WorldWideScience

Sample records for face detection information

  1. On Improving Face Detection Performance by Modelling Contextual Information

    OpenAIRE

    Atanasoaei, Cosmin; McCool, Chris; Marcel, Sébastien

    2010-01-01

    In this paper we present a new method to enhance object detection by removing false alarms and merging multiple detections in a principled way with few parameters. The method models the output of an object classiï¬er which we consider as the context. A hierarchical model is built using the detection distribution around a target sub-window to discriminate between false alarms and true detections. Next the context is used to iteratively reï¬ne the detections. Finally the detections are clustere...

  2. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    .... Specifically, the report addresses the problem of detecting faces in color images in the presence of various lighting conditions and complex backgrounds as well as recognizing faces under variations...

  3. Energy conservation using face detection

    Science.gov (United States)

    Deotale, Nilesh T.; Kalbande, Dhananjay R.; Mishra, Akassh A.

    2011-10-01

    Computerized Face Detection, is concerned with the difficult task of converting a video signal of a person to written text. It has several applications like face recognition, simultaneous multiple face processing, biometrics, security, video surveillance, human computer interface, image database management, digital cameras use face detection for autofocus, selecting regions of interest in photo slideshows that use a pan-and-scale and The Present Paper deals with energy conservation using face detection. Automating the process to a computer requires the use of various image processing techniques. There are various methods that can be used for Face Detection such as Contour tracking methods, Template matching, Controlled background, Model based, Motion based and color based. Basically, the video of the subject are converted into images are further selected manually for processing. However, several factors like poor illumination, movement of face, viewpoint-dependent Physical appearance, Acquisition geometry, Imaging conditions, Compression artifacts makes Face detection difficult. This paper reports an algorithm for conservation of energy using face detection for various devices. The present paper suggests Energy Conservation can be done by Detecting the Face and reducing the brightness of complete image and then adjusting the brightness of the particular area of an image where the face is located using histogram equalization.

  4. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    This report describes research efforts towards developing algorithms for a robust face recognition system to overcome many of the limitations found in existing two-dimensional facial recognition systems...

  5. Person-Specific Face Detection in a Scene with Optimum Composite Filtering and Colour-Shape Information

    Directory of Open Access Journals (Sweden)

    Seokwon Yeom

    2013-01-01

    Full Text Available Face detection and recognition have wide applications in robot vision and intelligent surveillance. However, face identification at a distance is very challenging because long-distance images are often degraded by low resolution, blurring and noise. This paper introduces a person-specific face detection method that uses a nonlinear optimum composite filter and subsequent verification stages. The filter's optimum criterion minimizes the sum of the output energy generated by the input noise and the input image. The composite filter is trained with several training images under long-distance modelling. The candidate facial regions are provided by the filter's outputs of the input scene. False alarms are eliminated by subsequent testing stages, which comprise skin colour and edge mask filtering tests. In the experiments, images captured by a webcam and a CCTV camera are processed to show the effectiveness of the person-specific face detection system at a long distance.

  6. Comparing Face Detection and Recognition Techniques

    OpenAIRE

    Korra, Jyothi

    2016-01-01

    This paper implements and compares different techniques for face detection and recognition. One is find where the face is located in the images that is face detection and second is face recognition that is identifying the person. We study three techniques in this paper: Face detection using self organizing map (SOM), Face recognition by projection and nearest neighbor and Face recognition using SVM.

  7. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  8. Face Liveness Detection Using Defocus

    Directory of Open Access Journals (Sweden)

    Sooyeon Kim

    2015-01-01

    Full Text Available In order to develop security systems for identity authentication, face recognition (FR technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D pictures. To defend from these attacks and to enhance the reliability of FR systems, many anti-spoofing approaches have been recently developed. In this paper, we propose a method for face liveness detection using the effect of defocus. From two images sequentially taken at different focuses, three features, focus, power histogram and gradient location and orientation histogram (GLOH, are extracted. Afterwards, we detect forged faces through the feature-level fusion approach. For reliable performance verification, we develop two databases with a handheld digital camera and a webcam. The proposed method achieves a 3.29% half total error rate (HTER at a given depth of field (DoF and can be extended to camera-equipped devices, like smartphones.

  9. The wide window of face detection.

    Science.gov (United States)

    Hershler, Orit; Golan, Tal; Bentin, Shlomo; Hochstein, Shaul

    2010-08-20

    Faces are detected more rapidly than other objects in visual scenes and search arrays, but the cause for this face advantage has been contested. In the present study, we found that under conditions of spatial uncertainty, faces were easier to detect than control targets (dog faces, clocks and cars) even in the absence of surrounding stimuli, making an explanation based only on low-level differences unlikely. This advantage improved with eccentricity in the visual field, enabling face detection in wider visual windows, and pointing to selective sparing of face detection at greater eccentricities. This face advantage might be due to perceptual factors favoring face detection. In addition, the relative face advantage is greater under flanked than non-flanked conditions, suggesting an additional, possibly attention-related benefit enabling face detection in groups of distracters.

  10. A robust human face detection algorithm

    Science.gov (United States)

    Raviteja, Thaluru; Karanam, Srikrishna; Yeduguru, Dinesh Reddy V.

    2012-01-01

    Human face detection plays a vital role in many applications like video surveillance, managing a face image database, human computer interface among others. This paper proposes a robust algorithm for face detection in still color images that works well even in a crowded environment. The algorithm uses conjunction of skin color histogram, morphological processing and geometrical analysis for detecting human faces. To reinforce the accuracy of face detection, we further identify mouth and eye regions to establish the presence/absence of face in a particular region of interest.

  11. Detecting and categorizing fleeting emotions in faces.

    Science.gov (United States)

    Sweeny, Timothy D; Suzuki, Satoru; Grabowecky, Marcia; Paller, Ken A

    2013-02-01

    Expressions of emotion are often brief, providing only fleeting images from which to base important social judgments. We sought to characterize the sensitivity and mechanisms of emotion detection and expression categorization when exposure to faces is very brief, and to determine whether these processes dissociate. Observers viewed 2 backward-masked facial expressions in quick succession, 1 neutral and the other emotional (happy, fearful, or angry), in a 2-interval forced-choice task. On each trial, observers attempted to detect the emotional expression (emotion detection) and to classify the expression (expression categorization). Above-chance emotion detection was possible with extremely brief exposures of 10 ms and was most accurate for happy expressions. We compared categorization among expressions using a d' analysis, and found that categorization was usually above chance for angry versus happy and fearful versus happy, but consistently poor for fearful versus angry expressions. Fearful versus angry categorization was poor even when only negative emotions (fearful, angry, or disgusted) were used, suggesting that this categorization is poor independent of decision context. Inverting faces impaired angry versus happy categorization, but not emotion detection, suggesting that information from facial features is used differently for emotion detection and expression categorizations. Emotion detection often occurred without expression categorization, and expression categorization sometimes occurred without emotion detection. These results are consistent with the notion that emotion detection and expression categorization involve separate mechanisms. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  12. Detecting and Categorizing Fleeting Emotions in Faces

    Science.gov (United States)

    Sweeny, Timothy D.; Suzuki, Satoru; Grabowecky, Marcia; Paller, Ken A.

    2013-01-01

    Expressions of emotion are often brief, providing only fleeting images from which to base important social judgments. We sought to characterize the sensitivity and mechanisms of emotion detection and expression categorization when exposure to faces is very brief, and to determine whether these processes dissociate. Observers viewed 2 backward-masked facial expressions in quick succession, 1 neutral and the other emotional (happy, fearful, or angry), in a 2-interval forced-choice task. On each trial, observers attempted to detect the emotional expression (emotion detection) and to classify the expression (expression categorization). Above-chance emotion detection was possible with extremely brief exposures of 10 ms and was most accurate for happy expressions. We compared categorization among expressions using a d′ analysis, and found that categorization was usually above chance for angry versus happy and fearful versus happy, but consistently poor for fearful versus angry expressions. Fearful versus angry categorization was poor even when only negative emotions (fearful, angry, or disgusted) were used, suggesting that this categorization is poor independent of decision context. Inverting faces impaired angry versus happy categorization, but not emotion detection, suggesting that information from facial features is used differently for emotion detection and expression categorizations. Emotion detection often occurred without expression categorization, and expression categorization sometimes occurred without emotion detection. These results are consistent with the notion that emotion detection and expression categorization involve separate mechanisms. PMID:22866885

  13. Seeing Objects as Faces Enhances Object Detection.

    Science.gov (United States)

    Takahashi, Kohske; Watanabe, Katsumi

    2015-10-01

    The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  14. Seeing Objects as Faces Enhances Object Detection

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2015-09-01

    Full Text Available The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  15. Faces in the Mist: Illusory Face and Letter Detection

    Directory of Open Access Journals (Sweden)

    Cory A. Rieth

    2011-06-01

    Full Text Available We report three behavioral experiments on the spatial characteristics evoking illusory face and letter detection. False detections made to pure noise images were analyzed using a modified reverse correlation method in which hundreds of observers rated a modest number of noise images (480 during a single session. This method was originally developed for brain imaging research, and has been used in a number of fMRI publications, but this is the first report of the behavioral classification images. In Experiment 1 illusory face detection occurred in response to scattered dark patches throughout the images, with a bias to the left visual field. This occurred despite the use of a fixation cross and expectations that faces would be centered. In contrast, illusory letter detection (Experiment 2 occurred in response to centrally positioned dark patches. Experiment 3 included an oval in all displays to spatially constrain illusory face detection. With the addition of this oval the classification image revealed an eyes/nose/mouth pattern. These results suggest that face detection is triggered by a minimal face-like pattern even when these features are not centered in visual focus.

  16. Improving Face Detection with TOE Cameras

    DEFF Research Database (Denmark)

    Hansen, Dan Witzner; Larsen, Rasmus; Lauze, F

    2007-01-01

    A face detection method based on a boosted classifier using images from a time-of-flight sensor is presented. We show that the performance of face detection can be improved when using both depth and gray scale images and that the common use of integration of hypotheses for verification can...... be relaxed. Based on the detected face we employ an active contour method on depth images for full head segmentation....

  17. Robust online face tracking-by-detection

    NARCIS (Netherlands)

    Comaschi, F.; Stuijk, S.; Basten, T.; Corporaal, H.

    2016-01-01

    The problem of online face tracking from unconstrained videos is still unresolved. Challenges range from coping with severe online appearance variations to coping with occlusion. We propose RFTD (Robust Face Tracking-by-Detection), a system which combines tracking and detection into a single

  18. Efficient human face detection in infancy.

    Science.gov (United States)

    Jakobsen, Krisztina V; Umstead, Lindsey; Simpson, Elizabeth A

    2016-01-01

    Adults detect conspecific faces more efficiently than heterospecific faces; however, the development of this own-species bias (OSB) remains unexplored. We tested whether 6- and 11-month-olds exhibit OSB in their attention to human and animal faces in complex visual displays with high perceptual load (25 images competing for attention). Infants (n = 48) and adults (n = 43) passively viewed arrays containing a face among 24 non-face distractors while we measured their gaze with remote eye tracking. While OSB is typically not observed until about 9 months, we found that, already by 6 months, human faces were more likely to be detected, were detected more quickly (attention capture), and received longer looks (attention holding) than animal faces. These data suggest that 6-month-olds already exhibit OSB in face detection efficiency, consistent with perceptual attunement. This specialization may reflect the biological importance of detecting conspecific faces, a foundational ability for early social interactions. © 2015 Wiley Periodicals, Inc.

  19. Live face detection based on the analysis of Fourier spectra

    Science.gov (United States)

    Li, Jiangwei; Wang, Yunhong; Tan, Tieniu; Jain, Anil K.

    2004-08-01

    Biometrics is a rapidly developing technology that is to identify a person based on his or her physiological or behavioral characteristics. To ensure the correction of authentication, the biometric system must be able to detect and reject the use of a copy of a biometric instead of the live biometric. This function is usually termed "liveness detection". This paper describes a new method for live face detection. Using structure and movement information of live face, an effective live face detection algorithm is presented. Compared to existing approaches, which concentrate on the measurement of 3D depth information, this method is based on the analysis of Fourier spectra of a single face image or face image sequences. Experimental results show that the proposed method has an encouraging performance.

  20. Face validation using 3D information from single calibrated camera

    DEFF Research Database (Denmark)

    Katsarakis, N.; Pnevmatikakis, A.

    2009-01-01

    stages in the cascade. This constrains the misses by making detection easier, but increases the false positives. False positives can be reduced by validating the detected image regions as faces. This has been accomplished using color and pattern information of the detected image regions. In this paper we......Detection of faces in cluttered scenes under arbitrary imaging conditions (pose, expression, illumination and distance) is prone to miss and false positive errors. The well-established approach of using boosted cascades of simple classifiers addresses the problem of missing faces by using fewer...

  1. Face Detection and Face Recognition in Android Mobile Applications

    Directory of Open Access Journals (Sweden)

    Octavian DOSPINESCU

    2016-01-01

    Full Text Available The quality of the smartphone’s camera enables us to capture high quality pictures at a high resolution, so we can perform different types of recognition on these images. Face detection is one of these types of recognition that is very common in our society. We use it every day on Facebook to tag friends in our pictures. It is also used in video games alongside Kinect concept, or in security to allow the access to private places only to authorized persons. These are just some examples of using facial recognition, because in modern society, detection and facial recognition tend to surround us everywhere. The aim of this article is to create an appli-cation for smartphones that can recognize human faces. The main goal of this application is to grant access to certain areas or rooms only to certain authorized persons. For example, we can speak here of hospitals or educational institutions where there are rooms where only certain employees can enter. Of course, this type of application can cover a wide range of uses, such as helping people suffering from Alzheimer's to recognize the people they loved, to fill gaps persons who can’t remember the names of their relatives or for example to automatically capture the face of our own children when they smile.

  2. Mapping face recognition information use across cultures

    Directory of Open Access Journals (Sweden)

    Sébastien eMiellet

    2013-02-01

    Full Text Available Face recognition is not rooted in a universal eye movement information-gathering strategy. Western observers favor a local facial feature sampling strategy, whereas Eastern observers prefer sampling face information from a global, central fixation strategy. Yet, the precise qualitative (the diagnostic and quantitative (the amount information underlying these cultural perceptual biases in face recognition remains undetermined.To this end, we monitored the eye movements of Western and Eastern observers during a face recognition task, with a novel gaze-contingent technique: the Expanding Spotlight. We used 2° Gaussian apertures centered on the observers' fixations expanding dynamically at a rate of 1° every 25ms at each fixation - the longer the fixation duration, the larger the aperture size. Identity-specific face information was only displayed within the Gaussian aperture; outside the aperture, an average face template was displayed to facilitate saccade planning. Thus, the Expanding Spotlight simultaneously maps out the facial information span at each fixation location.Data obtained with the Expanding Spotlight technique confirmed that Westerners extract more information from the eye region, whereas Easterners extract more information from the nose region. Interestingly, this quantitative difference was paired with a qualitative disparity. Retinal filters based on spatial frequency decomposition built from the fixations maps revealed that Westerners used local high-spatial frequency information sampling, covering all the features critical for effective face recognition (the eyes and the mouth. In contrast, Easterners achieved a similar result by using global low-spatial frequency information from those facial features.Our data show that the face system flexibly engages into local or global eye movement strategies across cultures, by relying on distinct facial information span and culturally tuned spatially filtered information. Overall, our

  3. A causal relationship between face-patch activity and face-detection behavior.

    Science.gov (United States)

    Sadagopan, Srivatsun; Zarco, Wilbert; Freiwald, Winrich A

    2017-04-04

    The primate brain contains distinct areas densely populated by face-selective neurons. One of these, face-patch ML, contains neurons selective for contrast relationships between face parts. Such contrast-relationships can serve as powerful heuristics for face detection. However, it is unknown whether neurons with such selectivity actually support face-detection behavior. Here, we devised a naturalistic face-detection task and combined it with fMRI-guided pharmacological inactivation of ML to test whether ML is of critical importance for real-world face detection. We found that inactivation of ML impairs face detection. The effect was anatomically specific, as inactivation of areas outside ML did not affect face detection, and it was categorically specific, as inactivation of ML impaired face detection while sparing body and object detection. These results establish that ML function is crucial for detection of faces in natural scenes, performing a critical first step on which other face processing operations can build.

  4. The asymmetric distribution of informative face information during gender recognition.

    Science.gov (United States)

    Hu, Fengpei; Hu, Huan; Xu, Lian; Qin, Jungang

    2013-02-01

    Recognition of the gender of a face is important in social interactions. In the current study, the distribution of informative facial information was systematically examined during gender judgment using two methods, Bubbles and Focus windows techniques. Two experiments found that the most informative information was around the eyes, followed by the mouth and nose. Other parts of the face contributed to the gender recognition but were less important. The left side of the face was used more during gender recognition in two experiments. These results show mainly areas around the eyes are used for gender judgment and demonstrate perceptual asymmetry with a normal (non-chimeric) face.

  5. Independent component analysis of edge information for face recognition

    CERN Document Server

    Karande, Kailash Jagannath

    2013-01-01

    The book presents research work on face recognition using edge information as features for face recognition with ICA algorithms. The independent components are extracted from edge information. These independent components are used with classifiers to match the facial images for recognition purpose. In their study, authors have explored Canny and LOG edge detectors as standard edge detection methods. Oriented Laplacian of Gaussian (OLOG) method is explored to extract the edge information with different orientations of Laplacian pyramid. Multiscale wavelet model for edge detection is also propos

  6. Advances in face detection and facial image analysis

    CERN Document Server

    Celebi, M; Smolka, Bogdan

    2016-01-01

    This book presents the state-of-the-art in face detection and analysis. It outlines new research directions, including in particular psychology-based facial dynamics recognition, aimed at various applications such as behavior analysis, deception detection, and diagnosis of various psychological disorders. Topics of interest include face and facial landmark detection, face recognition, facial expression and emotion analysis, facial dynamics analysis, face classification, identification, and clustering, and gaze direction and head pose estimation, as well as applications of face analysis.

  7. Happy Face Superiority Effect in Change Detection Paradigm

    Directory of Open Access Journals (Sweden)

    Domagoj Švegar

    2013-09-01

    Full Text Available The aim of the present study was to investigate which affective component guides cognitive processing of emotional facial expressions. According to the threat hypothesis, processing of angry faces is prioritized by the human cognitive system, because rapid detection of threat has a large adaptive value. The negativity hypothesis presumes that distressing emotional experiences of other people attract attention, regardless of whether they represent danger or not. The emotionality hypothesis proposes that positive emotional facial expressions can capture attention as effective as negative ones, while the happy face superiority hypothesis predicts that happy faces are prioritized. In the present study, which was conducted on 24 participants, change detection paradigm was used, because that procedure enables insight into the later stage of information processing. The results obtained show that happy facial expressions are heavily prioritized by the human cognitive system. In explanation of these results, that clearly support the happy face superiority hypothesis, we propose that angry expressions are initially prioritized by our cognitive system, because we benefit from early detection of potential threat in the environment, but in later cognitive processing, happy expressions are given the priority, because smiling is a valuable mechanism for forming and maintaining cooperative relationships. Besides the theoretical relevance, the present study is also valuable methodologically, because we demonstrated that change detection paradigm can be efficiently used for the research of emotional facial expressions processing.

  8. Cosmetic Detection Framework for Face and Iris Biometrics

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2018-04-01

    Full Text Available Cosmetics pose challenges to the recognition performance of face and iris biometric systems due to its ability to alter natural facial and iris patterns. Facial makeup and iris contact lens are considered to be commonly applied cosmetics for the face and iris in this study. The present work aims to present a novel solution for the detection of cosmetics in both face and iris biometrics by the fusion of texture, shape and color descriptors of images. The proposed cosmetic detection scheme combines the microtexton information from the local primitives of texture descriptors with the color spaces achieved from overlapped blocks in order to achieve better detection of spots, flat areas, edges, edge ends, curves, appearance and colors. The proposed cosmetic detection scheme was applied to the YMU YouTube makeup database (YMD facial makeup database and IIIT-Delhi Contact Lens iris database. The results demonstrate that the proposed cosmetic detection scheme is significantly improved compared to the other schemes implemented in this study.

  9. The effect of texture on face identification and configural information processing

    Directory of Open Access Journals (Sweden)

    Tzschaschel Eva Alica

    2014-01-01

    Full Text Available Shape and texture are an integral part of face identity. In the present study, the importance of face texture for face identification and detection of configural manipulation (i.e., spatial relation among facial features was examined by comparing grayscale face photographs (i.e., real faces and line drawings of the same faces. Whereas real faces provide information about texture and shape of faces, line drawings are lacking texture cues. A change-detection task and a forced-choice identification task were used with both stimuli categories. Within the change detection task, participants had to decide whether the size of the eyes of two sequentially presented faces had changed or not. After having made this decision, three faces were shown to the subjects and they had to identify the previously shown face among them. Furthermore, context (full vs. cropped faces and orientation (upright vs. inverted were manipulated. The results obtained in the change detection task suggest that configural information was used in processing real faces, while part-based and featural information was used in processing line-drawings. Additionally, real faces were identified more accurately than line drawings, and identification was less context but more orientation sensitive than identification of line drawings. Taken together, the results of the present study provide new evidence stressing the importance of face texture for identity encoding and configural face processing.

  10. Faces in places: humans and machines make similar face detection errors.

    Directory of Open Access Journals (Sweden)

    Bernard Marius 't Hart

    Full Text Available The human visual system seems to be particularly efficient at detecting faces. This efficiency sometimes comes at the cost of wrongfully seeing faces in arbitrary patterns, including famous examples such as a rock configuration on Mars or a toast's roast patterns. In machine vision, face detection has made considerable progress and has become a standard feature of many digital cameras. The arguably most wide-spread algorithm for such applications ("Viola-Jones" algorithm achieves high detection rates at high computational efficiency. To what extent do the patterns that the algorithm mistakenly classifies as faces also fool humans? We selected three kinds of stimuli from real-life, first-person perspective movies based on the algorithm's output: correct detections ("real faces", false positives ("illusory faces" and correctly rejected locations ("non faces". Observers were shown pairs of these for 20 ms and had to direct their gaze to the location of the face. We found that illusory faces were mistaken for faces more frequently than non faces. In addition, rotation of the real face yielded more errors, while rotation of the illusory face yielded fewer errors. Using colored stimuli increases overall performance, but does not change the pattern of results. When replacing the eye movement by a manual response, however, the preference for illusory faces over non faces disappeared. Taken together, our data show that humans make similar face-detection errors as the Viola-Jones algorithm, when directing their gaze to briefly presented stimuli. In particular, the relative spatial arrangement of oriented filters seems of relevance. This suggests that efficient face detection in humans is likely to be pre-attentive and based on rather simple features as those encoded in the early visual system.

  11. Implicit face prototype learning from geometric information.

    Science.gov (United States)

    Or, Charles C-F; Wilson, Hugh R

    2013-04-19

    There is evidence that humans implicitly learn an average or prototype of previously studied faces, as the unseen face prototype is falsely recognized as having been learned (Solso & McCarthy, 1981). Here we investigated the extent and nature of face prototype formation where observers' memory was tested after they studied synthetic faces defined purely in geometric terms in a multidimensional face space. We found a strong prototype effect: The basic results showed that the unseen prototype averaged from the studied faces was falsely identified as learned at a rate of 86.3%, whereas individual studied faces were identified correctly 66.3% of the time and the distractors were incorrectly identified as having been learned only 32.4% of the time. This prototype learning lasted at least 1 week. Face prototype learning occurred even when the studied faces were further from the unseen prototype than the median variation in the population. Prototype memory formation was evident in addition to memory formation of studied face exemplars as demonstrated in our models. Additional studies showed that the prototype effect can be generalized across viewpoints, and head shape and internal features separately contribute to prototype formation. Thus, implicit face prototype extraction in a multidimensional space is a very general aspect of geometric face learning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. The Face-to-Face Light Detection Paradigm: A New Methodology for Investigating Visuospatial Attention Across Different Face Regions in Live Face-to-Face Communication Settings.

    Science.gov (United States)

    Thompson, Laura A; Malloy, Daniel M; Cone, John M; Hendrickson, David L

    2010-01-01

    We introduce a novel paradigm for studying the cognitive processes used by listeners within interactive settings. This paradigm places the talker and the listener in the same physical space, creating opportunities for investigations of attention and comprehension processes taking place during interactive discourse situations. An experiment was conducted to compare results from previous research using videotaped stimuli to those obtained within the live face-to-face task paradigm. A headworn apparatus is used to briefly display LEDs on the talker's face in four locations as the talker communicates with the participant. In addition to the primary task of comprehending speeches, participants make a secondary task light detection response. In the present experiment, the talker gave non-emotionally-expressive speeches that were used in past research with videotaped stimuli. Signal detection analysis was employed to determine which areas of the face received the greatest focus of attention. Results replicate previous findings using videotaped methods.

  13. An RGB-D Database Using Microsoft’s Kinect for Windows for Face Detection

    DEFF Research Database (Denmark)

    Idskou Høg, Rasmus; Jasek, Petr; Rofidal, Clement

    2012-01-01

    The very first step in many facial analysis systems is face detection. Though face detection has been studied for many years, there is not still a benchmark public database to be widely accepted among researchers for which both color and depth information are obtained by the same sensor. Most...

  14. Multi-Branch Fully Convolutional Network for Face Detection

    KAUST Repository

    Bai, Yancheng

    2017-07-20

    Face detection is a fundamental problem in computer vision. It is still a challenging task in unconstrained conditions due to significant variations in scale, pose, expressions, and occlusion. In this paper, we propose a multi-branch fully convolutional network (MB-FCN) for face detection, which considers both efficiency and effectiveness in the design process. Our MB-FCN detector can deal with faces at all scale ranges with only a single pass through the backbone network. As such, our MB-FCN model saves computation and thus is more efficient, compared to previous methods that make multiple passes. For each branch, the specific skip connections of the convolutional feature maps at different layers are exploited to represent faces in specific scale ranges. Specifically, small faces can be represented with both shallow fine-grained and deep powerful coarse features. With this representation, superior improvement in performance is registered for the task of detecting small faces. We test our MB-FCN detector on two public face detection benchmarks, including FDDB and WIDER FACE. Extensive experiments show that our detector outperforms state-of-the-art methods on all these datasets in general and by a substantial margin on the most challenging among them (e.g. WIDER FACE Hard subset). Also, MB-FCN runs at 15 FPS on a GPU for images of size 640 x 480 with no assumption on the minimum detectable face size.

  15. Face detection and facial feature localization using notch based templates

    International Nuclear Information System (INIS)

    Qayyum, U.

    2007-01-01

    We present a real time detection off aces from the video with facial feature localization as well as the algorithm capable of differentiating between the face/non-face patterns. The need of face detection and facial feature localization arises in various application of computer vision, so a lot of research is dedicated to come up with a real time solution. The algorithm should remain simple to perform real time whereas it should not compromise on the challenges encountered during the detection and localization phase, keeping simplicity and all challenges i.e. algorithm invariant to scale, translation, and (+-45) rotation transformations. The proposed system contains two parts. Visual guidance and face/non-face classification. The visual guidance phase uses the fusion of motion and color cues to classify skin color. Morphological operation with union-structure component labeling algorithm extracts contiguous regions. Scale normalization is applied by nearest neighbor interpolation method to avoid the effect of different scales. Using the aspect ratio of width and height size. Region of Interest (ROI) is obtained and then passed to face/non-face classifier. Notch (Gaussian) based templates/ filters are used to find circular darker regions in ROI. The classified face region is handed over to facial feature localization phase, which uses YCbCr eyes/lips mask for face feature localization. The empirical results show an accuracy of 90% for five different videos with 1000 face/non-face patterns and processing rate of proposed algorithm is 15 frames/sec. (author)

  16. Face detection dissociates from face recognition : evidence from ERPs and the naso-temporal asymmetry (Abstract)

    NARCIS (Netherlands)

    de Gelder, B.; Pourtois, G.R.C.

    2002-01-01

    Neuropsychological data indicate that face processing could be distributed among two functionally and anatomically distinct mechanisms, one specialised for detection and the other aimed at recognition (de Gelder & Rouw, 2000; 2001). These two mechanisms may be implemented in different interacting

  17. Attentional System for Face Detection and Tracking

    Directory of Open Access Journals (Sweden)

    Leonardo Pinto da Silva Panta Leão

    2011-04-01

    Full Text Available The human visual system quickly performs complex decisions due, in part, to attentional system, which positions the most relevant targets in the center of the visual field, region with greatest concentration of photoreceptor cells. The attentional system involves sensory, cognitive and also mechanical elements, because the eye and head muscles must be activated to produce movement. In this paper we present the proposal of a face detector system that, as well as the biological system, produces a coordinated movement with the purpose of positioning the target image in the center of camera's visual field. The developed system has distinct parts, one responsible for video pattern recognition and other for controlling the mechanical part, implemented as processes that communicate with each other by sockets.

  18. Toward automated face detection in thermal and polarimetric thermal imagery

    Science.gov (United States)

    Gordon, Christopher; Acosta, Mark; Short, Nathan; Hu, Shuowen; Chan, Alex L.

    2016-05-01

    Visible spectrum face detection algorithms perform pretty reliably under controlled lighting conditions. However, variations in illumination and application of cosmetics can distort the features used by common face detectors, thereby degrade their detection performance. Thermal and polarimetric thermal facial imaging are relatively invariant to illumination and robust to the application of makeup, due to their measurement of emitted radiation instead of reflected light signals. The objective of this work is to evaluate a government off-the-shelf wavelet based naïve-Bayes face detection algorithm and a commercial off-the-shelf Viola-Jones cascade face detection algorithm on face imagery acquired in different spectral bands. New classifiers were trained using the Viola-Jones cascade object detection framework with preprocessed facial imagery. Preprocessing using Difference of Gaussians (DoG) filtering reduces the modality gap between facial signatures across the different spectral bands, thus enabling more correlated histogram of oriented gradients (HOG) features to be extracted from the preprocessed thermal and visible face images. Since the availability of training data is much more limited in the thermal spectrum than in the visible spectrum, it is not feasible to train a robust multi-modal face detector using thermal imagery alone. A large training dataset was constituted with DoG filtered visible and thermal imagery, which was subsequently used to generate a custom trained Viola-Jones detector. A 40% increase in face detection rate was achieved on a testing dataset, as compared to the performance of a pre-trained/baseline face detector. Insights gained in this research are valuable in the development of more robust multi-modal face detectors.

  19. The many faces of information disclosure

    NARCIS (Netherlands)

    Boot, A.W.A.; Thakor, A.V.

    1998-01-01

    In this article we ask: what kind of information and how much of it should firms voluntarily disclose? Three types of disclosures are considered. One is information that complements the information available only to informed investors (to-be-processed complementary information). The second is

  20. Horizontal information drives the behavioural signatures of face processing

    Directory of Open Access Journals (Sweden)

    Valerie Goffaux

    2010-09-01

    Full Text Available Recent psychophysical evidence indicates that the vertical arrangement of horizontal information is particularly important for encoding facial identity. In this paper we extend this notion to examine the role that information at different (particularly cardinal orientations might play in a number of established phenomena each a behavioural “signature” of face processing. In particular we consider (a the face inversion effect (FIE, (b the facial identity after-effect, (c face-matching across viewpoint, and (d interactive, so-called holistic, processing of face parts. We report that filtering faces to remove all but the horizontal information largely preserves these effects but conversely, retaining vertical information generally diminishes or abolishes them. We conclude that preferential processing of horizontal information is a central feature of human face processing that supports many of the behavioural signatures of this critical visual operation.

  1. Multi-Branch Fully Convolutional Network for Face Detection

    KAUST Repository

    Bai, Yancheng; Ghanem, Bernard

    2017-01-01

    Face detection is a fundamental problem in computer vision. It is still a challenging task in unconstrained conditions due to significant variations in scale, pose, expressions, and occlusion. In this paper, we propose a multi-branch fully

  2. The roles of perceptual and conceptual information in face recognition.

    Science.gov (United States)

    Schwartz, Linoy; Yovel, Galit

    2016-11-01

    The representation of familiar objects is comprised of perceptual information about their visual properties as well as the conceptual knowledge that we have about them. What is the relative contribution of perceptual and conceptual information to object recognition? Here, we examined this question by designing a face familiarization protocol during which participants were either exposed to rich perceptual information (viewing each face in different angles and illuminations) or with conceptual information (associating each face with a different name). Both conditions were compared with single-view faces presented with no labels. Recognition was tested on new images of the same identities to assess whether learning generated a view-invariant representation. Results showed better recognition of novel images of the learned identities following association of a face with a name label, but no enhancement following exposure to multiple face views. Whereas these findings may be consistent with the role of category learning in object recognition, face recognition was better for labeled faces only when faces were associated with person-related labels (name, occupation), but not with person-unrelated labels (object names or symbols). These findings suggest that association of meaningful conceptual information with an image shifts its representation from an image-based percept to a view-invariant concept. They further indicate that the role of conceptual information should be considered to account for the superior recognition that we have for familiar faces and objects. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  3. Multi-view Face Detection Using Deep Convolutional Neural Networks

    OpenAIRE

    Farfade, Sachin Sudhakar; Saberian, Mohammad; Li, Li-Jia

    2015-01-01

    In this paper we consider the problem of multi-view face detection. While there has been significant research on this problem, current state-of-the-art approaches for this task require annotation of facial landmarks, e.g. TSM [25], or annotation of face poses [28, 22]. They also require training dozens of models to fully capture faces in all orientations, e.g. 22 models in HeadHunter method [22]. In this paper we propose Deep Dense Face Detector (DDFD), a method that does not require pose/lan...

  4. A Viola-Jones based hybrid face detection framework

    Science.gov (United States)

    Murphy, Thomas M.; Broussard, Randy; Schultz, Robert; Rakvic, Ryan; Ngo, Hau

    2013-12-01

    Improvements in face detection performance would benefit many applications. The OpenCV library implements a standard solution, the Viola-Jones detector, with a statistically boosted rejection cascade of binary classifiers. Empirical evidence has shown that Viola-Jones underdetects in some instances. This research shows that a truncated cascade augmented by a neural network could recover these undetected faces. A hybrid framework is constructed, with a truncated Viola-Jones cascade followed by an artificial neural network, used to refine the face decision. Optimally, a truncation stage that captured all faces and allowed the neural network to remove the false alarms is selected. A feedforward backpropagation network with one hidden layer is trained to discriminate faces based upon the thresholding (detection) values of intermediate stages of the full rejection cascade. A clustering algorithm is used as a precursor to the neural network, to group significant overlappings. Evaluated on the CMU/VASC Image Database, comparison with an unmodified OpenCV approach shows: (1) a 37% increase in detection rates if constrained by the requirement of no increase in false alarms, (2) a 48% increase in detection rates if some additional false alarms are tolerated, and (3) an 82% reduction in false alarms with no reduction in detection rates. These results demonstrate improved face detection and could address the need for such improvement in various applications.

  5. Face Liveness Detection Based on Skin Blood Flow Analysis

    Directory of Open Access Journals (Sweden)

    Shun-Yi Wang

    2017-12-01

    Full Text Available Face recognition systems have been widely adopted for user authentication in security systems due to their simplicity and effectiveness. However, spoofing attacks, including printed photos, displayed photos, and replayed video attacks, are critical challenges to authentication, and these spoofing attacks allow malicious invaders to gain access to the system. This paper proposes two novel features for face liveness detection systems to protect against printed photo attacks and replayed attacks for biometric authentication systems. The first feature obtains the texture difference between red and green channels of face images inspired by the observation that skin blood flow in the face has properties that enable distinction between live and spoofing face images. The second feature estimates the color distribution in the local regions of face images, instead of whole images, because image quality might be more discriminative in small areas of face images. These two features are concatenated together, along with a multi-scale local binary pattern feature, and a support vector machine classifier is trained to discriminate between live and spoofing face images. The experimental results show that the performance of the proposed method for face spoof detection is promising when compared with that of previously published methods. Furthermore, the proposed system can be implemented in real time, which is valuable for mobile applications.

  6. Adapting Local Features for Face Detection in Thermal Image

    Directory of Open Access Journals (Sweden)

    Chao Ma

    2017-11-01

    Full Text Available A thermal camera captures the temperature distribution of a scene as a thermal image. In thermal images, facial appearances of different people under different lighting conditions are similar. This is because facial temperature distribution is generally constant and not affected by lighting condition. This similarity in face appearances is advantageous for face detection. To detect faces in thermal images, cascade classifiers with Haar-like features are generally used. However, there are few studies exploring the local features for face detection in thermal images. In this paper, we introduce two approaches relying on local features for face detection in thermal images. First, we create new feature types by extending Multi-Block LBP. We consider a margin around the reference and the generally constant distribution of facial temperature. In this way, we make the features more robust to image noise and more effective for face detection in thermal images. Second, we propose an AdaBoost-based training method to get cascade classifiers with multiple types of local features. These feature types have different advantages. In this way we enhance the description power of local features. We did a hold-out validation experiment and a field experiment. In the hold-out validation experiment, we captured a dataset from 20 participants, comprising 14 males and 6 females. For each participant, we captured 420 images with 10 variations in camera distance, 21 poses, and 2 appearances (participant with/without glasses. We compared the performance of cascade classifiers trained by different sets of the features. The experiment results showed that the proposed approaches effectively improve the performance of face detection in thermal images. In the field experiment, we compared the face detection performance in realistic scenes using thermal and RGB images, and gave discussion based on the results.

  7. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳俊; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting human faces in color images. The algorithm consists of three image processing steps. The first step is human skin color statistics. Then it separates skin regions from non-skin regions. After that, it locates the frontal human face(s) within the skin regions. In the first step, 250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors. This chroma chart is used to generate, from the original color image, a gray scale image whose gray value at a pixel shows its likelihood of representing the skin. The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into separate skin regions from non skin regions. Finally, multiple face templates matching is used to determine if a given skin region represents a frontal human face or not. Test of the system with more than 400 color images showed that the resulting detection rate was 83%, which is better than most color-based face detection systems. The average speed for face detection is 0.8 second/image (400×300 pixels) on a Pentium 3 (800MHz) PC.

  8. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳酸; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting hu-man faces in color images.The algorithm comsists of three image processing steps.The first step is human skin color statistics.Then it separates skin regions from non-skin regions.After that,it locates the frontal human face(s) within the skin regions.In the first step,250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors.This chroma chart is used to generate,from the original color image,a gray scale image whose gray value at a pixel shows its likelihood of representing the shin,The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into sep-arate skin regions from non skin regions.Finally,multiple face templates matching is used to determine if a given skin region represents a frontal human face or not.Test of the system with more than 400 color images showed that the resulting detection rate was 83%,which is better than most colou-based face detection sys-tems.The average speed for face detection is 0.8 second/image(400×300pixels) on a Pentium 3(800MHz) PC.

  9. Face Image Quality and its Improvement in a Face Detection System

    DEFF Research Database (Denmark)

    Kamal, Nasrollahi; Moeslund, Thomas B.

    2008-01-01

    When a person passes by a surveillance camera a sequence of images is obtained. Most of these images are redundant and usually keeping some of them which have better quality is sufficient. So before performing any analysis on the face of a person, the face at the first step needs to be detected...... we are trying to develop a system to deal with the video sequences in these 3 steps....

  10. Opportunities and constraints facing informal street traders ...

    African Journals Online (AJOL)

    A small income and the limited ability of the government and the formal business sector to provide sufficient employment opportunities to people in the economically active age categories are two of the main reasons for informal trading in South African cities. As a result, the informal street trading sector plays an important ...

