.88 vs. WL (Mean = 1.22, adjusted p =.013 and reverse Stroop LT (Mean = 3.22 vs. WL (Mean = 1.59, adjusted p =.015, verbal episodic memory (logical memory: LT (Mean = 4.59 vs. WL (Mean = 2.47, adjusted p =.015, focus attention(D-CAT: LT (Mean = 2.09 vs. WL (Mean = -0.59, adjusted p =.010 and processing speed compared to the waiting list control group (digit symbol coding: LT (Mean = 5.00 vs. WL (Mean = 1.13, adjusted p =.015 and symbol search: LT (Mean = 3.47 vs. WL (Mean = 1.81, adjusted p =.014.DiscussionThis RCT can showed the benefit of learning therapy on inhibition of executive functions, verbal episodic memory, focus attention, and processing speed in healthy elderly people. Our results were discussed under overlapping hypothesis.Trial registrationThis trial was registered in The University Hospital Medical Information Network Clinical Trials Registry (UMIN000006998.

  12. Generating equilateral random polygons in confinement III

    International Nuclear Information System (INIS)

    Diao, Y; Ernst, C; Montemayor, A; Ziegler, U

    2012-01-01

    In this paper we continue our earlier studies (Diao et al 2011 J. Phys. A: Math. Theor. 44 405202, Diao et al J. Phys. A: Math. Theor. 45 275203) on the generation methods of random equilateral polygons confined in a sphere. The first half of this paper is concerned with the generation of confined equilateral random walks. We show that if the selection of a vertex is uniform subject to the position of its previous vertex and the confining condition, then the distributions of the vertices are not uniform, although there exists a distribution such that if the initial vertex is selected following this distribution, then all vertices of the random walk follow this same distribution. Thus in order to generate a confined equilateral random walk, the selection of a vertex cannot be uniform subject to the position of its previous vertex and the confining condition. We provide a simple algorithm capable of generating confined equilateral random walks whose vertex distribution is almost uniform in the confinement sphere. In the second half of this paper we show that any process generating confined equilateral random walks can be turned into a process generating confined equilateral random polygons with the property that the vertex distribution of the polygons approaches the vertex distribution of the walks as the polygons get longer and longer. In our earlier studies, the starting point of the confined polygon is fixed at the center of the sphere. The new approach here allows us to move the starting point of the confined polygon off the center of the sphere. (paper)

  13. Random-walk simulation of the Schrodinger equation: H+3

    International Nuclear Information System (INIS)

    Anderson, J.B.

    1975-01-01

    A simple random-walk method for obtaining ab initio solutions of the Schrodinger equation is examined in its application to the case of the molecular ion H + 3 in the equilateral triangle configuration with side length R=1.66 bohr. The method, which is based on the similarity of the Schrodinger equation and the diffusion equation, involves the random movement of imaginary particles (psips) in electron configuration space subject to a variable chance of multiplication or disappearance. The computation requirements for high accuracy in determining energies of H + 3 are greater than those of existing LCAO--MO--SCF--CI methods. For more complex molecular systems the method may be competitive. (auth)

  14. A novel Random Walk algorithm with Compulsive Evolution for heat exchanger network synthesis

    International Nuclear Information System (INIS)

    Xiao, Yuan; Cui, Guomin

    2017-01-01

    Highlights: • A novel Random Walk Algorithm with Compulsive Evolution is proposed for HENS. • A simple and feasible evolution strategy is presented in RWCE algorithm. • The integer and continuous variables of HEN are optimized simultaneously in RWCE. • RWCE is demonstrated a relatively strong global search ability in HEN optimization. - Abstract: The heat exchanger network (HEN) synthesis can be characterized as highly combinatorial, nonlinear and nonconvex, contributing to unmanageable computational time and a challenge in identifying the global optimal network design. Stochastic methods are robust and show a powerful global optimizing ability. Based on the common characteristic of different stochastic methods, namely randomness, a novel Random Walk algorithm with Compulsive Evolution (RWCE) is proposed to achieve the best possible total annual cost of heat exchanger network with the relatively simple and feasible evolution strategy. A population of heat exchanger networks is first randomly initialized. Next, the heat load of heat exchanger for each individual is randomly expanded or contracted in order to optimize both the integer and continuous variables simultaneously and to obtain the lowest total annual cost. Besides, when individuals approach to local optima, there is a certain probability for them to compulsively accept the imperfect networks in order to keep the population diversity and ability of global optimization. The presented method is then applied to heat exchanger network synthesis cases from the literature to compare the best results published. RWCE consistently has a lower computed total annual cost compared to previously published results.

  15. Supporting the improvement and management of prescribing for urinary tract infections (SIMPle): protocol for a cluster randomized trial

    Science.gov (United States)

    2013-01-01

    Background The overuse of antimicrobials is recognized as the main selective pressure driving the emergence and spread of antimicrobial resistance in human bacterial pathogens. Urinary tract infections (UTIs) are among the most common infections presented in primary care and empirical antimicrobial treatment is currently recommended. Previous research has identified that a substantial proportion of Irish general practitioners (GPs) prescribe antimicrobials for UTIs that are not in accordance with the Guidelines for Antimicrobial Prescribing in Primary Care in Ireland. The aim of this trial is to design, implement and evaluate the effectiveness of a complex intervention on GP antimicrobial prescribing and adult (18 years of age and over) patients’ antimicrobial consumption when presenting with a suspected UTI. Methods/design The Supporting the Improvement and Management of Prescribing for urinary tract infections (SIMPle) study is a three-armed intervention with practice-level randomization. Adult patients presenting with suspected UTIs in primary care will be included in the study. The intervention integrates components for both GPs and patients. For GPs the intervention includes interactive workshops, audit and feedback reports and automated electronic prompts summarizing recommended first-line antimicrobial treatment and, for one intervention arm, a recommendation to consider delayed antimicrobial treatment. For patients, multimedia applications and information leaflets are included. Thirty practices will be recruited to the study; laboratory data indicate that 2,038 patients will be prescribed an antimicrobial in the study. The primary outcome is a change in prescribing of first-line antimicrobials for UTIs in accordance with the Guidelines for Antimicrobial Prescribing in Primary Care in Ireland. The study will take place over 15 months with a six-month intervention period. Data will be collected through a remote electronic anonymized data-extraction system

  16. Distribution of sizes of erased loops for loop-erased random walks

    OpenAIRE

    Dhar, Deepak; Dhar, Abhishek

    1997-01-01

    We study the distribution of sizes of erased loops for loop-erased random walks on regular and fractal lattices. We show that for arbitrary graphs the probability $P(l)$ of generating a loop of perimeter $l$ is expressible in terms of the probability $P_{st}(l)$ of forming a loop of perimeter $l$ when a bond is added to a random spanning tree on the same graph by the simple relation $P(l)=P_{st}(l)/l$. On $d$-dimensional hypercubical lattices, $P(l)$ varies as $l^{-\\sigma}$ for large $l$, whe...

  17. A Monotonicity Result for the Range of a Perturbed Random Walk

    OpenAIRE

    Chen, Lung-Chi; Sun, Rongfeng

    2012-01-01

    We consider a discrete time simple symmetric random walk on Z^d, d>=1, where the path of the walk is perturbed by inserting deterministic jumps. We show that for any time n and any deterministic jumps that we insert, the expected number of sites visited by the perturbed random walk up to time n is always larger than or equal to that for the unperturbed walk. This intriguing problem arises from the study of a particle among a Poisson system of moving traps with sub-diffusive trap motion. In pa...

  18. Albumin to creatinine ratio in a random urine sample: Correlation with severity of preeclampsia

    Directory of Open Access Journals (Sweden)

    Fady S. Moiety

    2014-06-01

    Conclusions: Random urine ACR may be a reliable method for prediction and assessment of severity of preeclampsia. Using the estimated cut-off may add to the predictive value of such a simple quick test.