  11. Borderline Personality and the Detection of Angry Faces.

    Directory of Open Access Journals (Sweden)

    Johanna Hepp

    Full Text Available Many studies have assessed emotion recognition in patients with Borderline Personality Disorder and considerable evidence has been accumulated on patients' ability to categorize emotions. In contrast, their ability to detect emotions has been investigated sparsely. The only two studies that assessed emotion detection abilities found contradictory evidence on patients' ability to detect angry faces.To clarify whether patients with Borderline Personality Disorder show enhanced detection of angry faces, we conducted three experiments: a laboratory study (n = 53 with a clinical sample and two highly powered web studies that measured Borderline features (n1 = 342, n2 = 220. Participants in all studies completed a visual search paradigm, and the reaction times for the detection of angry vs. happy faces were measured.Consistently, data spoke against enhanced detection of angry faces in the Borderline groups, indicated by non-significant group (Borderline vs. healthy control × target (angry vs. happy interactions, despite highly satisfactory statistical power to detect even small effects.In contrast to emotion categorization, emotion detection appears to be intact in patients with Borderline Personality Disorder and individuals high in Borderline features. The importance of distinguishing between these two processes in future studies is discussed.

  12. Individual differences in detecting rapidly presented fearful faces.

    Directory of Open Access Journals (Sweden)

    Dandan Zhang

    Full Text Available Rapid detection of evolutionarily relevant threats (e.g., fearful faces is important for human survival. The ability to rapidly detect fearful faces exhibits high variability across individuals. The present study aimed to investigate the relationship between behavioral detection ability and brain activity, using both event-related potential (ERP and event-related oscillation (ERO measurements. Faces with fearful or neutral facial expressions were presented for 17 ms or 200 ms in a backward masking paradigm. Forty-two participants were required to discriminate facial expressions of the masked faces. The behavioral sensitivity index d' showed that the detection ability to rapidly presented and masked fearful faces varied across participants. The ANOVA analyses showed that the facial expression, hemisphere, and presentation duration affected the grand-mean ERP (N1, P1, and N170 and ERO (below 20 Hz and lasted from 100 ms to 250 ms post-stimulus, mainly in theta band brain activity. More importantly, the overall detection ability of 42 subjects was significantly correlated with the emotion effect (i.e., fearful vs. neutral on ERP (r = 0.403 and ERO (r = 0.552 measurements. A higher d' value was corresponding to a larger size of the emotional effect (i.e., fearful--neutral of N170 amplitude and a larger size of the emotional effect of the specific ERO spectral power at the right hemisphere. The present results suggested a close link between behavioral detection ability and the N170 amplitude as well as the ERO spectral power below 20 Hz in individuals. The emotional effect size between fearful and neutral faces in brain activity may reflect the level of conscious awareness of fearful faces.

  13. Real-time Face Detection using Skin Color Model

    Institute of Scientific and Technical Information of China (English)

    LU Yao-xin; LIU Zhi-Qiang; ZHU Xiang-hua

    2004-01-01

    This paper presents a new face detection approach to real-time applications, which is based on the skin color model and the morphological filtering. First the non-skin color pixels of the input image are removed based on the skin color model in the YCrCb chrominance space, from which we extract candidate human face regions. Then a mathematical morphological filter is used to remove noisy regions and fill the holes in the candidate skin color regions. We adopt the similarity between the human face features and the candidate face regions to locate the face regions in the original image. We have implemented the algorithm in our smart media system. The experiment results show that this system is effective in real-time applications.

  14. The changing face of informed surgical consent.

    LENUS (Irish Health Repository)

    Oosthuizen, J C

    2012-03-01

    To determine whether procedure-specific brochures improve patients\\' pre-operative knowledge, to determine the amount of information expected by patients during the consenting process, and to determine whether the recently proposed \\'Request for Treatment\\' consenting process is viable on a large scale.

  15. Detection of emotional faces: salient physical features guide effective visual search.

    Science.gov (United States)

    Calvo, Manuel G; Nummenmaa, Lauri

    2008-08-01

    In this study, the authors investigated how salient visual features capture attention and facilitate detection of emotional facial expressions. In a visual search task, a target emotional face (happy, disgusted, fearful, angry, sad, or surprised) was presented in an array of neutral faces. Faster detection of happy and, to a lesser extent, surprised and disgusted faces was found both under upright and inverted display conditions. Inversion slowed down the detection of these faces less than that of others (fearful, angry, and sad). Accordingly, the detection advantage involves processing of featural rather than configural information. The facial features responsible for the detection advantage are located in the mouth rather than the eye region. Computationally modeled visual saliency predicted both attentional orienting and detection. Saliency was greatest for the faces (happy) and regions (mouth) that were fixated earlier and detected faster, and there was close correspondence between the onset of the modeled saliency peak and the time at which observers initially fixated the faces. The authors conclude that visual saliency of specific facial features--especially the smiling mouth--is responsible for facilitated initial orienting, which thus shortens detection. (PsycINFO Database Record (c) 2008 APA, all rights reserved).

  16. Multiview face detection based on position estimation over multicamera surveillance system

    Science.gov (United States)

    Huang, Ching-chun; Chou, Jay; Shiu, Jia-Hou; Wang, Sheng-Jyh

    2012-02-01

    In this paper, we propose a multi-view face detection system that locates head positions and indicates the direction of each face in 3-D space over a multi-camera surveillance system. To locate 3-D head positions, conventional methods relied on face detection in 2-D images and projected the face regions back to 3-D space for correspondence. However, the inevitable false face detection and rejection usually degrades the system performance. Instead, our system searches for the heads and face directions over the 3-D space using a sliding cube. Each searched 3-D cube is projected onto the 2-D camera views to determine the existence and direction of human faces. Moreover, a pre-process to estimate the locations of candidate targets is illustrated to speed-up the searching process over the 3-D space. In summary, our proposed method can efficiently fuse multi-camera information and suppress the ambiguity caused by detection errors. Our evaluation shows that the proposed approach can efficiently indicate the head position and face direction on real video sequences even under serious occlusion.

  17. Flaw detection device for plasma facing wall in thermonuclear device

    International Nuclear Information System (INIS)

    Doi, Akira.

    1996-01-01

    The present invention concerns plasma facing walls of a thermonuclear device and provides a device for detecting a thickness of amour tiles accurately and efficiently with no manual operation. Namely, the position of the plasma facing surface of the amour tile is measured using a structure to which the amour tiles are to be disposed as a reference. Also in a case of disposing new armor tiles, the position of the plasma facing surface of the armor tiles is measured to thereby measure the wearing amount of the amour tiles based on the difference between the reference and the measured value. If a measuring means capable of measuring a plurality of amour tiles at once is used efficiency of the measurement and the detection can be enhanced. Several ten thousands of amour tiles are disposed to the plasma facing wall in a large scaled thermonuclear device, and a plenty of time was required for the detection. However, the present invention can improve the accuracy for the measurement and detection and provide time and labors-saving. (I.S.)

  18. Frontal Face Detection using Haar Wavelet Coefficients and Local Histogram Correlation

    Directory of Open Access Journals (Sweden)

    Iwan Setyawan

    2011-12-01

    Full Text Available Face detection is the main building block on which all automatic systems dealing with human faces is built. For example, a face recognition system must rely on face detection to process an input image and determine which areas contain human faces. These areas then become the input for the face recognition system for further processing. This paper presents a face detection system designed to detect frontal faces. The system uses Haar wavelet coefficients and local histogram correlation as differentiating features. Our proposed system is trained using 100 training images. Our experiments show that the proposed system performed well during testing, achieving a detection rate of 91.5%.

  19. Coincidence Detection Using Spiking Neurons with Application to Face Recognition

    Directory of Open Access Journals (Sweden)

    Fadhlan Kamaruzaman

    2015-01-01

    Full Text Available We elucidate the practical implementation of Spiking Neural Network (SNN as local ensembles of classifiers. Synaptic time constant τs is used as learning parameter in representing the variations learned from a set of training data at classifier level. This classifier uses coincidence detection (CD strategy trained in supervised manner using a novel supervised learning method called τs Prediction which adjusts the precise timing of output spikes towards the desired spike timing through iterative adaptation of τs. This paper also discusses the approximation of spike timing in Spike Response Model (SRM for the purpose of coincidence detection. This process significantly speeds up the whole process of learning and classification. Performance evaluations with face datasets such as AR, FERET, JAFFE, and CK+ datasets show that the proposed method delivers better face classification performance than the network trained with Supervised Synaptic-Time Dependent Plasticity (STDP. We also found that the proposed method delivers better classification accuracy than k nearest neighbor, ensembles of kNN, and Support Vector Machines. Evaluation on several types of spike codings also reveals that latency coding delivers the best result for face classification as well as for classification of other multivariate datasets.

  20. Face Liveness Detection Using Dynamic Local Ternary Pattern (DLTP

    Directory of Open Access Journals (Sweden)

    Sajida Parveen

    2016-05-01

    Full Text Available Face spoofing is considered to be one of the prominent threats to face recognition systems. However, in order to improve the security measures of such biometric systems against deliberate spoof attacks, liveness detection has received significant recent attention from researchers. For this purpose, analysis of facial skin texture properties becomes more popular because of its limited resource requirement and lower processing cost. The traditional method of skin analysis for liveness detection was to use Local Binary Pattern (LBP and its variants. LBP descriptors are effective, but they may exhibit certain limitations in near uniform patterns. Thus, in this paper, we demonstrate the effectiveness of Local Ternary Pattern (LTP as an alternative to LBP. In addition, we adopted Dynamic Local Ternary Pattern (DLTP, which eliminates the manual threshold setting in LTP by using Weber’s law. The proposed method was tested rigorously on four facial spoof databases: three are public domain databases and the other is the Universiti Putra Malaysia (UPM face spoof database, which was compiled through this study. The results obtained from the proposed DLTP texture descriptor attained optimum accuracy and clearly outperformed the reported LBP and LTP texture descriptors.

  1. Big Questions Facing Vocational Psychology: A Cognitive Information Processing Perspective

    Science.gov (United States)

    Reardon, Robert C.; Lenz, Janet G.; Sampson, James P., Jr.; Peterson, Gary W.

    2011-01-01

    This article draws upon the authors' experience in developing cognitive information processing theory in order to examine three important questions facing vocational psychology and assessment: (a) Where should new knowledge for vocational psychology come from? (b) How do career theories and research find their way into practice? and (c) What is…

  2. Real-time driver fatigue detection based on face alignment

    Science.gov (United States)

    Tao, Huanhuan; Zhang, Guiying; Zhao, Yong; Zhou, Yi

    2017-07-01

    The performance and robustness of fatigue detection largely decrease if the driver with glasses. To address this issue, this paper proposes a practical driver fatigue detection method based on face alignment at 3000 FPS algorithm. Firstly, the eye regions of the driver are localized by exploiting 6 landmarks surrounding each eye. Secondly, the HOG features of the extracted eye regions are calculated and put into SVM classifier to recognize the eye state. Finally, the value of PERCLOS is calculated to determine whether the driver is drowsy or not. An alarm will be generated if the eye is closed for a specified period of time. The accuracy and real-time on testing videos with different drivers demonstrate that the proposed algorithm is robust and obtain better accuracy for driver fatigue detection compared with some previous method.

  3. A Comparative Survey of Methods for Remote Heart Rate Detection From Frontal Face Videos

    Directory of Open Access Journals (Sweden)

    Chen Wang

    2018-05-01

    Full Text Available Remotely measuring physiological activity can provide substantial benefits for both the medical and the affective computing applications. Recent research has proposed different methodologies for the unobtrusive detection of heart rate (HR using human face recordings. These methods are based on subtle color changes or motions of the face due to cardiovascular activities, which are invisible to human eyes but can be captured by digital cameras. Several approaches have been proposed such as signal processing and machine learning. However, these methods are compared with different datasets, and there is consequently no consensus on method performance. In this article, we describe and evaluate several methods defined in literature, from 2008 until present day, for the remote detection of HR using human face recordings. The general HR processing pipeline is divided into three stages: face video processing, face blood volume pulse (BVP signal extraction, and HR computation. Approaches presented in the paper are classified and grouped according to each stage. At each stage, algorithms are analyzed and compared based on their performance using the public database MAHNOB-HCI. Results found in this article are limited on MAHNOB-HCI dataset. Results show that extracted face skin area contains more BVP information. Blind source separation and peak detection methods are more robust with head motions for estimating HR.

  4. Face detection for interactive tabletop viewscreen system using olfactory display

    Science.gov (United States)

    Sakamoto, Kunio; Kanazawa, Fumihiro

    2009-10-01

    An olfactory display is a device that delivers smells to the nose. It provides us with special effects, for example to emit smell as if you were there or to give a trigger for reminding us of memories. The authors have developed a tabletop display system connected with the olfactory display. For delivering a flavor to user's nose, the system needs to recognition and measure positions of user's face and nose. In this paper, the authors describe an olfactory display which enables to detect the nose position for an effective delivery.

  5. Face to face interventions for informing or educating parents about early childhood vaccination.

    Science.gov (United States)

    Kaufman, Jessica; Synnot, Anneliese; Ryan, Rebecca; Hill, Sophie; Horey, Dell; Willis, Natalie; Lin, Vivian; Robinson, Priscilla

    2013-05-31

    Childhood vaccination (also described as immunisation) is an important and effective way to reduce childhood illness and death. However, there are many children who do not receive the recommended vaccines because their parents do not know why vaccination is important, do not understand how, where or when to get their children vaccinated, disagree with vaccination as a public health measure, or have concerns about vaccine safety.Face to face interventions to inform or educate parents about routine childhood vaccination may improve vaccination rates and parental knowledge or understanding of vaccination. Such interventions may describe or explain the practical and logistical factors associated with vaccination, and enable parents to understand the meaning and relevance of vaccination for their family or community. To assess the effects of face to face interventions for informing or educating parents about early childhood vaccination on immunisation uptake and parental knowledge. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (The Cochrane Library 2012, Issue 7); MEDLINE (OvidSP) (1946 to July 2012); EMBASE + Embase Classic (OvidSP) (1947 to July 2012); CINAHL (EbscoHOST) (1981 to July 2012); PsycINFO (OvidSP) (1806 to July 2012); Global Health (CAB) (1910 to July 2012); Global Health Library (WHO) (searched July 2012); Google Scholar (searched September 2012), ISI Web of Science (searched September 2012) and reference lists of relevant articles. We searched for ongoing trials in The International Clinical Trials Registry Platform (ICTRP) (searched August 2012) and for grey literature in The Grey Literature Report and OpenGrey (searched August 2012). We also contacted authors of included studies and experts in the field. There were no language or date restrictions. Randomised controlled trials (RCTs) and cluster RCTs evaluating the effects of face to face interventions delivered to individual parents or groups of parents to inform or educate

  6. Information Theory for Gabor Feature Selection for Face Recognition

    Directory of Open Access Journals (Sweden)

    Shen Linlin

    2006-01-01

    Full Text Available A discriminative and robust feature—kernel enhanced informative Gabor feature—is proposed in this paper for face recognition. Mutual information is applied to select a set of informative and nonredundant Gabor features, which are then further enhanced by kernel methods for recognition. Compared with one of the top performing methods in the 2004 Face Verification Competition (FVC2004, our methods demonstrate a clear advantage over existing methods in accuracy, computation efficiency, and memory cost. The proposed method has been fully tested on the FERET database using the FERET evaluation protocol. Significant improvements on three of the test data sets are observed. Compared with the classical Gabor wavelet-based approaches using a huge number of features, our method requires less than 4 milliseconds to retrieve a few hundreds of features. Due to the substantially reduced feature dimension, only 4 seconds are required to recognize 200 face images. The paper also unified different Gabor filter definitions and proposed a training sample generation algorithm to reduce the effects caused by unbalanced number of samples available in different classes.

  7. Information Theory for Gabor Feature Selection for Face Recognition

    Science.gov (United States)

    Shen, Linlin; Bai, Li

    2006-12-01

    A discriminative and robust feature—kernel enhanced informative Gabor feature—is proposed in this paper for face recognition. Mutual information is applied to select a set of informative and nonredundant Gabor features, which are then further enhanced by kernel methods for recognition. Compared with one of the top performing methods in the 2004 Face Verification Competition (FVC2004), our methods demonstrate a clear advantage over existing methods in accuracy, computation efficiency, and memory cost. The proposed method has been fully tested on the FERET database using the FERET evaluation protocol. Significant improvements on three of the test data sets are observed. Compared with the classical Gabor wavelet-based approaches using a huge number of features, our method requires less than 4 milliseconds to retrieve a few hundreds of features. Due to the substantially reduced feature dimension, only 4 seconds are required to recognize 200 face images. The paper also unified different Gabor filter definitions and proposed a training sample generation algorithm to reduce the effects caused by unbalanced number of samples available in different classes.

  8. Vitality Detection in Face Images using Second Order Gradient

    OpenAIRE

    Aruni Singh

    2012-01-01

    Spoofing is a very big challenge in biometrics, specially in face image. So many artificial techniques are available to tamper or hide the original face. To ensure the actual presence of live face image in contrast to fake face image this research has been contributed. The intended purpose of proposed approach is also to endorse the biometric authentication, by joining the liveness awareness with Facial Recognition Technology (FRT). In this research 200 dummy face images and 200 real face ima...

  9. A face detection bias for horizontal orientations develops in middle childhood

    Directory of Open Access Journals (Sweden)

    Benjamin J Balas

    2015-06-01

    Full Text Available Faces are complex stimuli that can be described via intuitive facial features like the eyes, nose, and mouth, configural features like the distances between facial landmarks, and features that correspond to computations performed in the early visual system (e.g. oriented edges. With regard to this latter category of descriptors, adult face recognition relies disproportionately on information in specific spatial frequency and orientation bands: Many recognition tasks are performed more accurately when adults have access to mid-range spatial frequencies (8-16 cycles/face and horizontal orientations (Dakin & Watt, 2009. In the current study, we examined how this information bias develops in middle childhood. We recruited children between the ages of 5-10 years old to participate in a simple categorization task that required them to label images according to whether they depicted a face or a house. Critically, children were presented with face and house images comprised either of primarily horizontal orientation energy, primarily vertical orientation energy, or both horizontal and vertical orientation energy. We predicted that any bias favoring horizontal information over vertical should be more evident in faces than in houses, and also that older children would be more likely to show such a bias than younger children. We designed our categorization task to be sufficiently easy that children would perform at near-ceiling accuracy levels, but with variation in response times that would reflect how they rely on different orientations as a function of age and object category. We found that horizontal bias for face detection (but not house detection correlated significantly with age, suggesting an emergent category-specific bias for horizontal orientation energy that develops during middle childhood. These results thus suggest that the tuning of high-level recognition to specific low-level visual features takes take place over several years of visual

  10. Real-time detection with AdaBoost-svm combination in various face orientation

    Science.gov (United States)

    Fhonna, R. P.; Nasution, M. K. M.; Tulus

    2018-03-01

    Most of the research has used algorithm AdaBoost-SVM for face detection. However, to our knowledge so far there is no research has been facing detection on real-time data with various orientations using the combination of AdaBoost and Support Vector Machine (SVM). Characteristics of complex and diverse face variations and real-time data in various orientations, and with a very complex application will slow down the performance of the face detection system this becomes a challenge in this research. Face orientation performed on the detection system, that is 900, 450, 00, -450, and -900. This combination method is expected to be an effective and efficient solution in various face orientations. The results showed that the highest average detection rate is on the face detection oriented 00 and the lowest detection rate is in the face orientation 900.

  11. Face repetition detection and social interest: An ERP study in adults with and without Williams syndrome.

    Science.gov (United States)

    Key, Alexandra P; Dykens, Elisabeth M

    2016-12-01

    The present study examined possible neural mechanisms underlying increased social interest in persons with Williams syndrome (WS). Visual event-related potentials (ERPs) during passive viewing were used to compare incidental memory traces for repeated vs. single presentations of previously unfamiliar social (faces) and nonsocial (houses) images in 26 adults with WS and 26 typical adults. Results indicated that participants with WS developed familiarity with the repeated faces and houses (frontal N400 response), but only typical adults evidenced the parietal old/new effect (previously associated with stimulus recollection) for the repeated faces. There was also no evidence of exceptional salience of social information in WS, as ERP markers of memory for repeated faces vs. houses were not significantly different. Thus, while persons with WS exhibit behavioral evidence of increased social interest, their processing of social information in the absence of specific instructions may be relatively superficial. The ERP evidence of face repetition detection in WS was independent of IQ and the earlier perceptual differentiation of social vs. nonsocial stimuli. Large individual differences in ERPs of participants with WS may provide valuable information for understanding the WS phenotype and have relevance for educational and treatment purposes.

  12. Facing information management solutions for SAT applications: A Tecnatom's perspective

    International Nuclear Information System (INIS)

    Batuecas, T.

    2002-01-01

    Facing the development of Information Management Solutions for SAT applications implies to cope with different technological, methodological and services aspects. A chronological overview of the major projects in this area where Tecnatom, s.a has been involved up to present is presented. Firstly a brief explanation of Tecnatom's Training Management (GESFORM) and Training Area Intranet applications main features is provided, to focus next in the e-learning approach which has been followed to develop Tecnatom's Virtual Campus. Finally some R and D topics of interest in the field of SAT implementation are outlined. (author)

  13. A feasibility test of using smartphones to collect GPS information in face-to-face surveys

    Directory of Open Access Journals (Sweden)

    Kristen Olson

    2015-02-01

    Full Text Available Survey organizations rely on interviewers to make informed and efficient decisions about their efforts in the field, including which housing units they approach to knock on doors, make appointments, and obtain interviews. This paper presents initial findings from a feasibility test on a face to face survey, the US National Survey of Family Growth, in which the interviewers were equipped with GPS-enabled smartphones. This test included an experiment to determine if the use of the GPS-enabled smartphone altered interviewer behavior. We evaluate interviewer compliance with the GPS request, the effects of using the GPS device on interviewer behavior, and the quality of the recorded GPS points as related to interviewer behaviors. This test also included two surveys of interviewers that were completed after using the smartphone. We report results from these surveys and link one set of survey results to interviewer GPS compliance rates. Implications for future use of GPS devices to monitor and understand interviewer travel behavior are discussed.

  14. Impact of eye detection error on face recognition performance

    NARCIS (Netherlands)

    Dutta, A.; Günther, Manuel; El Shafey, Laurent; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan

    2015-01-01

    The locations of the eyes are the most commonly used features to perform face normalisation (i.e. alignment of facial features), which is an essential preprocessing stage of many face recognition systems. In this study, the authors study the sensitivity of open source implementations of five face

  15. Automatic landmark detection and face recognition for side-view face images

    NARCIS (Netherlands)

    Santemiz, P.; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Broemme, Arslan; Busch, Christoph

    2013-01-01

    In real-life scenarios where pose variation is up to side-view positions, face recognition becomes a challenging task. In this paper we propose an automatic side-view face recognition system designed for home-safety applications. Our goal is to recognize people as they pass through doors in order to

  16. Faces

    DEFF Research Database (Denmark)

    Mortensen, Kristine Køhler; Brotherton, Chloe

    2018-01-01

    for the face the be put into action. Based on an ethnographic study of Danish teenagers’ use of SnapChat we demonstrate how the face is used as a central medium for interaction with peers. Through the analysis of visual SnapChat messages we investigate how SnapChat requires the sender to put an ‘ugly’ face...... already secured their popular status on the heterosexual marketplace in the broad context of the school. Thus SnapChat functions both as a challenge to beauty norms of ‘flawless faces’ and as a reinscription of these same norms by further manifesting the exclusive status of the popular girl...

  17. Neural correlates of own name and own face detection in autism spectrum disorder.

    Directory of Open Access Journals (Sweden)

    Hanna B Cygan

    Full Text Available Autism spectrum disorder (ASD is a heterogeneous neurodevelopmental condition clinically characterized by social interaction and communication difficulties. To date, the majority of research efforts have focused on brain mechanisms underlying the deficits in interpersonal social cognition associated with ASD. Recent empirical and theoretical work has begun to reveal evidence for a reduced or even absent self-preference effect in patients with ASD. One may hypothesize that this is related to the impaired attentional processing of self-referential stimuli. The aim of our study was to test this hypothesis. We investigated the neural correlates of face and name detection in ASD. Four categories of face/name stimuli were used: own, close-other, famous, and unknown. Event-related potentials were recorded from 62 electrodes in 23 subjects with ASD and 23 matched control subjects. P100, N170, and P300 components were analyzed. The control group clearly showed a significant self-preference effect: higher P300 amplitude to the presentation of own face and own name than to the close-other, famous, and unknown categories, indicating preferential attentional engagement in processing of self-related information. In contrast, detection of both own and close-other's face and name in the ASD group was associated with enhanced P300, suggesting similar attention allocation for self and close-other related information. These findings suggest that attention allocation in the ASD group is modulated by the personal significance factor, and that the self-preference effect is absent if self is compared to close-other. These effects are similar for physical and non-physical aspects of the autistic self. In addition, lateralization of face and name processing is attenuated in ASD, suggesting atypical brain organization.

  18. Neural correlates of own name and own face detection in autism spectrum disorder.

    Science.gov (United States)

    Cygan, Hanna B; Tacikowski, Pawel; Ostaszewski, Pawel; Chojnicka, Izabela; Nowicka, Anna

    2014-01-01

    Autism spectrum disorder (ASD) is a heterogeneous neurodevelopmental condition clinically characterized by social interaction and communication difficulties. To date, the majority of research efforts have focused on brain mechanisms underlying the deficits in interpersonal social cognition associated with ASD. Recent empirical and theoretical work has begun to reveal evidence for a reduced or even absent self-preference effect in patients with ASD. One may hypothesize that this is related to the impaired attentional processing of self-referential stimuli. The aim of our study was to test this hypothesis. We investigated the neural correlates of face and name detection in ASD. Four categories of face/name stimuli were used: own, close-other, famous, and unknown. Event-related potentials were recorded from 62 electrodes in 23 subjects with ASD and 23 matched control subjects. P100, N170, and P300 components were analyzed. The control group clearly showed a significant self-preference effect: higher P300 amplitude to the presentation of own face and own name than to the close-other, famous, and unknown categories, indicating preferential attentional engagement in processing of self-related information. In contrast, detection of both own and close-other's face and name in the ASD group was associated with enhanced P300, suggesting similar attention allocation for self and close-other related information. These findings suggest that attention allocation in the ASD group is modulated by the personal significance factor, and that the self-preference effect is absent if self is compared to close-other. These effects are similar for physical and non-physical aspects of the autistic self. In addition, lateralization of face and name processing is attenuated in ASD, suggesting atypical brain organization.

  19. Stereotype Priming in Face Recognition: Interactions between Semantic and Visual Information in Face Encoding

    Science.gov (United States)

    Hills, Peter J.; Lewis, Michael B.; Honey, R. C.

    2008-01-01

    The accuracy with which previously unfamiliar faces are recognised is increased by the presentation of a stereotype-congruent occupation label [Klatzky, R. L., Martin, G. L., & Kane, R. A. (1982a). "Semantic interpretation effects on memory for faces." "Memory & Cognition," 10, 195-206; Klatzky, R. L., Martin, G. L., & Kane, R. A. (1982b).…

  20. Evaluation of Face Detection Algorithms for the Bank Client Identity Verification

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2017-06-01

    Full Text Available Results of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide a simplified as much as possible user interaction with the application. Applied algorithms for face detection are described and achieved results of face detection in the real bank environment conditions are presented. Practical limitations of the application based on encountered problems are discussed.

  1. Multi-scale Fully Convolutional Network for Face Detection in the Wild

    KAUST Repository

    Bai, Yancheng; Ghanem, Bernard

    2017-01-01

    , including FDDB, WIDER FACE, AFW and PASCAL FACE. Extensive experiments show that it outperforms state-of-the-art methods. Also, MS-FCN runs at 23 FPS on a GPU for images of size 640×480 with no assumption on the minimum detectable face size.

  2. Door Security using Face Detection and Raspberry Pi

    Science.gov (United States)

    Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.

    2018-03-01

    With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.

  3. Information booklet on personal protective equipment: eye and face protection

    International Nuclear Information System (INIS)

    1992-01-01

    In all work places where hazards of various kinds are present and the same cannot be totally controlled by engineering methods, suitable personal protective equipment (PPE) shall be used. There are several types of eye and face protection devices available in the market and it is important that employees use the proper type for the particular job. The main classes of eye and face protection devices required for the industrial operations are as follows: (a) eye protection devices which includes: (i) safety goggles (ii) safety spectacles (iii) safety clipons and eye and face protection devices which are (i) eye shield, (ii) face shield, (iii) wire mesh screen guard. Guide lines for selecting appropriate ear and face protection equipment for nuclear installations are given. (M.K.V.). 4 annexures, 1 appendix

  4. Detection of Emotional Faces: Salient Physical Features Guide Effective Visual Search

    Science.gov (United States)

    Calvo, Manuel G.; Nummenmaa, Lauri

    2008-01-01

    In this study, the authors investigated how salient visual features capture attention and facilitate detection of emotional facial expressions. In a visual search task, a target emotional face (happy, disgusted, fearful, angry, sad, or surprised) was presented in an array of neutral faces. Faster detection of happy and, to a lesser extent,…

  5. Multi-scale Fully Convolutional Network for Face Detection in the Wild

    KAUST Repository

    Bai, Yancheng

    2017-08-24

    Face detection is a classical problem in computer vision. It is still a difficult task due to many nuisances that naturally occur in the wild. In this paper, we propose a multi-scale fully convolutional network for face detection. To reduce computation, the intermediate convolutional feature maps (conv) are shared by every scale model. We up-sample and down-sample the final conv map to approximate K levels of a feature pyramid, leading to a wide range of face scales that can be detected. At each feature pyramid level, a FCN is trained end-to-end to deal with faces in a small range of scale change. Because of the up-sampling, our method can detect very small faces (10×10 pixels). We test our MS-FCN detector on four public face detection datasets, including FDDB, WIDER FACE, AFW and PASCAL FACE. Extensive experiments show that it outperforms state-of-the-art methods. Also, MS-FCN runs at 23 FPS on a GPU for images of size 640×480 with no assumption on the minimum detectable face size.

  6. Information-Theoretic Evidence for Predictive Coding in the Face-Processing System.

    Science.gov (United States)

    Brodski-Guerniero, Alla; Paasch, Georg-Friedrich; Wollstadt, Patricia; Özdemir, Ipek; Lizier, Joseph T; Wibral, Michael

    2017-08-23

    Predictive coding suggests that the brain infers the causes of its sensations by combining sensory evidence with internal predictions based on available prior knowledge. However, the neurophysiological correlates of (pre)activated prior knowledge serving these predictions are still unknown. Based on the idea that such preactivated prior knowledge must be maintained until needed, we measured the amount of maintained information in neural signals via the active information storage (AIS) measure. AIS was calculated on whole-brain beamformer-reconstructed source time courses from MEG recordings of 52 human subjects during the baseline of a Mooney face/house detection task. Preactivation of prior knowledge for faces showed as α-band-related and β-band-related AIS increases in content-specific areas; these AIS increases were behaviorally relevant in the brain's fusiform face area. Further, AIS allowed decoding of the cued category on a trial-by-trial basis. Our results support accounts indicating that activated prior knowledge and the corresponding predictions are signaled in low-frequency activity (information our eyes/retina and other sensory organs receive from the outside world, but strongly depends also on information already present in our brains, such as prior knowledge about specific situations or objects. A currently popular theory in neuroscience, predictive coding theory, suggests that this prior knowledge is used by the brain to form internal predictions about upcoming sensory information. However, neurophysiological evidence for this hypothesis is rare, mostly because this kind of evidence requires strong a priori assumptions about the specific predictions the brain makes and the brain areas involved. Using a novel, assumption-free approach, we find that face-related prior knowledge and the derived predictions are represented in low-frequency brain activity. Copyright © 2017 the authors 0270-6474/17/378273-11$15.00/0.

  7. Face Liveness Detection Using a Light Field Camera

    Directory of Open Access Journals (Sweden)

    Sooyeon Kim

    2014-11-01

    Full Text Available A light field camera is a sensor that can record the directions as well as the colors of incident rays. This camera is widely utilized from 3D reconstruction to face and iris recognition. In this paper, we suggest a novel approach for defending spoofing face attacks, like printed 2D facial photos (hereinafter 2D photos and HD tablet images, using the light field camera. By viewing the raw light field photograph from a different standpoint, we extract two special features which cannot be obtained from the conventional camera. To verify the performance, we compose light field photograph databases and conduct experiments. Our proposed method achieves at least 94.78% accuracy or up to 99.36% accuracy under different types of spoofing attacks.

  8. Suprasegmental information affects processing of talking faces at birth.

    Science.gov (United States)

    Guellai, Bahia; Mersad, Karima; Streri, Arlette

    2015-02-01

    From birth, newborns show a preference for faces talking a native language compared to silent faces. The present study addresses two questions that remained unanswered by previous research: (a) Does the familiarity with the language play a role in this process and (b) Are all the linguistic and paralinguistic cues necessary in this case? Experiment 1 extended newborns' preference for native speakers to non-native ones. Given that fetuses and newborns are sensitive to the prosodic characteristics of speech, Experiments 2 and 3 presented faces talking native and nonnative languages with the speech stream being low-pass filtered. Results showed that newborns preferred looking at a person who talked to them even when only the prosodic cues were provided for both languages. Nonetheless, a familiarity preference for the previously talking face is observed in the "normal speech" condition (i.e., Experiment 1) and a novelty preference in the "filtered speech" condition (Experiments 2 and 3). This asymmetry reveals that newborns process these two types of stimuli differently and that they may already be sensitive to a mismatch between the articulatory movements of the face and the corresponding speech sounds. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. A comparison of the effectiveness of a game informed online learning activity and face to face teaching in increasing knowledge about managing aggression in health settings

    OpenAIRE

    McKenzie, Karen

    2013-01-01

    The present study compared the impact of face to face teaching with a short online game informed learning activity on health participants' knowledge about, and confidence in, managing aggressive situations. Both forms of teaching resulted in a significant increase in participants' knowledge and confidence. Face to face training led to significantly greater increases in knowledge but was equivalent in terms of confidence. Both forms of teaching were rated positively, but face to face teaching ...

  10. Mutual information, perceptual independence, and holistic face perception.

    Science.gov (United States)

    Fitousi, Daniel

    2013-07-01

    The concept of perceptual independence is ubiquitous in psychology. It addresses the question of whether two (or more) dimensions are perceived independently. Several authors have proposed perceptual independence (or its lack thereof) as a viable measure of holistic face perception (Loftus, Oberg, & Dillon, Psychological Review 111:835-863, 2004; Wenger & Ingvalson, Learning, Memory, and Cognition 28:872-892, 2002). According to this notion, the processing of facial features occurs in an interactive manner. Here, I examine this idea from the perspective of two theories of perceptual independence: the multivariate uncertainty analysis (MUA; Garner & Morton, Definitions, models, and experimental paradigms. Psychological Bulletin 72:233-259, 1969), and the general recognition theory (GRT; Ashby & Townsend, Psychological Review 93:154-179, 1986). The goals of the study were to (1) introduce the MUA, (2) examine various possible relations between MUA and GRT using numerical simulations, and (3) apply the MUA to two consensual markers of holistic face perception(-)recognition of facial features (Farah, Wilson, Drain, & Tanaka, Psychological Review 105:482-498, 1998) and the composite face effect (Young, Hellawell, & Hay, Perception 16:747-759, 1987). The results suggest that facial holism is generated by violations of several types of perceptual independence. They highlight the important theoretical role played by converging operations in the study of holistic face perception.

  11. An own-age bias in recognizing faces with horizontal information

    Directory of Open Access Journals (Sweden)

    Andreas Schaich

    2016-11-01

    Full Text Available Horizontal information, as a result of a selective filtering process, are essential in younger adults’ (YA ability to recognize human faces. Obermeyer, Kolling, Schaich, and Knopf (2012 recently reported impaired recognition of faces with horizontal information in older adults (OA suggesting age-variant processing. Two yet unconsidered factors (stimulus age and exposure duration that may have influenced previous results, were investigated in this study. Forty-seven YA (18-35yrs and 49 OA (62-83yrs were tested in a 2x2x2x2 mixed design with the between-subjects factors age group (YA vs OA and stimulus age (young faces vs older faces and the within-subjects factors filter (filtered (HF faces vs unfiltered faces (UF and exposure duration (0.8s vs 8s. Subjects were presented morph videos between pairs of faces: A starting face gradually merged into either the previously encoded target face or a control face. As expected, results showed an increase in recognition sensitivity (d’ with longer exposure duration in YA with both younger and older HF faces. OA however were unable to recognize filtered young faces not even with increased exposure duration. Furthermore, only elderly participants showed more accurate recognition with faces of their own age relative to other-age faces (own-age bias, OAB. For YA no OAB was observed. Filtered face recognition was significantly correlated with unfiltered recognition in YA but not in OA. It is concluded, that processing of horizontal information changes at a higher age. Presenting filtered or unfiltered faces both targets convergent face-specific processing only in YA but not in OA.

  12. Internal representations for face detection: an application of noise-based image classification to BOLD responses.

    Science.gov (United States)

    Nestor, Adrian; Vettel, Jean M; Tarr, Michael J

    2013-11-01

    What basic visual structures underlie human face detection and how can we extract such structures directly from the amplitude of neural responses elicited by face processing? Here, we address these issues by investigating an extension of noise-based image classification to BOLD responses recorded in high-level visual areas. First, we assess the applicability of this classification method to such data and, second, we explore its results in connection with the neural processing of faces. To this end, we construct luminance templates from white noise fields based on the response of face-selective areas in the human ventral cortex. Using behaviorally and neurally-derived classification images, our results reveal a family of simple but robust image structures subserving face representation and detection. Thus, we confirm the role played by classical face selective regions in face detection and we help clarify the representational basis of this perceptual function. From a theory standpoint, our findings support the idea of simple but highly diagnostic neurally-coded features for face detection. At the same time, from a methodological perspective, our work demonstrates the ability of noise-based image classification in conjunction with fMRI to help uncover the structure of high-level perceptual representations. Copyright © 2012 Wiley Periodicals, Inc.

  13. Patient decision making in the face of conflicting medication information

    Directory of Open Access Journals (Sweden)

    Emily Elstad

    2012-08-01

    Full Text Available When patients consult more than one source of information about their medications, they may encounter conflicting information. Although conflicting information has been associated with negative outcomes, including worse medication adherence, little is known about how patients make health decisions when they receive conflicting information. The objective of this study was to explore the decision making strategies that individuals with arthritis use when they receive conflicting medication information. Qualitative telephone interviews were conducted with 20 men and women with arthritis. Interview vignettes posed scenarios involving conflicting information from different sources (e.g., doctor, pharmacist, and relative, and respondents were asked how they would respond to the situation. Data analysis involved inductive coding to identify emergent themes and deductive contextualization to make meaning from the emergent themes. In response to conflicting medication information, patients used rules of thumb, trial and error, weighed benefits and risks, and sought more information, especially from a doctor. Patients relied heavily on trial and error when there was no conflicting information involved in the vignette. In contrast, patients used rules of thumb as a unique response to conflicting information. These findings increase our understanding of what patients do when they receive conflicting medication information. Given that patient exposure to conflicting information is likely to increase alongside the proliferation of medication information on the Internet, patients may benefit from assistance in identifying the most appropriate decision strategies for dealing with conflicting information, including information about best information sources.

  14. A Comparison of the Effectiveness of a Game Informed Online Learning Activity and Face to Face Teaching in Increasing Knowledge about Managing Aggression in Health Settings

    Science.gov (United States)

    McKenzie, Karen

    2013-01-01

    The present study compared the impact of face to face teaching with a short online game informed learning activity on health participants' knowledge about, and confidence in, managing aggressive situations. Both forms of teaching resulted in a significant increase in participants' knowledge and confidence. Face to face training led to…

  15. Feature Extraction and Fusion Using Deep Convolutional Neural Networks for Face Detection

    Directory of Open Access Journals (Sweden)

    Xiaojun Lu

    2017-01-01

    Full Text Available This paper proposes a method that uses feature fusion to represent images better for face detection after feature extraction by deep convolutional neural network (DCNN. First, with Clarifai net and VGG Net-D (16 layers, we learn features from data, respectively; then we fuse features extracted from the two nets. To obtain more compact feature representation and mitigate computation complexity, we reduce the dimension of the fused features by PCA. Finally, we conduct face classification by SVM classifier for binary classification. In particular, we exploit offset max-pooling to extract features with sliding window densely, which leads to better matches of faces and detection windows; thus the detection result is more accurate. Experimental results show that our method can detect faces with severe occlusion and large variations in pose and scale. In particular, our method achieves 89.24% recall rate on FDDB and 97.19% average precision on AFW.

  16. Dynamics of processing invisible faces in the brain: automatic neural encoding of facial expression information.

    Science.gov (United States)

    Jiang, Yi; Shannon, Robert W; Vizueta, Nathalie; Bernat, Edward M; Patrick, Christopher J; He, Sheng

    2009-02-01

    The fusiform face area (FFA) and the superior temporal sulcus (STS) are suggested to process facial identity and facial expression information respectively. We recently demonstrated a functional dissociation between the FFA and the STS as well as correlated sensitivity of the STS and the amygdala to facial expressions using an interocular suppression paradigm [Jiang, Y., He, S., 2006. Cortical responses to invisible faces: dissociating subsystems for facial-information processing. Curr. Biol. 16, 2023-2029.]. In the current event-related brain potential (ERP) study, we investigated the temporal dynamics of facial information processing. Observers viewed neutral, fearful, and scrambled face stimuli, either visibly or rendered invisible through interocular suppression. Relative to scrambled face stimuli, intact visible faces elicited larger positive P1 (110-130 ms) and larger negative N1 or N170 (160-180 ms) potentials at posterior occipital and bilateral occipito-temporal regions respectively, with the N170 amplitude significantly greater for fearful than neutral faces. Invisible intact faces generated a stronger signal than scrambled faces at 140-200 ms over posterior occipital areas whereas invisible fearful faces (compared to neutral and scrambled faces) elicited a significantly larger negative deflection starting at 220 ms along the STS. These results provide further evidence for cortical processing of facial information without awareness and elucidate the temporal sequence of automatic facial expression information extraction.

  17. Face detection on distorted images using perceptual quality-aware features

    Science.gov (United States)

    Gunasekar, Suriya; Ghosh, Joydeep; Bovik, Alan C.

    2014-02-01

    We quantify the degradation in performance of a popular and effective face detector when human-perceived image quality is degraded by distortions due to additive white gaussian noise, gaussian blur or JPEG compression. It is observed that, within a certain range of perceived image quality, a modest increase in image quality can drastically improve face detection performance. These results can be used to guide resource or bandwidth allocation in a communication/delivery system that is associated with face detection tasks. A new face detector based on QualHOG features is also proposed that augments face-indicative HOG features with perceptual quality-aware spatial Natural Scene Statistics (NSS) features, yielding improved tolerance against image distortions. The new detector provides statistically significant improvements over a strong baseline on a large database of face images representing a wide range of distortions. To facilitate this study, we created a new Distorted Face Database, containing face and non-face patches from images impaired by a variety of common distortion types and levels. This new dataset is available for download and further experimentation at www.ideal.ece.utexas.edu/˜suriya/DFD/.

  18. Face mask sampling for the detection of Mycobacterium tuberculosis in expelled aerosols.

    Science.gov (United States)

    Williams, Caroline M L; Cheah, Eddy S G; Malkin, Joanne; Patel, Hemu; Otu, Jacob; Mlaga, Kodjovi; Sutherland, Jayne S; Antonio, Martin; Perera, Nelun; Woltmann, Gerrit; Haldar, Pranabashis; Garton, Natalie J; Barer, Michael R

    2014-01-01

    Although tuberculosis is transmitted by the airborne route, direct information on the natural output of bacilli into air by source cases is very limited. We sought to address this through sampling of expelled aerosols in face masks that were subsequently analyzed for mycobacterial contamination. In series 1, 17 smear microscopy positive patients wore standard surgical face masks once or twice for periods between 10 minutes and 5 hours; mycobacterial contamination was detected using a bacteriophage assay. In series 2, 19 patients with suspected tuberculosis were studied in Leicester UK and 10 patients with at least one positive smear were studied in The Gambia. These subjects wore one FFP30 mask modified to contain a gelatin filter for one hour; this was subsequently analyzed by the Xpert MTB/RIF system. In series 1, the bacteriophage assay detected live mycobacteria in 11/17 patients with wearing times between 10 and 120 minutes. Variation was seen in mask positivity and the level of contamination detected in multiple samples from the same patient. Two patients had non-tuberculous mycobacterial infections. In series 2, 13/20 patients with pulmonary tuberculosis produced positive masks and 0/9 patients with extrapulmonary or non-tuberculous diagnoses were mask positive. Overall, 65% of patients with confirmed pulmonary mycobacterial infection gave positive masks and this included 3/6 patients who received diagnostic bronchoalveolar lavages. Mask sampling provides a simple means of assessing mycobacterial output in non-sputum expectorant. The approach shows potential for application to the study of airborne transmission and to diagnosis.

  19. A new method for face detection in colour images for emotional bio-robots

    Institute of Scientific and Technical Information of China (English)

    HAPESHI; Kevin

    2010-01-01

    Emotional bio-robots have become a hot research topic in last two decades. Though there have been some progress in research, design and development of various emotional bio-robots, few of them can be used in practical applications. The study of emotional bio-robots demands multi-disciplinary co-operation. It involves computer science, artificial intelligence, 3D computation, engineering system modelling, analysis and simulation, bionics engineering, automatic control, image processing and pattern recognition etc. Among them, face detection belongs to image processing and pattern recognition. An emotional robot must have the ability to recognize various objects, particularly, it is very important for a bio-robot to be able to recognize human faces from an image. In this paper, a face detection method is proposed for identifying any human faces in colour images using human skin model and eye detection method. Firstly, this method can be used to detect skin regions from the input colour image after normalizing its luminance. Then, all face candidates are identified using an eye detection method. Comparing with existing algorithms, this method only relies on the colour and geometrical data of human face rather than using training datasets. From experimental results, it is shown that this method is effective and fast and it can be applied to the development of an emotional bio-robot with further improvements of its speed and accuracy.

  20. Sistem Kontrol Akses Berbasis Real Time Face Recognition dan Gender Information

    Directory of Open Access Journals (Sweden)

    Putri Nurmala

    2015-06-01

    Full Text Available Face recognition and gender information is a computer application for automatically identifying or verifying a person's face from a camera to capture a person's face. It is usually used in access control systemsand it can be compared to other biometrics such as finger print identification system or iris. Many of face recognition algorithms have been developed in recent years. Face recognition system and gender information inthis system based on the Principal Component Analysis method (PCA. Computational method has a simple and fast compared with the use of the method requires a lot of learning, such as artificial neural network. In thisaccess control system, relay used and Arduino controller. In this essay focuses on face recognition and gender - based information in real time using the method of Principal Component Analysis ( PCA . The result achievedfrom the application design is the identification of a person’s face with gender using PCA. The results achieved by the application is face recognition system using PCA can obtain good results the 85 % success rate in face recognition with face images that have been tested by a few people and a fairly high degree of accuracy.

  1. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  2. 20 CFR 266.6 - Information to be submitted by a representative payee-applicant; face-to-face interview.

    Science.gov (United States)

    2010-04-01

    ... representative payee-applicant; face-to-face interview. 266.6 Section 266.6 Employees' Benefits RAILROAD... be submitted by a representative payee-applicant; face-to-face interview. Before the Board selects a... listed in § 266.4 of this part. An employee of the Board may also conduct a face-to-face interview with...

  3. Face, Body, and Center of Gravity Mediate Person Detection in Natural Scenes

    Science.gov (United States)

    Bindemann, Markus; Scheepers, Christoph; Ferguson, Heather J.; Burton, A. Mike

    2010-01-01

    Person detection is an important prerequisite of social interaction, but is not well understood. Following suggestions that people in the visual field can capture a viewer's attention, this study examines the role of the face and the body for person detection in natural scenes. We observed that viewers tend first to look at the center of a scene,…

  4. Fusion of LBP and SWLD using spatio-spectral information for hyperspectral face recognition

    Science.gov (United States)

    Xie, Zhihua; Jiang, Peng; Zhang, Shuai; Xiong, Jinquan

    2018-01-01

    Hyperspectral imaging, recording intrinsic spectral information of the skin cross different spectral bands, become an important issue for robust face recognition. However, the main challenges for hyperspectral face recognition are high data dimensionality, low signal to noise ratio and inter band misalignment. In this paper, hyperspectral face recognition based on LBP (Local binary pattern) and SWLD (Simplified Weber local descriptor) is proposed to extract discriminative local features from spatio-spectral fusion information. Firstly, the spatio-spectral fusion strategy based on statistical information is used to attain discriminative features of hyperspectral face images. Secondly, LBP is applied to extract the orientation of the fusion face edges. Thirdly, SWLD is proposed to encode the intensity information in hyperspectral images. Finally, we adopt a symmetric Kullback-Leibler distance to compute the encoded face images. The hyperspectral face recognition is tested on Hong Kong Polytechnic University Hyperspectral Face database (PolyUHSFD). Experimental results show that the proposed method has higher recognition rate (92.8%) than the state of the art hyperspectral face recognition algorithms.

  5. Visual and associated affective processing of face information in schizophrenia: A selective review.

    Science.gov (United States)

    Chen, Yue; Ekstrom, Tor

    Perception of facial features is crucial in social life. In past decades, extensive research showed that the ability to perceive facial emotion expression was compromised in schizophrenia patients. Given that face perception involves visual/cognitive and affective processing, the roles of these two processing domains in the compromised face perception in schizophrenia were studied and discussed, but not clearly defined. One particular issue was whether face-specific processing is implicated in this psychiatric disorder. Recent investigations have probed into the components of face perception processes such as visual detection, identity recognition, emotion expression discrimination and working memory conveyed from faces. Recent investigations have further assessed the associations between face processing and basic visual processing and between face processing and social cognitive processing such as Theory of Mind. In this selective review, we discuss the investigative findings relevant to the issues of cognitive and affective association and face-specific processing. We highlight the implications of multiple processing domains and face-specific processes as potential mechanisms underlying compromised face perception in schizophrenia. These findings suggest a need for a domain-specific therapeutic approach to the improvement of face perception in schizophrenia.

  6. Hardware-software face detection system based on multi-block local binary patterns

    Science.gov (United States)

    Acasandrei, Laurentiu; Barriga, Angel

    2015-03-01

    Face detection is an important aspect for biometrics, video surveillance and human computer interaction. Due to the complexity of the detection algorithms any face detection system requires a huge amount of computational and memory resources. In this communication an accelerated implementation of MB LBP face detection algorithm targeting low frequency, low memory and low power embedded system is presented. The resulted implementation is time deterministic and uses a customizable AMBA IP hardware accelerator. The IP implements the kernel operations of the MB-LBP algorithm and can be used as universal accelerator for MB LBP based applications. The IP employs 8 parallel MB-LBP feature evaluators cores, uses a deterministic bandwidth, has a low area profile and the power consumption is ~95 mW on a Virtex5 XC5VLX50T. The resulted implementation acceleration gain is between 5 to 8 times, while the hardware MB-LBP feature evaluation gain is between 69 and 139 times.

  7. Modern Microelectronics as Hardware Face of Information Technologies

    NARCIS (Netherlands)

    Jozwiak, L.; Luba, T.; Zbierzchowski, B.

    2000-01-01

    Development trends of contemporary microelectronics, as well as its influence on development of widely grasped information systems are discussed. It was proved, that about this development decide not only quantitative, but also qualitative reasons, such as technology of manufacturing and technology

  8. Challenges Facing Adoption of Information Communication Technology in African Universities

    Science.gov (United States)

    Murgor, Titus Kiptoo

    2015-01-01

    A significant number of the universities and higher educational institutions have adopted the latest technology and implemented it productively, for the development of skilled human resource in respective area of specialization, as part of their responsibility. Information and communication Technology (ICT) has grown tremendously around the globe…

  9. Spatial But Not Oculomotor Information Biases Perceptual Memory: Evidence From Face Perception and Cognitive Modeling.

    Science.gov (United States)

    Wantz, Andrea L; Lobmaier, Janek S; Mast, Fred W; Senn, Walter

    2017-08-01

    Recent research put forward the hypothesis that eye movements are integrated in memory representations and are reactivated when later recalled. However, "looking back to nothing" during recall might be a consequence of spatial memory retrieval. Here, we aimed at distinguishing between the effect of spatial and oculomotor information on perceptual memory. Participants' task was to judge whether a morph looked rather like the first or second previously presented face. Crucially, faces and morphs were presented in a way that the morph reactivated oculomotor and/or spatial information associated with one of the previously encoded faces. Perceptual face memory was largely influenced by these manipulations. We considered a simple computational model with an excellent match (4.3% error) that expresses these biases as a linear combination of recency, saccade, and location. Surprisingly, saccades did not play a role. The results suggest that spatial and temporal rather than oculomotor information biases perceptual face memory. Copyright © 2016 Cognitive Science Society, Inc.

  10. Face Recognition in 4- to 7-Year-Olds: Processing of Configural, Featural, and Paraphernalia Information.

    Science.gov (United States)

    Freire, Alejo; Lee, Kang

    2001-01-01

    Tested in two studies 4- to 7-year-olds' face recognition by manipulating the faces' configural and featural information. Found that even with only a single 5-second exposure, most children could use configural and featural cues to make identity judgments. Repeated exposure and feedback improved others' performance. Even proficient memories were…

  11. Cooperative multisensor system for real-time face detection and tracking in uncontrolled conditions

    Science.gov (United States)

    Marchesotti, Luca; Piva, Stefano; Turolla, Andrea; Minetti, Deborah; Regazzoni, Carlo S.

    2005-03-01

    The presented work describes an innovative architecture for multi-sensor distributed video surveillance applications. The aim of the system is to track moving objects in outdoor environments with a cooperative strategy exploiting two video cameras. The system also exhibits the capacity of focusing its attention on the faces of detected pedestrians collecting snapshot frames of face images, by segmenting and tracking them over time at different resolution. The system is designed to employ two video cameras in a cooperative client/server structure: the first camera monitors the entire area of interest and detects the moving objects using change detection techniques. The detected objects are tracked over time and their position is indicated on a map representing the monitored area. The objects" coordinates are sent to the server sensor in order to point its zooming optics towards the moving object. The second camera tracks the objects at high resolution. As well as the client camera, this sensor is calibrated and the position of the object detected on the image plane reference system is translated in its coordinates referred to the same area map. In the map common reference system, data fusion techniques are applied to achieve a more precise and robust estimation of the objects" track and to perform face detection and tracking. The work novelties and strength reside in the cooperative multi-sensor approach, in the high resolution long distance tracking and in the automatic collection of biometric data such as a person face clip for recognition purposes.

  12. A comparison of the effectiveness of a game informed online learning activity and face to face teaching in increasing knowledge about managing aggression in health settings.

    Science.gov (United States)

    McKenzie, Karen

    2013-12-01

    The present study compared the impact of face to face teaching with a short online game informed learning activity on health participants' knowledge about, and confidence in, managing aggressive situations. Both forms of teaching resulted in a significant increase in participants' knowledge and confidence. Face to face training led to significantly greater increases in knowledge but was equivalent in terms of confidence. Both forms of teaching were rated positively, but face to face teaching received significantly higher ratings than the online activity. The study suggests that short online game informed learning activities may offer an effective alternative for health professional training where face to face training is not possible. Further research is needed on the longer term impact of both types of training on practice.

  13. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    Science.gov (United States)

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  14. Two faces of entropy and information in biological systems.

    Science.gov (United States)

    Mitrokhin, Yuriy

    2014-10-21

    The article attempts to overcome the well-known paradox of contradictions between the emerging biological organization and entropy production in biological systems. It is assumed that quality, speculative correlation between entropy and antientropy processes taking place both in the past and today in the metabolic and genetic cellular systems may be perfectly authorized for adequate description of the evolution of biological organization. So far as thermodynamic entropy itself cannot compensate for the high degree of organization which exists in the cell, we discuss the mode of conjunction of positive entropy events (mutations) in the genetic systems of the past generations and the formation of organized structures of current cells. We argue that only the information which is generated in the conditions of the information entropy production (mutations and other genome reorganization) in genetic systems of the past generations provides the physical conjunction of entropy and antientropy processes separated from each other in time generations. It is readily apparent from the requirements of the Second law of thermodynamics. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. The part task of the part-spacing paradigm is not a pure measurement of part-based information of faces.

    Directory of Open Access Journals (Sweden)

    Qi Zhu

    Full Text Available BACKGROUND: Faces are arguably one of the most important object categories encountered by human observers, yet they present one of the most difficult challenges to both the human and artificial visual systems. A variety of experimental paradigms have been developed to study how faces are represented and recognized, among which is the part-spacing paradigm. This paradigm is presumed to characterize the processing of both the featural and configural information of faces, and it has become increasingly popular for testing hypotheses on face specificity and in the diagnosis of face perception in cognitive disorders. METHODOLOGY/PRINCIPAL FINDINGS: In two experiments we questioned the validity of the part task of this paradigm by showing that, in this task, measuring pure information about face parts is confounded by the effect of face configuration on the perception of those parts. First, we eliminated or reduced contributions from face configuration by either rearranging face parts into a non-face configuration or by removing the low spatial frequencies of face images. We found that face parts were no longer sensitive to inversion, suggesting that the previously reported inversion effect observed in the part task was due in fact to the presence of face configuration. Second, self-reported prosopagnosic patients who were selectively impaired in the holistic processing of faces failed to detect part changes when face configurations were presented. When face configurations were scrambled, however, their performance was as good as that of normal controls. CONCLUSIONS/SIGNIFICANCE: In sum, consistent evidence from testing both normal and prosopagnosic subjects suggests the part task of the part-spacing paradigm is not an appropriate task for either measuring how face parts alone are processed or for providing a valid contrast to the spacing task. Therefore, conclusions from previous studies using the part-spacing paradigm may need re-evaluation with

  16. Multiple Information Fusion Face Recognition Using Key Feature Points

    Directory of Open Access Journals (Sweden)

    LIN Kezheng

    2017-06-01

    Full Text Available After years of face recognition research,due to the effect of illumination,noise and other conditions have led to the recognition rate is relatively low,2 d face recognition technology has couldn’t keep up with the pace of The Times the forefront,Although 3 d face recognition technology is developing step by step,but it has a higher complexity. In order to solve this problem,based on the traditional depth information positioning method and local characteristic analysis methods LFA,puts forward an improved 3 d face key feature points localization algorithm, and on the basis of the trained sample which obtained by complete cluster,further put forward the global and local feature extraction algorithm of weighted fusion. Through FRGC and BU-3DFE experiment data comparison and analysis of the two face library,the method in terms of 3 d face recognition effect has a higher robustness.

  17. The acquisition of face and person identity information following anterior temporal lobectomy.

    Science.gov (United States)

    Moran, Maria; Seidenberg, Michael; Sabsevitz, Dave; Swanson, Sara; Hermann, Bruce

    2005-05-01

    Thirty unilateral anterior temporal lobectomy (ATL) subjects (15 right and 15 left) and 15 controls were presented a multitrial learning task in which unfamiliar faces were paired with biographical information (occupation, city location, and a person's name). Face recognition hits were similar between groups, but the right ATL group committed more false-positive errors to face foils. Both left and right ATL groups were impaired relative to controls in acquiring biographical information, but the deficit was more pronounced for the left ATL group. Recall levels also varied for the different types of biographical information; occupation was most commonly recalled followed by city name and person name. In addition, city and person name recall was more likely when occupation was also recalled. Overall, recall of biographical information was positively correlated with clinical measures of anterograde episodic memory. Findings are discussed in terms of the role of the temporal lobe and associative learning ability in the successful acquisition of new face semantic (biographical) representations.

  18. The effects of presentation methods and semantic information on multi-ethnicity face recognition

    Directory of Open Access Journals (Sweden)

    Kaarel Rundu

    2012-01-01

    Full Text Available Studies have shown that own-race faces are more accurately recognised than other-race faces. The present study examined the effects of own- and other-race face recognition when different ethnicity targets are presented to the participants together. Also the effect of semantic information on the recognition of different race faces was examined. The participants (N = 234 were presented with photos of own-race and other-race faces. For some participants the faces were presented with stereotypical names and for some not. As hypothesized, own-race faces were better recognised in target-present lineup and more correctly rejected in target-absent lineup than other-race faces. Concerning presentation method, both own-race and other-race faces were more correctly identified in target-present simultaneous than in target-present sequential lineups. No effects of stereotypical names on face recognition were found. The findings suggest that identifying multi-ethnicity perpetrators is a problematic and difficult task.

  19. vMMN for schematic faces: automatic detection of change in emotional expression

    Directory of Open Access Journals (Sweden)

    Kairi eKreegipuu

    2013-10-01

    Full Text Available Our brain is able to automatically detect changes in sensory stimulation, including in vision. A large variety of changes of features in stimulation elicit a deviance-reflecting ERP component known as the mismatch negativity (MMN. The present study has three main goals: (1 to register vMMN using a rapidly presented stream of schematic faces (neutral, happy, angry; adapted from Öhman et al., 2001; (2 to compare elicited vMMNs to angry and happy schematic faces in two different paradigms, in a traditional oddball design with frequent standard and rare target and deviant stimuli (12.5% each and in an version of an optimal multi-feature paradigm with several deviant stimuli (altogether 37.5% in the stimulus block; (3 to compare vMMNs to subjective ratings of valence, arousal and attention capture for happy and angry schematic faces, i.e., to estimate the effect of affective value of stimuli on their automatic detection. Eleven observers (19-32 years, 6 women took part in both experiments, an oddball and optimum paradigm. Stimuli were rapidly presented schematic faces and an object with face-features that served as the target stimulus to be detected by a button-press. Results show that a vMMN-type response at posterior sites was equally elicited in both experiments. Post-experimental reports confirmed that the angry face attracted more automatic attention than the happy face but the difference did not emerge directly at the ERP level. Thus, when interested in studying change detection in facial expressions we encourage the use of the optimum (multi-feature design in order to save time and other experimental resources.

  20. Visual processing in patients with age-related macular degeneration performing a face detection test

    Directory of Open Access Journals (Sweden)

    Vottonen P

    2017-07-01

    Full Text Available Pasi Vottonen,1 Kai Kaarniranta,1,2 Ari Pääkkönen,3 Ina M Tarkka4 1Department of Ophthalmology, Kuopio University Hospital, Kuopio, Finland; 2Department of Ophthalmology, Institute of Clinical Medicine, University of Eastern Finland, Kuopio, Finland; 3Department of Clinical Neurophysiology, Institute of Clinical Medicine, University of Eastern Finland, Kuopio, Finland; 4Department of Health Sciences, University of Jyväskylä, Jyväskylä, Finland Purpose: People with age-related macular degeneration (AMD have difficulties in familiar face recognition and facial expression discrimination. Our aim was to evaluate the visual processing of faces in AMD patients and whether this would be improved by anti-vascular endothelial growth factor therapy. This was a prospective interventional cohort study. Patients: Twelve patients with monocular wet AMD and 6 control subjects were recruited. Face detection processes were studied using cortical event-related potentials (ERPs. Patients received 3 bevacizumab intravitreal injections to the single affected eye. At baseline and 4–6 weeks after the last injection, clinical presentation and ERPs of the face task were evaluated. Face pictures were shown as targets (16.7% among standard pictures of pixelated faces in an oddball-type paradigm. Results: Face pictures elicited well-defined electrical components in occipital and parieto-occipital cortical areas at baseline and after treatment. The face-specific N170 component was evident in all subjects with longer peak latency in patients than in controls (170±13 vs 155±14, P=0.032. Unexpectedly, an early component reflecting unintentional prediction of perceiving a face, that is, deviance-related negativity, was present in patients and controls. Visual acuity of the affected eye seemed improved in patients from logarithm of the minimum angle of resolution 0.71 (±0.33 to 0.52 (±0.39 by 119 (±23 days without accompanying significant change in face

  1. Designing Patient-facing Health Information Technologies for the Outpatient Settings: A Literature Review

    OpenAIRE

    Yushi Yang; Onur Asan

    2016-01-01

    Introduction: The implementation of health information technologies (HITs) has changed the dynamics of doctor–patient communication in outpatient settings. Designing patient-facing HITs provides patients with easy access to healthcare information during the visit and has the potential to enhance the patient-centred care.   Objectives: The objectives of this study are to systematically review how the designs of patient-facing HITs have been suggested and evaluated, and how they may pot...

  2. Neutral face classification using personalized appearance models for fast and robust emotion detection.

    Science.gov (United States)

    Chiranjeevi, Pojala; Gopalakrishnan, Viswanath; Moogi, Pratibha

    2015-09-01

    Facial expression recognition is one of the open problems in computer vision. Robust neutral face recognition in real time is a major challenge for various supervised learning-based facial expression recognition methods. This is due to the fact that supervised methods cannot accommodate all appearance variability across the faces with respect to race, pose, lighting, facial biases, and so on, in the limited amount of training data. Moreover, processing each and every frame to classify emotions is not required, as user stays neutral for majority of the time in usual applications like video chat or photo album/web browsing. Detecting neutral state at an early stage, thereby bypassing those frames from emotion classification would save the computational power. In this paper, we propose a light-weight neutral versus emotion classification engine, which acts as a pre-processer to the traditional supervised emotion classification approaches. It dynamically learns neutral appearance at key emotion (KE) points using a statistical texture model, constructed by a set of reference neutral frames for each user. The proposed method is made robust to various types of user head motions by accounting for affine distortions based on a statistical texture model. Robustness to dynamic shift of KE points is achieved by evaluating the similarities on a subset of neighborhood patches around each KE point using the prior information regarding the directionality of specific facial action units acting on the respective KE point. The proposed method, as a result, improves emotion recognition (ER) accuracy and simultaneously reduces computational complexity of the ER system, as validated on multiple databases.

  3. Effects of rust in the crack face on crack detection based on Sonic-IR method

    International Nuclear Information System (INIS)

    Harai, Y.; Izumi, Y.; Tanabe, H.; Takamatsu, T.; Sakagami, T.

    2015-01-01

    Sonic-IR, which is based on the thermographic detection of the temperature rise due to frictional heating at the defect faces under ultrasonic excitation, has an advantage in the detection of closed and small defects. However, this method has a lot of nuclear factors relating to heat generation. In this study, effects of rust in the crack faces on the crack detection based on the sonic-IR method is experimentally investigated by using crack specimens. The heat generation by ultrasonic excitation was observed regularly during rust accelerated test using original device. The distribution of temperature change around the crack was changed with the progress of rust. This change in heat generation, it believed to be due to change in the contact state of the crack surface due to rust. As a result, it was found that heat generation by ultrasonic excitation is affected by rust in the crack faces. And it was also found that crack detection can be conducted by sonic-IR even if rust was generated in the crack faces. (author)

  4. Decoding face information in time, frequency and space from direct intracranial recordings of the human brain.

    Directory of Open Access Journals (Sweden)

    Naotsugu Tsuchiya

    Full Text Available Faces are processed by a neural system with distributed anatomical components, but the roles of these components remain unclear. A dominant theory of face perception postulates independent representations of invariant aspects of faces (e.g., identity in ventral temporal cortex including the fusiform gyrus, and changeable aspects of faces (e.g., emotion in lateral temporal cortex including the superior temporal sulcus. Here we recorded neuronal activity directly from the cortical surface in 9 neurosurgical subjects undergoing epilepsy monitoring while they viewed static and dynamic facial expressions. Applying novel decoding analyses to the power spectrogram of electrocorticograms (ECoG from over 100 contacts in ventral and lateral temporal cortex, we found better representation of both invariant and changeable aspects of faces in ventral than lateral temporal cortex. Critical information for discriminating faces from geometric patterns was carried by power modulations between 50 to 150 Hz. For both static and dynamic face stimuli, we obtained a higher decoding performance in ventral than lateral temporal cortex. For discriminating fearful from happy expressions, critical information was carried by power modulation between 60-150 Hz and below 30 Hz, and again better decoded in ventral than lateral temporal cortex. Task-relevant attention improved decoding accuracy more than 10% across a wide frequency range in ventral but not at all in lateral temporal cortex. Spatial searchlight decoding showed that decoding performance was highest around the middle fusiform gyrus. Finally, we found that the right hemisphere, in general, showed superior decoding to the left hemisphere. Taken together, our results challenge the dominant model for independent face representation of invariant and changeable aspects: information about both face attributes was better decoded from a single region in the middle fusiform gyrus.

  5. Subject independent facial expression recognition with robust face detection using a convolutional neural network.

    Science.gov (United States)

    Matsugu, Masakazu; Mori, Katsuhiko; Mitari, Yusuke; Kaneda, Yuji

    2003-01-01

    Reliable detection of ordinary facial expressions (e.g. smile) despite the variability among individuals as well as face appearance is an important step toward the realization of perceptual user interface with autonomous perception of persons. We describe a rule-based algorithm for robust facial expression recognition combined with robust face detection using a convolutional neural network. In this study, we address the problem of subject independence as well as translation, rotation, and scale invariance in the recognition of facial expression. The result shows reliable detection of smiles with recognition rate of 97.6% for 5600 still images of more than 10 subjects. The proposed algorithm demonstrated the ability to discriminate smiling from talking based on the saliency score obtained from voting visual cues. To the best of our knowledge, it is the first facial expression recognition model with the property of subject independence combined with robustness to variability in facial appearance.

  6. DEWA: A Multiaspect Approach for Multiple Face Detection in Complex Scene Digital Image

    Directory of Open Access Journals (Sweden)

    Setiawan Hadi

    2013-09-01

    Full Text Available A new approach for detecting faces in a digital image with unconstrained background has been developed. The approach is composed of three phases: segmentation phase, filtering phase and localization phase. In the segmentation phase, we utilized both training and non-training methods, which are implemented in user selectable color space. In the filtering phase, Minkowski addition-based objects removal has been used for image cleaning. In the last phase, an image processing method and a data mining method are employed for grouping and localizing objects, combined with geometric-based image analysis. Several experiments have been conducted using our special face database that consists of simple objects and complex objects. The experiment results demonstrated that the detection accuracy is around 90% and the detection speed is less than 1 second in average.

  7. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  8. The Evaluation of Face to Face and Web-Based Information Sharing Contexts between Teachers and Academicians from the Viewpoints of the Participants

    Directory of Open Access Journals (Sweden)

    Fatih Baş

    2014-12-01

    Full Text Available The aim of this study is; evaluated the web-based and face to face information sharing context between teachers and academicians from the viewpoints of the participants. Web-based context has 13 academician - 72 teacher and face to face context has 6 academicians -17 teachers participants. The holistic case study method was adopted in the study and the data were collected via unstructured interviews  with 5 teachers and 5 academicians who participated in the information sharing processes in both contexts. The content analyses were conducted and the findings showed that coming together and sharing information were considered a positive aspect of these contexts by teachers and academicians. The participants stated that there were some factors decreasing their participation rate in the web-based context stemming from the structure of web-page, the posts in the page, views of the participants and necessary conditions. However, the participants added that teachers having similar teaching applications decreased their information sharing in the face to face context. It was recommended to use both context together based on the recommendations from the participants and the relevant literature.Key Words:    Information sharing between teacher and academician, web-based communication, face to face communication

  9. The changing face of government information providing access in the twenty-first century

    CERN Document Server

    Kumar, Suhasini L

    2006-01-01

    Learn what innovative changes lie in the future of government information The Changing Face of Government Information comprehensively examines the way government documents' librarians acquire, provide access, and provide reference services in the new electronic environment. Noted experts discuss the impact electronic materials have had on the Government Printing Office (GPO), the reference services within the Federal Depository Library Program (FDLP), and the new opportunities in the transition from paper-based information policy to an electronic e-government. This source reveals the latest changes in the field of government documents librarianship and the knowledge and expertise needed to teach users how to access what they need from this enormous wealth of government information. Major changes have taken place in the way government information is created, disseminated, accessed, and preserved. The Changing Face of Government Information explains in detail the tremendous change taking place in libraries and ...

  10. Real-time camera-based face detection using a modified LAMSTAR neural network system

    Science.gov (United States)

    Girado, Javier I.; Sandin, Daniel J.; DeFanti, Thomas A.; Wolf, Laura K.

    2003-03-01

    This paper describes a cost-effective, real-time (640x480 at 30Hz) upright frontal face detector as part of an ongoing project to develop a video-based, tetherless 3D head position and orientation tracking system. The work is specifically targeted for auto-stereoscopic displays and projection-based virtual reality systems. The proposed face detector is based on a modified LAMSTAR neural network system. At the input stage, after achieving image normalization and equalization, a sub-window analyzes facial features using a neural network. The sub-window is segmented, and each part is fed to a neural network layer consisting of a Kohonen Self-Organizing Map (SOM). The output of the SOM neural networks are interconnected and related by correlation-links, and can hence determine the presence of a face with enough redundancy to provide a high detection rate. To avoid tracking multiple faces simultaneously, the system is initially trained to track only the face centered in a box superimposed on the display. The system is also rotationally and size invariant to a certain degree.

  11. Design of an Active Multispectral SWIR Camera System for Skin Detection and Face Verification

    Directory of Open Access Journals (Sweden)

    Holger Steiner

    2016-01-01

    Full Text Available Biometric face recognition is becoming more frequently used in different application scenarios. However, spoofing attacks with facial disguises are still a serious problem for state of the art face recognition algorithms. This work proposes an approach to face verification based on spectral signatures of material surfaces in the short wave infrared (SWIR range. They allow distinguishing authentic human skin reliably from other materials, independent of the skin type. We present the design of an active SWIR imaging system that acquires four-band multispectral image stacks in real-time. The system uses pulsed small band illumination, which allows for fast image acquisition and high spectral resolution and renders it widely independent of ambient light. After extracting the spectral signatures from the acquired images, detected faces can be verified or rejected by classifying the material as “skin” or “no-skin.” The approach is extensively evaluated with respect to both acquisition and classification performance. In addition, we present a database containing RGB and multispectral SWIR face images, as well as spectrometer measurements of a variety of subjects, which is used to evaluate our approach and will be made available to the research community by the time this work is published.

  12. The effect of real-world personal familiarity on the speed of face information processing.

    Directory of Open Access Journals (Sweden)

    Benjamin Balas

    2007-11-01

    Full Text Available Previous studies have explored the effects of familiarity on various kinds of visual face judgments, yet the role of familiarity in face processing is not fully understood. Across different face judgments and stimulus sets, the data is equivocal as to whether or not familiarity impacts recognition processes.Here, we examine the effect of real-world personal familiarity in three simple delayed-match-to-sample tasks in which subjects were required to match faces on the basis of orientation (upright v. inverted, gender and identity. We find that subjects had a significant speed advantage with familiar faces in all three tasks, with large effects for the gender and identity matching tasks.Our data indicates that real-world experience with a face exerts a powerful influence on face processing in tasks where identity information is irrelevant, even in tasks that could in principle be solved via low-level cues. These results underscore the importance of experience in shaping visual recognition processes.

  13. Visual search of Mooney faces

    Directory of Open Access Journals (Sweden)

    Jessica Emeline Goold

    2016-02-01

    Full Text Available Faces spontaneously capture attention. However, which special attributes of a face underlie this effect are unclear. To address this question, we investigate how gist information, specific visual properties and differing amounts of experience with faces affect the time required to detect a face. Three visual search experiments were conducted investigating the rapidness of human observers to detect Mooney face images. Mooney images are two-toned, ambiguous images. They were used in order to have stimuli that maintain gist information but limit low-level image properties. Results from the experiments show: 1 although upright Mooney faces were searched inefficiently, they were detected more rapidly than inverted Mooney face targets, demonstrating the important role of gist information in guiding attention towards a face. 2 Several specific Mooney face identities were searched efficiently while others were not, suggesting the involvement of specific visual properties in face detection. 3 By providing participants with unambiguous gray-scale versions of the Mooney face targets prior to the visual search task, the targets were detected significantly more efficiently, suggesting that prior experience with Mooney faces improves the ability to extract gist information for rapid face detection. However, a week of training with Mooney face categorization did not lead to even more efficient visual search of Mooney face targets. In summary, these results reveal that specific local image properties cannot account for how faces capture attention. On the other hand, gist information alone cannot account for how faces capture attention either. Prior experience facilitates the effect of gist on visual search of faces, making faces a special object category for guiding attention.

  14. Face-to-face and electronic communications in maintaining social networks : the influence of geographical and relational distance and of information content

    NARCIS (Netherlands)

    Tillema, Taede; Dijst, Martin; Schwanen, Tim

    Using data collected among 742 respondents, this article aims at gaining greater insight into (i) the interaction between face-to-face (F2F) and electronic contacts, (ii) the influence of information content and relational distance on the communication mode/service choice and (iii) the influence of

  15. Early detection of tooth wear by en-face optical coherence tomography

    Science.gov (United States)

    Mărcăuteanu, Corina; Negrutiu, Meda; Sinescu, Cosmin; Demjan, Eniko; Hughes, Mike; Bradu, Adrian; Dobre, George; Podoleanu, Adrian G.

    2009-02-01

    Excessive dental wear (pathological attrition and/or abfractions) is a frequent complication in bruxing patients. The parafunction causes heavy occlusal loads. The aim of this study is the early detection and monitoring of occlusal overload in bruxing patients. En-face optical coherence tomography was used for investigating and imaging of several extracted tooth, with a normal morphology, derived from patients with active bruxism and from subjects without parafunction. We found a characteristic pattern of enamel cracks in patients with first degree bruxism and with a normal tooth morphology. We conclude that the en-face optical coherence tomography is a promising non-invasive alternative technique for the early detection of occlusal overload, before it becomes clinically evident as tooth wear.

  16. Does dynamic information about the speaker's face contribute to semantic speech processing? ERP evidence.

    Science.gov (United States)

    Hernández-Gutiérrez, David; Abdel Rahman, Rasha; Martín-Loeches, Manuel; Muñoz, Francisco; Schacht, Annekathrin; Sommer, Werner

    2018-07-01

    Face-to-face interactions characterize communication in social contexts. These situations are typically multimodal, requiring the integration of linguistic auditory input with facial information from the speaker. In particular, eye gaze and visual speech provide the listener with social and linguistic information, respectively. Despite the importance of this context for an ecological study of language, research on audiovisual integration has mainly focused on the phonological level, leaving aside effects on semantic comprehension. Here we used event-related potentials (ERPs) to investigate the influence of facial dynamic information on semantic processing of connected speech. Participants were presented with either a video or a still picture of the speaker, concomitant to auditory sentences. Along three experiments, we manipulated the presence or absence of the speaker's dynamic facial features (mouth and eyes) and compared the amplitudes of the semantic N400 elicited by unexpected words. Contrary to our predictions, the N400 was not modulated by dynamic facial information; therefore, semantic processing seems to be unaffected by the speaker's gaze and visual speech. Even though, during the processing of expected words, dynamic faces elicited a long-lasting late posterior positivity compared to the static condition. This effect was significantly reduced when the mouth of the speaker was covered. Our findings may indicate an increase of attentional processing to richer communicative contexts. The present findings also demonstrate that in natural communicative face-to-face encounters, perceiving the face of a speaker in motion provides supplementary information that is taken into account by the listener, especially when auditory comprehension is non-demanding. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. A Self-Determination Perspective on Online Health Information Seeking: The Internet vs. Face-to-Face Office Visits With Physicians.