  19. The effectiveness of a clinical and home-based physical activity program and simple lymphatic drainage in the prevention of breast cancer-related lymphedema: A prospective randomized controlled study.

    Science.gov (United States)

    Dönmez, Ayşe Arıkan; Kapucu, Sevgisun

    2017-12-01

    To investigate the effectiveness of a clinical and home-based, nurse-led physical activity program (PAP) and simple lymphatic drainage (SLD) in the prevention of breast cancer-related lymphedema. A total of 52 breast cancer patients were randomized to either a PAP and SLD program (n = 25) or a control group (n = 27). Patients in both groups were also provided training for lymphedema. The PAP and SLD were administered through home visits by the investigators, twice a week for six weeks, in the intervention group. The control group did not undergo intervention. The circumference of the upper extremity, symptom severity, and physical function were measured in both groups. The upper extremity circumference increased by about two times from the baseline, in the control group, especially in the sixth week (p breast cancer surgery, starting from before surgery and continuing until after, to prevent breast cancer-related lymphedema. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. High-power random distributed feedback fiber laser: From science to application

    Energy Technology Data Exchange (ETDEWEB)

    Du, Xueyuan [College of Optoelectronic Science and Engineering, National University of Defense Technology, Changsha 410073 (China); Naval Academy of Armament, Beijing 100161 (China); Zhang, Hanwei; Xiao, Hu; Ma, Pengfei; Wang, Xiaolin; Zhou, Pu; Liu, Zejin [College of Optoelectronic Science and Engineering, National University of Defense Technology, Changsha 410073 (China)

    2016-10-15

    A fiber laser based on random distributed feedback has attracted increasing attention in recent years, as it has become an important photonic device and has found wide applications in fiber communications or sensing. In this article, recent advances in high-power random distributed feedback fiber laser are reviewed, including the theoretical analyses, experimental approaches, discussion on the practical applications and outlook. It is found that a random distributed feedback fiber laser can not only act as an information photonics device, but also has the feasibility for high-efficiency/high-power generation, which makes it competitive with conventional high-power laser sources. In addition, high-power random distributed feedback fiber laser has been successfully applied for midinfrared lasing, frequency doubling to the visible and high-quality imaging. It is believed that the high-power random distributed feedback fiber laser could become a promising light source with simple and economic configurations. (copyright 2016 by WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  1. Novel pseudo-random number generator based on quantum random walks

    Science.gov (United States)

    Yang, Yu-Guang; Zhao, Qian-Qian

    2016-02-01

    In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on quantum random walks (QRWs), a famous quantum computation model. The PRNG merely relies on the equations used in the QRWs, and thus the generation algorithm is simple and the computation speed is fast. The proposed PRNG is subjected to statistical tests such as NIST and successfully passed the test. Compared with the representative PRNG based on quantum chaotic maps (QCM), the present QRWs-based PRNG has some advantages such as better statistical complexity and recurrence. For example, the normalized Shannon entropy and the statistical complexity of the QRWs-based PRNG are 0.999699456771172 and 1.799961178212329e-04 respectively given the number of 8 bits-words, say, 16Mbits. By contrast, the corresponding values of the QCM-based PRNG are 0.999448131481064 and 3.701210794388818e-04 respectively. Thus the statistical complexity and the normalized entropy of the QRWs-based PRNG are closer to 0 and 1 respectively than those of the QCM-based PRNG when the number of words of the analyzed sequence increases. It provides a new clue to construct PRNGs and also extends the applications of quantum computation.

  2. Novel pseudo-random number generator based on quantum random walks.

    Science.gov (United States)

    Yang, Yu-Guang; Zhao, Qian-Qian

    2016-02-04

    In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on quantum random walks (QRWs), a famous quantum computation model. The PRNG merely relies on the equations used in the QRWs, and thus the generation algorithm is simple and the computation speed is fast. The proposed PRNG is subjected to statistical tests such as NIST and successfully passed the test. Compared with the representative PRNG based on quantum chaotic maps (QCM), the present QRWs-based PRNG has some advantages such as better statistical complexity and recurrence. For example, the normalized Shannon entropy and the statistical complexity of the QRWs-based PRNG are 0.999699456771172 and 1.799961178212329e-04 respectively given the number of 8 bits-words, say, 16Mbits. By contrast, the corresponding values of the QCM-based PRNG are 0.999448131481064 and 3.701210794388818e-04 respectively. Thus the statistical complexity and the normalized entropy of the QRWs-based PRNG are closer to 0 and 1 respectively than those of the QCM-based PRNG when the number of words of the analyzed sequence increases. It provides a new clue to construct PRNGs and also extends the applications of quantum computation.

  3. Functional Significance of Labellum Pattern Variation in a Sexually Deceptive Orchid (Ophrys heldreichii: Evidence of Individual Signature Learning Effects.

    Directory of Open Access Journals (Sweden)

    Kerstin Stejskal

    Full Text Available Mimicking female insects to attract male pollinators is an important strategy in sexually deceptive orchids of the genus Ophrys, and some species possess flowers with conspicuous labellum patterns. The function of the variation of the patterns remains unresolved, with suggestions that these enhance pollinator communication. We investigated the possible function of the labellum pattern in Ophrys heldreichii, an orchid species in which the conspicuous and complex labellum pattern contrasts with a dark background. The orchid is pollinated exclusively by males of the solitary bee, Eucera berlandi. Comparisons of labellum patterns revealed that patterns within inflorescences are more similar than those of other conspecific plants. Field observations showed that the males approach at a great speed and directly land on flowers, but after an unsuccessful copulation attempt, bees hover close and visually scan the labellum pattern for up to a minute. Learning experiments conducted with honeybees as an accessible model of bee vision demonstrated that labellum patterns of different plants can be reliably learnt; in contrast, patterns of flowers from the same inflorescence could not be discriminated. These results support the hypothesis that variable labellum patterns in O. heldreichii are involved in flower-pollinator communication which would likely help these plants to avoid geitonogamy.

  4. Simple and flexible SAS and SPSS programs for analyzing lag-sequential categorical data.

    Science.gov (United States)

    O'Connor, B P

    1999-11-01

    This paper describes simple and flexible programs for analyzing lag-sequential categorical data, using SAS and SPSS. The programs read a stream of codes and produce a variety of lag-sequential statistics, including transitional frequencies, expected transitional frequencies, transitional probabilities, adjusted residuals, z values, Yule's Q values, likelihood ratio tests of stationarity across time and homogeneity across groups or segments, transformed kappas for unidirectional dependence, bidirectional dependence, parallel and nonparallel dominance, and significance levels based on both parametric and randomization tests.

  5. Exact two-point resistance, and the simple random walk on the complete graph minus N edges

    International Nuclear Information System (INIS)

    Chair, Noureddine

    2012-01-01

    An analytical approach is developed to obtain the exact expressions for the two-point resistance and the total effective resistance of the complete graph minus N edges of the opposite vertices. These expressions are written in terms of certain numbers that we introduce, which we call the Bejaia and the Pisa numbers; these numbers are the natural generalizations of the bisected Fibonacci and Lucas numbers. The correspondence between random walks and the resistor networks is then used to obtain the exact expressions for the first passage and mean first passage times on this graph. - Highlights: ► We obtain exact formulas for the two-point resistance of the complete graph minus N edges. ► We obtain also the total effective resistance of this graph. ► We modified Schwatt’s formula on trigonometrical power sum to suit our computations. ► We introduced the generalized bisected Fibonacci and Lucas numbers: the Bejaia and the Pisa numbers. ► The first passage and mean first passage times of the random walks have exact expressions.