    Science.gov (United States)

    Lee, Seow Ting; Lin, Julian

    2016-06-01

    This study elucidates the experiential and motivational aspects of online health information beyond the theoretically limited instrumental perspective that dominates the extant literature. Based on a sample of 993 online health information seekers in India, the survey found that online health information seeking offers individuals greater autonomy, competence, and relatedness compared to face-to-face office visits with physicians. According to self-determination theory, individuals are motivated to act by a sense of volition and experience of willingness, validation of one's skills and competencies, and feeling of connection with others who shaped one's decisions. These 3 psychological needs, which motivate individuals to pursue what they innately seek as human beings, help explain why individuals turn online for health information. T tests showed that all 3 self-determination theory constructs -autonomy, competence, and relatedness-were higher for online health information seeking than for face-to-face office visits with physicians. A regression analysis found that 2 variables, autonomy and relatedness, explained online health information seeking. Competence was not a significant factor, likely because of competency issues faced by individuals in interpreting, understanding, and making use of online health information. The findings, which do not suggest that online health information seeking would displace physicians as many have feared, offer promise for an integrated system of care. Office visits with physicians would necessarily evolve into an expanded communicative space of health information seeking instead of an alternative channel for health information.

  18. Making the Ineffable Explicit: Estimating the Information Employed for Face Classifications

    Science.gov (United States)

    Mangini, Michael C.; Biederman, Irving

    2004-01-01

    When we look at a face, we readily perceive that person's gender, expression, identity, age, and attractiveness. Perceivers as well as scientists have hitherto had little success in articulating just what information we are employing to achieve these subjectively immediate and effortless classifications. We describe here a method that estimates…

  19. Gharibi_FaceCard for Contacts and Easy Personal - Information Exchange

    OpenAIRE

    Gharibi, Wajeb; Gharibi, Gharib

    2014-01-01

    In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code (GC) for each personal mobile and creating a personal information file called Gharibi Face Card (GFC), which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the...

  20. Designing Patient-facing Health Information Technologies for the Outpatient Settings: A Literature Review

    Directory of Open Access Journals (Sweden)

    Yushi Yang

    2016-04-01

    Full Text Available Introduction: The implementation of health information technologies (HITs has changed the dynamics of doctor–patient communication in outpatient settings. Designing patient-facing HITs provides patients with easy access to healthcare information during the visit and has the potential to enhance the patient-centred care.   Objectives: The objectives of this study are to systematically review how the designs of patient-facing HITs have been suggested and evaluated, and how they may potentially affect the doctor–patient communication and patient-centred care.   Method: We conducted an online database search to identify articles published before December 2014 relevant to the objectives of this study. A total of nine papers have been identified and reviewed in this study.   Results: Designing patient-facing HITs is at an early stage. The current literature has been exploring the impact of HITs on doctor–patient communication dynamics. Based on the findings of these studies, there is an emergent need to design more patient-centred HITs. There are also some papers that focus on the usability evaluation of some preliminary prototypes of the patient-facing HITs. The design styles of patient-facing HITs included sharing the health information with the patients on: (1 a separate patient display, (2 a projector, (3 a portable tablet, (4 a touch-based screen and (5 a shared computer display that can be viewed by both doctors and patients. Each of them had the strengths and limitations to facilitate the patient-centred care, and it is worthwhile to make a comparison of them in order to identify future research directions.   Conclusion: The designs of patient-facing HITs in outpatient settings are promising in facilitating the doctor-patient communication and patient engagement. However, their effectiveness and usefulness need to be further evaluated and improved from a systems perspective.

  1. Designing Patient-facing Health Information Technologies for the Outpatient Settings: A Literature Review.

    Science.gov (United States)

    Yang, Yushi; Asan, Onur

    2016-04-06

      The implementation of health information technologies (HITs) has changed the dynamics of doctor-patient communication in outpatient settings. Designing patient-facing HITs provides patients with easy access to healthcare information during the visit and has the potential to enhance the patient-centred care.  The objectives of this study are to systematically review how the designs of patient-facing HITs have been suggested and evaluated, and how they may potentially affect the doctor-patient communication and patient-centred care.  We conducted an online database search to identify articles published before December 2014 relevant to the objectives of this study. A total of nine papers have been identified and reviewed in this study.  Designing patient-facing HITs is at an early stage. The current literature has been exploring the impact of HITs on doctor-patient communication dynamics. Based on the findings of these studies, there is an emergent need to design more patient-centred HITs. There are also some papers that focus on the usability evaluation of some preliminary prototypes of the patient-facing HITs. The design styles of patient-facing HITs included sharing the health information with the patients on: (1) a separate patient display, (2) a projector, (3) a portable tablet, (4) a touch-based screen and (5) a shared computer display that can be viewed by both doctors and patients. Each of them had the strengths and limitations to facilitate the patient-centred care, and it is worthwhile to make a comparison of them in order to identify future research directions.  The designs of patient-facing HITs in outpatient settings are promising in facilitating the doctor-patient communication and patient engagement. However, their effectiveness and usefulness need to be further evaluated and improved from a systems perspective.

  2. Characterization of ionization chambers in double face for X-ray detection systems

    International Nuclear Information System (INIS)

    Costa, Alessandro M. da; Caldas, Linda V.O.

    2000-01-01

    Two identical parallel-plate ionization chambers with collecting electrodes of different materials (in order to obtain different energy dependences), developed at Instituto de Pesquisas Energeticas e Nucleares, were tested in low energy X-radiation beams, simulating a special ionization chamber, of double face, in a Tandem system. The purpose of this work is to justify a project of a double face detection system utilizing ionization chambers in Tandem. In relation to conventional methods, this kind of system will provide more efficient and precise absorbed dose in air measurements and radiation effective energy determinations. The results obtained in relation to characteristics of short- and long-term stabilities and angular and energy dependence show that the project is feasible and very appropriate. (author)

  3. Information, perspective, and judgments about the self in face and dignity cultures.

    Science.gov (United States)

    Kim, Young-Hoon; Cohen, Dov

    2010-04-01

    People's judgments about their own moral status and well-being were made differently by those from a Dignity culture (Anglo-Americans) and by those from a Face culture (Asian Americans). Face culture participants were more influenced by information processed from a third-person (compared with first-person) perspective, with information about the self having a powerful effect only when seen through another's eyes. Thus, (a) Asian Americans felt the greatest need for moral cleansing when thinking about how others would judge their many (vs. few) transgressions, but this effect did not hold when others were not invoked, and (b) Asian Americans defined themselves as having a rich social network and worthwhile life when thinking about how others would evaluate their many (vs. few) friendships, but again, effects did not hold when others were not invoked. In contrast, Anglo-Americans responded to information about their transgressions or friendships, but effects were pronounced only when other people were not invoked.

  4. Neural processing of high and low spatial frequency information in faces changes across development: qualitative changes in face processing during adolescence.

    Science.gov (United States)

    Peters, Judith C; Vlamings, Petra; Kemner, Chantal

    2013-05-01

    Face perception in adults depends on skilled processing of interattribute distances ('configural' processing), which is disrupted for faces presented in inverted orientation (face inversion effect or FIE). Children are not proficient in configural processing, and this might relate to an underlying immaturity to use facial information in low spatial frequency (SF) ranges, which capture the coarse information needed for configural processing. We hypothesized that during adolescence a shift from use of high to low SF information takes place. Therefore, we studied the influence of SF content on neural face processing in groups of children (9-10 years), adolescents (14-15 years) and young adults (21-29 years) by measuring event-related potentials (ERPs) to upright and inverted faces which varied in SF content. Results revealed that children show a neural FIE in early processing stages (i.e. P1; generated in early visual areas), suggesting a superficial, global facial analysis. In contrast, ERPs of adults revealed an FIE at later processing stages (i.e. N170; generated in face-selective, higher visual areas). Interestingly, adolescents showed FIEs in both processing stages, suggesting a hybrid developmental stage. Furthermore, adolescents and adults showed FIEs for stimuli containing low SF information, whereas such effects were driven by both low and high SF information in children. These results indicate that face processing has a protracted maturational course into adolescence, and is dependent on changes in SF processing. During adolescence, sensitivity to configural cues is developed, which aids the fast and holistic processing that is so special for faces. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  5. The Contact State Monitoring for Seal End Faces Based on Acoustic Emission Detection

    Directory of Open Access Journals (Sweden)

    Xiaohui Li

    2016-01-01

    Full Text Available Monitoring the contact state of seal end faces would help the early warning of the seal failure. In the acoustic emission (AE detection for mechanical seal, the main difficulty is to reduce the background noise and to classify the dispersed features. To solve these problems and achieve higher detection rates, a new approach based on genetic particle filter with autoregression (AR-GPF and hypersphere support vector machine (HSSVM is presented. First, AR model is used to build the dynamic state space (DSS of the AE signal, and GPF is used for signal filtering. Then, multiple features are extracted, and a classification model based on HSSVM is constructed for state recognition. In this approach, AR-GPF is an excellent time-domain method for noise reduction, and HSSVM has advantage on those dispersed features. Finally experimental data shows that the proposed method can effectively detect the contact state of the seal end faces and has higher accuracy rates than some other existing methods.

  6. The Obstacles Facing the Flow of the Electronic Information in the Arab World

    Directory of Open Access Journals (Sweden)

    Samir Yahya Umri

    2006-12-01

    Full Text Available This research views the most important obstacles facing the flow of electronic information in Arab world; with an illustration about the effect of each obstacle on the flowing of the information, and the special recommendation to overcome it. the research states 4 main obstacles; they are: number of internet users and the weakness of the infrastructure in our Arab world, the spam e-mails, the Bugs and vulnerabilities in the operating systems that allow hackers to attack the information systems, and the spread of the electronic pornography on the internet

  7. Investigating the Causal Role of rOFA in Holistic Detection of Mooney Faces and Objects: An fMRI-guided TMS Study.

    Science.gov (United States)

    Bona, Silvia; Cattaneo, Zaira; Silvanto, Juha

    2016-01-01

    The right occipital face area (rOFA) is known to be involved in face discrimination based on local featural information. Whether this region is also involved in global, holistic stimulus processing is not known. We used fMRI-guided transcranial magnetic stimulation (TMS) to investigate whether rOFA is causally implicated in stimulus detection based on holistic processing, by the use of Mooney stimuli. Two studies were carried out: In Experiment 1, participants performed a detection task involving Mooney faces and Mooney objects; Mooney stimuli lack distinguishable local features and can be detected solely via holistic processing (i.e. at a global level) with top-down guidance from previously stored representations. Experiment 2 required participants to detect shapes which are recognized via bottom-up integration of local (collinear) Gabor elements and was performed to control for specificity of rOFA's implication in holistic detection. In Experiment 1, TMS over rOFA and rLO impaired detection of all stimulus categories, with no category-specific effect. In Experiment 2, shape detection was impaired when TMS was applied over rLO but not over rOFA. Our results demonstrate that rOFA is causally implicated in the type of top-down holistic detection required by Mooney stimuli and that such role is not face-selective. In contrast, rOFA does not appear to play a causal role in detection of shapes based on bottom-up integration of local components, demonstrating that its involvement in processing non-face stimuli is specific for holistic processing. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  8. Voice-associated static face image releases speech from informational masking.

    Science.gov (United States)

    Gao, Yayue; Cao, Shuyang; Qu, Tianshu; Wu, Xihong; Li, Haifeng; Zhang, Jinsheng; Li, Liang

    2014-06-01

    In noisy, multipeople talking environments such as a cocktail party, listeners can use various perceptual and/or cognitive cues to improve recognition of target speech against masking, particularly informational masking. Previous studies have shown that temporally prepresented voice cues (voice primes) improve recognition of target speech against speech masking but not noise masking. This study investigated whether static face image primes that have become target-voice associated (i.e., facial images linked through associative learning with voices reciting the target speech) can be used by listeners to unmask speech. The results showed that in 32 normal-hearing younger adults, temporally prepresenting a voice-priming sentence with the same voice reciting the target sentence significantly improved the recognition of target speech that was masked by irrelevant two-talker speech. When a person's face photograph image became associated with the voice reciting the target speech by learning, temporally prepresenting the target-voice-associated face image significantly improved recognition of target speech against speech masking, particularly for the last two keywords in the target sentence. Moreover, speech-recognition performance under the voice-priming condition was significantly correlated to that under the face-priming condition. The results suggest that learned facial information on talker identity plays an important role in identifying the target-talker's voice and facilitating selective attention to the target-speech stream against the masking-speech stream. © 2014 The Institute of Psychology, Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  9. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  10. A Research on Fast Face Feature Points Detection on Smart Mobile Devices

    Directory of Open Access Journals (Sweden)

    Xiaohe Li

    2018-01-01

    Full Text Available We explore how to leverage the performance of face feature points detection on mobile terminals from 3 aspects. First, we optimize the models used in SDM algorithms via PCA and Spectrum Clustering. Second, we propose an evaluation criterion using Linear Discriminative Analysis to choose the best local feature descriptions which plays a critical role in feature points detection. Third, we take advantage of multicore architecture of mobile terminal and parallelize the optimized SDM algorithm to improve the efficiency further. The experiment observations show that our final accomplished GPC-SDM (improved Supervised Descent Method using spectrum clustering, PCA, and GPU acceleration suppresses the memory usage, which is beneficial and efficient to meet the real-time requirements.

  11. Individual differences and the effect of face configuration information in the McGurk effect.

    Science.gov (United States)

    Ujiie, Yuta; Asai, Tomohisa; Wakabayashi, Akio

    2018-04-01

    The McGurk effect, which denotes the influence of visual information on audiovisual speech perception, is less frequently observed in individuals with autism spectrum disorder (ASD) compared to those without it; the reason for this remains unclear. Several studies have suggested that facial configuration context might play a role in this difference. More specifically, people with ASD show a local processing bias for faces-that is, they process global face information to a lesser extent. This study examined the role of facial configuration context in the McGurk effect in 46 healthy students. Adopting an analogue approach using the Autism-Spectrum Quotient (AQ), we sought to determine whether this facial configuration context is crucial to previously observed reductions in the McGurk effect in people with ASD. Lip-reading and audiovisual syllable identification tasks were assessed via presentation of upright normal, inverted normal, upright Thatcher-type, and inverted Thatcher-type faces. When the Thatcher-type face was presented, perceivers were found to be sensitive to the misoriented facial characteristics, causing them to perceive a weaker McGurk effect than when the normal face was presented (this is known as the McThatcher effect). Additionally, the McGurk effect was weaker in individuals with high AQ scores than in those with low AQ scores in the incongruent audiovisual condition, regardless of their ability to read lips or process facial configuration contexts. Our findings, therefore, do not support the assumption that individuals with ASD show a weaker McGurk effect due to a difficulty in processing facial configuration context.

  12. The Challenges Faced by Informal Traders in Greater Letaba Municipality in Limpopo Province, South Africa

    Directory of Open Access Journals (Sweden)

    Kole Legodi

    2015-12-01

    Full Text Available Informal trade has grown at an alarming rate in South Africa because of lack of employment opportunities in both the private and public sectors. This has resulted in many unemployed members of the population joining the informal business sector. The majority of people in this sector do not have skills that are needed in the formal employment sector, others are semi-literate and a small percentage has some level of qualification. Nevertheless, this sector is plagued by a number of challenges which this article presents.  The article reports on the study that was conducted at Greater Letaba Municipality in Limpopo Province. The aim of the study was to investigate the challenges that were faced by informal traders in Greater Letaba Municipality in Limpopo Province in South Africa. The area was chosen because of its accessibility to the researchers and its potential to provide relevant and accurate information for the research project. Thus, a qualitative research method was used to collect data through face to face interviews. The research discovered that some of the challenges experienced by the informal traders in the area ranged from lack of support from the local municipality to structural challenges like lack of ablution facilities and limited access to electricity. Furthermore, other challenges concerned safety and health issues that were also gender based. Most of the traders in the area were women; an element which attest to the fact that it is difficult to find employment in the country when one is less educated and is also a woman.

  13. An efficient and cost effective FPGA based implementation of the Viola-Jones face detection algorithm

    Directory of Open Access Journals (Sweden)

    Peter Irgens

    2017-04-01

    Full Text Available We present an field programmable gate arrays (FPGA based implementation of the popular Viola-Jones face detection algorithm, which is an essential building block in many applications such as video surveillance and tracking. Our implementation is a complete system level hardware design described in a hardware description language and validated on the affordable DE2-115 evaluation board. Our primary objective is to study the achievable performance with a low-end FPGA chip based implementation. In addition, we release to the public domain the entire project. We hope that this will enable other researchers to easily replicate and compare their results to ours and that it will encourage and facilitate further research and educational ideas in the areas of image processing, computer vision, and advanced digital design and FPGA prototyping.

  14. Improved cyberbullying detection using gender information

    NARCIS (Netherlands)

    Dadvar, M.; de Jong, F.M.G.; Ordelman, R.; Trieschnigg, D.

    2012-01-01

    As a result of the invention of social networks, friendships, relationships and social communication are all undergoing changes and new definitions seem to be applicable. One may have hundreds of ‘friends’ without even seeing their faces. Meanwhile, alongside this transition there is increasing

  15. Sentence Level Information Patterns for Novelty Detection

    National Research Council Canada - National Science Library

    Li, Xiaoyan

    2006-01-01

    .... Given a user's information need, some information patterns in sentences such as combinations of query words, sentence lengths, named entities and phrases, and other sentence patterns, may contain...

  16. Audio-Visual Speech Recognition Using Lip Information Extracted from Side-Face Images

    Directory of Open Access Journals (Sweden)

    Koji Iwano

    2007-03-01

    Full Text Available This paper proposes an audio-visual speech recognition method using lip information extracted from side-face images as an attempt to increase noise robustness in mobile environments. Our proposed method assumes that lip images can be captured using a small camera installed in a handset. Two different kinds of lip features, lip-contour geometric features and lip-motion velocity features, are used individually or jointly, in combination with audio features. Phoneme HMMs modeling the audio and visual features are built based on the multistream HMM technique. Experiments conducted using Japanese connected digit speech contaminated with white noise in various SNR conditions show effectiveness of the proposed method. Recognition accuracy is improved by using the visual information in all SNR conditions. These visual features were confirmed to be effective even when the audio HMM was adapted to noise by the MLLR method.

  17. Learning weighted sparse representation of encoded facial normal information for expression-robust 3D face recognition

    KAUST Repository

    Li, Huibin; Di, Huang; Morvan, Jean-Marie; Chen, Liming

    2011-01-01

    This paper proposes a novel approach for 3D face recognition by learning weighted sparse representation of encoded facial normal information. To comprehensively describe 3D facial surface, three components, in X, Y, and Z-plane respectively

  18. A comparison of face to face and group education on informed choice and decisional conflict of pregnant women about screening tests of fetal abnormalities

    Science.gov (United States)

    Kordi, Masoumeh; Riyazi, Sahar; Lotfalizade, Marziyeh; Shakeri, Mohammad Taghi; Suny, Hoseyn Jafari

    2018-01-01

    BACKGROUND AND GOAL: Screening of fetal anomalies is assumed as a necessary measurement in antenatal cares. The screening plans aim at empowerment of individuals to make the informed choice. This study was conducted in order to compare the effect of group and face-to-face education and decisional conflicts among the pregnant females regarding screening of fetal abnormalities. METHODS: This study of the clinical trial was carried out on 240 pregnant women at education course were held in two weekly sessions for intervention groups during two consecutive weeks, and the usual care was conducted for the control group. The rate of informed choice and decisional conflict was measured in pregnant women before education and also at weeks 20–22 of pregnancy in three groups. The data analysis was executed using SPSS statistical software (version 16), and statistical tests were implemented including Chi-square test, Kruskal–Wallis test, Wilcoxon test, Mann–Whitney U-test, one-way analysis of variance test, and Tukey's range test. The P education group, 64 members (80%) in group education class, and 20 persons (25%) in control group had the informed choice regarding screening tests, but there was no statistically significant difference between two individual and group education classes. Similarly, during the postintervention phase, there was a statistically significant difference in mean score of decisional conflict scale among pregnant women regarding screening tests in three groups (P = 0.001). DISCUSSION AND CONCLUSION: With respect to effectiveness of group and face-to-face education methods in increasing the informed choice and reduced decisional conflict in pregnant women regarding screening tests, each of these education methods may be employed according to the clinical environment conditions and requirement to encourage the women for conducting the screening tests. PMID:29417066

  19. The Role of Spatial Frequency Information in Face Classification by Race

    OpenAIRE

    Zhang, Guoping; Wang, Zeyao; Wu, Jie; Zhao, Lun

    2017-01-01

    It was found that face classification by race is more quickly for other-race than own-race faces (other-race classification advantage, ORCA). Controlling the spatial frequencies of face images, the current study investigated the perceptual processing differences based on spatial frequencies between own-race and other-race faces that might account for the ORCA. Regardless of the races of the observers, the own-race faces were classified faster and more accurately for broad-band faces than for ...

  20. Mediamorphosis and misinformation in the infosphere: media, digital and information literacy face of changes in information consumption habits

    Directory of Open Access Journals (Sweden)

    Juan Ignacio AGUADED

    2015-04-01

    Full Text Available From a theoretical reflection, this work is evidence that the current communicational and digital ecosystem is endogenous and systemically misinformative, as it has gradually become an information overload and infoxicative scenario, traversed by a dynamic of mediamorphosis, in which traditional media are looking to compete for the preference of the audience facing the multiplicity of digital platforms in the way of their economic subsistence, usually spreading pseudo-contents with limbic great value, but lacking useful in the process of decision making. Consequently, this paper analyzes the above problems by reviewing various multidisciplinary academic contributions to later refer those from within the theories of media, digital and information literacy contribute recommendations and pragmatic schemes to cope with the situation. The work focuses on media-digital society in the context of media convergence and multiple screens, outlining the social changes that are currently embedded audiences. Obtained results showed the need to adapt an “infodiet” or media ecology from the user’s perspective, alternating moments of disconnection, without deserting the efforts that Educommunication and communication policy could contribute in social transformation, in order promote educational, cultural and informative content from the perspective of pluralism, citizen participation and pragmatic reconstruction towards public service media.

  1. Detecting superior face recognition skills in a large sample of young British adults

    Directory of Open Access Journals (Sweden)

    Anna Katarzyna Bobak

    2016-09-01

    Full Text Available The Cambridge Face Memory Test Long Form (CFMT+ and Cambridge Face Perception Test (CFPT are typically used to assess the face processing ability of individuals who believe they have superior face recognition skills. Previous large-scale studies have presented norms for the CFPT but not the CFMT+. However, previous research has also highlighted the necessity for establishing country-specific norms for these tests, indicating that norming data is required for both tests using young British adults. The current study addressed this issue in 254 British participants. In addition to providing the first norm for performance on the CFMT+ in any large sample, we also report the first UK specific cut-off for superior face recognition on the CFPT. Further analyses identified a small advantage for females on both tests, and only small associations between objective face recognition skills and self-report measures. A secondary aim of the study was to examine the relationship between trait or social anxiety and face processing ability, and no associations were noted. The implications of these findings for the classification of super-recognisers are discussed.

  2. Camouflage target detection via hyperspectral imaging plus information divergence measurement

    Science.gov (United States)

    Chen, Yuheng; Chen, Xinhua; Zhou, Jiankang; Ji, Yiqun; Shen, Weimin

    2016-01-01

    Target detection is one of most important applications in remote sensing. Nowadays accurate camouflage target distinction is often resorted to spectral imaging technique due to its high-resolution spectral/spatial information acquisition ability as well as plenty of data processing methods. In this paper, hyper-spectral imaging technique together with spectral information divergence measure method is used to solve camouflage target detection problem. A self-developed visual-band hyper-spectral imaging device is adopted to collect data cubes of certain experimental scene before spectral information divergences are worked out so as to discriminate target camouflage and anomaly. Full-band information divergences are measured to evaluate target detection effect visually and quantitatively. Information divergence measurement is proved to be a low-cost and effective tool for target detection task and can be further developed to other target detection applications beyond spectral imaging technique.

  3. Auditor detected misstatements and the effect of information technology

    OpenAIRE

    Austen, Lizabeth A.; Eilifsen, Aasmund; Messier, William F.

    2003-01-01

    This paper presents information on the causes and detection of misstatements by auditors and the relationship of those misstatements with information technology (IT). The last major study of misstatements and IT used data that was gathered in 1988. In the intervening period, there have been significant changes in IT, possibly altering the error generation and detection process. Two research questions related to detected misstatements and the effect of IT are examined. The six largest public a...

  4. 'Intimate mothering publics': comparing face-to-face support groups and Internet use for women seeking information and advice in the transition to first-time motherhood.

    Science.gov (United States)

    Johnson, Sophia Alice

    2015-01-01

    This paper seeks to contribute to an understanding of the changing nature of support and information-seeking practices for women in the transition to first-time motherhood. In the context of increasing digitalisation, the significance of new virtual spaces for parenting is discussed. The paper demonstrates how women seek out alternative forms of expertise (specifically, non-medical expertise) and social support. The author argues for the importance of 'intimate mothering publics' through which women gather experiential information and practical support. These publics can act as a space for women to 'test' or legitimise their new identity as a mother. Intimate mothering publics are particularly useful for thinking about the meaning-making practices and learning experiences that occur during intimate online and face-to-face interactions. A variety of types of online support may be used during pregnancy. Surreptitious support in particular involves users invisibly receiving advice, information and reassurance that might otherwise be lacking. Access to intimate mothering publics is motivated by a number of factors, including feelings of community or acceptance, the desire to be a good mother or parent, emotional support and the need for practical and experiential advice.

  5. Signal Detection Theory-Based Information Processing for the Detection of Breast Cancer at Microwave Frequencies

    National Research Council Canada - National Science Library

    Nolte, Loren

    2002-01-01

    The hypothesis is that one can use signal detection theory to improve the performance in detecting tumors in the breast by using this theory to develop task-oriented information processing techniques...

  6. Combining Deep and Handcrafted Image Features for Presentation Attack Detection in Face Recognition Systems Using Visible-Light Camera Sensors

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-02-01

    Full Text Available Although face recognition systems have wide application, they are vulnerable to presentation attack samples (fake samples. Therefore, a presentation attack detection (PAD method is required to enhance the security level of face recognition systems. Most of the previously proposed PAD methods for face recognition systems have focused on using handcrafted image features, which are designed by expert knowledge of designers, such as Gabor filter, local binary pattern (LBP, local ternary pattern (LTP, and histogram of oriented gradients (HOG. As a result, the extracted features reflect limited aspects of the problem, yielding a detection accuracy that is low and varies with the characteristics of presentation attack face images. The deep learning method has been developed in the computer vision research community, which is proven to be suitable for automatically training a feature extractor that can be used to enhance the ability of handcrafted features. To overcome the limitations of previously proposed PAD methods, we propose a new PAD method that uses a combination of deep and handcrafted features extracted from the images by visible-light camera sensor. Our proposed method uses the convolutional neural network (CNN method to extract deep image features and the multi-level local binary pattern (MLBP method to extract skin detail features from face images to discriminate the real and presentation attack face images. By combining the two types of image features, we form a new type of image features, called hybrid features, which has stronger discrimination ability than single image features. Finally, we use the support vector machine (SVM method to classify the image features into real or presentation attack class. Our experimental results indicate that our proposed method outperforms previous PAD methods by yielding the smallest error rates on the same image databases.

  7. Combining Deep and Handcrafted Image Features for Presentation Attack Detection in Face Recognition Systems Using Visible-Light Camera Sensors.

    Science.gov (United States)

    Nguyen, Dat Tien; Pham, Tuyen Danh; Baek, Na Rae; Park, Kang Ryoung

    2018-02-26

    Although face recognition systems have wide application, they are vulnerable to presentation attack samples (fake samples). Therefore, a presentation attack detection (PAD) method is required to enhance the security level of face recognition systems. Most of the previously proposed PAD methods for face recognition systems have focused on using handcrafted image features, which are designed by expert knowledge of designers, such as Gabor filter, local binary pattern (LBP), local ternary pattern (LTP), and histogram of oriented gradients (HOG). As a result, the extracted features reflect limited aspects of the problem, yielding a detection accuracy that is low and varies with the characteristics of presentation attack face images. The deep learning method has been developed in the computer vision research community, which is proven to be suitable for automatically training a feature extractor that can be used to enhance the ability of handcrafted features. To overcome the limitations of previously proposed PAD methods, we propose a new PAD method that uses a combination of deep and handcrafted features extracted from the images by visible-light camera sensor. Our proposed method uses the convolutional neural network (CNN) method to extract deep image features and the multi-level local binary pattern (MLBP) method to extract skin detail features from face images to discriminate the real and presentation attack face images. By combining the two types of image features, we form a new type of image features, called hybrid features, which has stronger discrimination ability than single image features. Finally, we use the support vector machine (SVM) method to classify the image features into real or presentation attack class. Our experimental results indicate that our proposed method outperforms previous PAD methods by yielding the smallest error rates on the same image databases.

  8. Combining Deep and Handcrafted Image Features for Presentation Attack Detection in Face Recognition Systems Using Visible-Light Camera Sensors

    Science.gov (United States)

    Nguyen, Dat Tien; Pham, Tuyen Danh; Baek, Na Rae; Park, Kang Ryoung

    2018-01-01

    Although face recognition systems have wide application, they are vulnerable to presentation attack samples (fake samples). Therefore, a presentation attack detection (PAD) method is required to enhance the security level of face recognition systems. Most of the previously proposed PAD methods for face recognition systems have focused on using handcrafted image features, which are designed by expert knowledge of designers, such as Gabor filter, local binary pattern (LBP), local ternary pattern (LTP), and histogram of oriented gradients (HOG). As a result, the extracted features reflect limited aspects of the problem, yielding a detection accuracy that is low and varies with the characteristics of presentation attack face images. The deep learning method has been developed in the computer vision research community, which is proven to be suitable for automatically training a feature extractor that can be used to enhance the ability of handcrafted features. To overcome the limitations of previously proposed PAD methods, we propose a new PAD method that uses a combination of deep and handcrafted features extracted from the images by visible-light camera sensor. Our proposed method uses the convolutional neural network (CNN) method to extract deep image features and the multi-level local binary pattern (MLBP) method to extract skin detail features from face images to discriminate the real and presentation attack face images. By combining the two types of image features, we form a new type of image features, called hybrid features, which has stronger discrimination ability than single image features. Finally, we use the support vector machine (SVM) method to classify the image features into real or presentation attack class. Our experimental results indicate that our proposed method outperforms previous PAD methods by yielding the smallest error rates on the same image databases. PMID:29495417

  9. Visual scanning and recognition of Chinese, Caucasian, and racially ambiguous faces: Contributions from bottom-up facial physiognomic information and top-down knowledge of racial categories

    Science.gov (United States)

    Wang, Qiandong; Xiao, Naiqi G.; Quinn, Paul C.; Hu, Chao S.; Qian, Miao; Fu, Genyue; Lee, Kang

    2014-01-01

    Recent studies have shown that participants use different eye movement strategies when scanning own- and other-race faces. However, it is unclear (1) whether this effect is related to face recognition performance, and (2) to what extent this effect is influenced by top-down or bottom-up facial information. In the present study, Chinese participants performed a face recognition task with Chinese faces, Caucasian faces, and racially ambiguous morphed face stimuli. For the racially ambiguous faces, we led participants to believe that they were viewing either own-race Chinese faces or other-race Caucasian faces. Results showed that (1) Chinese participants scanned the nose of the true Chinese faces more than that of the true Caucasian faces, whereas they scanned the eyes of the Caucasian faces more than those of the Chinese faces; (2) they scanned the eyes, nose, and mouth equally for the ambiguous faces in the Chinese condition compared with those in the Caucasian condition; (3) when recognizing the true Chinese target faces, but not the true target Caucasian faces, the greater the fixation proportion on the nose, the faster the participants correctly recognized these faces. The same was true when racially ambiguous face stimuli were thought to be Chinese faces. These results provide the first evidence to show that (1) visual scanning patterns of faces are related to own-race face recognition response time, and (2) it is bottom-up facial physiognomic information of racial categories that mainly contributes to face scanning. However, top-down knowledge of racial categories can influence the relationship between face scanning patterns and recognition response time. PMID:25497461

  10. Face Detection for Augmented Reality Application Using Boosting-based Techniques

    Directory of Open Access Journals (Sweden)

    Youssef Hbali

    2016-12-01

    Full Text Available Augmented reality has gained an increasing research interest over the few last years. Customers requirements have become more intense and more demanding, the need of the different industries to re-adapt their products and enhance them by recent advances in the computer vision and more intelligence has become a necessary. In this work we present a marker-less augmented reality application that can be used and expanded in the e-commerce industry. We take benefit of the well known boosting techniques to train and evaluate different face detectors using the multi-block local binary features. The work purpose is to select the more relevant training parameters in order to maximize the classification accuracy. Using the resulted face detector, the position of the face will serve as a marker in the proposed augmented reality.

  11. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  12. Head Pose Estimation on Top of Haar-Like Face Detection: A Study Using the Kinect Sensor

    Directory of Open Access Journals (Sweden)

    Anwar Saeed

    2015-08-01

    Full Text Available Head pose estimation is a crucial initial task for human face analysis, which is employed in several computer vision systems, such as: facial expression recognition, head gesture recognition, yawn detection, etc. In this work, we propose a frame-based approach to estimate the head pose on top of the Viola and Jones (VJ Haar-like face detector. Several appearance and depth-based feature types are employed for the pose estimation, where comparisons between them in terms of accuracy and speed are presented. It is clearly shown through this work that using the depth data, we improve the accuracy of the head pose estimation. Additionally, we can spot positive detections, faces in profile views detected by the frontal model, that are wrongly cropped due to background disturbances. We introduce a new depth-based feature descriptor that provides competitive estimation results with a lower computation time. Evaluation on a benchmark Kinect database shows that the histogram of oriented gradients and the developed depth-based features are more distinctive for the head pose estimation, where they compare favorably to the current state-of-the-art approaches. Using a concatenation of the aforementioned feature types, we achieved a head pose estimation with average errors not exceeding 5:1; 4:6; 4:2 for pitch, yaw and roll angles, respectively.

  13. Transient electromagnetic detecting technique for water hazard to the roof of fully mechanized sub-level caving face

    Energy Technology Data Exchange (ETDEWEB)

    Yu Jing-cun; Liu Zhi-xin; Tang Jin-yun; Wang Yang-zhou [China University of Mining & Technology, Xuzhou (China). School of Resources and Geoscience Science

    2007-07-01

    In coal mining, with the popularization of fully mechanized equipment, the roof control becomes more and more important. The development of water body in roofs may seriously affect the efficiency of the fully mechanized mining, quite possible to cause an accident in working face. Therefore, to make clear the position of a water body located in roofs so as to provide a basis for water drainage borehole layout is an urgent problem to be solved by geophysical exploration. Based on the transient electromagnetic theory and the technique used on ground surface and on the actual situation in underground coal mines, a square superimposed loop device (2 m in side length) which is non-contact and multi-turns was developed to detect the water bodies in coal seam roofs. Based on the 'smoke ring effect' theory and the physical simulation criterion, the mathematical model for calculating the apparent resistivity of full space transient electromagnetism is deduced. In addition, the water detection technology for the roof of fully mechanized sub-level caving face was researched and applied in several coal mines, which has been verified by boreholes and mining practice, indicating that this method is very effective in detecting the water source in the roof of fully mechanized sub-level caving face. 11 refs., 5 figs.

  14. Fine-grained Emotion Role Detection Based on Retweet Information

    OpenAIRE

    Yu, Zhiwen; Chen, Liming; Guo, Bin; Ma, Chao; Yi, Fei; Wang, Zhu

    2018-01-01

    User behaviors in online social networks convey not only literal information but also one’s emotion attitudes towards the information. To compute this attitude, we define the concept of emotion role as the concentrated reflection of a user’s online emotional characteristics. Emotion role detection aims to better understand the structure and sentiments of online social networks and support further analysis, e.g., revealing public opinions, providing personalized recommendations, and detecting ...

  15. Filtering, control and fault detection with randomly occurring incomplete information

    CERN Document Server

    Dong, Hongli; Gao, Huijun

    2013-01-01

    This book investigates the filtering, control and fault detection problems for several classes of nonlinear systems with randomly occurring incomplete information. It proposes new concepts, including RVNs, ROMDs, ROMTCDs, and ROQEs. The incomplete information under consideration primarily includes missing measurements, time-delays, sensor and actuator saturations, quantization effects and time-varying nonlinearities. The first part of this book focuses on the filtering, control and fault detection problems for several classes of nonlinear stochastic discrete-time systems and

  16. Visual scanning and recognition of Chinese, Caucasian, and racially ambiguous faces: contributions from bottom-up facial physiognomic information and top-down knowledge of racial categories.

    Science.gov (United States)

    Wang, Qiandong; Xiao, Naiqi G; Quinn, Paul C; Hu, Chao S; Qian, Miao; Fu, Genyue; Lee, Kang

    2015-02-01

    Recent studies have shown that participants use different eye movement strategies when scanning own- and other-race faces. However, it is unclear (1) whether this effect is related to face recognition performance, and (2) to what extent this effect is influenced by top-down or bottom-up facial information. In the present study, Chinese participants performed a face recognition task with Chinese, Caucasian, and racially ambiguous faces. For the racially ambiguous faces, we led participants to believe that they were viewing either own-race Chinese faces or other-race Caucasian faces. Results showed that (1) Chinese participants scanned the nose of the true Chinese faces more than that of the true Caucasian faces, whereas they scanned the eyes of the Caucasian faces more than those of the Chinese faces; (2) they scanned the eyes, nose, and mouth equally for the ambiguous faces in the Chinese condition compared with those in the Caucasian condition; (3) when recognizing the true Chinese target faces, but not the true target Caucasian faces, the greater the fixation proportion on the nose, the faster the participants correctly recognized these faces. The same was true when racially ambiguous face stimuli were thought to be Chinese faces. These results provide the first evidence to show that (1) visual scanning patterns of faces are related to own-race face recognition response time, and (2) it is bottom-up facial physiognomic information that mainly contributes to face scanning. However, top-down knowledge of racial categories can influence the relationship between face scanning patterns and recognition response time. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Birthplace choices: what are the information needs of women when choosing where to give birth in England? A qualitative study using online and face to face focus groups.