  6. Observations of volcanic earthquakes and tremor at Deception Island - Antarctica

    Directory of Open Access Journals (Sweden)

    J. Morales

    1999-06-01

    Full Text Available Deception Island - South Shetlands, Antarctica is site of active volcanism. Since 1988 field surveys have been carried out with the aim of seismic monitoring, and in 1994 a seismic array was set up near the site of the Spanish summer base in order to better constrain the source location and spectral properties of the seismic events related to the volcanic activity. The array was maintained during the Antarctic summer of 1995 and the last field survey was carried out in 1996. Data show the existence of three different groups (or families of seismic events: 1 long period events, with a quasi-monochromatic spectral content (1-3 Hz peak frequency and a duration of more than 50 s, often occurring in small swarms lasting from several minutes to some day; 2 volcanic tremor, with a spectral shape similar to the long period events but with a duration of several minutes (2-10; 3 hybrid events, with a waveform characterised by the presence of a high frequency initial phase, followed by a low frequency phase with characteristics similar to those of the long period events. The high frequency phase of the hybrid events was analysed using polarisation techniques, showing the presence of P waves. This phase is presumably located at short epicentral distances and shallow source depth. All the analysed seismic events show back-azimuths between 120 and 330 degrees from north (corresponding to zones of volcanic activity showing no seismic activity in the middle of the caldera. Particle motion, Fourier spectral and spectrogram analysis show that the low frequency part of the three groups of the seismic signals have similar patterns. Moreover careful observations show that the high frequency phase which characterises the hybrid events is present in the long period and in the tremor events, even with lower signal to noise ratios. This evidence suggests that long period events are events in which the high frequency part is simply difficult to observe, due to a very

  7. Efficient sampling of complex network with modified random walk strategies

    Science.gov (United States)

    Xie, Yunya; Chang, Shuhua; Zhang, Zhipeng; Zhang, Mi; Yang, Lei

    2018-02-01

    We present two novel random walk strategies, choosing seed node (CSN) random walk and no-retracing (NR) random walk. Different from the classical random walk sampling, the CSN and NR strategies focus on the influences of the seed node choice and path overlap, respectively. Three random walk samplings are applied in the Erdös-Rényi (ER), Barabási-Albert (BA), Watts-Strogatz (WS), and the weighted USAir networks, respectively. Then, the major properties of sampled subnets, such as sampling efficiency, degree distributions, average degree and average clustering coefficient, are studied. The similar conclusions can be reached with these three random walk strategies. Firstly, the networks with small scales and simple structures are conducive to the sampling. Secondly, the average degree and the average clustering coefficient of the sampled subnet tend to the corresponding values of original networks with limited steps. And thirdly, all the degree distributions of the subnets are slightly biased to the high degree side. However, the NR strategy performs better for the average clustering coefficient of the subnet. In the real weighted USAir networks, some obvious characters like the larger clustering coefficient and the fluctuation of degree distribution are reproduced well by these random walk strategies.

  8. Probability of Failure in Random Vibration

    DEFF Research Database (Denmark)

    Nielsen, Søren R.K.; Sørensen, John Dalsgaard

    1988-01-01

    Close approximations to the first-passage probability of failure in random vibration can be obtained by integral equation methods. A simple relation exists between the first-passage probability density function and the distribution function for the time interval spent below a barrier before out......-crossing. An integral equation for the probability density function of the time interval is formulated, and adequate approximations for the kernel are suggested. The kernel approximation results in approximate solutions for the probability density function of the time interval and thus for the first-passage probability...

  9. Xenoepitope substitution avoids deceptive imprinting and broadens the immune response to foot-and-mouth disease virus.