    Science.gov (United States)

    Hinton, Lisa; Dumelow, Carol; Rowe, Rachel; Hollowell, Jennifer

    2018-01-08

    Current clinical guidelines and national policy in England support offering 'low risk' women a choice of birth setting. Options include: home, free-standing midwifery unit (FMU), alongside midwifery unit (AMU) or obstetric unit (OU). This study, which is part of a broader project designed to inform policy on 'choice' in relation to childbirth, aimed to provide evidence on UK women's experiences of choice and decision-making in the period since the publication of the Birthplace findings (2011) and new NICE guidelines (2014). This paper reports on findings relating to women's information needs when making decisions about where to give birth. A qualitative focus group study including 69 women in the last trimester of pregnancy in England in 2015-16. Seven focus groups were conducted online via a bespoke web portal, and one was face-to-face. To explore different aspects of women's experience, each group included women with specific characteristics or options; planning a home birth, living in areas with lots of choice, living in areas with limited choice, first time mothers, living close to a FMU, living in opt-out AMU areas, living in socioeconomically disadvantaged areas and planning to give birth in an OU. Focus group transcripts were analysed thematically. Women drew on multiple sources when making choices about where to give birth. Sources included; the Internet, friends' recommendations and experiences, antenatal classes and their own personal experiences. Their midwife was not the main source of information. Women wanted the option to discuss and consider their birth preferences throughout their pregnancy, not at a fixed point. Birthplace choice is informed by many factors. Women may encounter fewer overt obstacles to exercising choice than in the past, but women do not consistently receive information about birthplace options from their midwife at a time and in a manner that they find helpful. Introducing options early in pregnancy, but deferring decision

  18. Start Position Strongly Influences Fixation Patterns during Face Processing: Difficulties with Eye Movements as a Measure of Information Use

    Science.gov (United States)

    Arizpe, Joseph; Kravitz, Dwight J.; Yovel, Galit; Baker, Chris I.

    2012-01-01

    Fixation patterns are thought to reflect cognitive processing and, thus, index the most informative stimulus features for task performance. During face recognition, initial fixations to the center of the nose have been taken to indicate this location is optimal for information extraction. However, the use of fixations as a marker for information use rests on the assumption that fixation patterns are predominantly determined by stimulus and task, despite the fact that fixations are also influenced by visuo-motor factors. Here, we tested the effect of starting position on fixation patterns during a face recognition task with upright and inverted faces. While we observed differences in fixations between upright and inverted faces, likely reflecting differences in cognitive processing, there was also a strong effect of start position. Over the first five saccades, fixation patterns across start positions were only coarsely similar, with most fixations around the eyes. Importantly, however, the precise fixation pattern was highly dependent on start position with a strong tendency toward facial features furthest from the start position. For example, the often-reported tendency toward the left over right eye was reversed for the left starting position. Further, delayed initial saccades for central versus peripheral start positions suggest greater information processing prior to the initial saccade, highlighting the experimental bias introduced by the commonly used center start position. Finally, the precise effect of face inversion on fixation patterns was also dependent on start position. These results demonstrate the importance of a non-stimulus, non-task factor in determining fixation patterns. The patterns observed likely reflect a complex combination of visuo-motor effects and simple sampling strategies as well as cognitive factors. These different factors are very difficult to tease apart and therefore great caution must be applied when interpreting absolute

  19. 3D Face Model Dataset: Automatic Detection of Facial Expressions and Emotions for Educational Environments

    Science.gov (United States)

    Chickerur, Satyadhyan; Joshi, Kartik

    2015-01-01

    Emotion detection using facial images is a technique that researchers have been using for the last two decades to try to analyze a person's emotional state given his/her image. Detection of various kinds of emotion using facial expressions of students in educational environment is useful in providing insight into the effectiveness of tutoring…

  20. Evaluation of a processing scheme for calcified atheromatous carotid artery detection in face/neck CBCT images

    Science.gov (United States)

    Matheus, B. R. N.; Centurion, B. S.; Rubira-Bullen, I. R. F.; Schiabel, H.

    2017-03-01

    Cone Beam Computed Tomography (CBCT), a kind of face and neck exams can be opportunity to identify, as an incidental finding, calcifications of the carotid artery (CACA). Given the similarity of the CACA with calcification found in several x-ray exams, this work suggests that a similar technique designed to detect breast calcifications in mammography images could be applied to detect such calcifications in CBCT. The method used a 3D version of the calcification detection technique [1], based on a signal enhancement using a convolution with a 3D Laplacian of Gaussian (LoG) function followed by removing the high contrast bone structure from the image. Initial promising results show a 71% sensitivity with 0.48 false positive per exam.

  1. Learning weighted sparse representation of encoded facial normal information for expression-robust 3D face recognition

    KAUST Repository

    Li, Huibin

    2011-10-01

    This paper proposes a novel approach for 3D face recognition by learning weighted sparse representation of encoded facial normal information. To comprehensively describe 3D facial surface, three components, in X, Y, and Z-plane respectively, of normal vector are encoded locally to their corresponding normal pattern histograms. They are finally fed to a sparse representation classifier enhanced by learning based spatial weights. Experimental results achieved on the FRGC v2.0 database prove that the proposed encoded normal information is much more discriminative than original normal information. Moreover, the patch based weights learned using the FRGC v1.0 and Bosphorus datasets also demonstrate the importance of each facial physical component for 3D face recognition. © 2011 IEEE.

  2. Technological advances for improving adenoma detection rates: The changing face of colonoscopy.

    Science.gov (United States)

    Ishaq, Sauid; Siau, Keith; Harrison, Elizabeth; Tontini, Gian Eugenio; Hoffman, Arthur; Gross, Seth; Kiesslich, Ralf; Neumann, Helmut

    2017-07-01

    Worldwide, colorectal cancer is the third commonest cancer. Over 90% follow an adenoma-to-cancer sequence over many years. Colonoscopy is the gold standard method for cancer screening and early adenoma detection. However, considerable variation exists between endoscopists' detection rates. This review considers the effects of different endoscopic techniques on adenoma detection. Two areas of technological interest were considered: (1) optical technologies and (2) mechanical technologies. Optical solutions, including FICE, NBI, i-SCAN and high definition colonoscopy showed mixed results. In contrast, mechanical advances, such as cap-assisted colonoscopy, FUSE, EndoCuff and G-EYE™, showed promise, with reported detections rates of up to 69%. However, before definitive recommendations can be made for their incorporation into daily practice, further studies and comparison trials are required. Copyright © 2017 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  3. Do patients' faces influence General Practitioners' cancer suspicions? A test of automatic processing of sociodemographic information.

    Directory of Open Access Journals (Sweden)

    Rosalind Adam

    Full Text Available Delayed cancer diagnosis leads to poorer patient outcomes. During short consultations, General Practitioners (GPs make quick decisions about likelihood of cancer. Patients' facial cues are processed rapidly and may influence diagnosis.To investigate whether patients' facial characteristics influence immediate perception of cancer risk by GPs.Web-based binary forced choice experiment with GPs from Northeast Scotland.GPs were presented with a series of pairs of face prototypes and asked to quickly select the patient more likely to have cancer. Faces were modified with respect to age, gender, and ethnicity. Choices were analysed using Chi-squared goodness-of-fit statistics with Bonferroni corrections.Eighty-two GPs participated. GPs were significantly more likely to suspect cancer in older patients. Gender influenced GP cancer suspicion, but this was modified by age: the male face was chosen as more likely to have cancer than the female face for young (72% of GPs;95% CI 61.0-87.0 and middle-aged faces (65.9%; 95% CI 54.7-75.5; but 63.4% (95% CI 52.2-73.3 decided the older female was more likely to have cancer than the older male (p = 0.015. GPs were significantly more likely to suspect cancer in the young Caucasian male (65.9% (95% CI 54.7, 75.5 compared to the young Asian male (p = 0.004.GPs' first impressions about cancer risk are influenced by patient age, gender, and ethnicity. Tackling GP cognitive biases could be a promising way of reducing cancer diagnostic delays, particularly for younger patients.

  4. Incorporating Spatial Information for Microaneurysm Detection in Retinal Images

    Directory of Open Access Journals (Sweden)

    Mohamed M. Habib

    2017-06-01

    Full Text Available The presence of microaneurysms(MAs in retinal images is a pathognomonic sign of Diabetic Retinopathy (DR. This is one of the leading causes of blindness in the working population worldwide. This paper introduces a novel algorithm that combines information from spatial views of the retina for the purpose of MA detection. Most published research in the literature has addressed the problem of detecting MAs from single retinal images. This work proposes the incorporation of information from two spatial views during the detection process. The algorithm is evaluated using 160 images from 40 patients seen as part of a UK diabetic eye screening programme which contained 207 MAs. An improvement in performance compared to detection from an algorithm that relies on a single image is shown as an increase of 2% ROC score, hence demonstrating the potential of this method.

  5. Optimum detection for extracting maximum information from symmetric qubit sets

    International Nuclear Information System (INIS)

    Mizuno, Jun; Fujiwara, Mikio; Sasaki, Masahide; Akiba, Makoto; Kawanishi, Tetsuya; Barnett, Stephen M.

    2002-01-01

    We demonstrate a class of optimum detection strategies for extracting the maximum information from sets of equiprobable real symmetric qubit states of a single photon. These optimum strategies have been predicted by Sasaki et al. [Phys. Rev. A 59, 3325 (1999)]. The peculiar aspect is that the detections with at least three outputs suffice for optimum extraction of information regardless of the number of signal elements. The cases of ternary (or trine), quinary, and septenary polarization signals are studied where a standard von Neumann detection (a projection onto a binary orthogonal basis) fails to access the maximum information. Our experiments demonstrate that it is possible with present technologies to attain about 96% of the theoretical limit

  6. Social Circles Detection from Ego Network and Profile Information

    Science.gov (United States)

    2014-12-19

    way of organizing contacts in personal networks . They are therefore currently implemented in the major social net- working systems, such as Facebook ...0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network ...structural network information but also the contents of social interactions, with the aim to detect copying communities. The views, opinions and/or findings

  7. Experimental Detection of Information Deficit in a Photonic Contextuality Scenario

    Science.gov (United States)

    Zhan, Xiang; Kurzyński, Paweł; Kaszlikowski, Dagomir; Wang, Kunkun; Bian, Zhihao; Zhang, Yongsheng; Xue, Peng

    2017-12-01

    Contextuality is an essential characteristic of quantum theory, and supplies the power for many quantum information processes. Previous tests of contextuality focus mainly on the probability distribution of measurement results. However, a test of contextuality can be formulated in terms of entropic inequalities whose violations imply information deficit in the studied system. This information deficit has not been observed on a single local system. Here we report the first experimental detection of information deficit in an entropic test of quantum contextuality based on photonic setup. The corresponding inequality is violated with more than 13 standard deviations.

  8. Information theoretic analysis of canny edge detection in visual communication

    Science.gov (United States)

    Jiang, Bo; Rahman, Zia-ur

    2011-06-01

    In general edge detection evaluation, the edge detectors are examined, analyzed, and compared either visually or with a metric for specific an application. This analysis is usually independent of the characteristics of the image-gathering, transmission and display processes that do impact the quality of the acquired image and thus, the resulting edge image. We propose a new information theoretic analysis of edge detection that unites the different components of the visual communication channel and assesses edge detection algorithms in an integrated manner based on Shannon's information theory. The edge detection algorithm here is considered to achieve high performance only if the information rate from the scene to the edge approaches the maximum possible. Thus, by setting initial conditions of the visual communication system as constant, different edge detection algorithms could be evaluated. This analysis is normally limited to linear shift-invariant filters so in order to examine the Canny edge operator in our proposed system, we need to estimate its "power spectral density" (PSD). Since the Canny operator is non-linear and shift variant, we perform the estimation for a set of different system environment conditions using simulations. In our paper we will first introduce the PSD of the Canny operator for a range of system parameters. Then, using the estimated PSD, we will assess the Canny operator using information theoretic analysis. The information-theoretic metric is also used to compare the performance of the Canny operator with other edge-detection operators. This also provides a simple tool for selecting appropriate edgedetection algorithms based on system parameters, and for adjusting their parameters to maximize information throughput.

  9. Facing possible illness detected through screening--experiences of healthy women with pathological cervical smears

    DEFF Research Database (Denmark)

    Hounsgaard, Lise; Petersen, Lone Kjeld; Pedersen, Birthe D

    2007-01-01

    The aim of this study is to gain knowledge about women's perceptions of illness based on their abnormal PAP smears, following screening for cervical cancer. The study uses a phenomenological, hermeneutic approach inspired by Ricoeur's theory of interpretation. Twelve women, aged between 23 and 59...... of a face-value review of participant experiences (naive reading), structural analysis and, critical interpretation of what it means to be potentially ill. The women were unprepared to find that their screening results showed abnormal cells, indicative of incipient genital cancer. They were frustrated...... by the results as they had not experienced any symptoms and felt well, despite being diagnosed with a potential disease. Being diagnosed with abnormal cells caused the participants to feel anxious. Their anxiety had subsided 6 months after the cells had been removed. For those who did not require treatment...

  10. Enhancing community detection by using local structural information

    International Nuclear Information System (INIS)

    Xiang, Ju; Bao, Mei-Hua; Tang, Liang; Li, Jian-Ming; Hu, Ke; Chen, Benyan; Hu, Jing-Bo; Zhang, Yan; Tang, Yan-Ni; Gao, Yuan-Yuan

    2016-01-01

    Many real-world networks, such as gene networks, protein–protein interaction networks and metabolic networks, exhibit community structures, meaning the existence of groups of densely connected vertices in the networks. Many local similarity measures in the networks are closely related to the concept of the community structures, and may have a positive effect on community detection in the networks. Here, various local similarity measures are used to extract local structural information, which is then applied to community detection in the networks by using the edge-reweighting strategy. The effect of the local similarity measures on community detection is carefully investigated and compared in various networks. The experimental results show that the local similarity measures are crucial for the improvement of community detection methods, while the positive effect of the local similarity measures is closely related to the networks under study and applied community detection methods. (paper: interdisciplinary statistical mechanics)

  11. A Moving Object Detection Algorithm Based on Color Information

    International Nuclear Information System (INIS)

    Fang, X H; Xiong, W; Hu, B J; Wang, L T

    2006-01-01

    This paper designed a new algorithm of moving object detection for the aim of quick moving object detection and orientation, which used a pixel and its neighbors as an image vector to represent that pixel and modeled different chrominance component pixel as a mixture of Gaussians, and set up different mixture model of Gauss for different YUV chrominance components. In order to make full use of the spatial information, color segmentation and background model were combined. Simulation results show that the algorithm can detect intact moving objects even when the foreground has low contrast with background

  12. Baseline Face Detection, Head Pose Estimation, and Coarse Direction Detection for Facial Data in the SHRP2 Naturalistic Driving Study

    Energy Technology Data Exchange (ETDEWEB)

    Paone, Jeffrey R [ORNL; Bolme, David S [ORNL; Ferrell, Regina Kay [ORNL; Aykac, Deniz [ORNL; Karnowski, Thomas Paul [ORNL

    2015-01-01

    Keeping a driver focused on the road is one of the most critical steps in insuring the safe operation of a vehicle. The Strategic Highway Research Program 2 (SHRP2) has over 3,100 recorded videos of volunteer drivers during a period of 2 years. This extensive naturalistic driving study (NDS) contains over one million hours of video and associated data that could aid safety researchers in understanding where the driver s attention is focused. Manual analysis of this data is infeasible, therefore efforts are underway to develop automated feature extraction algorithms to process and characterize the data. The real-world nature, volume, and acquisition conditions are unmatched in the transportation community, but there are also challenges because the data has relatively low resolution, high compression rates, and differing illumination conditions. A smaller dataset, the head pose validation study, is available which used the same recording equipment as SHRP2 but is more easily accessible with less privacy constraints. In this work we report initial head pose accuracy using commercial and open source face pose estimation algorithms on the head pose validation data set.

  13. Redox cycling with facing interdigitated array electrodes as a method for selective detection of redox species

    NARCIS (Netherlands)

    Dam, T.V.A.; Olthuis, Wouter; van den Berg, Albert

    2007-01-01

    A pair of interdigitated ultramicroelectrodes (UMEs) is used to electrochemically detect a weak reductor ( dopamine) in the presence of a stronger one (K-4[ Fe(CN)(6)]). In the mixture of both reductors, one of the two interdigitated electrodes ( the generator electrode) is used to oxidize both

  14. Redox cycling with facing interdigitated array electrodes as a method for selective detection of redox species

    NARCIS (Netherlands)

    Dam, V.A.T.; Olthuis, W.; Berg, van den A.

    2007-01-01

    A pair of interdigitated ultramicroelectrodes (UMEs) is used to electrochemically detect a weak reductor (dopamine) in the presence of a stronger one (K4[Fe(CN)6]). In the mixture of both reductors, one of the two interdigitated electrodes (the generator electrode) is used to oxidize both species at

  15. Feasibility evaluation of a motion detection system with face images for stereotactic radiosurgery.

    Science.gov (United States)

    Yamakawa, Takuya; Ogawa, Koichi; Iyatomi, Hitoshi; Kunieda, Etsuo

    2011-01-01

    In stereotactic radiosurgery we can irradiate a targeted volume precisely with a narrow high-energy x-ray beam, and thus the motion of a targeted area may cause side effects to normal organs. This paper describes our motion detection system with three USB cameras. To reduce the effect of change in illuminance in a tracking area we used an infrared light and USB cameras that were sensitive to the infrared light. The motion detection of a patient was performed by tracking his/her ears and nose with three USB cameras, where pattern matching between a predefined template image for each view and acquired images was done by an exhaustive search method with a general-purpose computing on a graphics processing unit (GPGPU). The results of the experiments showed that the measurement accuracy of our system was less than 0.7 mm, amounting to less than half of that of our previous system.

  16. The building of strategic information service in nuclear field facing to decision making

    International Nuclear Information System (INIS)

    Wang Yong; Xue Enjie; Yuan Huibin

    2010-01-01

    Objective: To study the structure of strategic information service system in nuclear field for decision making supporting. Methods: Investigating and studying the strategic information systems at different levels-domestic and overseas, regional and national, governmental and industrial as well as information departmental, putting forward the envisioning of strategic information service system in nuclear field. Results: The system is consisted of three parts: data part, data operating part using IT technology and service function part. The system can produce varied information outputs automatically based on rich information resources and IT technology under mathematical models. The information workers can analyze and study special strategic information needed based on this system. Conclusions: The envisioning for the system structure is feasible and it can be realized at present technology level. The service effect will be visible and the supporting to decision making will be weighty. (authors)

  17. Information theoretic analysis of edge detection in visual communication

    Science.gov (United States)

    Jiang, Bo; Rahman, Zia-ur

    2010-08-01

    Generally, the designs of digital image processing algorithms and image gathering devices remain separate. Consequently, the performance of digital image processing algorithms is evaluated without taking into account the artifacts introduced into the process by the image gathering process. However, experiments show that the image gathering process profoundly impacts the performance of digital image processing and the quality of the resulting images. Huck et al. proposed one definitive theoretic analysis of visual communication channels, where the different parts, such as image gathering, processing, and display, are assessed in an integrated manner using Shannon's information theory. In this paper, we perform an end-to-end information theory based system analysis to assess edge detection methods. We evaluate the performance of the different algorithms as a function of the characteristics of the scene, and the parameters, such as sampling, additive noise etc., that define the image gathering system. The edge detection algorithm is regarded to have high performance only if the information rate from the scene to the edge approaches the maximum possible. This goal can be achieved only by jointly optimizing all processes. People generally use subjective judgment to compare different edge detection methods. There is not a common tool that can be used to evaluate the performance of the different algorithms, and to give people a guide for selecting the best algorithm for a given system or scene. Our information-theoretic assessment becomes this new tool to which allows us to compare the different edge detection operators in a common environment.

  18. A malware detection scheme based on mining format information.

    Science.gov (United States)

    Bai, Jinrong; Wang, Junfeng; Zou, Guozhong

    2014-01-01

    Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. In this paper, we proposed a malware detection approach by mining format information of PE (portable executable) files. Based on in-depth analysis of the static format information of the PE files, we extracted 197 features from format information of PE files and applied feature selection methods to reduce the dimensionality of the features and achieve acceptable high performance. When the selected features were trained using classification algorithms, the results of our experiments indicate that the accuracy of the top classification algorithm is 99.1% and the value of the AUC is 0.998. We designed three experiments to evaluate the performance of our detection scheme and the ability of detecting unknown and new malware. Although the experimental results of identifying new malware are not perfect, our method is still able to identify 97.6% of new malware with 1.3% false positive rates.

  19. Kickstarting Creativity: Supporting the Productive Faces of Uncertainty in Information Practice

    Science.gov (United States)

    Anderson, Theresa Dirndorfer

    2010-01-01

    Introduction: Examines implications of research suggesting fast access to information may reduce the time needed for creative thinking and reflection. To support human thought through information provision, more opportunities to experience and work with imperfect information and to engage with ambiguities are needed. Method: Four linked arguments…

  20. An object-oriented feature-based design system face-based detection of feature interactions

    International Nuclear Information System (INIS)

    Ariffin Abdul Razak

    1999-01-01

    This paper presents an object-oriented, feature-based design system which supports the integration of design and manufacture by ensuring that part descriptions fully account for any feature interactions. Manufacturing information is extracted from the feature descriptions in the form of volumes and Tool Access Directions, TADs. When features interact, both volumes and TADs are updated. This methodology has been demonstrated by developing a prototype system in which ACIS attributes are used to record feature information within the data structure of the solid model. The system implemented in the C++ programming language and embedded in a menu-driven X-windows user interface to the ACIS 3D Toolkit. (author)

  1. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  2. Detecting Hotspot Information Using Multi-Attribute Based Topic Model.

    Directory of Open Access Journals (Sweden)

    Jing Wang

    Full Text Available Microblogging as a kind of social network has become more and more important in our daily lives. Enormous amounts of information are produced and shared on a daily basis. Detecting hot topics in the mountains of information can help people get to the essential information more quickly. However, due to short and sparse features, a large number of meaningless tweets and other characteristics of microblogs, traditional topic detection methods are often ineffective in detecting hot topics. In this paper, we propose a new topic model named multi-attribute latent dirichlet allocation (MA-LDA, in which the time and hashtag attributes of microblogs are incorporated into LDA model. By introducing time attribute, MA-LDA model can decide whether a word should appear in hot topics or not. Meanwhile, compared with the traditional LDA model, applying hashtag attribute in MA-LDA model gives the core words an artificially high ranking in results meaning the expressiveness of outcomes can be improved. Empirical evaluations on real data sets demonstrate that our method is able to detect hot topics more accurately and efficiently compared with several baselines. Our method provides strong evidence of the importance of the temporal factor in extracting hot topics.

  3. Detecting Hotspot Information Using Multi-Attribute Based Topic Model

    Science.gov (United States)

    Wang, Jing; Li, Li; Tan, Feng; Zhu, Ying; Feng, Weisi

    2015-01-01

    Microblogging as a kind of social network has become more and more important in our daily lives. Enormous amounts of information are produced and shared on a daily basis. Detecting hot topics in the mountains of information can help people get to the essential information more quickly. However, due to short and sparse features, a large number of meaningless tweets and other characteristics of microblogs, traditional topic detection methods are often ineffective in detecting hot topics. In this paper, we propose a new topic model named multi-attribute latent dirichlet allocation (MA-LDA), in which the time and hashtag attributes of microblogs are incorporated into LDA model. By introducing time attribute, MA-LDA model can decide whether a word should appear in hot topics or not. Meanwhile, compared with the traditional LDA model, applying hashtag attribute in MA-LDA model gives the core words an artificially high ranking in results meaning the expressiveness of outcomes can be improved. Empirical evaluations on real data sets demonstrate that our method is able to detect hot topics more accurately and efficiently compared with several baselines. Our method provides strong evidence of the importance of the temporal factor in extracting hot topics. PMID:26496635

  4. The Many Faces of Information Management. AIR 1998 Annual Forum Paper.

    Science.gov (United States)

    Krotseng, Marsha V.; McLaughlin, Gerald W.

    This paper examines the many facets of administrative information management on the college or university campus. It is argued that, depending on the situation, an effective information manager can adopt the outlook of an architect/designer, data administrator, editor, analyst, reporter, planner, broker, collaborator, interpreter, or marketer.…

  5. Long-Range Reduced Predictive Information Transfers of Autistic Youths in EEG Sensor-Space During Face Processing.

    Science.gov (United States)

    Khadem, Ali; Hossein-Zadeh, Gholam-Ali; Khorrami, Anahita

    2016-03-01

    The majority of previous functional/effective connectivity studies conducted on the autistic patients converged to the underconnectivity theory of ASD: "long-range underconnectivity and sometimes short-rang overconnectivity". However, to the best of our knowledge the total (linear and nonlinear) predictive information transfers (PITs) of autistic patients have not been investigated yet. Also, EEG data have rarely been used for exploring the information processing deficits in autistic subjects. This study is aimed at comparing the total (linear and nonlinear) PITs of autistic and typically developing healthy youths during human face processing by using EEG data. The ERPs of 12 autistic youths and 19 age-matched healthy control (HC) subjects were recorded while they were watching upright and inverted human face images. The PITs among EEG channels were quantified using two measures separately: transfer entropy with self-prediction optimality (TESPO), and modified transfer entropy with self-prediction optimality (MTESPO). Afterwards, the directed differential connectivity graphs (dDCGs) were constructed to characterize the significant changes in the estimated PITs of autistic subjects compared with HC ones. By using both TESPO and MTESPO, long-range reduction of PITs of ASD group during face processing was revealed (particularly from frontal channels to right temporal channels). Also, it seemed the orientation of face images (upright or upside down) did not modulate the binary pattern of PIT-based dDCGs, significantly. Moreover, compared with TESPO, the results of MTESPO were more compatible with the underconnectivity theory of ASD in the sense that MTESPO showed no long-range increase in PIT. It is also noteworthy that to the best of our knowledge it is the first time that a version of MTE is applied for patients (here ASD) and it is also its first use for EEG data analysis.

  6. Acquiring information about neutrino parameters by detecting supernova neutrinos

    Science.gov (United States)

    Huang, Ming-Yang; Guo, Xin-Heng; Young, Bing-Lin

    2010-08-01

    We consider the supernova shock effects, the Mikheyev-Smirnov-Wolfenstein effects, the collective effects, and the Earth matter effects in the detection of type II supernova neutrinos on the Earth. It is found that the event number of supernova neutrinos depends on the neutrino mass hierarchy, the neutrino mixing angle θ13, and neutrino masses. Therefore, we propose possible methods to identify the mass hierarchy and acquire information about θ13 and neutrino masses by detecting supernova neutrinos. We apply these methods to some current neutrino experiments.

  7. Information dynamics algorithm for detecting communities in networks

    Science.gov (United States)

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  8. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  9. Acquire information about neutrino parameters by detecting supernova neutrinos

    OpenAIRE

    Huang, Ming-Yang; Guo, Xin-Heng; Young, Bing-Lin

    2010-01-01

    We consider the supernova shock effects, the Mikheyev-Smirnov-Wolfenstein (MSW) effects, the collective effects, and the Earth matter effects in the detection of type II supernova neutrinos on the Earth. It is found that the event number of supernova neutrinos depends on the neutrino mass hierarchy, the neutrino mixing angle $\\theta_{13}$, and neutrino masses. Therefore, we propose possible methods to identify the mass hierarchy and acquire information about $\\theta_{13}$ and neutrino masses ...

  10. Ethical communication in clinical trials. Issues faced by data managers in obtaining informed consent.

    Science.gov (United States)

    Loh, Winnie Y; Butow, Phyllis N; Brown, Richard F; Boyle, Frances

    2002-12-01

    Informed consent has been proposed as the optimal method for ensuring the ethical entry of patients into clinical trials. However, it is known that problems with informed consent exist from the perspective of both patients and physicians. This has led to the suggestion that a third party, such as a research nurse or data manager, should be responsible for obtaining informed consent. The objective of this study was to explore the views of data managers concerning the nature, challenges, and rewards of their role and the similarities and differences between their role and that of physicians in obtaining informed consent. Four focus groups in three large teaching hospitals were conducted. Twenty-one data managers who were involved in cancer or pain clinical trials participated. The focus groups were audiotaped, transcribed, and subjected to content analysis to identify themes. Data managers identified three primary roles complementary to that of physicians: information provision, quality assurance of the informed consent process, and ongoing support during the trial. Despite expressed concern that medical and drug company interests may lead to subtle coercion of the patient, participants did not support the notion that they may be solely responsible for the consent process. Participants described a range of ethical dilemmas they confronted, including patients asking them for medical details they could not provide and situations in which they felt that informed consent was compromised in some way, for example, dealing with situations in which the patient appeared to be entering the trial for the wrong reasons due to misunderstanding, need, or passivity. Effective functioning of the multidisciplinary team assisted data managers in performing their role. A range of training needs were identified, particularly communication skills training and trial start-up briefing. The issues raised by these data managers have important implications for the successful conduct of

  11. Rapid prototyping of SoC-based real-time vision system: application to image preprocessing and face detection

    Science.gov (United States)

    Jridi, Maher; Alfalou, Ayman

    2017-05-01

    By this paper, the major goal is to investigate the Multi-CPU/FPGA SoC (System on Chip) design flow and to transfer a know-how and skills to rapidly design embedded real-time vision system. Our aim is to show how the use of these devices can be benefit for system level integration since they make possible simultaneous hardware and software development. We take the facial detection and pretreatments as case study since they have a great potential to be used in several applications such as video surveillance, building access control and criminal identification. The designed system use the Xilinx Zedboard platform. The last is the central element of the developed vision system. The video acquisition is performed using either standard webcam connected to the Zedboard via USB interface or several camera IP devices. The visualization of video content and intermediate results are possible with HDMI interface connected to HD display. The treatments embedded in the system are as follow: (i) pre-processing such as edge detection implemented in the ARM and in the reconfigurable logic, (ii) software implementation of motion detection and face detection using either ViolaJones or LBP (Local Binary Pattern), and (iii) application layer to select processing application and to display results in a web page. One uniquely interesting feature of the proposed system is that two functions have been developed to transmit data from and to the VDMA port. With the proposed optimization, the hardware implementation of the Sobel filter takes 27 ms and 76 ms for 640x480, and 720p resolutions, respectively. Hence, with the FPGA implementation, an acceleration of 5 times is obtained which allow the processing of 37 fps and 13 fps for 640x480, and 720p resolutions, respectively.

  12. GlobePort Faces Global Business Challenges--Assessing the Organizational Side of Information Systems Projects

    Science.gov (United States)

    Ghosh, Biswadip

    2011-01-01

    Published studies have reported that Information System (IS) projects succeed or fail based on how effectively the organizational issues were understood and addressed in the specification, development and implementation stages of the project. This is particularly true in the design and delivery of Inter-Organizational Systems (IOS) that can affect…

  13. Three faces of entropy for complex systems: Information, thermodynamics, and the maximum entropy principle

    Science.gov (United States)

    Thurner, Stefan; Corominas-Murtra, Bernat; Hanel, Rudolf

    2017-09-01

    There are at least three distinct ways to conceptualize entropy: entropy as an extensive thermodynamic quantity of physical systems (Clausius, Boltzmann, Gibbs), entropy as a measure for information production of ergodic sources (Shannon), and entropy as a means for statistical inference on multinomial processes (Jaynes maximum entropy principle). Even though these notions represent fundamentally different concepts, the functional form of the entropy for thermodynamic systems in equilibrium, for ergodic sources in information theory, and for independent sampling processes in statistical systems, is degenerate, H (p ) =-∑ipilogpi . For many complex systems, which are typically history-dependent, nonergodic, and nonmultinomial, this is no longer the case. Here we show that for such processes, the three entropy concepts lead to different functional forms of entropy, which we will refer to as SEXT for extensive entropy, SIT for the source information rate in information theory, and SMEP for the entropy functional that appears in the so-called maximum entropy principle, which characterizes the most likely observable distribution functions of a system. We explicitly compute these three entropy functionals for three concrete examples: for Pólya urn processes, which are simple self-reinforcing processes, for sample-space-reducing (SSR) processes, which are simple history dependent processes that are associated with power-law statistics, and finally for multinomial mixture processes.

  14. Multirobot autonomous landmine detection using distributed multisensor information aggregation

    Science.gov (United States)

    Jumadinova, Janyl; Dasgupta, Prithviraj

    2012-06-01

    We consider the problem of distributed sensor information fusion by multiple autonomous robots within the context of landmine detection. We assume that different landmines can be composed of different types of material and robots are equipped with different types of sensors, while each robot has only one type of landmine detection sensor on it. We introduce a novel technique that uses a market-based information aggregation mechanism called a prediction market. Each robot is provided with a software agent that uses sensory input of the robot and performs calculations of the prediction market technique. The result of the agent's calculations is a 'belief' representing the confidence of the agent in identifying the object as a landmine. The beliefs from different robots are aggregated by the market mechanism and passed on to a decision maker agent. The decision maker agent uses this aggregate belief information about a potential landmine and makes decisions about which other robots should be deployed to its location, so that the landmine can be confirmed rapidly and accurately. Our experimental results show that, for identical data distributions and settings, using our prediction market-based information aggregation technique increases the accuracy of object classification favorably as compared to two other commonly used techniques.

  15. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  16. Pro-active data breach detection: examining accuracy and applicability on personal information detected

    CSIR Research Space (South Africa)

    Botha, J

    2016-03-01

    Full Text Available breaches but does not provide a clear indication of the level of personal information available on the internet since only reported incidents are taken into account. The possibility of pro-active automated breach detection has previously been discussed as a...

  17. Development of an integrated Sasang constitution diagnosis method using face, body shape, voice, and questionnaire information.

    Science.gov (United States)

    Do, Jun-Hyeong; Jang, Eunsu; Ku, Boncho; Jang, Jun-Su; Kim, Honggie; Kim, Jong Yeol

    2012-07-04

    Sasang constitutional medicine (SCM) is a unique form of traditional Korean medicine that divides human beings into four constitutional types (Tae-Yang: TY, Tae-Eum: TE, So-Yang: SY, and So-Eum: SE), which differ in inherited characteristics, such as external appearance, personality traits, susceptibility to particular diseases, drug responses, and equilibrium among internal organ functions. According to SCM, herbs that belong to a certain constitution cannot be used in patients with other constitutions; otherwise, this practice may result in no effect or in an adverse effect. Thus, the diagnosis of SC type is the most crucial step in SCM practice. The diagnosis, however, tends to be subjective due to a lack of quantitative standards for SC diagnosis. We have attempted to make the diagnosis method as objective as possible by basing it on an analysis of quantitative data from various Oriental medical clinics. Four individual diagnostic models were developed with multinomial logistic regression based on face, body shape, voice, and questionnaire responses. Inspired by SCM practitioners' holistic diagnostic processes, an integrated diagnostic model was then proposed by combining the four individual models. The diagnostic accuracies in the test set, after the four individual models had been integrated into a single model, improved to 64.0% and 55.2% in the male and female patient groups, respectively. Using a cut-off value for the integrated SC score, such as 1.6, the accuracies increased by 14.7% in male patients and by 4.6% in female patients, which showed that a higher integrated SC score corresponded to a higher diagnostic accuracy. This study represents the first trial of integrating the objectification of SC diagnosis based on quantitative data and SCM practitioners' holistic diagnostic processes. Although the diagnostic accuracy was not great, it is noted that the proposed diagnostic model represents common rules among practitioners who have various points of

  18. Development of three-dimensional patient face model that enables real-time collision detection and cutting operation for a dental simulator.

    Science.gov (United States)

    Yamaguchi, Satoshi; Yamada, Yuya; Yoshida, Yoshinori; Noborio, Hiroshi; Imazato, Satoshi

    2012-01-01

    The virtual reality (VR) simulator is a useful tool to develop dental hand skill. However, VR simulations with reactions of patients have limited computational time to reproduce a face model. Our aim was to develop a patient face model that enables real-time collision detection and cutting operation by using stereolithography (STL) and deterministic finite automaton (DFA) data files. We evaluated dependence of computational cost and constructed the patient face model using the optimum condition for combining STL and DFA data files, and assessed the computational costs for operation in do-nothing, collision, cutting, and combination of collision and cutting. The face model was successfully constructed with low computational costs of 11.3, 18.3, 30.3, and 33.5 ms for do-nothing, collision, cutting, and collision and cutting, respectively. The patient face model could be useful for developing dental hand skill with VR.

  19. Detection of information security violations with the aid of information and telecommunication networks monitoring

    International Nuclear Information System (INIS)

    Kovalev, D.O.

    2011-01-01

    Author has studied the methods and algorithms used in the monitoring of information security (IS), the distribution law of the number of IS messages, has developed a method and an algorithm for detecting IS violations in the message flow, a technique for generating the consolidated evaluation of results of monitoring the data and telecommunications network information security. Practical recommendations for improving the IS monitoring have been elaborated [ru

  20. National Earthquake Information Center Seismic Event Detections on Multiple Scales

    Science.gov (United States)

    Patton, J.; Yeck, W. L.; Benz, H.; Earle, P. S.; Soto-Cordero, L.; Johnson, C. E.

    2017-12-01

    The U.S. Geological Survey National Earthquake Information Center (NEIC) monitors seismicity on local, regional, and global scales using automatic picks from more than 2,000 near-real time seismic stations. This presents unique challenges in automated event detection due to the high variability in data quality, network geometries and density, and distance-dependent variability in observed seismic signals. To lower the overall detection threshold while minimizing false detection rates, NEIC has begun to test the incorporation of new detection and picking algorithms, including multiband (Lomax et al., 2012) and kurtosis (Baillard et al., 2014) pickers, and a new bayesian associator (Glass 3.0). The Glass 3.0 associator allows for simultaneous processing of variably scaled detection grids, each with a unique set of nucleation criteria (e.g., nucleation threshold, minimum associated picks, nucleation phases) to meet specific monitoring goals. We test the efficacy of these new tools on event detection in networks of various scales and geometries, compare our results with previous catalogs, and discuss lessons learned. For example, we find that on local and regional scales, rapid nucleation of small events may require event nucleation with both P and higher-amplitude secondary phases (e.g., S or Lg). We provide examples of the implementation of a scale-independent associator for an induced seismicity sequence (local-scale), a large aftershock sequence (regional-scale), and for monitoring global seismicity. Baillard, C., Crawford, W. C., Ballu, V., Hibert, C., & Mangeney, A. (2014). An automatic kurtosis-based P-and S-phase picker designed for local seismic networks. Bulletin of the Seismological Society of America, 104(1), 394-409. Lomax, A., Satriano, C., & Vassallo, M. (2012). Automatic picker developments and optimization: FilterPicker - a robust, broadband picker for real-time seismic monitoring and earthquake early-warning, Seism. Res. Lett. , 83, 531-540, doi: 10

  1. Strategic Conflict Detection and Resolution Using Aircraft Intent Information

    Science.gov (United States)

    Porretta, Marco; Schuster, Wolfgang; Majumdar, Arnab; Ochieng, Washington

    A number of automated decision support tools will be required in the future air traffic management system to enable continued provision of safe and efficient services in increasingly congested skies. In particular, Conflict Detection and Resolution (CDR) tools should allow for early detection of possible conflicts and propose safe and efficient resolution manoeuvres to avoid loss of separation. However, current approaches in the open literature not only use different levels of aircraft intent information but also make a number of assumptions on models of aircraft motion. Furthermore, information relevant to aircraft performance is often not considered with the consequence of the resulting resolution strategies being potentially unreliable. This paper presents an enhanced, strategic, pairwise, performance-based and distributed CDR algorithm. It accounts for the weaknesses of current approaches by using the maximum level of aircraft intent information together with a novel trajectory prediction model. Numerical results for representative conflict scenarios show that the proposed CDR method is able to generate conflict-free trajectories for participating aircraft while taking into account the actual aircraft capabilities to perform the recommended resolution manoeuvres.