    Science.gov (United States)

    Szczepanek, Steven M; Barrette, Roger W; Rood, Debra; Alejo, Diana; Silbart, Lawrence K

    2012-04-01

    Many RNA viruses encode error-prone polymerases which introduce mutations into B and T cell epitopes, providing a mechanism for immunological escape. When regions of hypervariability are found within immunodominant epitopes with no known function, they are referred to as "decoy epitopes," which often deceptively imprint the host's immune response. In this work, a decoy epitope was identified in the foot-and-mouth disease virus (FMDV) serotype O VP1 G-H loop after multiple sequence alignment of 118 isolates. A series of chimeric cyclic peptides resembling the type O G-H loop were prepared, each bearing a defined "B cell xenoepitope" from another virus in place of the native decoy epitope. These sequences were derived from porcine respiratory and reproductive syndrome virus (PRRSV), from HIV, or from a presumptively tolerogenic sequence from murine albumin and were subsequently used as immunogens in BALB/c mice. Cross-reactive antibody responses against all peptides were compared to a wild-type peptide and ovalbumin (OVA). A broadened antibody response was generated in animals inoculated with the PRRSV chimeric peptide, in which virus binding of serum antibodies was also observed. A B cell epitope mapping experiment did not reveal recognition of any contiguous linear epitopes, raising the possibility that the refocused response was directed to a conformational epitope. Taken together, these results indicate that xenoepitope substitution is a novel method for immune refocusing against decoy epitopes of RNA viruses such as FMDV as part of the rational design of next-generation vaccines.

  10. Study of the active layer at the Spanish Antarctic station “Gabriel de Castilla”, Deception Island, Antarctica

    International Nuclear Information System (INIS)

    Pablo, M.A. de; Molina, A.; Recio, C.; Ramos, M.; Goyanes, G.; Ropero, M.A.

    2017-01-01

    The degradation of permanent frozen ground (permafrost) and the increase in the thickness of the active layer may be caused both by natural processes (such as global climate change) and by anthropic activity, which changes the natural environmental conditions that allow its existence, as has been widely reported to occur in the northern polar and subpolar regions. In the case of Antarctica, some scientific research stations are located in areas with permafrost, such as the Spanish Antarctic station “Gabriel de Castilla” on Deception Island. In the place where the station is located, an important increase in erosion has been observed in recent years, including the excavation of new gullies and the erosion of the coastal cliffs. In order to develop an initial analysis of the possible effects of the station on the permafrost degradation, ground temperature has been monitored since 2012 and the thickness and of the active layer and the temperature, both inside and beneath the station, have also been sporadically measured. Here we show the results and discuss how the station reduces the freezing of the ground during the winter when the station is closed and facilitates the warming of the ground during the living periods of the station in the Antarctic summer. Those initial results and conclusions make necessary to continue the study of the permafrost and the active layer in the station site by systematic monitoring of the ground temperature and the thickness of the active layer. [es

  11. Efficient search by optimized intermittent random walks

    International Nuclear Information System (INIS)

    Oshanin, Gleb; Lindenberg, Katja; Wio, Horacio S; Burlatsky, Sergei

    2009-01-01

    We study the kinetics for the search of an immobile target by randomly moving searchers that detect it only upon encounter. The searchers perform intermittent random walks on a one-dimensional lattice. Each searcher can step on a nearest neighbor site with probability α or go off lattice with probability 1 - α to move in a random direction until it lands back on the lattice at a fixed distance L away from the departure point. Considering α and L as optimization parameters, we seek to enhance the chances of successful detection by minimizing the probability P N that the target remains undetected up to the maximal search time N. We show that even in this simple model, a number of very efficient search strategies can lead to a decrease of P N by orders of magnitude upon appropriate choices of α and L. We demonstrate that, in general, such optimal intermittent strategies are much more efficient than Brownian searches and are as efficient as search algorithms based on random walks with heavy-tailed Cauchy jump-length distributions. In addition, such intermittent strategies appear to be more advantageous than Levy-based ones in that they lead to more thorough exploration of visited regions in space and thus lend themselves to parallelization of the search processes.

  12. A generalized model via random walks for information filtering

    Science.gov (United States)

    Ren, Zhuo-Ming; Kong, Yixiu; Shang, Ming-Sheng; Zhang, Yi-Cheng

    2016-08-01

    There could exist a simple general mechanism lurking beneath collaborative filtering and interdisciplinary physics approaches which have been successfully applied to online E-commerce platforms. Motivated by this idea, we propose a generalized model employing the dynamics of the random walk in the bipartite networks. Taking into account the degree information, the proposed generalized model could deduce the collaborative filtering, interdisciplinary physics approaches and even the enormous expansion of them. Furthermore, we analyze the generalized model with single and hybrid of degree information on the process of random walk in bipartite networks, and propose a possible strategy by using the hybrid degree information for different popular objects to toward promising precision of the recommendation.

  13. Randomly Generating Four Mixed Bell-Diagonal States with a Concurrences Sum to Unity

    International Nuclear Information System (INIS)

    Toh, S. P.; Zainuddin Hishamuddin; Foo Kim Eng

    2012-01-01

    A two-qubit system in quantum information theory is the simplest bipartite quantum system and its concurrence for pure and mixed states is well known. As a subset of two-qubit systems, Bell-diagonal states can be depicted by a very simple geometrical representation of a tetrahedron with sides of length 2√2. Based on this geometric representation, we propose a simple approach to randomly generate four mixed Bell decomposable states in which the sum of their concurrence is equal to one. (general)

  14. Random blebbing motion: A simple model linking cell structural properties to migration characteristics

    Science.gov (United States)

    Woolley, Thomas E.; Gaffney, Eamonn A.; Goriely, Alain

    2017-07-01

    If the plasma membrane of a cell is able to delaminate locally from its actin cortex, a cellular bleb can be produced. Blebs are pressure-driven protrusions, which are noteworthy for their ability to produce cellular motion. Starting from a general continuum mechanics description, we restrict ourselves to considering cell and bleb shapes that maintain approximately spherical forms. From this assumption, we obtain a tractable algebraic system for bleb formation. By including cell-substrate adhesions, we can model blebbing cell motility. Further, by considering mechanically isolated blebbing events, which are randomly distributed over the cell, we can derive equations linking the macroscopic migration characteristics to the microscopic structural parameters of the cell. This multiscale modeling framework is then used to provide parameter estimates, which are in agreement with current experimental data. In summary, the construction of the mathematical model provides testable relationships between the bleb size and cell motility.

  15. Random blebbing motion: A simple model linking cell structural properties to migration characteristics.

    Science.gov (United States)

    Woolley, Thomas E; Gaffney, Eamonn A; Goriely, Alain

    2017-07-01

    If the plasma membrane of a cell is able to delaminate locally from its actin cortex, a cellular bleb can be produced. Blebs are pressure-driven protrusions, which are noteworthy for their ability to produce cellular motion. Starting from a general continuum mechanics description, we restrict ourselves to considering cell and bleb shapes that maintain approximately spherical forms. From this assumption, we obtain a tractable algebraic system for bleb formation. By including cell-substrate adhesions, we can model blebbing cell motility. Further, by considering mechanically isolated blebbing events, which are randomly distributed over the cell, we can derive equations linking the macroscopic migration characteristics to the microscopic structural parameters of the cell. This multiscale modeling framework is then used to provide parameter estimates, which are in agreement with current experimental data. In summary, the construction of the mathematical model provides testable relationships between the bleb size and cell motility.

  16. Simple arithmetic: not so simple for highly math anxious individuals.

    Science.gov (United States)

    Chang, Hyesang; Sprute, Lisa; Maloney, Erin A; Beilock, Sian L; Berman, Marc G

    2017-12-01

    Fluency with simple arithmetic, typically achieved in early elementary school, is thought to be one of the building blocks of mathematical competence. Behavioral studies with adults indicate that math anxiety (feelings of tension or apprehension about math) is associated with poor performance on cognitively demanding math problems. However, it remains unclear whether there are fundamental differences in how high and low math anxious individuals approach overlearned simple arithmetic problems that are less reliant on cognitive control. The current study used functional magnetic resonance imaging to examine the neural correlates of simple arithmetic performance across high and low math anxious individuals. We implemented a partial least squares analysis, a data-driven, multivariate analysis method to measure distributed patterns of whole-brain activity associated with performance. Despite overall high simple arithmetic performance across high and low math anxious individuals, performance was differentially dependent on the fronto-parietal attentional network as a function of math anxiety. Specifically, low-compared to high-math anxious individuals perform better when they activate this network less-a potential indication of more automatic problem-solving. These findings suggest that low and high math anxious individuals approach even the most fundamental math problems differently. © The Author (2017). Published by Oxford University Press.