  2. Deep Fully Convolutional Networks for the Detection of Informal Settlements in VHR Images

    NARCIS (Netherlands)

    Persello, Claudio; Stein, Alfred

    2017-01-01

    This letter investigates fully convolutional networks (FCNs) for the detection of informal settlements in very high resolution (VHR) satellite images. Informal settlements or slums are proliferating in developing countries and their detection and classification provides vital information for

  3. Low spatial frequency bias in schizophrenia is not face specific: When the integration of coarse and fine information fails

    Directory of Open Access Journals (Sweden)

    Vincent eLaprevote

    2013-05-01

    Full Text Available Studies have shown that patients with schizophrenia exhibit visual processing impairments, particularly regarding the processing of spatial frequencies. In a previous work, we found that, compared to healthy volunteers, patients were biased towards low spatial frequencies (LSF to identify facial expression at a glance. Given the ubiquity of faces in visual perception, it remains an open question whether the LSF bias is face specific or also occurs with other visual objects. Here, fifteen patients with schizophrenia and eleven healthy control adults performed a categorization task with hybrid stimuli. These stimuli were single images consisting of two different objects, a fruit and an animal, each in a specific spatial frequency range, either low (LSF or high (HSF. Observers were asked to report if they saw an animal or a fruit. The reported category demonstrated which spatial scale was preferentially perceived in each trial. In a control experiment, participants performed the same task but with images of only a single object, either a LSF or HSF filtered animal or fruit, to verify that participants could perceive both HSF or LSF when presented in isolation. The results on the categorization task showed that patients chose more frequently LSF with hybrid stimuli compared to healthy controls. However, both populations performed equally well with HSF and LSF filtered pictures in the control experiment, demonstrating that the LSF preference found with hybrid stimuli in patients was not due to an inability to perceive HSF.The LSF preference found in schizophrenia confirms our previous study conducted with faces, and shows that this LSF bias generalizes to other categories of objects. When a broad range of spatial frequencies are present in the image, as in normal conditions of viewing, patients preferentially rely on coarse visual information contained in LSF. This result may be interpreted as a dysfunction of the guidance of HSF processing by LSF

  4. Coastal Hazards Maps: Actionable Information for Communities Facing Sea-Level Rise (Invited)

    Science.gov (United States)

    Gibeaut, J. C.; Barraza, E.

    2010-12-01

    Barrier islands along the U.S. Gulf coast remain under increasing pressure from development. This development and redevelopment is occurring despite recent hurricanes, ongoing erosion, and sea-level rise. To lessen the impacts of these hazards, local governments need information in a form that is useful for informing the public, making policy, and enforcing development rules. We recently completed the Galveston Island Geohazards Map for the city of Galveston, Texas and are currently developing maps for the Mustang and South Padre Island communities. The maps show areas that vary in their susceptibility to, and function for, mitigating the effects of geological processes, including sea-level rise, land subsidence, erosion and storm-surge flooding and washover. The current wetlands, beaches and dunes are mapped as having the highest geohazard potential both in terms of their exposure to hazardous conditions and their mitigating effects of those hazards for the rest of the island. These existing “critical environments” are generally protected under existing regulations. Importantly, however, the mapping recognizes that sea-level rise and shoreline retreat are changing the island; therefore, 60-year model projections of the effects of these changes are incorporated into the map. The areas that we project will become wetlands, beaches and dunes in the next 60 years are not protected. These areas are the most difficult to deal with from a policy point of view, yet we must address what happens there if real progress is to be made in how we live with sea-level rise. The geohazards maps draw on decades of geological knowledge of how barrier islands behave and put it in a form that is intuitive to the public and directly useful to planners. Some of the “messages” in the map include: leave salt marshes alone and give them room to migrate inland as sea level rises; set back and move development away from the shoreline to provide space for beaches and protective dunes

  5. Detection of vehicle parts based on Faster R-CNN and relative position information

    Science.gov (United States)

    Zhang, Mingwen; Sang, Nong; Chen, Youbin; Gao, Changxin; Wang, Yongzhong

    2018-03-01

    Detection and recognition of vehicles are two essential tasks in intelligent transportation system (ITS). Currently, a prevalent method is to detect vehicle body, logo or license plate at first, and then recognize them. So the detection task is the most basic, but also the most important work. Besides the logo and license plate, some other parts, such as vehicle face, lamp, windshield and rearview mirror, are also key parts which can reflect the characteristics of vehicle and be used to improve the accuracy of recognition task. In this paper, the detection of vehicle parts is studied, and the work is novel. We choose Faster R-CNN as the basic algorithm, and take the local area of an image where vehicle body locates as input, then can get multiple bounding boxes with their own scores. If the box with maximum score is chosen as final result directly, it is often not the best one, especially for small objects. This paper presents a method which corrects original score with relative position information between two parts. Then we choose the box with maximum comprehensive score as the final result. Compared with original output strategy, the proposed method performs better.

  6. Child vocalization composition as discriminant information for automatic autism detection.

    Science.gov (United States)

    Xu, Dongxin; Gilkerson, Jill; Richards, Jeffrey; Yapanel, Umit; Gray, Sharmi

    2009-01-01

    Early identification is crucial for young children with autism to access early intervention. The existing screens require either a parent-report questionnaire and/or direct observation by a trained practitioner. Although an automatic tool would benefit parents, clinicians and children, there is no automatic screening tool in clinical use. This study reports a fully automatic mechanism for autism detection/screening for young children. This is a direct extension of the LENA (Language ENvironment Analysis) system, which utilizes speech signal processing technology to analyze and monitor a child's natural language environment and the vocalizations/speech of the child. It is discovered that child vocalization composition contains rich discriminant information for autism detection. By applying pattern recognition and machine learning approaches to child vocalization composition data, accuracy rates of 85% to 90% in cross-validation tests for autism detection have been achieved at the equal-error-rate (EER) point on a data set with 34 children with autism, 30 language delayed children and 76 typically developing children. Due to its easy and automatic procedure, it is believed that this new tool can serve a significant role in childhood autism screening, especially in regards to population-based or universal screening.

  7. Brain Activity Related to the Judgment of Face-Likeness: Correlation between EEG and Face-Like Evaluation.

    Science.gov (United States)

    Nihei, Yuji; Minami, Tetsuto; Nakauchi, Shigeki

    2018-01-01

    Faces represent important information for social communication, because social information, such as face-color, expression, and gender, is obtained from faces. Therefore, individuals' tend to find faces unconsciously, even in objects. Why is face-likeness perceived in non-face objects? Previous event-related potential (ERP) studies showed that the P1 component (early visual processing), the N170 component (face detection), and the N250 component (personal detection) reflect the neural processing of faces. Inverted faces were reported to enhance the amplitude and delay the latency of P1 and N170. To investigate face-likeness processing in the brain, we explored the face-related components of the ERP through a face-like evaluation task using natural faces, cars, insects, and Arcimboldo paintings presented upright or inverted. We found a significant correlation between the inversion effect index and face-like scores in P1 in both hemispheres and in N170 in the right hemisphere. These results suggest that judgment of face-likeness occurs in a relatively early stage of face processing.

  8. Brain Activity Related to the Judgment of Face-Likeness: Correlation between EEG and Face-Like Evaluation

    Directory of Open Access Journals (Sweden)

    Yuji Nihei

    2018-02-01

    Full Text Available Faces represent important information for social communication, because social information, such as face-color, expression, and gender, is obtained from faces. Therefore, individuals' tend to find faces unconsciously, even in objects. Why is face-likeness perceived in non-face objects? Previous event-related potential (ERP studies showed that the P1 component (early visual processing, the N170 component (face detection, and the N250 component (personal detection reflect the neural processing of faces. Inverted faces were reported to enhance the amplitude and delay the latency of P1 and N170. To investigate face-likeness processing in the brain, we explored the face-related components of the ERP through a face-like evaluation task using natural faces, cars, insects, and Arcimboldo paintings presented upright or inverted. We found a significant correlation between the inversion effect index and face-like scores in P1 in both hemispheres and in N170 in the right hemisphere. These results suggest that judgment of face-likeness occurs in a relatively early stage of face processing.

  9. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    Science.gov (United States)

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  10. Familiar face + novel face = familiar face? Representational bias in the perception of morphed faces in chimpanzees

    Directory of Open Access Journals (Sweden)

    Yoshi-Taka Matsuda

    2016-08-01

    Full Text Available Highly social animals possess a well-developed ability to distinguish the faces of familiar from novel conspecifics to induce distinct behaviors for maintaining society. However, the behaviors of animals when they encounter ambiguous faces of familiar yet novel conspecifics, e.g., strangers with faces resembling known individuals, have not been well characterised. Using a morphing technique and preferential-looking paradigm, we address this question via the chimpanzee’s facial–recognition abilities. We presented eight subjects with three types of stimuli: (1 familiar faces, (2 novel faces and (3 intermediate morphed faces that were 50% familiar and 50% novel faces of conspecifics. We found that chimpanzees spent more time looking at novel faces and scanned novel faces more extensively than familiar or intermediate faces. Interestingly, chimpanzees looked at intermediate faces in a manner similar to familiar faces with regards to the fixation duration, fixation count, and saccade length for facial scanning, even though the participant was encountering the intermediate faces for the first time. We excluded the possibility that subjects merely detected and avoided traces of morphing in the intermediate faces. These findings suggest a bias for a feeling-of-familiarity that chimpanzees perceive familiarity with an intermediate face by detecting traces of a known individual, as 50% alternation is sufficient to perceive familiarity.

  11. Trajectory Shape Analysis and Anomaly Detection Utilizing Information Theory Tools

    Directory of Open Access Journals (Sweden)

    Yuejun Guo

    2017-06-01

    Full Text Available In this paper, we propose to improve trajectory shape analysis by explicitly considering the speed attribute of trajectory data, and to successfully achieve anomaly detection. The shape of object motion trajectory is modeled using Kernel Density Estimation (KDE, making use of both the angle attribute of the trajectory and the speed of the moving object. An unsupervised clustering algorithm, based on the Information Bottleneck (IB method, is employed for trajectory learning to obtain an adaptive number of trajectory clusters through maximizing the Mutual Information (MI between the clustering result and a feature set of the trajectory data. Furthermore, we propose to effectively enhance the performance of IB by taking into account the clustering quality in each iteration of the clustering procedure. The trajectories are determined as either abnormal (infrequently observed or normal by a measure based on Shannon entropy. Extensive tests on real-world and synthetic data show that the proposed technique behaves very well and outperforms the state-of-the-art methods.

  12. Detection of morphological changes in cliff face surrounding a waterfall using terrestrial laser scanning and unmanned aerial system

    Science.gov (United States)

    Hayakawa, Yuichi S.; Obanawa, Hiroyuki

    2015-04-01

    Waterfall or bedrock knickpoint appears as an erosional front in bedrock rivers forming deep v-shaped valley downstream. Following the rapid fluvial erosion of waterfall, rockfalls and gravita-tional collapses often occur in surrounding steep cliffs. Although morphological changes of such steep cliffs are sometimes visually observed, quantitative and precise measurements of their spatio-temporal distribution have been limited due to the difficulties in direct access to such cliffs if with classical measurement methods. However, for the clarification of geomorphological processes oc-curring in the cliffs, multi-temporal mapping of the cliff face at a high resolution is necessary. Re-mote sensing approaches are therefore suitable for the topographic measurements and detection of changes in such inaccessible cliffs. To achieve accurate topographic mapping of cliffs around a wa-terfall, here we perform multi-temporal terrestrial laser scanning (TLS), as well as structure-from-motion multi-view stereo (SfM-MVS) photogrammetry based on unmanned aerial system (UAS). The study site is Kegon Falls in central Japan, having a vertical drop of surface water from top of its overhanging cliff, as well as groundwater outflows from its lower portions. The bedrock is composed of alternate layers of andesite lava and conglomerates. Minor rockfalls in the cliffs are often ob-served by local people. The latest major rockfall occurred in 1986, causing ca. 8-m upstream propa-gation of the waterfall lip. This provides a good opportunity to examine the changes in the surround-ing cliffs following the waterfall recession. Multi-time point clouds were obtained by TLS measure-ment over years, and the three-dimensional changes of the rock surface were detected, uncovering the locus of small rockfalls and gully developments. Erosion seems particularly frequent in relatively weak the conglomerates layer, whereas small rockfalls seems to have occurred in the andesite layers. Also, shadows in the

  13. Collecting maternal health information from HIV-positive pregnant women using mobile phone-assisted face-to-face interviews in Southern Africa.

    Science.gov (United States)

    van Heerden, Alastair; Norris, Shane; Tollman, Stephen; Richter, Linda; Rotheram-Borus, Mary Jane

    2013-06-10

    Most of the world's women living with human immunodeficiency virus (HIV) reside in sub-Saharan Africa. Although efforts to reduce mother-to-child transmission are underway, obtaining complete and accurate data from rural clinical sites to track progress presents a major challenge. To describe the acceptability and feasibility of mobile phones as a tool for clinic-based face-to-face data collection with pregnant women living with HIV in South Africa. As part of a larger clinic-based trial, 16 interviewers were trained to conduct mobile phone-assisted personal interviews (MPAPI). These interviewers (participant group 1) completed the same short questionnaire based on items from the Technology Acceptance Model at 3 different time points. Questions were asked before training, after training, and 3 months after deployment to clinic facilities. In addition, before the start of the primary intervention trial in which this substudy was undertaken, 12 mothers living with HIV (MLH) took part in a focus group discussion exploring the acceptability of MPAPI (participant group 2). Finally, a sample of MLH (n=512) enrolled in the primary trial were asked to assess their experience of being interviewed by MPAPI (participant group 3). Acceptability of the method was found to be high among the 16 interviewers in group 1. Perceived usefulness was reported to be slightly higher than perceived ease of use across the 3 time points. After 3 months of field use, interviewer perceptions of both perceived ease of use and perceived usefulness were found to be higher than before training. The feasibility of conducting MPAPI interviews in this setting was found to be high. Network coverage was available in all clinics and hardware, software, cost, and secure transmission to the data center presented no significant challenges over the 21-month period. For the 12 MHL participants in group 2, anxiety about the multimedia capabilities of the phone was evident. Their concern centered on the

  14. Phylogenetically informed logic relationships improve detection of biological network organization

    Science.gov (United States)

    2011-01-01

    Background A "phylogenetic profile" refers to the presence or absence of a gene across a set of organisms, and it has been proven valuable for understanding gene functional relationships and network organization. Despite this success, few studies have attempted to search beyond just pairwise relationships among genes. Here we search for logic relationships involving three genes, and explore its potential application in gene network analyses. Results Taking advantage of a phylogenetic matrix constructed from the large orthologs database Roundup, we invented a method to create balanced profiles for individual triplets of genes that guarantee equal weight on the different phylogenetic scenarios of coevolution between genes. When we applied this idea to LAPP, the method to search for logic triplets of genes, the balanced profiles resulted in significant performance improvement and the discovery of hundreds of thousands more putative triplets than unadjusted profiles. We found that logic triplets detected biological network organization and identified key proteins and their functions, ranging from neighbouring proteins in local pathways, to well separated proteins in the whole pathway, and to the interactions among different pathways at the system level. Finally, our case study suggested that the directionality in a logic relationship and the profile of a triplet could disclose the connectivity between the triplet and surrounding networks. Conclusion Balanced profiles are superior to the raw profiles employed by traditional methods of phylogenetic profiling in searching for high order gene sets. Gene triplets can provide valuable information in detection of biological network organization and identification of key genes at different levels of cellular interaction. PMID:22172058

  15. This person is saying bad things about you: The influence of physically and socially threatening context information on the processing of inherently neutral faces.

    Science.gov (United States)

    Klein, Fabian; Iffland, Benjamin; Schindler, Sebastian; Wabnitz, Pascal; Neuner, Frank

    2015-12-01

    Recent studies have shown that the perceptual processing of human faces is affected by context information, such as previous experiences and information about the person represented by the face. The present study investigated the impact of verbally presented information about the person that varied with respect to affect (neutral, physically threatening, socially threatening) and reference (self-referred, other-referred) on the processing of faces with an inherently neutral expression. Stimuli were presented in a randomized presentation paradigm. Event-related potential (ERP) analysis demonstrated a modulation of the evoked potentials by reference at the EPN (early posterior negativity) and LPP (late positive potential) stage and an enhancing effect of affective valence on the LPP (700-1000 ms) with socially threatening context information leading to the most pronounced LPP amplitudes. We also found an interaction between reference and valence with self-related neutral context information leading to more pronounced LPP than other related neutral context information. Our results indicate an impact of self-reference on early, presumably automatic processing stages and also a strong impact of valence on later stages. Using a randomized presentation paradigm, this study confirms that context information affects the visual processing of faces, ruling out possible confounding factors such as facial configuration or conditional learning effects.

  16. Face to Face

    OpenAIRE

    Robert Leckey

    2013-01-01

    This paper uses Queer theory, specifically literature on Bowers v. Hardwick, to analyze debates over legislation proposed in Quebec regarding covered faces. Queer theory sheds light on legal responses to the veil. Parliamentary debates in Quebec reconstitute the polity, notably as secular and united. The paper highlights the contradictory and unstable character of four binaries: legislative text versus social practice, act versus status, majority versus minority, and knowable versus unknowabl...

  17. Pornographic information of Internet views detection method based on the connected areas

    Science.gov (United States)

    Wang, Huibai; Fan, Ajie

    2017-01-01

    Nowadays online porn video broadcasting and downloading is very popular. In view of the widespread phenomenon of Internet pornography, this paper proposed a new method of pornographic video detection based on connected areas. Firstly, decode the video into a serious of static images and detect skin color on the extracted key frames. If the area of skin color reaches a certain threshold, use the AdaBoost algorithm to detect the human face. Judge the connectivity of the human face and the large area of skin color to determine whether detect the sensitive area finally. The experimental results show that the method can effectively remove the non-pornographic videos contain human who wear less. This method can improve the efficiency and reduce the workload of detection.

  18. Anomaly detection through information sharing under different topologies

    NARCIS (Netherlands)

    Gallos, Lazaros K.; Korczynski, M.T.; Fefferman, Nina H.

    2017-01-01

    Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detection are subject to inherent constraints: (1) they create a communication burden on the

  19. Improving Reliability of Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-03-01

    Full Text Available The problem of protection from deliberate leaks of information is one of the most difficult. Integrated systems of information protection against insider have a serious drawback. Using this disadvantage the offender receives the possibility of unauthorized theft of information from working machine.

  20. Tool for Insider Threat Detection in Corporative Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Sergeevich Vedeneev

    2014-02-01

    Full Text Available Systems and tools for insider threat detection are described. Different meanings of the term “insider”, types of insiders, examples of motivation of insiders, typical insider actions are set.

  1. Change Detection Algorithms for Information Assurance of Computer Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A

    2002-01-01

    .... In this thesis, the author will focus on the detection of three attack scenarios: the spreading of active worms throughout the Internet, distributed denial of service attacks, and routing attacks to wireless ad hoc networks...

  2. Face to Face

    Directory of Open Access Journals (Sweden)

    Robert Leckey

    2013-12-01

    Full Text Available This paper uses Queer theory, specifically literature on Bowers v. Hardwick, to analyze debates over legislation proposed in Quebec regarding covered faces. Queer theory sheds light on legal responses to the veil. Parliamentary debates in Quebec reconstitute the polity, notably as secular and united. The paper highlights the contradictory and unstable character of four binaries: legislative text versus social practice, act versus status, majority versus minority, and knowable versus unknowable. As with contradictory propositions about homosexuality, contradiction does not undermine discourse but makes it stronger and more agile. Este artículo utiliza la teoría Queer, más concretamente la literatura sobre Bowers vs. Hardwick, para analizar los debates sobre la legislación propuesta en Quebec en relación al velo. La teoría Queer arroja luz sobre las respuestas legales al velo. Los debates parlamentarios en Quebec reconstituyen la forma de gobierno, especialmente como secular y unido. El documento pone de relieve el carácter contradictorio e inestable de cuatro binarios: texto legislativo frente a las prácticas sociales; legislación frente a estado; mayoría versus minoría; y conocible frente a incognoscible. Al igual que con las proposiciones contradictorias acerca de la homosexualidad, la contradicción no socava el discurso, sino que lo hace más fuerte y más ágil.

  3. Detect to Avoid: Supporting Aviation Safety with Bird Movement Information

    NARCIS (Netherlands)

    Metz, I.C.; Muhlhausen, Thorsten; Ellerbroek, J.; Hoekstra, J.M.; Kügler, D.

    2017-01-01

    The presented research evaluates the concept of providing an airport’s Air Traffic Control with a bird strike advisory system. Such a system informs the controller about current and predicted bird movements in the arrival and departure corridors. Based on this information, the controller can decide

  4. Community detection with consideration of non-topological information

    International Nuclear Information System (INIS)

    Zou Sheng-Rong; Peng Yu-Jing; Liu Ai-Fen; Xu Xiu-Lian; He Da-Ren

    2011-01-01

    In a network described by a graph, only topological structure information is considered to determine how the nodes are connected by edges. Non-topological information denotes that which cannot be determined directly from topological information. This paper shows, by a simple example where scientists in three research groups and one external group form four communities, that in some real world networks non-topological information (in this example, the research group affiliation) dominates community division. If the information has some influence on the network topological structure, the question arises as to how to find a suitable algorithm to identify the communities based only on the network topology. We show that weighted Newman algorithm may be the best choice for this example. We believe that this idea is general for real-world complex networks. (interdisciplinary physics and related areas of science and technology)

  5. Coarse-to-Fine Encoding of Spatial Frequency Information into Visual Short-Term Memory for Faces but Impartial Decay

    Science.gov (United States)

    Gao, Zaifeng; Bentin, Shlomo

    2011-01-01

    Face perception studies investigated how spatial frequencies (SF) are extracted from retinal display while forming a perceptual representation, or their selective use during task-imposed categorization. Here we focused on the order of encoding low-spatial frequencies (LSF) and high-spatial frequencies (HSF) from perceptual representations into…

  6. Summarization of Surveillance Video Sequences Using Face Quality Assessment

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rahmati, Mohammad

    2011-01-01

    Constant working surveillance cameras in public places, such as airports and banks, produce huge amount of video data. Faces in such videos can be extracted in real time. However, most of these detected faces are either redundant or useless. Redundant information adds computational costs to facial...

  7. Detection, information fusion, and temporal processing for intelligence in recognition

    Energy Technology Data Exchange (ETDEWEB)

    Casasent, D. [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    1996-12-31

    The use of intelligence in vision recognition uses many different techniques or tools. This presentation discusses several of these techniques for recognition. The recognition process is generally separated into several steps or stages when implemented in hardware, e.g. detection, segmentation and enhancement, and recognition. Several new distortion-invariant filters, biologically-inspired Gabor wavelet filter techniques, and morphological operations that have been found very useful for detection and clutter rejection are discussed. These are all shift-invariant operations that allow multiple object regions of interest in a scene to be located in parallel. We also discuss new algorithm fusion concepts by which the results from different detection algorithms are combined to reduce detection false alarms; these fusion methods utilize hierarchical processing and fuzzy logic concepts. We have found this to be most necessary, since no single detection algorithm is best for all cases. For the final recognition stage, we describe a new method of representing all distorted versions of different classes of objects and determining the object class and pose that most closely matches that of a given input. Besides being efficient in terms of storage and on-line computations required, it overcomes many of the problems that other classifiers have in terms of the required training set size, poor generalization with many hidden layer neurons, etc. It is also attractive in its ability to reject input regions as clutter (non-objects) and to learn new object descriptions. We also discuss its use in processing a temporal sequence of input images of the contents of each local region of interest. We note how this leads to robust results in which estimation efforts in individual frames can be overcome. This seems very practical, since in many scenarios a decision need not be made after only one frame of data, since subsequent frames of data enter immediately in sequence.

  8. Activity Detection for Information Access to Oral Communication

    National Research Council Canada - National Science Library

    Ries, Klaus; Waibel, Alex

    2001-01-01

    .... Traditional information retrieval techniques use a histogram of keywords as the document representation but oral communication may offer additional indices such as the time and place of the rejoinder and the attendance...

  9. Information Processing Features Can Detect Behavioral Regimes of Dynamical Systems

    Directory of Open Access Journals (Sweden)

    Rick Quax

    2018-01-01

    Full Text Available In dynamical systems, local interactions between dynamical units generate correlations which are stored and transmitted throughout the system, generating the macroscopic behavior. However a framework to quantify exactly how these correlations are stored, transmitted, and combined at the microscopic scale is missing. Here we propose to characterize the notion of “information processing” based on all possible Shannon mutual information quantities between a future state and all possible sets of initial states. We apply it to the 256 elementary cellular automata (ECA, which are the simplest possible dynamical systems exhibiting behaviors ranging from simple to complex. Our main finding is that only a few information features are needed for full predictability of the systemic behavior and that the “information synergy” feature is always most predictive. Finally we apply the idea to foreign exchange (FX and interest-rate swap (IRS time-series data. We find an effective “slowing down” leading indicator in all three markets for the 2008 financial crisis when applied to the information features, as opposed to using the data itself directly. Our work suggests that the proposed characterization of the local information processing of units may be a promising direction for predicting emergent systemic behaviors.

  10. Shadow detection of moving objects based on multisource information in Internet of things

    Science.gov (United States)

    Ma, Zhen; Zhang, De-gan; Chen, Jie; Hou, Yue-xian

    2017-05-01

    Moving object detection is an important part in intelligent video surveillance under the banner of Internet of things. The detection of moving target's shadow is also an important step in moving object detection. On the accuracy of shadow detection will affect the detection results of the object directly. Based on the variety of shadow detection method, we find that only using one feature can't make the result of detection accurately. Then we present a new method for shadow detection which contains colour information, the invariance of optical and texture feature. Through the comprehensive analysis of the detecting results of three kinds of information, the shadow was effectively determined. It gets ideal effect in the experiment when combining advantages of various methods.

  11. Towards Real-Time Facial Landmark Detection in Depth Data Using Auxiliary Information

    Directory of Open Access Journals (Sweden)

    Connah Kendrick

    2018-06-01

    Full Text Available Modern facial motion capture systems employ a two-pronged approach for capturing and rendering facial motion. Visual data (2D is used for tracking the facial features and predicting facial expression, whereas Depth (3D data is used to build a series of expressions on 3D face models. An issue with modern research approaches is the use of a single data stream that provides little indication of the 3D facial structure. We compare and analyse the performance of Convolutional Neural Networks (CNN using visual, Depth and merged data to identify facial features in real-time using a Depth sensor. First, we review the facial landmarking algorithms and its datasets for Depth data. We address the limitation of the current datasets by introducing the Kinect One Expression Dataset (KOED. Then, we propose the use of CNNs for the single data stream and merged data streams for facial landmark detection. We contribute to existing work by performing a full evaluation on which streams are the most effective for the field of facial landmarking. Furthermore, we improve upon the existing work by extending neural networks to predict into 3D landmarks in real-time with additional observations on the impact of using 2D landmarks as auxiliary information. We evaluate the performance by using Mean Square Error (MSE and Mean Average Error (MAE. We observe that the single data stream predicts accurate facial landmarks on Depth data when auxiliary information is used to train the network. The codes and dataset used in this paper will be made available.

  12. Face haulage equipment failure analysis. Volume I. Technical information and conclusions. Final technical report as of November 30, 1980

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, W.N.; Orona, F.

    1980-11-01

    Face haulage equipment used in conjunction with continuous miners (shuttle cars, diesel haulers, battery scoops, and bridge conveyors) was investigated by recording section delay reports for computer analysis to determine the effect of haulage equipment failures and downtime on productivity, pinpoint the causes of machine failures and downtime, and develop the possible design and operational changes required to reduce machine failures and downtime and increase section productivity. For the mobile vehicle type of haulage (shuttle car, diesel hauler, and battery scoop) failure of one unit in multiple unit haulage operations would not normally stop section production. Bridge conveyors as a haulage system provide continuous haulage of section production but when any part of the bridge system fails, the section production is stopped. In the course of this program, it was determined through the use of daily section shift reports on 200 machines that face haulage equipment is responsible for about 40 to 56 minutes of lost section production time per shift. The most prevalent failure for shuttle cars was found to be the trailing cable umbilical. Bridge conveyors had the most trouble with the conveyor subsystem. Discussions of these and other recorded failures are developed with possible solutions outlined for future implementation. This report only covers the face haulage element of the continuous miner system. Companion reports were developed for the continuous miner and roof bolter elements under separate task orders.

  13. Chromatic Information and Feature Detection in Fast Visual Analysis.

    Directory of Open Access Journals (Sweden)

    Maria M Del Viva

    Full Text Available The visual system is able to recognize a scene based on a sketch made of very simple features. This ability is likely crucial for survival, when fast image recognition is necessary, and it is believed that a primal sketch is extracted very early in the visual processing. Such highly simplified representations can be sufficient for accurate object discrimination, but an open question is the role played by color in this process. Rich color information is available in natural scenes, yet artist's sketches are usually monochromatic; and, black-and-white movies provide compelling representations of real world scenes. Also, the contrast sensitivity of color is low at fine spatial scales. We approach the question from the perspective of optimal information processing by a system endowed with limited computational resources. We show that when such limitations are taken into account, the intrinsic statistical properties of natural scenes imply that the most effective strategy is to ignore fine-scale color features and devote most of the bandwidth to gray-scale information. We find confirmation of these information-based predictions from psychophysics measurements of fast-viewing discrimination of natural scenes. We conclude that the lack of colored features in our visual representation, and our overall low sensitivity to high-frequency color components, are a consequence of an adaptation process, optimizing the size and power consumption of our brain for the visual world we live in.

  14. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  15. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  16. Spectral information for detection of acoustic time to arrival

    DEFF Research Database (Denmark)

    Gordon, Michael S.; Russo, Frank A.; MacDonald, Ewen

    2013-01-01

    The exponential increase of intensity for an approaching sound source provides salient information for a listener to make judgments of time to arrival (TTA). Specifically, a listener will experience a greater rate of increasing intensity for higher than for lower frequencies during a sound source...

  17. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  18. Detecting information-driven trading in a dealers market

    Czech Academy of Sciences Publication Activity Database

    Hanousek, Jan; Kopřiva, František

    2011-01-01

    Roč. 61, č. 3 (2011), s. 204-229 ISSN 0015-1920 R&D Projects: GA ČR(CZ) GAP403/11/0020; GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : dealers’ market * emerging markets * informed trading Subject RIV: AH - Economics Impact factor: 0.346, year: 2011 http://journal.fsv.cuni.cz/storage/1212_hanousek.pdf

  19. Detection and Measurement of Sales Cannibalization in Information Technology Markets

    OpenAIRE

    Novelli, Francesco

    2015-01-01

    Characteristic features of Information Technology (IT), such as its intrinsic modularity and distinctive cost structure, incentivize IT vendors to implement growth strategies based on launching variants of a basic offering. These variants are by design substitutable to some degree and may contend for the same customers instead of winning new ones from competitors or from an expansion of the market. They may thus generate intra-organizational sales diversion – i.e., sales cannibalization. T...

  20. On the detection of thermohygrometric differences of Juniperus turbinata habitat between north and south faces in the island of El Hierro (Canary Islands)

    Science.gov (United States)

    Salva-Catarineu, Montserrat; Salvador-Franch, Ferran; Lopez-Bustins, Joan A.; Padrón-Padrón, Pedro A.; Cortés-Lucas, Amparo

    2016-04-01

    The current extent of Juniperus turbinata in the island of El Hierro is very small due to heavy exploitation for centuries. The recovery of its natural habitat has such a high environmental and scenic interest since this is a protected species in Europe. The study of the environmental factors that help or limit its recovery is indispensable. Our research project (JUNITUR) studied the populations of juniper woodlands in El Hierro from different environments. These environments are mainly determined by their altitude and exposure to north-easterly trade winds. The main objective of this study was to compare the thermohygrometric conditions of three juniper woodlands: La Dehesa (north-west face at 528 m a.s.l.), El Julan (south face at 996 m a.s.l.) and Sabinosa (north face at 258 m a.s.l.). They are located at different altitude and orientation in El Hierro and present different recovery rates. We used air sensor data loggers fixed to tree branches for recording hourly temperature and humidity data in the three study areas. We analysed daily data of three annual cycles (from September 2012 to August 2015). Similar thermohygrometric annual cycles among the three study areas were observed. We detected the largest differences in winter temperature and summer humidity between the north (to windward) (Sabinosa and La Dehesa) and south (to leeward) (El Julan) faces of the island. The juniper woodland with a highest recovery rate (El Julan) showed the most extreme temperature conditions in both winter and summer seasons. The results of this project might contribute to the knowledge of the juniper bioclimatology in El Hierro, where there is the biggest population of Juniperus turbinata throughout the Canary Islands.

  1. The Secrets of Faces

    OpenAIRE

    Enquist, Magnus; Ghirlanda, Stefano

    1998-01-01

    This is a comment on an article by Perrett et al., on the same issue of Nature, investigating face perception. With computer graphics, Perrett and colleagues have produced exaggerated male and female faces, and asked people to rate them with respect to femininity or masculinity, and personality traits such as intelligence, emotionality and so on. The key question is: what informations do faces (and sexual signals in general) convey? One view, supported by Perrett and colleagues, is that all a...

  2. Face Attention Network: An Effective Face Detector for the Occluded Faces

    OpenAIRE

    Wang, Jianfeng; Yuan, Ye; Yu, Gang

    2017-01-01

    The performance of face detection has been largely improved with the development of convolutional neural network. However, the occlusion issue due to mask and sunglasses, is still a challenging problem. The improvement on the recall of these occluded cases usually brings the risk of high false positives. In this paper, we present a novel face detector called Face Attention Network (FAN), which can significantly improve the recall of the face detection problem in the occluded case without comp...

  3. Libor at crossroads: Stochastic switching detection using information theory quantifiers

    International Nuclear Information System (INIS)

    Bariviera, Aurelio F.; Guercio, M. Belén; Martinez, Lisana B.; Rosso, Osvaldo A.

    2016-01-01

    Highlights: • 28 time series of Libor rates, classified in seven maturities and four currencies, during the last 14 years, were considered. • The analysis was performed using a novel technique in financial economics: the Complexity–Entropy Causality Plane. • Our analysis unveils an abnormal movement of Libor time series around the period of the 2007 financial crisis. • This alteration in the stochastic dynamics of Libor is contemporary of what press called “Libor scandal”. - Abstract: This paper studies the 28 time series of Libor rates, classified in seven maturities and four currencies, during the last 14 years. The analysis was performed using a novel technique in financial economics: the Complexity–Entropy Causality Plane. This planar representation allows the discrimination of different stochastic and chaotic regimes. Using a temporal analysis based on moving windows, this paper unveils an abnormal movement of Libor time series around the period of the 2007 financial crisis. This alteration in the stochastic dynamics of Libor is contemporary of what press called “Libor scandal”, i.e. the manipulation of interest rates carried out by several prime banks. We argue that our methodology is suitable as a market watch mechanism, as it makes visible the temporal redution in informational efficiency of the market.

  4. Information Seeking Behavior in Blind People of Iran : a Survey based on Various Experiences faced by them

    Directory of Open Access Journals (Sweden)

    Hasan Siamian

    2016-12-01

    Full Text Available Access to information and its dissemination for the planning of health and social care is essential. While information is not always available as per the needs of the blind people, thus the public libraries and information centers led for meeting the information needs culture and proper knowledge. The study was based on a Descriptive-analytic method in which we included 384 blind people of both the sex selected by the multi-clustering method from 10 provinces of Iran. Health information of the subjects was collect through a researcher-based questionnaire. Results showed that religion, occupations, and access to healthy living, were the first top priority of blind people for meeting information needs in three cultural; social in addition, health forms. The blind people try to look for information on a daily basis and seeking up-to-date technologies. They are most used to audio media rather than any other media to access, utilise information, and rarely used new technologies. Unlike normal people, blind people have high expectations from the library. An attempt has also been taken to present a new model.

  5. Face recognition : implementation of face recognition on AMIGO

    NARCIS (Netherlands)

    Geelen, M.J.A.J.; Molengraft, van de M.J.G.; Elfring, J.

    2011-01-01

    In this (traineeship)report two possible methods of face recognition were presented. The first method describes how to detect and recognize faces by using the SURF algorithm. This algorithm finally was not used for recognizing faces, with the reason that the Eigenface algorithm was an already tested

  6. TIGER/Line Shapefile, 2016, Series Information for the Topological Faces-Area Hydrography County-based Relationship File

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  7. TIGER/Line Shapefile, 2012, Series Information File for the Current Topological Faces (Polygons With All Geocodes) Shapefiles

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  8. About Face

    Medline Plus

    Full Text Available ... Basics PTSD Treatment What is AboutFace? Resources for Professionals Get Help Home Watch Videos by Topic Videos ... Basics PTSD Treatment What is AboutFace? Resources for Professionals Get Help PTSD We've been there. After ...

  9. About Face

    Medline Plus

    Full Text Available ... Treatment What is AboutFace? Resources for Professionals Get Help Home Watch Videos by Topic Videos by Type ... Treatment What is AboutFace? Resources for Professionals Get Help PTSD We've been there. After a traumatic ...

  10. Friends with Faces: How Social Networks Can Enhance Face Recognition and Vice Versa

    Science.gov (United States)

    Mavridis, Nikolaos; Kazmi, Wajahat; Toulis, Panos

    The "friendship" relation, a social relation among individuals, is one of the primary relations modeled in some of the world's largest online social networking sites, such as "FaceBook." On the other hand, the "co-occurrence" relation, as a relation among faces appearing in pictures, is one that is easily detectable using modern face detection techniques. These two relations, though appearing in different realms (social vs. visual sensory), have a strong correlation: faces that co-occur in photos often belong to individuals who are friends. Using real-world data gathered from "Facebook," which were gathered as part of the "FaceBots" project, the world's first physical face-recognizing and conversing robot that can utilize and publish information on "Facebook" was established. We present here methods as well as results for utilizing this correlation in both directions. Both algorithms for utilizing knowledge of the social context for faster and better face recognition are given, as well as algorithms for estimating the friendship network of a number of individuals given photos containing their faces. The results are quite encouraging. In the primary example, doubling of the recognition accuracy as well as a sixfold improvement in speed is demonstrated. Various improvements, interesting statistics, as well as an empirical investigation leading to predictions of scalability to much bigger data sets are discussed.

  11. Rapid prefrontal cortex activation towards aversively paired faces and enhanced contingency detection are observed in highly trait-anxious women under challenging conditions

    Directory of Open Access Journals (Sweden)

    Maimu Alissa Rehbein

    2015-06-01

    Full Text Available Relative to healthy controls, anxiety-disorder patients show anomalies in classical conditioning that may either result from, or provide a risk factor for, clinically relevant anxiety. Here, we investigated whether healthy participants with enhanced anxiety vulnerability show abnormalities in a challenging affective-conditioning paradigm, in which many stimulus-reinforcer associations had to be acquired with only few learning trials. Forty-seven high and low trait-anxious females underwent MultiCS conditioning, in which 52 different neutral faces (CS+ were paired with an aversive noise (US, while further 52 faces (CS- remained unpaired. Emotional learning was assessed by evaluative (rating, behavioral (dot-probe, contingency report, and neurophysiological (magnetoencephalography measures before, during, and after learning. High and low trait-anxious groups did not differ in evaluative ratings or response priming before or after conditioning. High trait-anxious women, however, were better than low trait-anxious women at reporting CS+/US contingencies after conditioning, and showed an enhanced prefrontal cortex activation towards CS+ in the M1 (i.e., 80 to 117 ms and M170 time intervals (i.e., 140 to 160 ms during acquisition. These effects in MultiCS conditioning observed in individuals with elevated trait anxiety are consistent with theories of enhanced conditionability in anxiety vulnerability. Furthermore, they point towards increased threat monitoring and detection in highly trait-anxious females, possibly mediated by alterations in visual working memory.