  17. Universal shocks in the Wishart random-matrix ensemble.

    Science.gov (United States)

    Blaizot, Jean-Paul; Nowak, Maciej A; Warchoł, Piotr

    2013-05-01

    We show that the derivative of the logarithm of the average characteristic polynomial of a diffusing Wishart matrix obeys an exact partial differential equation valid for an arbitrary value of N, the size of the matrix. In the large N limit, this equation generalizes the simple inviscid Burgers equation that has been obtained earlier for Hermitian or unitary matrices. The solution, through the method of characteristics, presents singularities that we relate to the precursors of shock formation in the Burgers equation. The finite N effects appear as a viscosity term in the Burgers equation. Using a scaling analysis of the complete equation for the characteristic polynomial, in the vicinity of the shocks, we recover in a simple way the universal Bessel oscillations (so-called hard-edge singularities) familiar in random-matrix theory.

  18. Efficient pseudo-random number generation for monte-carlo simulations using graphic processors

    Science.gov (United States)

    Mohanty, Siddhant; Mohanty, A. K.; Carminati, F.

    2012-06-01

    A hybrid approach based on the combination of three Tausworthe generators and one linear congruential generator for pseudo random number generation for GPU programing as suggested in NVIDIA-CUDA library has been used for MONTE-CARLO sampling. On each GPU thread, a random seed is generated on fly in a simple way using the quick and dirty algorithm where mod operation is not performed explicitly due to unsigned integer overflow. Using this hybrid generator, multivariate correlated sampling based on alias technique has been carried out using both CUDA and OpenCL languages.

  19. Efficient pseudo-random number generation for Monte-Carlo simulations using graphic processors

    International Nuclear Information System (INIS)

    Mohanty, Siddhant; Mohanty, A K; Carminati, F

    2012-01-01

    A hybrid approach based on the combination of three Tausworthe generators and one linear congruential generator for pseudo random number generation for GPU programing as suggested in NVIDIA-CUDA library has been used for MONTE-CARLO sampling. On each GPU thread, a random seed is generated on fly in a simple way using the quick and dirty algorithm where mod operation is not performed explicitly due to unsigned integer overflow. Using this hybrid generator, multivariate correlated sampling based on alias technique has been carried out using both CUDA and OpenCL languages.

  20. Exact two-point resistance, and the simple random walk on the complete graph minus N edges

    Energy Technology Data Exchange (ETDEWEB)

    Chair, Noureddine, E-mail: n.chair@ju.edu.jo

    2012-12-15

    An analytical approach is developed to obtain the exact expressions for the two-point resistance and the total effective resistance of the complete graph minus N edges of the opposite vertices. These expressions are written in terms of certain numbers that we introduce, which we call the Bejaia and the Pisa numbers; these numbers are the natural generalizations of the bisected Fibonacci and Lucas numbers. The correspondence between random walks and the resistor networks is then used to obtain the exact expressions for the first passage and mean first passage times on this graph. - Highlights: Black-Right-Pointing-Pointer We obtain exact formulas for the two-point resistance of the complete graph minus N edges. Black-Right-Pointing-Pointer We obtain also the total effective resistance of this graph. Black-Right-Pointing-Pointer We modified Schwatt's formula on trigonometrical power sum to suit our computations. Black-Right-Pointing-Pointer We introduced the generalized bisected Fibonacci and Lucas numbers: the Bejaia and the Pisa numbers. Black-Right-Pointing-Pointer The first passage and mean first passage times of the random walks have exact expressions.