  12. Rapid prefrontal cortex activation towards aversively paired faces and enhanced contingency detection are observed in highly trait-anxious women under challenging conditions

    Science.gov (United States)

    Rehbein, Maimu Alissa; Wessing, Ida; Zwitserlood, Pienie; Steinberg, Christian; Eden, Annuschka Salima; Dobel, Christian; Junghöfer, Markus

    2015-01-01

    Relative to healthy controls, anxiety-disorder patients show anomalies in classical conditioning that may either result from, or provide a risk factor for, clinically relevant anxiety. Here, we investigated whether healthy participants with enhanced anxiety vulnerability show abnormalities in a challenging affective-conditioning paradigm, in which many stimulus-reinforcer associations had to be acquired with only few learning trials. Forty-seven high and low trait-anxious females underwent MultiCS conditioning, in which 52 different neutral faces (CS+) were paired with an aversive noise (US), while further 52 faces (CS−) remained unpaired. Emotional learning was assessed by evaluative (rating), behavioral (dot-probe, contingency report), and neurophysiological (magnetoencephalography) measures before, during, and after learning. High and low trait-anxious groups did not differ in evaluative ratings or response priming before or after conditioning. High trait-anxious women, however, were better than low trait-anxious women at reporting CS+/US contingencies after conditioning, and showed an enhanced prefrontal cortex (PFC) activation towards CS+ in the M1 (i.e., 80–117 ms) and M170 time intervals (i.e., 140–160 ms) during acquisition. These effects in MultiCS conditioning observed in individuals with elevated trait anxiety are consistent with theories of enhanced conditionability in anxiety vulnerability. Furthermore, they point towards increased threat monitoring and detection in highly trait-anxious females, possibly mediated by alterations in visual working memory. PMID:26113814

  13. What information do parents need when facing end-of-life decisions for their child? A meta-synthesis of parental feedback.

    Science.gov (United States)

    Xafis, Vicki; Wilkinson, Dominic; Sullivan, Jane

    2015-04-30

    The information needs of parents facing end-of-life decisions for their child are complex due to the wide-ranging dimensions within which such significant events unfold. While parents acknowledge that healthcare professionals are their main source of information, they also turn to a variety of additional sources of written information in an attempt to source facts, discover solutions, and find hope. Much has been written about the needs of parents faced with end-of-life decisions for their child but little is known about the written information needs such parents have. Research in the adult intensive care context has shown that written resources impact positively on the understanding of medical facts, including diagnoses and prognoses, communication between families and healthcare professionals, and the emotional wellbeing of families after their relative's death. A meta-synthesis of predominantly empirical research pertaining to features which assist or impede parental end-of-life decisions was undertaken to provide insight and guidance in our development of written resources (short print and online comprehensive version) for parents. The most prominently cited needs in the literature related to numerous aspects of information provision; the quantity, quality, delivery, and timing of information and its provision impacted not only on parents' ability to make end-of-life decisions but also on their emotional wellbeing. The meta-synthesis supports the value of written materials, as these provide guidance for both parents and healthcare professionals in pertinent content areas. Further research is required to determine the impact that written resources have on parental end-of-life decision-making and on parents' wellbeing during and after their experience and time in the hospital environment.

  14. System and method for extracting physiological information from remotely detected electromagnetic radiation

    NARCIS (Netherlands)

    2016-01-01

    The present invention relates to a device and a method for extracting physiological information indicative of at least one health symptom from remotely detected electromagnetic radiation. The device comprises an interface (20) for receiving a data stream comprising remotely detected image data

  15. System and method for extracting physiological information from remotely detected electromagnetic radiation

    NARCIS (Netherlands)

    2015-01-01

    The present invention relates to a device and a method for extracting physiological information indicative of at least one health symptom from remotely detected electromagnetic radiation. The device comprises an interface (20) for receiving a data stream comprising remotely detected image data

  16. Phase synchronization of delta and theta oscillations increase during the detection of relevant lexical information

    Directory of Open Access Journals (Sweden)

    Enzo eBrunetti

    2013-06-01

    Full Text Available During monitoring of the discourse, the detection of the relevance of incoming lexical information could be critical for its incorporation to update mental representations in memory. Because, in these situations, the relevance for lexical information is defined by abstract rules that are maintained in memory, results critical to understand how an abstract level of knowledge maintained in mind mediates the detection of the lower-level semantic information. In the present study, we propose that neuronal oscillations participate in the detection of relevant lexical information, based on ‘kept in mind’ rules deriving from more abstract semantic information. We tested our hypothesis using an experimental paradigm that restricted the detection of relevance to inferences based on explicit information, thus controlling for ambiguities derived from implicit aspects. We used a categorization task, in which the semantic relevance was previously defined based on the congruency between a kept in mind category (abstract knowledge, and the lexical-semantic information presented. Our results show that during the detection of the relevant lexical information, phase synchronization of neuronal oscillations selectively increases in delta and theta frequency bands during the interval of semantic analysis. These increments were independent of the semantic category maintained in memory, had a temporal profile specific for each subject, and were mainly induced, as they had no effect on the evoked mean global field power. Also, recruitment of an increased number of pairs of electrodes was a robust observation during the detection of semantic contingent words. These results are consistent with the notion that the detection of relevant lexical information based on a particular semantic rule, could be mediated by increasing the global phase synchronization of neuronal oscillations, which may contribute to the recruitment of an extended number of cortical regions.

  17. Phase synchronization of delta and theta oscillations increase during the detection of relevant lexical information.

    Science.gov (United States)

    Brunetti, Enzo; Maldonado, Pedro E; Aboitiz, Francisco

    2013-01-01

    During monitoring of the discourse, the detection of the relevance of incoming lexical information could be critical for its incorporation to update mental representations in memory. Because, in these situations, the relevance for lexical information is defined by abstract rules that are maintained in memory, a central aspect to elucidate is how an abstract level of knowledge maintained in mind mediates the detection of the lower-level semantic information. In the present study, we propose that neuronal oscillations participate in the detection of relevant lexical information, based on "kept in mind" rules deriving from more abstract semantic information. We tested our hypothesis using an experimental paradigm that restricted the detection of relevance to inferences based on explicit information, thus controlling for ambiguities derived from implicit aspects. We used a categorization task, in which the semantic relevance was previously defined based on the congruency between a kept in mind category (abstract knowledge), and the lexical semantic information presented. Our results show that during the detection of the relevant lexical information, phase synchronization of neuronal oscillations selectively increases in delta and theta frequency bands during the interval of semantic analysis. These increments occurred irrespective of the semantic category maintained in memory, had a temporal profile specific for each subject, and were mainly induced, as they had no effect on the evoked mean global field power. Also, recruitment of an increased number of pairs of electrodes was a robust observation during the detection of semantic contingent words. These results are consistent with the notion that the detection of relevant lexical information based on a particular semantic rule, could be mediated by increasing the global phase synchronization of neuronal oscillations, which may contribute to the recruitment of an extended number of cortical regions.

  18. The Changing Face of Librarianship in Papua New Guinea: Libraries for Life in the Papua New Guinea Information Society?

    Science.gov (United States)

    Obi, Margaret J.

    "Libraries for life" in Papua New Guinea today is not an impossible goal to strive for to achieve with today's new and old information and communication technologies. However, in order for this to happen, a number of questions will need to be asked. There are three that need immediate attention: (1) What is an "information…

  19. e-Research support services: responding to a challenge facing the South African research and information communities

    CSIR Research Space (South Africa)

    Page-Shipp, RJ

    2005-12-01

    Full Text Available and development strategy, published in 2002, invited role players to find ways of increasing economic growth and improve the quality of life of all South Africans. Many relatively small, disconnected information projects with various funding streams were initiated...

  20. Quantified Faces

    DEFF Research Database (Denmark)

    Sørensen, Mette-Marie Zacher

    2016-01-01

    artist Marnix de Nijs' Physiognomic Scrutinizer is an interactive installation whereby the viewer's face is scanned and identified with historical figures. The American artist Zach Blas' project Fag Face Mask consists of three-dimensional portraits that blend biometric facial data from 30 gay men's faces...... and critically examine bias in surveillance technologies, as well as scientific investigations, regarding the stereotyping mode of the human gaze. The American artist Heather Dewey-Hagborg creates three-dimensional portraits of persons she has “identified” from their garbage. Her project from 2013 entitled...

  1. Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

    Directory of Open Access Journals (Sweden)

    Mohamed Idhammad

    2018-01-01

    Full Text Available Cloud Computing services are often delivered through HTTP protocol. This facilitates access to services and reduces costs for both providers and end-users. However, this increases the vulnerabilities of the Cloud services face to HTTP DDoS attacks. HTTP request methods are often used to address web servers’ vulnerabilities and create multiple scenarios of HTTP DDoS attack such as Low and Slow or Flooding attacks. Existing HTTP DDoS detection systems are challenged by the big amounts of network traffic generated by these attacks, low detection accuracy, and high false positive rates. In this paper we present a detection system of HTTP DDoS attacks in a Cloud environment based on Information Theoretic Entropy and Random Forest ensemble learning algorithm. A time-based sliding window algorithm is used to estimate the entropy of the network header features of the incoming network traffic. When the estimated entropy exceeds its normal range the preprocessing and the classification tasks are triggered. To assess the proposed approach various experiments were performed on the CIDDS-001 public dataset. The proposed approach achieves satisfactory results with an accuracy of 99.54%, a FPR of 0.4%, and a running time of 18.5s.

  2. Reading faces and Facing words

    DEFF Research Database (Denmark)

    Robotham, Julia Emma; Lindegaard, Martin Weis; Delfi, Tzvetelina Shentova

    unilateral lesions, we found no patient with a selective deficit in either reading or face processing. Rather, the patients showing a deficit in processing either words or faces were also impaired with the other category. One patient performed within the normal range on all tasks. In addition, all patients......It has long been argued that perceptual processing of faces and words is largely independent, highly specialised and strongly lateralised. Studies of patients with either pure alexia or prosopagnosia have strongly contributed to this view. The aim of our study was to investigate how visual...... perception of faces and words is affected by unilateral posterior stroke. Two patients with lesions in their dominant hemisphere and two with lesions in their non-dominant hemisphere were tested on sensitive tests of face and word perception during the stable phase of recovery. Despite all patients having...

  3. Neural synchronization during face-to-face communication.

    Science.gov (United States)

    Jiang, Jing; Dai, Bohan; Peng, Danling; Zhu, Chaozhe; Liu, Li; Lu, Chunming

    2012-11-07

    Although the human brain may have evolutionarily adapted to face-to-face communication, other modes of communication, e.g., telephone and e-mail, increasingly dominate our modern daily life. This study examined the neural difference between face-to-face communication and other types of communication by simultaneously measuring two brains using a hyperscanning approach. The results showed a significant increase in the neural synchronization in the left inferior frontal cortex during a face-to-face dialog between partners but none during a back-to-back dialog, a face-to-face monologue, or a back-to-back monologue. Moreover, the neural synchronization between partners during the face-to-face dialog resulted primarily from the direct interactions between the partners, including multimodal sensory information integration and turn-taking behavior. The communicating behavior during the face-to-face dialog could be predicted accurately based on the neural synchronization level. These results suggest that face-to-face communication, particularly dialog, has special neural features that other types of communication do not have and that the neural synchronization between partners may underlie successful face-to-face communication.

  4. The Caledonian face test: A new test of face discrimination.

    Science.gov (United States)

    Logan, Andrew J; Wilkinson, Frances; Wilson, Hugh R; Gordon, Gael E; Loffler, Gunter

    2016-02-01

    This study aimed to develop a clinical test of face perception which is applicable to a wide range of patients and can capture normal variability. The Caledonian face test utilises synthetic faces which combine simplicity with sufficient realism to permit individual identification. Face discrimination thresholds (i.e. minimum difference between faces required for accurate discrimination) were determined in an "odd-one-out" task. The difference between faces was controlled by an adaptive QUEST procedure. A broad range of face discrimination sensitivity was determined from a group (N=52) of young adults (mean 5.75%; SD 1.18; range 3.33-8.84%). The test is fast (3-4 min), repeatable (test-re-test r(2)=0.795) and demonstrates a significant inversion effect. The potential to identify impairments of face discrimination was evaluated by testing LM who reported a lifelong difficulty with face perception. While LM's impairment for two established face tests was close to the criterion for significance (Z-scores of -2.20 and -2.27) for the Caledonian face test, her Z-score was -7.26, implying a more than threefold higher sensitivity. The new face test provides a quantifiable and repeatable assessment of face discrimination ability. The enhanced sensitivity suggests that the Caledonian face test may be capable of detecting more subtle impairments of face perception than available tests. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. La libertad de información frente a Internet // The freedom of information facing the internet

    Directory of Open Access Journals (Sweden)

    Daniel Capodiferro Cubero

    2017-12-01

    or what role should play journalists in the digital society. Subjects no longer need mass media for effective reporting. They simply have to get access to a specific technology to do so, which opens a new debate: if the public powers should guarantee the access to it and how. With regard to the protection of freedom of information in the Internet, it may be useful to focus attention on the training of the subject as a journalist to identify who possess certain knowledge of the technique and deontology and, therefore, is able to act in a responsible manner contributing to public debate in constructive terms. Likewise, concepts such as the veracity of information, which may also have a new application in relation to advertising, or the prohibition of prior censorship must be reconsidered to their implementation in the digital environment, since it does not seem appropriate to renounce them in digital communications.

  6. Tools for Multimode Quantum Information: Modulation, Detection, and Spatial Quantum Correlations

    DEFF Research Database (Denmark)

    Lassen, Mikael Østergaard; Delaubert, Vincent; Janousek, Jirí

    2007-01-01

    We present here all the tools required for continuous variable parallel quantum information protocols based on spatial multi-mode quantum correlations and entanglement. We describe techniques for encoding and detecting this quantum information with high efficiency in the individual modes. We use ...

  7. About Face

    Medline Plus

    Full Text Available Skip to Content Menu Closed (Tap to Open) Home Interviews Our Stories Search All Videos PTSD Basics PTSD Treatment What is AboutFace? Resources for Professionals Get Help Home Watch Interviews Our ...

  8. About Face

    Medline Plus

    Full Text Available ... not feeling better, you may have PTSD (posttraumatic stress disorder). Watch the intro This is AboutFace In these videos, Veterans, family members, and clinicians share their experiences with PTSD ...

  9. About Face

    Medline Plus

    Full Text Available Skip to Content Menu Closed (Tap to Open) Home Videos by Topic Videos by Type Search All ... What is AboutFace? Resources for Professionals Get Help Home Watch Videos by Topic Videos by Type Search ...

  10. About Face

    Medline Plus

    Full Text Available Skip to Content Menu Closed (Tap to Open) Home Interviews Our Stories Search All Videos PTSD Basics ... What is AboutFace? Resources for Professionals Get Help Home Watch Interviews Our Stories Search All Videos Learn ...

  11. A Novel Abandoned Object Detection System Based on Three-Dimensional Image Information

    Directory of Open Access Journals (Sweden)

    Yiliang Zeng

    2015-03-01

    Full Text Available A new idea of an abandoned object detection system for road traffic surveillance systems based on three-dimensional image information is proposed in this paper to prevent traffic accidents. A novel Binocular Information Reconstruction and Recognition (BIRR algorithm is presented to implement the new idea. As initial detection, suspected abandoned objects are detected by the proposed static foreground region segmentation algorithm based on surveillance video from a monocular camera. After detection of suspected abandoned objects, three-dimensional (3D information of the suspected abandoned object is reconstructed by the proposed theory about 3D object information reconstruction with images from a binocular camera. To determine whether the detected object is hazardous to normal road traffic, road plane equation and height of suspected-abandoned object are calculated based on the three-dimensional information. Experimental results show that this system implements fast detection of abandoned objects and this abandoned object system can be used for road traffic monitoring and public area surveillance.

  12. A special purpose knowledge-based face localization method

    Science.gov (United States)

    Hassanat, Ahmad; Jassim, Sabah

    2008-04-01

    This paper is concerned with face localization for visual speech recognition (VSR) system. Face detection and localization have got a great deal of attention in the last few years, because it is an essential pre-processing step in many techniques that handle or deal with faces, (e.g. age, face, gender, race and visual speech recognition). We shall present an efficient method for localization human's faces in video images captured on mobile constrained devices, under a wide variation in lighting conditions. We use a multiphase method that may include all or some of the following steps starting with image pre-processing, followed by a special purpose edge detection, then an image refinement step. The output image will be passed through a discrete wavelet decomposition procedure, and the computed LL sub-band at a certain level will be transformed into a binary image that will be scanned by using a special template to select a number of possible candidate locations. Finally, we fuse the scores from the wavelet step with scores determined by color information for the candidate location and employ a form of fuzzy logic to distinguish face from non-face locations. We shall present results of large number of experiments to demonstrate that the proposed face localization method is efficient and achieve high level of accuracy that outperforms existing general-purpose face detection methods.

  13. Face time: educating face transplant candidates.

    Science.gov (United States)

    Lamparello, Brooke M; Bueno, Ericka M; Diaz-Siso, Jesus Rodrigo; Sisk, Geoffroy C; Pomahac, Bohdan

    2013-01-01

    Face transplantation is the innovative application of microsurgery and immunology to restore appearance and function to those with severe facial disfigurements. Our group aims to establish a multidisciplinary education program that can facilitate informed consent and build a strong knowledge base in patients to enhance adherence to medication regimes, recovery, and quality of life. We analyzed handbooks from our institution's solid organ transplant programs to identify topics applicable to face transplant patients. The team identified unique features of face transplantation that warrant comprehensive patient education. We created a 181-page handbook to provide subjects interested in pursuing transplantation with a written source of information on the process and team members and to address concerns they may have. While the handbook covers a wide range of topics, it is easy to understand and visually appealing. Face transplantation has many unique aspects that must be relayed to the patients pursuing this novel therapy. Since candidates lack third-party support groups and programs, the transplant team must provide an extensive educational component to enhance this complex process. As face transplantation continues to develop, programs must create sound education programs that address patients' needs and concerns to facilitate optimal care.

  14. Past, Present, and Future of Informed Consent in Pain and Genomics Research: Challenges Facing Global Medical Community.

    Science.gov (United States)

    Compagnone, Christian; Schatman, Michael E; Rauck, Richard L; Van Zundert, Jan; Kraus, Monika; Primorac, Dragan; Williams, Frances; Allegri, Massimo; Saccani Jordi, Gloria; Fanelli, Guido

    2017-01-01

    In recent decades, there has been a revision of the role of institutional review boards with the intention of protecting human subjects from harm and exploitation in research. Informed consent aims to protect the subject by explaining all of the benefits and risks associated with a specific research project. To date, there has not been a review published analyzing issues of informed consent in research in the field of genetic/Omics in subjects with chronic pain, and the current review aims to fill that gap in the ethical aspects of such investigation. Despite the extensive discussion on ethical challenges unique to the field of genetic/Omics, this is the first attempt at addressing ethical challenges regarding Informed Consent Forms for pain research as the primary focus. We see this contribution as an important one, for while ethical issues are too often ignored in pain research in general, the numerous arising ethical issues that are unique to pain genetic/Omics suggest that researchers in the field need to pay even greater attention to the rights of subjects/patients. This article presents the work of the Ethic Committee of the Pain-Omics Group (www.painomics.eu), a consortium of 11 centers that is running the Pain-Omics project funded by the European Community in the 7th Framework Program theme (HEALTH.2013.2.2.1-5-Understanding and controlling pain). The Ethic Committee is composed of 1 member of each group of the consortium as well as key opinion leaders in the field of ethics and pain more generally. © 2016 The Authors. Pain Practice published by Wiley Periodicals, Inc. on behalf of World Institute of Pain.

  15. Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2017-01-01

    Full Text Available In recent years, Android malware has continued to grow at an alarming rate. More recent malicious apps’ employing highly sophisticated detection avoidance techniques makes the traditional machine learning based malware detection methods far less effective. More specifically, they cannot cope with various types of Android malware and have limitation in detection by utilizing a single classification algorithm. To address this limitation, we propose a novel approach in this paper that leverages parallel machine learning and information fusion techniques for better Android malware detection, which is named Mlifdect. To implement this approach, we first extract eight types of features from static analysis on Android apps and build two kinds of feature sets after feature selection. Then, a parallel machine learning detection model is developed for speeding up the process of classification. Finally, we investigate the probability analysis based and Dempster-Shafer theory based information fusion approaches which can effectively obtain the detection results. To validate our method, other state-of-the-art detection works are selected for comparison with real-world Android apps. The experimental results demonstrate that Mlifdect is capable of achieving higher detection accuracy as well as a remarkable run-time efficiency compared to the existing malware detection solutions.

  16. Cultural-social and human resource challenges facing development of information technology in Iran's higher education in viewpoint of graduate students

    Directory of Open Access Journals (Sweden)

    M. Rahmanpoor

    2017-06-01

    Full Text Available The aim of the this study was survey of cultural-social and human recourses  challenges facing development of information technology in higher education in Iran. The population of this study was all graduate students studying in the Department of the State University in academic year 2010-2011. In first stage, Tehran, Allameh-Tabatabaee, San’ati-Sharif, Isfahan, Shiraz and Kurdistan Universities were selected as samples. Among these universities, 460 patients were randomly selected in proportion. Data were collected via a questionnaire. Reliability using Cronbach's alpha coefficient respectively 0/94, and its validity was confirmed by several professors. The data were calculated using SPSS statistical software and then analyzed. In Descriptive statistics level, indicators of frequency, percentage and standard deviation, and in inferential statistics level, T test, ANOVA and post hoc test was used. The results showed that in cultural-social  dimension including the important challenges were the high ratio of computers to students, poor students searching spirit, and lack of English language teachers and students. In human resource dimension are also unfamiliar of the students with the how access to information in databases, shortage or lack of professional expertise in information technology, faculty and administrators do not understand the capabilities of information technology, were most important challenges Information technology in Iran's higher education.

  17. Development of a methodology for the detection of hospital financial outliers using information systems.

    Science.gov (United States)

    Okada, Sachiko; Nagase, Keisuke; Ito, Ayako; Ando, Fumihiko; Nakagawa, Yoshiaki; Okamoto, Kazuya; Kume, Naoto; Takemura, Tadamasa; Kuroda, Tomohiro; Yoshihara, Hiroyuki

    2014-01-01

    Comparison of financial indices helps to illustrate differences in operations and efficiency among similar hospitals. Outlier data tend to influence statistical indices, and so detection of outliers is desirable. Development of a methodology for financial outlier detection using information systems will help to reduce the time and effort required, eliminate the subjective elements in detection of outlier data, and improve the efficiency and quality of analysis. The purpose of this research was to develop such a methodology. Financial outliers were defined based on a case model. An outlier-detection method using the distances between cases in multi-dimensional space is proposed. Experiments using three diagnosis groups indicated successful detection of cases for which the profitability and income structure differed from other cases. Therefore, the method proposed here can be used to detect outliers. Copyright © 2013 John Wiley & Sons, Ltd.

  18. Oxytocin and Pareidolia Face Detection Using the Visual Search Task. A double blind, placebo-controlled within-subject design study using eye tracking and intranasal oxytocin.

    OpenAIRE

    Winge, Jarle Alexander

    2014-01-01

    Face pareidolia is the human tendency to see illusory human-like faces, for example in random patterns exhibiting configural properties of a face. Past research on humans show that oxytocin has a crucial role in enhancing facial processing. By leading to an increased focus on the face in general, and eyes especially, alter the encoding and conceptual recognition of social stimuli, enhancing sensitivity to hidden emotions in facial expressions, and enhancing the ability to interpret the fac...

  19. Explaining Sad People's Memory Advantage for Faces.

    Science.gov (United States)

    Hills, Peter J; Marquardt, Zoe; Young, Isabel; Goodenough, Imogen

    2017-01-01

    Sad people recognize faces more accurately than happy people (Hills et al., 2011). We devised four hypotheses for this finding that are tested between in the current study. The four hypotheses are: (1) sad people engage in more expert processing associated with face processing; (2) sad people are motivated to be more accurate than happy people in an attempt to repair their mood; (3) sad people have a defocused attentional strategy that allows more information about a face to be encoded; and (4) sad people scan more of the face than happy people leading to more facial features to be encoded. In Experiment 1, we found that dysphoria (sad mood often associated with depression) was not correlated with the face-inversion effect (a measure of expert processing) nor with response times but was correlated with defocused attention and recognition accuracy. Experiment 2 established that dysphoric participants detected changes made to more facial features than happy participants. In Experiment 3, using eye-tracking we found that sad-induced participants sampled more of the face whilst avoiding the eyes. Experiment 4 showed that sad-induced people demonstrated a smaller own-ethnicity bias. These results indicate that sad people show different attentional allocation to faces than happy and neutral people.

  20. Detection of image structures using the Fisher information and the Rao metric.

    Science.gov (United States)

    Maybank, Stephen J

    2004-12-01

    In many detection problems, the structures to be detected are parameterized by the points of a parameter space. If the conditional probability density function for the measurements is known, then detection can be achieved by sampling the parameter space at a finite number of points and checking each point to see if the corresponding structure is supported by the data. The number of samples and the distances between neighboring samples are calculated using the Rao metric on the parameter space. The Rao metric is obtained from the Fisher information which is, in turn, obtained from the conditional probability density function. An upper bound is obtained for the probability of a false detection. The calculations are simplified in the low noise case by making an asymptotic approximation to the Fisher information. An application to line detection is described. Expressions are obtained for the asymptotic approximation to the Fisher information, the volume of the parameter space, and the number of samples. The time complexity for line detection is estimated. An experimental comparison is made with a Hough transform-based method for detecting lines.

  1. Scene text detection by leveraging multi-channel information and local context

    Science.gov (United States)

    Wang, Runmin; Qian, Shengyou; Yang, Jianfeng; Gao, Changxin

    2018-03-01

    As an important information carrier, texts play significant roles in many applications. However, text detection in unconstrained scenes is a challenging problem due to cluttered backgrounds, various appearances, uneven illumination, etc.. In this paper, an approach based on multi-channel information and local context is proposed to detect texts in natural scenes. According to character candidate detection plays a vital role in text detection system, Maximally Stable Extremal Regions(MSERs) and Graph-cut based method are integrated to obtain the character candidates by leveraging the multi-channel image information. A cascaded false positive elimination mechanism are constructed from the perspective of the character and the text line respectively. Since the local context information is very valuable for us, these information is utilized to retrieve the missing characters for boosting the text detection performance. Experimental results on two benchmark datasets, i.e., the ICDAR 2011 dataset and the ICDAR 2013 dataset, demonstrate that the proposed method have achieved the state-of-the-art performance.

  2. Single-trial EEG-informed fMRI reveals spatial dependency of BOLD signal on early and late IC-ERP amplitudes during face recognition.

    Science.gov (United States)

    Wirsich, Jonathan; Bénar, Christian; Ranjeva, Jean-Philippe; Descoins, Médéric; Soulier, Elisabeth; Le Troter, Arnaud; Confort-Gouny, Sylviane; Liégeois-Chauvel, Catherine; Guye, Maxime

    2014-10-15

    Simultaneous EEG-fMRI has opened up new avenues for improving the spatio-temporal resolution of functional brain studies. However, this method usually suffers from poor EEG quality, especially for evoked potentials (ERPs), due to specific artifacts. As such, the use of EEG-informed fMRI analysis in the context of cognitive studies has particularly focused on optimizing narrow ERP time windows of interest, which ignores the rich diverse temporal information of the EEG signal. Here, we propose to use simultaneous EEG-fMRI to investigate the neural cascade occurring during face recognition in 14 healthy volunteers by using the successive ERP peaks recorded during the cognitive part of this process. N170, N400 and P600 peaks, commonly associated with face recognition, were successfully and reproducibly identified for each trial and each subject by using a group independent component analysis (ICA). For the first time we use this group ICA to extract several independent components (IC) corresponding to the sequence of activation and used single-trial peaks as modulation parameters in a general linear model (GLM) of fMRI data. We obtained an occipital-temporal-frontal stream of BOLD signal modulation, in accordance with the three successive IC-ERPs providing an unprecedented spatio-temporal characterization of the whole cognitive process as defined by BOLD signal modulation. By using this approach, the pattern of EEG-informed BOLD modulation provided improved characterization of the network involved than the fMRI-only analysis or the source reconstruction of the three ERPs; the latter techniques showing only two regions in common localized in the occipital lobe. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. [Fast Detection of Camellia Sinensis Growth Process and Tea Quality Informations with Spectral Technology: A Review].

    Science.gov (United States)

    Peng, Ji-yu; Song, Xing-lin; Liu, Fei; Bao, Yi-dan; He, Yong

    2016-03-01

    The research achievements and trends of spectral technology in fast detection of Camellia sinensis growth process information and tea quality information were being reviewed. Spectral technology is a kind of fast, nondestructive, efficient detection technology, which mainly contains infrared spectroscopy, fluorescence spectroscopy, Raman spectroscopy and mass spectroscopy. The rapid detection of Camellia sinensis growth process information and tea quality is helpful to realize the informatization and automation of tea production and ensure the tea quality and safety. This paper provides a review on its applications containing the detection of tea (Camellia sinensis) growing status(nitrogen, chlorophyll, diseases and insect pest), the discrimination of tea varieties, the grade discrimination of tea, the detection of tea internal quality (catechins, total polyphenols, caffeine, amino acid, pesticide residual and so on), the quality evaluation of tea beverage and tea by-product, the machinery of tea quality determination and discrimination. This paper briefly introduces the trends of the technology of the determination of tea growth process information, sensor and industrial application. In conclusion, spectral technology showed high potential to detect Camellia sinensis growth process information, to predict tea internal quality and to classify tea varieties and grades. Suitable chemometrics and preprocessing methods is helpful to improve the performance of the model and get rid of redundancy, which provides the possibility to develop the portable machinery. Future work is to develop the portable machinery and on-line detection system is recommended to improve the further application. The application and research achievement of spectral technology concerning about tea were outlined in this paper for the first time, which contained Camellia sinensis growth, tea production, the quality and safety of tea and by-produce and so on, as well as some problems to be solved

  4. Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy

    Science.gov (United States)

    2014-03-27

    Gerard, 2005:3) The NTSB report lists alarm management as one of the top five areas for improvement in pipeline SCADA systems (Gerard, 2005:1...Zhang, Qin, Wang, and Liang for leak detection in a SCADA -run pipeline system. A concept derived from information theory improved leak detection...System for West Products Pipeline . Journal of Loss Prevention in the Process Industries, 22(6), 981-989. Zhu, B., & Sastry, S. (2010). SCADA

  5. Failure detection of liquid cooled electronics in sealed packages. [in airborne information management system

    Science.gov (United States)

    Hoadley, A. W.; Porter, A. J.

    1991-01-01

    The theory and experimental verification of a method of detecting fluid-mass loss, expansion-chamber pressure loss, or excessive vapor build-up in NASA's Airborne Information Management System (AIMS) are presented. The primary purpose of this leak-detection method is to detect the fluid-mass loss before the volume of vapor on the liquid side causes a temperature-critical part to be out of the liquid. The method detects the initial leak after the first 2.5 pct of the liquid mass has been lost, and it can be used for detecting subsequent situations including the leaking of air into the liquid chamber and the subsequent vapor build-up.

  6. About Face

    Medline Plus

    Full Text Available ... at first. But if it's been months or years since the trauma and you're not feeling better, you may have PTSD (posttraumatic stress disorder). Watch the intro This is AboutFace In these videos, Veterans, family members, ...

  7. About Face

    Medline Plus

    Full Text Available ... What is AboutFace? Resources for Professionals Get Help PTSD We've been there. After a traumatic event — ... you're not feeling better, you may have PTSD (posttraumatic stress disorder). Watch the intro This is ...

  8. A simple method for detection of gunshot residue particles from hands, hair, face, and clothing using scanning electron microscopy/wavelength dispersive X-ray (SEM/WDX).

    Science.gov (United States)

    Kage, S; Kudo, K; Kaizoji, A; Ryumoto, J; Ikeda, H; Ikeda, N

    2001-07-01

    We devised a simple and rapid method for detection of gunshot residue (GSR) particles, using scanning electron microscopy/wavelength dispersive X-ray (SEM/WDX) analysis. Experiments were done on samples containing GSR particles obtained from hands, hair, face, and clothing, using double-sided adhesive coated aluminum stubs (tape-lift method). SEM/WDX analyses for GSR were carried out in three steps: the first step was map analysis for barium (Ba) to search for GSR particles from lead styphnate primed ammunition, or tin (Sn) to search for GSR particles from mercury fulminate primed ammunition. The second step was determination of the location of GSR particles by X-ray imaging of Ba or Sn at a magnification of x 1000-2000 in the SEM, using data of map analysis, and the third step was identification of GSR particles, using WDX spectrometers. Analysis of samples from each primer of a stub took about 3 h. Practical applications were shown for utility of this method.

  9. Pressure, Dysfunctional Behavior, Fraud Detection and Role of Information Technology in the Audit Process

    OpenAIRE

    Muhammad Umar; Shinta Megawati Sitorus; Rika Lusiana Surya; Elvia R. Shauki; Vera Diyanti

    2017-01-01

    This study examines the effect of information technology and pressure such as time budget and task complexity on dysfunctional audit behavior. This study tests whether dysfunctional audit behavior affects fraud detection. Data were gathered from 81 auditors in Jakarta and were analyzed using structure equation model (SEM). The results explain that pressure (time budget and complexity task) have some impacts on dysfunctional audit behavior while information technology does not affect dysfuncti...

  10. Image preprocessing study on KPCA-based face recognition

    Science.gov (United States)

    Li, Xuan; Li, Dehua

    2015-12-01

    Face recognition as an important biometric identification method, with its friendly, natural, convenient advantages, has obtained more and more attention. This paper intends to research a face recognition system including face detection, feature extraction and face recognition, mainly through researching on related theory and the key technology of various preprocessing methods in face detection process, using KPCA method, focuses on the different recognition results in different preprocessing methods. In this paper, we choose YCbCr color space for skin segmentation and choose integral projection for face location. We use erosion and dilation of the opening and closing operation and illumination compensation method to preprocess face images, and then use the face recognition method based on kernel principal component analysis method for analysis and research, and the experiments were carried out using the typical face database. The algorithms experiment on MATLAB platform. Experimental results show that integration of the kernel method based on PCA algorithm under certain conditions make the extracted features represent the original image information better for using nonlinear feature extraction method, which can obtain higher recognition rate. In the image preprocessing stage, we found that images under various operations may appear different results, so as to obtain different recognition rate in recognition stage. At the same time, in the process of the kernel principal component analysis, the value of the power of the polynomial function can affect the recognition result.

  11. Use of maternal information for QTL detection in a (granddaughter design

    Directory of Open Access Journals (Sweden)

    Boichard Didier

    2002-05-01

    Full Text Available Abstract In a (granddaughter design, maternal information is often neglected because the number of progeny per dam is limited. The number of dams per maternal grandsire (MGS, however, could be large enough to contribute to QTL detection. But dams and MGS usually are not genotyped, there are two recombination opportunities between the MGS and the progeny, and at a given location, only half the progeny receive a MGS chromosomal segment. A 3-step procedure was developed to estimate: (1 the marker phenotypes probabilities of the MGS; (2 the probability of each possible MGS haplotype; (3 the probabilities that the progeny receives either the first, or second MGS segment, or a maternal grandam segment. These probabilities were used for QTL detection in a linear model including the effects of sire, MGS, paternal QTL, MGS QTL and maternal grandam QTL. Including the grandam QTL effect makes it possible to detect QTL in the grandam population, even when MGS are not informative. The detection power, studied by simulation, was rather high, provided that MGS family size was greater than 50. Using maternal information in the French dairy cattle granddaughter design made it possible to detect 23 additional QTL genomewise significant.

  12. Using Clustering Techniques To Detect Usage Patterns in a Web-based Information System.

    Science.gov (United States)

    Chen, Hui-Min; Cooper, Michael D.

    2001-01-01

    This study developed an analytical approach to detecting groups with homogenous usage patterns in a Web-based information system. Principal component analysis was used for data reduction, cluster analysis for categorizing usage into groups. The methodology was demonstrated and tested using two independent samples of user sessions from the…

  13. The construction FACE database - Codifying the NIOSH FACE reports.

    Science.gov (United States)

    Dong, Xiuwen Sue; Largay, Julie A; Wang, Xuanwen; Cain, Chris Trahan; Romano, Nancy

    2017-09-01

    The National Institute for Occupational Safety and Health (NIOSH) has published reports detailing the results of investigations on selected work-related fatalities through the Fatality Assessment and Control Evaluation (FACE) program since 1982. Information from construction-related FACE reports was coded into the Construction FACE Database (CFD). Use of the CFD was illustrated by analyzing major CFD variables. A total of 768 construction fatalities were included in the CFD. Information on decedents, safety training, use of PPE, and FACE recommendations were coded. Analysis shows that one in five decedents in the CFD died within the first two months on the job; 75% and 43% of reports recommended having safety training or installing protection equipment, respectively. Comprehensive research using FACE reports may improve understanding of work-related fatalities and provide much-needed information on injury prevention. The CFD allows researchers to analyze the FACE reports quantitatively and efficiently. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.

  14. [Face recognition in patients with schizophrenia].

    Science.gov (United States)

    Doi, Hirokazu; Shinohara, Kazuyuki

    2012-07-01

    It is well known that patients with schizophrenia show severe deficiencies in social communication skills. These deficiencies are believed to be partly derived from abnormalities in face recognition. However, the exact nature of these abnormalities exhibited by schizophrenic patients with respect to face recognition has yet to be clarified. In the present paper, we review the main findings on face recognition deficiencies in patients with schizophrenia, particularly focusing on abnormalities in the recognition of facial expression and gaze direction, which are the primary sources of information of others' mental states. The existing studies reveal that the abnormal recognition of facial expression and gaze direction in schizophrenic patients is attributable to impairments in both perceptual processing of visual stimuli, and cognitive-emotional responses to social information. Furthermore, schizophrenic patients show malfunctions in distributed neural regions, ranging from the fusiform gyrus recruited in the structural encoding of facial stimuli, to the amygdala which plays a primary role in the detection of the emotional significance of stimuli. These findings were obtained from research in patient groups with heterogeneous characteristics. Because previous studies have indicated that impairments in face recognition in schizophrenic patients might vary according to the types of symptoms, it is of primary importance to compare the nature of face recognition deficiencies and the impairments of underlying neural functions across sub-groups of patients.

  15. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    Directory of Open Access Journals (Sweden)

    Chundong Wang

    2018-03-01

    Full Text Available With the development of the Internet-of-Things (IoT, wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI. This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI. Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  16. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    Science.gov (United States)

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  17. Invariant Face recognition Using Infrared Images

    International Nuclear Information System (INIS)

    Zahran, E.G.

    2012-01-01

    Over the past few decades, face recognition has become a rapidly growing research topic due to the increasing demands in many applications of our daily life such as airport surveillance, personal identification in law enforcement, surveillance systems, information safety, securing financial transactions, and computer security. The objective of this thesis is to develop a face recognition system capable of recognizing persons with a high recognition capability, low processing time, and under different illumination conditions, and different facial expressions. The thesis presents a study for the performance of the face recognition system using two techniques; the Principal Component Analysis (PCA), and the Zernike Moments (ZM). The performance of the recognition system is evaluated according to several aspects including the recognition rate, and the processing time. Face recognition systems that use visual images are sensitive to variations in the lighting conditions and facial expressions. The performance of these systems may be degraded under poor illumination conditions or for subjects of various skin colors. Several solutions have been proposed to overcome these limitations. One of these solutions is to work in the Infrared (IR) spectrum. IR images have been suggested as an alternative source of information for detection and recognition of faces, when there is little or no control over lighting conditions. This arises from the fact that these images are formed due to thermal emissions from skin, which is an intrinsic property because these emissions depend on the distribution of blood vessels under the skin. On the other hand IR face recognition systems still have limitations with temperature variations and recognition of persons wearing eye glasses. In this thesis we will fuse IR images with visible images to enhance the performance of face recognition systems. Images are fused using the wavelet transform. Simulation results show that the fusion of visible and

  18. Using Information From Prior Satellite Scans to Improve Cloud Detection Near the Day-Night Terminator

    Science.gov (United States)

    Yost, Christopher R.; Minnis, Patrick; Trepte, Qing Z.; Palikonda, Rabindra; Ayers, Jeffrey K.; Spangenberg, Doulas A.

    2012-01-01

    With geostationary satellite data it is possible to have a continuous record of diurnal cycles of cloud properties for a large portion of the globe. Daytime cloud property retrieval algorithms are typically superior to nighttime algorithms because daytime methods utilize measurements of reflected solar radiation. However, reflected solar radiation is difficult to accurately model for high solar zenith angles where the amount of incident radiation is small. Clear and cloudy scenes can exhibit very small differences in reflected radiation and threshold-based cloud detection methods have more difficulty setting the proper thresholds for accurate cloud detection. Because top-of-atmosphere radiances are typically more accurately modeled outside the terminator region, information from previous scans can help guide cloud detection near the terminator. This paper presents an algorithm that uses cloud fraction and clear and cloudy infrared brightness temperatures from previous satellite scan times to improve the performance of a threshold-based cloud mask near the terminator. Comparisons of daytime, nighttime, and terminator cloud fraction derived from Geostationary Operational Environmental Satellite (GOES) radiance measurements show that the algorithm greatly reduces the number of false cloud detections and smoothes the transition from the daytime to the nighttime clod detection algorithm. Comparisons with the Geoscience Laser Altimeter System (GLAS) data show that using this algorithm decreases the number of false detections by approximately 20 percentage points.

  19. Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.

    Science.gov (United States)

    Liu, Yang; Xu, Songhua; Tourassi, Georgia

    2015-01-01

    In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.

  20. A new method to detect geometrical information by the tunneling microscope

    DEFF Research Database (Denmark)

    Tasaki, S.; Levitan, J.; Mygind, Jesper

    1997-01-01

    A new method for the detection of the geometrical information by the scanning tunneling microscope is proposed. In addition to the bias voltage, a small ac modulation is applied. The nonlinear dependence of the transmission coefficient on the applied voltage is used to generate harmonics. The ratio...... of the harmonics to the dc current is found to give the width between the sample and the probe, i.e., the geometrical information. This method may be useful to measure materials, where the local-spatial-density of states may change notably from place to place. ©1997 American Institute of Physics....

  1. Detecting Weather Radar Clutter by Information Fusion With Satellite Images and Numerical Weather Prediction Model Output

    DEFF Research Database (Denmark)

    Bøvith, Thomas; Nielsen, Allan Aasbjerg; Hansen, Lars Kai

    2006-01-01

    A method for detecting clutter in weather radar images by information fusion is presented. Radar data, satellite images, and output from a numerical weather prediction model are combined and the radar echoes are classified using supervised classification. The presented method uses indirect...... information on precipitation in the atmosphere from Meteosat-8 multispectral images and near-surface temperature estimates from the DMI-HIRLAM-S05 numerical weather prediction model. Alternatively, an operational nowcasting product called 'Precipitating Clouds' based on Meteosat-8 input is used. A scale...

  2. Audio computer-assisted survey instrument versus face-to-face interviews: optimal method for detecting high-risk behaviour in pregnant women and their sexual partners in the south of Brazil.

    Science.gov (United States)

    Yeganeh, N; Dillavou, C; Simon, M; Gorbach, P; Santos, B; Fonseca, R; Saraiva, J; Melo, M; Nielsen-Saines, K

    2013-04-01

    Audio computer-assisted survey instrument (ACASI) has been shown to decrease under-reporting of socially undesirable behaviours, but has not been evaluated in pregnant women at risk of HIV acquisition in Brazil. We assigned HIV-negative pregnant women receiving routine antenatal care at in Porto Alegre, Brazil and their partners to receive a survey regarding high-risk sexual behaviours and drug use via ACASI (n = 372) or face-to-face (FTF) (n = 283) interviews. Logistic regression showed that compared with FTF, pregnant women interviewed via ACASI were significantly more likely to self-report themselves as single (14% versus 6%), having >5 sexual partners (35% versus 29%), having oral sex (42% versus 35%), using intravenous drugs (5% versus 0), smoking cigarettes (23% versus 16%), drinking alcohol (13% versus 8%) and using condoms during pregnancy (32% versus 17%). Therefore, ACASI may be a useful method in assessing risk behaviours in pregnant women, especially in relation to drug and alcohol use.

  3. Near surface illumination method to detect particle size information by optical calibration free remission measurements

    Science.gov (United States)

    Stocker, Sabrina; Foschum, Florian; Kienle, Alwin

    2017-07-01

    A calibration free method to detect particle size information is presented. A possible application for such measurements is the investigation of raw milk since there not only the fat and protein content varies but also the fat droplet size. The newly developed method is sensitive to the scattering phase function, which makes it applicable to many other applications, too. By simulating the light propagation by use of Monte Carlo simulations, a calibration free device can be developed from this principle.

  4. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  5. A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

    OpenAIRE

    Davicino, Pablo; Echaiz, Javier; Ardenghi, Jorge Raúl

    2011-01-01

    Computer Intrusion Detection Systems (IDS) are primarily designed to protect availability, condentiality and integrity of critical information infrastructures. A Distributed IDS (DIDS) consists of several IDS over a large network(s), all of which communicate with each other, with a central server or with a cluster of servers that facilitates advanced network monitoring. In a distributed environment, DIDS are implemented using cooperative intelligent sensors distributed across the network(s). ...

  6. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  7. Robust QRS peak detection by multimodal information fusion of ECG and blood pressure signals.

    Science.gov (United States)

    Ding, Quan; Bai, Yong; Erol, Yusuf Bugra; Salas-Boni, Rebeca; Zhang, Xiaorong; Hu, Xiao

    2016-11-01

    QRS peak detection is a challenging problem when ECG signal is corrupted. However, additional physiological signals may also provide information about the QRS position. In this study, we focus on a unique benchmark provided by PhysioNet/Computing in Cardiology Challenge 2014 and Physiological Measurement focus issue: robust detection of heart beats in multimodal data, which aimed to explore robust methods for QRS detection in multimodal physiological signals. A dataset of 200 training and 210 testing records are used, where the testing records are hidden for evaluating the performance only. An information fusion framework for robust QRS detection is proposed by leveraging existing ECG and ABP analysis tools and combining heart beats derived from different sources. Results show that our approach achieves an overall accuracy of 90.94% and 88.66% on the training and testing datasets, respectively. Furthermore, we observe expected performance at each step of the proposed approach, as an evidence of the effectiveness of our approach. Discussion on the limitations of our approach is also provided.

  8. Moving target detection based on temporal-spatial information fusion for infrared image sequences

    Science.gov (United States)

    Toing, Wu-qin; Xiong, Jin-yu; Zeng, An-jun; Wu, Xiao-ping; Xu, Hao-peng

    2009-07-01

    Moving target detection and localization is one of the most fundamental tasks in visual surveillance. In this paper, through analyzing the advantages and disadvantages of the traditional approaches about moving target detection, a novel approach based on temporal-spatial information fusion is proposed for moving target detection. The proposed method combines the spatial feature in single frame and the temporal properties within multiple frames of an image sequence of moving target. First, the method uses the spatial image segmentation for target separation from background and uses the local temporal variance for extracting targets and wiping off the trail artifact. Second, the logical "and" operator is used to fuse the temporal and spatial information. In the end, to the fusion image sequence, the morphological filtering and blob analysis are used to acquire exact moving target. The algorithm not only requires minimal computation and memory but also quickly adapts to the change of background and environment. Comparing with other methods, such as the KDE, the Mixture of K Gaussians, etc., the simulation results show the proposed method has better validity and higher adaptive for moving target detection, especially in infrared image sequences with complex illumination change, noise change, and so on.

  9. [Comparative studies of face recognition].

    Science.gov (United States)

    Kawai, Nobuyuki

    2012-07-01

    Every human being is proficient in face recognition. However, the reason for and the manner in which humans have attained such an ability remain unknown. These questions can be best answered-through comparative studies of face recognition in non-human animals. Studies in both primates and non-primates show that not only primates, but also non-primates possess the ability to extract information from their conspecifics and from human experimenters. Neural specialization for face recognition is shared with mammals in distant taxa, suggesting that face recognition evolved earlier than the emergence of mammals. A recent study indicated that a social insect, the golden paper wasp, can distinguish their conspecific faces, whereas a closely related species, which has a less complex social lifestyle with just one queen ruling a nest of underlings, did not show strong face recognition for their conspecifics. Social complexity and the need to differentiate between one another likely led humans to evolve their face recognition abilities.

  10. Joint two-view information for computerized detection of microcalcifications on mammograms

    International Nuclear Information System (INIS)

    Sahiner, Berkman; Chan, H.-P.; Hadjiiski, Lubomir M.; Helvie, Mark A.; Paramagul, Chinatana; Ge Jun; Wei Jun; Zhou Chuan

    2006-01-01

    We are developing new techniques to improve the accuracy of computerized microcalcification detection by using the joint two-view information on craniocaudal (CC) and mediolateral-oblique (MLO) views. After cluster candidates were detected using a single-view detection technique, candidates on CC and MLO views were paired using their radial distances from the nipple. Candidate pairs were classified with a similarity classifier that used the joint information from both views. Each cluster candidate was also characterized by its single-view features. The outputs of the similarity classifier and the single-view classifier were fused and the cluster candidate was classified as a true microcalcification cluster or a false-positive (FP) using the fused two-view information. A data set of 116 pairs of mammograms containing microcalcification clusters and 203 pairs of normal images from the University of South Florida (USF) public database was used for training the two-view detection algorithm. The trained method was tested on an independent test set of 167 pairs of mammograms, which contained 71 normal pairs and 96 pairs with microcalcification clusters collected at the University of Michigan (UM). The similarity classifier had a very low FP rate for the test set at low and medium levels of sensitivity. However, the highest mammogram-based sensitivity that could be reached by the similarity classifier was 69%. The single-view classifier had a higher FP rate compared to the similarity classifier, but it could reach a maximum mammogram-based sensitivity of 93%. The fusion method combined the scores of these two classifiers so that the number of FPs was substantially reduced at relatively low and medium sensitivities, and a relatively high maximum sensitivity was maintained. For the malignant microcalcification clusters, at a mammogram-based sensitivity of 80%, the FP rates were 0.18 and 0.35 with the two-view fusion and single-view detection methods, respectively. When the

  11. At face value : categorization goals modulate vigilance for angry faces

    NARCIS (Netherlands)

    Van Dillen, L.F.; Lakens, D.; Bos, van den K.

    2010-01-01

    The present research demonstrates that the attention bias to angry faces is modulated by how people categorize these faces. Since facial expressions contain psychologically meaningful information for social categorizations (i.e., gender, personality) but not for non-social categorizations (i.e.,

  12. Online Particle Detection by Neural Networks Based on Topologic Calorimetry Information

    CERN Document Server

    Ciodaro, T; The ATLAS collaboration; Damazio, D; de Seixas, JM

    2011-01-01

    This paper presents the last results from the Ringer algorithm, which is based on artificial neural networks for the electron identification at the online filtering system of the ATLAS particle detector, in the context of the LHC experiment at CERN. The algorithm performs topological feature extraction over the ATLAS calorimetry information (energy measurements). Later, the extracted information is presented to a neural network classifier. Studies showed that the Ringer algorithm achieves high detection efficiency, while keeping the false alarm rate low. Optimizations, guided by detailed analysis, reduced the algorithm execution time in 59%. Also, the payload necessary to store the Ringer algorithm information represents less than 6.2 percent of the total filtering system amount

  13. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  14. Frontal Theta Activity Supports Detecting Mismatched Information in Visual Working Memory.

    Science.gov (United States)

    Liang, Tengfei; Hu, Zhonghua; Liu, Qiang

    2017-01-01

    During the comparison stage of visual working memory (VWM) processing, detecting the mismatch between the external sensory input and internal representations is a crucial cognitive ability for human, but the neural mechanism behind it remains largely unclear. The present study investigated the role of frontal theta power in detecting the mismatched information in VWM in a delayed matching task. A control task required to compare two simultaneously presented visual figures was also designed as a contrast to exclude the possibility that frontal theta activity just reflecting the non-memory-related behavioral conflicts. To better characterize the control mechanisms shaped by the frontal theta oscillation in human VWM, colored shapes were adopted as materials while both the task-relevant shape feature and task-irrelevant color feature could be mismatched. We found that the response times of participants were significantly delayed under the relevant- and irrelevant-mismatch conditions in both tasks and the conjunction-mismatch condition in delayed matching task. While our EEG data showed that increased frontal theta power was only observed under the relevant- and conjunction-mismatch conditions in the delayed matching task, but not the control task. These findings suggest that the frontal distributed theta activity observed here reflects the detection of mismatched information during the comparison stage of VWM, rather than the response-related conflicts. Furthermore, it is consistent with the proposal that theta-band oscillation can act as a control mechanism in working memory function so that the target-mismatched information in VWM could be successfully tracked. We also propose a possible processing structure to explain the neural dynamics underlying the mismatch detection process in VWM.

  15. Frontal Theta Activity Supports Detecting Mismatched Information in Visual Working Memory

    Directory of Open Access Journals (Sweden)

    Tengfei Liang

    2017-10-01

    Full Text Available During the comparison stage of visual working memory (VWM processing, detecting the mismatch between the external sensory input and internal representations is a crucial cognitive ability for human, but the neural mechanism behind it remains largely unclear. The present study investigated the role of frontal theta power in detecting the mismatched information in VWM in a delayed matching task. A control task required to compare two simultaneously presented visual figures was also designed as a contrast to exclude the possibility that frontal theta activity just reflecting the non-memory-related behavioral conflicts. To better characterize the control mechanisms shaped by the frontal theta oscillation in human VWM, colored shapes were adopted as materials while both the task-relevant shape feature and task-irrelevant color feature could be mismatched. We found that the response times of participants were significantly delayed under the relevant- and irrelevant-mismatch conditions in both tasks and the conjunction-mismatch condition in delayed matching task. While our EEG data showed that increased frontal theta power was only observed under the relevant- and conjunction-mismatch conditions in the delayed matching task, but not the control task. These findings suggest that the frontal distributed theta activity observed here reflects the detection of mismatched information during the comparison stage of VWM, rather than the response-related conflicts. Furthermore, it is consistent with the proposal that theta-band oscillation can act as a control mechanism in working memory function so that the target-mismatched information in VWM could be successfully tracked. We also propose a possible processing structure to explain the neural dynamics underlying the mismatch detection process in VWM.

  16. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  17. Detecting clinically relevant new information in clinical notes across specialties and settings.

    Science.gov (United States)

    Zhang, Rui; Pakhomov, Serguei V S; Arsoniadis, Elliot G; Lee, Janet T; Wang, Yan; Melton, Genevieve B

    2017-07-05

    Automated methods for identifying clinically relevant new versus redundant information in electronic health record (EHR) clinical notes is useful for clinicians and researchers involved in patient care and clinical research, respectively. We evaluated methods to automatically identify clinically relevant new information in clinical notes, and compared the quantity of redundant information across specialties and clinical settings. Statistical language models augmented with semantic similarity measures were evaluated as a means to detect and quantify clinically relevant new and redundant information over longitudinal clinical notes for a given patient. A corpus of 591 progress notes over 40 inpatient admissions was annotated for new information longitudinally by physicians to generate a reference standard. Note redundancy between various specialties was evaluated on 71,021 outpatient notes and 64,695 inpatient notes from 500 solid organ transplant patients (April 2015 through August 2015). Our best method achieved at best performance of 0.87 recall, 0.62 precision, and 0.72 F-measure. Addition of semantic similarity metrics compared to baseline improved recall but otherwise resulted in similar performance. While outpatient and inpatient notes had relatively similar levels of high redundancy (61% and 68%, respectively), redundancy differed by author specialty with mean redundancy of 75%, 66%, 57%, and 55% observed in pediatric, internal medicine, psychiatry and surgical notes, respectively. Automated techniques with statistical language models for detecting redundant versus clinically relevant new information in clinical notes do not improve with the addition of semantic similarity measures. While levels of redundancy seem relatively similar in the inpatient and ambulatory settings in the Fairview Health Services, clinical note redundancy appears to vary significantly with different medical specialties.

  18. Face pareidolia in the rhesus monkey

    OpenAIRE

    Taubert, Jessica; Wardle, Susan G.; Flessert, Molly; Leopold, David A.; Ungerleider, Leslie G.

    2017-01-01

    Face perception in humans and non-human primates is rapid and accurate[1–4]. In the human brain, a network of visual processing regions is specialized for faces[5–7]. Although face processing is a priority of the primate visual system, face detection is not infallible. Face pareidolia is the compelling illusion of perceiving facial features on inanimate objects, such as the illusory face on the surface of the moon. Although face pareidolia is commonly experienced by humans, its presence in ot...

  19. Famous face recognition, face matching, and extraversion.

    Science.gov (United States)

    Lander, Karen; Poyarekar, Siddhi

    2015-01-01

    It has been previously established that extraverts who are skilled at interpersonal interaction perform significantly better than introverts on a face-specific recognition memory task. In our experiment we further investigate the relationship between extraversion and face recognition, focusing on famous face recognition and face matching. Results indicate that more extraverted individuals perform significantly better on an upright famous face recognition task and show significantly larger face inversion effects. However, our results did not find an effect of extraversion on face matching or inverted famous face recognition.

  20. Uncertain Reasoning for Detection of Selling Stolen Goods in Online Auctions Using Contextual Information

    Directory of Open Access Journals (Sweden)

    Ladislav Beranek

    2014-01-01

    Full Text Available This work describes the design of a decision support system for detection of fraudulent behavior of selling stolen goods in online auctions. In this system, each seller is associated with a type of certification, namely “proper seller,” “suspect seller,” and “selling stolen goods.” The certification level is determined on the basis of a seller’s behaviors and especially on the basis of contextual information whose origin is outside online auctions portals. In this paper, we focus on representing knowledge about sellers in online auctions, the influence of additional information available from other Internet source, and reasoning on bidders’ trustworthiness under uncertainties using Dempster-Shafer theory of evidence. To demonstrate the practicability of our approach, we performed a case study using real auction data from Czech auction portal Aukro. The analysis results show that our approach can be used to detect selling stolen goods. By applying Dempster-Shafer theory to combine multiple sources of evidence for the detection of this fraudulent behavior, the proposed approach can reduce the number of false positive results in comparison to approaches using a single source of evidence.

  1. Priorities for treatment, care and information if faced with serious illness: a comparative population-based survey in seven European countries.

    Science.gov (United States)

    Higginson, Irene J; Gomes, Barbara; Calanzani, Natalia; Gao, Wei; Bausewein, Claudia; Daveson, Barbara A; Deliens, Luc; Ferreira, Pedro L; Toscani, Franco; Gysels, Marjolein; Ceulemans, Lucas; Simon, Steffen T; Cohen, Joachim; Harding, Richard

    2014-02-01

    Health-care costs are growing, with little population-based data about people's priorities for end-of-life care, to guide service development and aid discussions. We examined variations in people's priorities for treatment, care and information across seven European countries. Telephone survey of a random sample of households; we asked respondents their priorities if 'faced with a serious illness, like cancer, with limited time to live' and used multivariable logistic regressions to identify associated factors. Members of the general public aged ≥ 16 years residing in England, Flanders, Germany, Italy, the Netherlands, Portugal and Spain. In total, 9344 individuals were interviewed. Most people chose 'improve quality of life for the time they had left', ranging from 57% (95% confidence interval: 55%-60%, Italy) to 81% (95% confidence interval: 79%-83%, Spain). Only 2% (95% confidence interval: 1%-3%, England) to 6% (95% confidence interval: 4%-7%, Flanders) said extending life was most important, and 15% (95% confidence interval: 13%-17%, Spain) to 40% (95% confidence interval: 37%-43%, Italy) said quality and extension were equally important. Prioritising quality of life was associated with higher education in all countries (odds ratio = 1.3 (Flanders) to 7.9 (Italy)), experience of caregiving or bereavement (England, Germany, Portugal), prioritising pain/symptom control over having a positive attitude and preferring death in a hospice/palliative care unit. Those prioritising extending life had the highest home death preference of all groups. Health status did not affect priorities. Across all countries, extending life was prioritised by a minority, regardless of health status. Treatment and care needs to be reoriented with patient education and palliative care becoming mainstream for serious conditions such as cancer.

  2. Beyond Faces and Expertise

    Science.gov (United States)

    Zhao, Mintao; Bülthoff, Heinrich H.; Bülthoff, Isabelle

    2016-01-01

    Holistic processing—the tendency to perceive objects as indecomposable wholes—has long been viewed as a process specific to faces or objects of expertise. Although current theories differ in what causes holistic processing, they share a fundamental constraint for its generalization: Nonface objects cannot elicit facelike holistic processing in the absence of expertise. Contrary to this prevailing view, here we show that line patterns with salient Gestalt information (i.e., connectedness, closure, and continuity between parts) can be processed as holistically as faces without any training. Moreover, weakening the saliency of Gestalt information in these patterns reduced holistic processing of them, which indicates that Gestalt information plays a crucial role in holistic processing. Therefore, holistic processing can be achieved not only via a top-down route based on expertise, but also via a bottom-up route relying merely on object-based information. The finding that facelike holistic processing can extend beyond the domains of faces and objects of expertise poses a challenge to current dominant theories. PMID:26674129

  3. Brain Stroke Detection by Microwaves Using Prior Information from Clinical Databases

    Directory of Open Access Journals (Sweden)

    Natalia Irishina

    2013-01-01

    Full Text Available Microwave tomographic imaging is an inexpensive, noninvasive modality of media dielectric properties reconstruction which can be utilized as a screening method in clinical applications such as breast cancer and brain stroke detection. For breast cancer detection, the iterative algorithm of structural inversion with level sets provides well-defined boundaries and incorporates an intrinsic regularization, which permits to discover small lesions. However, in case of brain lesion, the inverse problem is much more difficult due to the skull, which causes low microwave penetration and highly noisy data. In addition, cerebral liquid has dielectric properties similar to those of blood, which makes the inversion more complicated. Nevertheless, the contrast in the conductivity and permittivity values in this situation is significant due to blood high dielectric values compared to those of surrounding grey and white matter tissues. We show that using brain MRI images as prior information about brain's configuration, along with known brain dielectric properties, and the intrinsic regularization by structural inversion, allows successful and rapid stroke detection even in difficult cases. The method has been applied to 2D slices created from a database of 3D real MRI phantom images to effectively detect lesions larger than 2.5 × 10−2 m diameter.

  4. Information-Aided Smart Schemes for Vehicle Flow Detection Enhancements of Traffic Microwave Radar Detectors

    Directory of Open Access Journals (Sweden)

    Tan-Jan Ho

    2016-07-01

    Full Text Available For satisfactory traffic management of an intelligent transport system, it is vital that traffic microwave radar detectors (TMRDs can provide real-time traffic information with high accuracy. In this study, we develop several information-aided smart schemes for traffic detection improvements of TMRDs in multiple-lane environments. Specifically, we select appropriate thresholds not only for removing noise from fast Fourier transforms (FFTs of regional lane contexts but also for reducing FFT side lobes within each lane. The resulting FFTs of reflected vehicle signals and those of clutter are distinguishable. We exploit FFT and lane-/or time stamp-related information for developing smart schemes, which mitigate adverse effects of lane-crossing FFT side lobes of a vehicle signal. As such, the proposed schemes can enhance the detection accuracy of both lane vehicle flow and directional traffic volume. On-site experimental results demonstrate the advantages and feasibility of the proposed methods, and suggest the best smart scheme.

  5. Automatic seizure detection based on the combination of newborn multi-channel EEG and HRV information

    Science.gov (United States)

    Mesbah, Mostefa; Balakrishnan, Malarvili; Colditz, Paul B.; Boashash, Boualem

    2012-12-01

    This article proposes a new method for newborn seizure detection that uses information extracted from both multi-channel electroencephalogram (EEG) and a single channel electrocardiogram (ECG). The aim of the study is to assess whether additional information extracted from ECG can improve the performance of seizure detectors based solely on EEG. Two different approaches were used to combine this extracted information. The first approach, known as feature fusion, involves combining features extracted from EEG and heart rate variability (HRV) into a single feature vector prior to feeding it to a classifier. The second approach, called classifier or decision fusion, is achieved by combining the independent decisions of the EEG and the HRV-based classifiers. Tested on recordings obtained from eight newborns with identified EEG seizures, the proposed neonatal seizure detection algorithms achieved 95.20% sensitivity and 88.60% specificity for the feature fusion case and 95.20% sensitivity and 94.30% specificity for the classifier fusion case. These results are considerably better than those involving classifiers using EEG only (80.90%, 86.50%) or HRV only (85.70%, 84.60%).

  6. Use of Business Intelligence as a Strategic Information Technology in Banking: Farud Discovery & Detection

    Directory of Open Access Journals (Sweden)

    علی محقر

    2009-02-01

    Full Text Available In today?s competitive, complex and rapidly changing business world, based on information, it is very essential to have timely and accurate insight of business conditions and activities to check whether they are healthy and according to business norms. Information obviously plays a critical role to have this insight and it can only be of avail, if it is directional, focused, timely and easily accessible and also if it gives both the macro/strategic and the micro/operational view of the company. Due to the advancement in information technology, state-of-the-art technologies like business intelligence (BI have been developed to provide us the above features. This paper provides reader an insight of BI and its strategic importance. It also explains how BI can be effective technology in industries like banking to overcome critical issue like fraud discovery and detection. The methodology, based on BI, in the form of model named BI model for fraud discovery and detection has been devised and suggested at the end of paper along with it its details for overcoming the above mentioned issue in more effective and efficient manner.

  7. Two-dimensional hidden semantic information model for target saliency detection and eyetracking identification

    Science.gov (United States)

    Wan, Weibing; Yuan, Lingfeng; Zhao, Qunfei; Fang, Tao

    2018-01-01

    Saliency detection has been applied to the target acquisition case. This paper proposes a two-dimensional hidden Markov model (2D-HMM) that exploits the hidden semantic information of an image to detect its salient regions. A spatial pyramid histogram of oriented gradient descriptors is used to extract features. After encoding the image by a learned dictionary, the 2D-Viterbi algorithm is applied to infer the saliency map. This model can predict fixation of the targets and further creates robust and effective depictions of the targets' change in posture and viewpoint. To validate the model with a human visual search mechanism, two eyetrack experiments are employed to train our model directly from eye movement data. The results show that our model achieves better performance than visual attention. Moreover, it indicates the plausibility of utilizing visual track data to identify targets.

  8. Stories about breast cancer in Australian women's magazines: information sources for risk, early detection and treatment.

    Science.gov (United States)

    Wilkes, L; Withnall, J; Harris, R; White, K; Beale, B; Hobson, J; Durham, M; Kristjanson, L

    2001-06-01

    Sixty articles in five Australian women's magazines were analyzed for journalistic qualities, metaphors, narrative features and accuracy of clinical facts related to risk, early detection and treatment of breast cancer. The stories were features, news features or soft news stories. The stories reflected the 'good news' editorial style of women's magazines. A dominant theme in the stories was that early detection of breast cancer is crucial and equals survival. While there were few inaccuracies in the stories, there was little detail of treatment modalities, an emphasis on lifestyle as a risk factor and a prevailing message that a genetic history of breast cancer means you will get it. A major implication of the findings is that nurses, who provide information to women, must be aware of the goals of journalists and the educational power of narrative logic of stories in women's magazines.

  9. [Information quality in general public French-speaking websites dedicated to oral cancer detection].

    Science.gov (United States)

    Vivien, A; Kowalski, V; Chatellier, A; Babin, E; Bénateau, H; Veyssière, A

    2017-02-01

    The goal set by the French highest national authorities in the 2014-2019 Cancer Plan is to "heal more sick persons by promoting early diagnosis through screening". Screening requires information. Nowadays, Internet allows for access to information "in one click". The aim of our study was to evaluate the quality of information found on the Internet. Several sites dedicated to oral cavity cancer screening were selected on Google. The quality of health information found in these sites was evaluated by the DISCERN questionnaire. The quality of decision support provided by the sites was evaluated by the IPDAS checklist. Twenty-seven sites were selected. The average DISCERN score was 25.1/75 (15/75 to 40/75). Eighteen sites (66.6%) had very poor, 8 sites (29.6%) had poor and 1 site had average information quality. IPDAS scores ranged from 11.1 to 38.1. Eight sites (29.6%) had less than 20%, 14 sites (51.9%) had between 20 and 30% and 5 sites (18.5%) had 30% or more validated criteria. No site achieved the pass mark. The quality of general public French-speaking website dedicated to oral cancer detection is very bad. The role of health professionals such as general practitioners and head and neck surgeons, remains essential. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  10. Blind information-theoretic multiuser detection algorithms for DS-CDMA and WCDMA downlink systems.

    Science.gov (United States)

    Waheed, Khuram; Salem, Fathi M

    2005-07-01

    Code division multiple access (CDMA) is based on the spread-spectrum technology and is a dominant air interface for 2.5G, 3G, and future wireless networks. For the CDMA downlink, the transmitted CDMA signals from the base station (BS) propagate through a noisy multipath fading communication channel before arriving at the receiver of the user equipment/mobile station (UE/MS). Classical CDMA single-user detection (SUD) algorithms implemented in the UE/MS receiver do not provide the required performance for modern high data-rate applications. In contrast, multi-user detection (MUD) approaches require a lot of a priori information not available to the UE/MS. In this paper, three promising adaptive Riemannian contra-variant (or natural) gradient based user detection approaches, capable of handling the highly dynamic wireless environments, are proposed. The first approach, blind multiuser detection (BMUD), is the process of simultaneously estimating multiple symbol sequences associated with all the users in the downlink of a CDMA communication system using only the received wireless data and without any knowledge of the user spreading codes. This approach is applicable to CDMA systems with relatively short spreading codes but becomes impractical for systems using long spreading codes. We also propose two other adaptive approaches, namely, RAKE -blind source recovery (RAKE-BSR) and RAKE-principal component analysis (RAKE-PCA) that fuse an adaptive stage into a standard RAKE receiver. This adaptation results in robust user detection algorithms with performance exceeding the linear minimum mean squared error (LMMSE) detectors for both Direct Sequence CDMA (DS-CDMA) and wide-band CDMA (WCDMA) systems under conditions of congestion, imprecise channel estimation and unmodeled multiple access interference (MAI).

  11. Virtual & Real Face to Face Teaching

    Science.gov (United States)

    Teneqexhi, Romeo; Kuneshka, Loreta

    2016-01-01

    In traditional "face to face" lessons, during the time the teacher writes on a black or white board, the students are always behind the teacher. Sometimes, this happens even in the recorded lesson in videos. Most of the time during the lesson, the teacher shows to the students his back not his face. We do not think the term "face to…

  12. Method for detecting core malware sites related to biomedical information systems.

    Science.gov (United States)

    Kim, Dohoon; Choi, Donghee; Jin, Jonghyun

    2015-01-01

    Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%.

  13. Method for Detecting Core Malware Sites Related to Biomedical Information Systems

    Directory of Open Access Journals (Sweden)

    Dohoon Kim

    2015-01-01

    Full Text Available Most advanced persistent threat attacks target web users through malicious code within landing (exploit or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%.

  14. Perspective projection for variance pose face recognition from camera calibration

    Science.gov (United States)

    Fakhir, M. M.; Woo, W. L.; Chambers, J. A.; Dlay, S. S.

    2016-04-01

    Variance pose is an important research topic in face recognition. The alteration of distance parameters across variance pose face features is a challenging. We provide a solution for this problem using perspective projection for variance pose face recognition. Our method infers intrinsic camera parameters of the image which enable the projection of the image plane into 3D. After this, face box tracking and centre of eyes detection can be identified using our novel technique to verify the virtual face feature measurements. The coordinate system of the perspective projection for face tracking allows the holistic dimensions for the face to be fixed in different orientations. The training of frontal images and the rest of the poses on FERET database determine the distance from the centre of eyes to the corner of box face. The recognition system compares the gallery of images against different poses. The system initially utilises information on position of both eyes then focuses principally on closest eye in order to gather data with greater reliability. Differentiation between the distances and position of the right and left eyes is a unique feature of our work with our algorithm outperforming other state of the art algorithms thus enabling stable measurement in variance pose for each individual.

  15. Model-based decoding, information estimation, and change-point detection techniques for multineuron spike trains.

    Science.gov (United States)

    Pillow, Jonathan W; Ahmadian, Yashar; Paninski, Liam

    2011-01-01

    One of the central problems in systems neuroscience is to understand how neural spike trains convey sensory information. Decoding methods, which provide an explicit means for reading out the information contained in neural spike responses, offer a powerful set of tools for studying the neural coding problem. Here we develop several decoding methods based on point-process neural encoding models, or forward models that predict spike responses to stimuli. These models have concave log-likelihood functions, which allow efficient maximum-likelihood model fitting and stimulus decoding. We present several applications of the encoding model framework to the problem of decoding stimulus information from population spike responses: (1) a tractable algorithm for computing the maximum a posteriori (MAP) estimate of the stimulus, the most probable stimulus to have generated an observed single- or multiple-neuron spike train response, given some prior distribution over the stimulus; (2) a gaussian approximation to the posterior stimulus distribution that can be used to quantify the fidelity with which various stimulus features are encoded; (3) an efficient method for estimating the mutual information between the stimulus and the spike trains emitted by a neural population; and (4) a framework for the detection of change-point times (the time at which the stimulus undergoes a change in mean or variance) by marginalizing over the posterior stimulus distribution. We provide several examples illustrating the performance of these estimators with simulated and real neural data.

  16. Pressure, Dysfunctional Behavior, Fraud Detection and Role of Information Technology in the Audit Process

    Directory of Open Access Journals (Sweden)

    Muhammad Umar

    2017-12-01

    Full Text Available This study examines the effect of information technology and pressure such as time budget and task complexity on dysfunctional audit behavior. This study tests whether dysfunctional audit behavior affects fraud detection. Data were gathered from 81 auditors in Jakarta and were analyzed using structure equation model (SEM. The results explain that pressure (time budget and complexity task have some impacts on dysfunctional audit behavior while information technology does not affect dysfunctional audit behavior. These results also indicate that dysfunctional audit behavior has an adverse effect on fraud detection. Job-related stress framework explains the conditions that make stress (stressors will affect to individual psychology, physics, and behavior (strains and make some result (outcome. Pressure (time budget and complexity task is the condition that makes both positive and negative effect on individual behavior. Pressure can make individuals behave dysfunctional or motivate them to give their best shot even though their work uses a lot of energy and mind to solve the problems. Raising dysfunctional audit behavior will reduce auditor’s ability to identify material misstatement in the financial statement.

  17. Augmenting Amyloid PET Interpretations With Quantitative Information Improves Consistency of Early Amyloid Detection.

    Science.gov (United States)

    Harn, Nicholas R; Hunt, Suzanne L; Hill, Jacqueline; Vidoni, Eric; Perry, Mark; Burns, Jeffrey M

    2017-08-01

    Establishing reliable methods for interpreting elevated cerebral amyloid-β plaque on PET scans is increasingly important for radiologists, as availability of PET imaging in clinical practice increases. We examined a 3-step method to detect plaque in cognitively normal older adults, focusing on the additive value of quantitative information during the PET scan interpretation process. Fifty-five F-florbetapir PET scans were evaluated by 3 experienced raters. Scans were first visually interpreted as having "elevated" or "nonelevated" plaque burden ("Visual Read"). Images were then processed using a standardized quantitative analysis software (MIMneuro) to generate whole brain and region of interest SUV ratios. This "Quantitative Read" was considered elevated if at least 2 of 6 regions of interest had an SUV ratio of more than 1.1. The final interpretation combined both visual and quantitative data together ("VisQ Read"). Cohen kappa values were assessed as a measure of interpretation agreement. Plaque was elevated in 25.5% to 29.1% of the 165 total Visual Reads. Interrater agreement was strong (kappa = 0.73-0.82) and consistent with reported values. Quantitative Reads were elevated in 45.5% of participants. Final VisQ Reads changed from initial Visual Reads in 16 interpretations (9.7%), with most changing from "nonelevated" Visual Reads to "elevated." These changed interpretations demonstrated lower plaque quantification than those initially read as "elevated" that remained unchanged. Interrater variability improved for VisQ Reads with the addition of quantitative information (kappa = 0.88-0.96). Inclusion of quantitative information increases consistency of PET scan interpretations for early detection of cerebral amyloid-β plaque accumulation.

  18. Social cognition in autism: Face tuning.

    Science.gov (United States)

    Pavlova, Marina A; Guerreschi, Michele; Tagliavento, Lucia; Gitti, Filippo; Sokolov, Alexander N; Fallgatter, Andreas J; Fazzi, Elisa

    2017-05-26

    Faces convey valuable information for social cognition, effective interpersonal interaction, and non-verbal communication. Face perception is believed to be atypical in autism, but the origin of this deficit is controversial. Dominant featural face encoding is suggested to be responsible for face tuning scarcity. Here we used a recently developed Face-n-Food paradigm for studying face tuning in individuals with autistic spectrum disorders (ASD). The key benefit of these images is that single components do not explicitly trigger face processing. In a spontaneous recognition task, adolescents with autism and typically developing matched controls were presented with a set of Face-n-Food images in different degree resembling a face (slightly bordering on the Giuseppe Arcimboldo style). The set of images was shown in a predetermined order from the least to most resembling a face. Thresholds for recognition of the Face-n-Food images as a face in ASD individuals were substantially higher than in typically developing controls: they did not report seeing a face on the images, which controls easily recognized as a face, and gave overall fewer face responses. This outcome not only lends support to atypical face tuning, but provides novel insights into the origin of face encoding deficits in autism.

  19. Alternative face models for 3D face registration

    Science.gov (United States)

    Salah, Albert Ali; Alyüz, Neşe; Akarun, Lale

    2007-01-01

    3D has become an important modality for face biometrics. The accuracy of a 3D face recognition system depends on a correct registration that aligns the facial surfaces and makes a comparison possible. The best results obtained so far use a one-to-all registration approach, which means each new facial surface is registered to all faces in the gallery, at a great computational cost. We explore the approach of registering the new facial surface to an average face model (AFM), which automatically establishes correspondence to the pre-registered gallery faces. Going one step further, we propose that using a couple of well-selected AFMs can trade-off computation time with accuracy. Drawing on cognitive justifications, we propose to employ category-specific alternative average face models for registration, which is shown to increase the accuracy of the subsequent recognition. We inspect thin-plate spline (TPS) and iterative closest point (ICP) based registration schemes under realistic assumptions on manual or automatic landmark detection prior to registration. We evaluate several approaches for the coarse initialization of ICP. We propose a new algorithm for constructing an AFM, and show that it works better than a recent approach. Finally, we perform simulations with multiple AFMs that correspond to different clusters in the face shape space and compare these with gender and morphology based groupings. We report our results on the FRGC 3D face database.

  20. Anticipated detection of favorable periods for wind energy production by means of information theory

    Science.gov (United States)

    Vogel, Eugenio; Saravia, Gonzalo; Kobe, Sigismund; Schumann, Rolf; Schuster, Rolf

    Managing the electric power produced by different sources requires mixing the different response times they present. Thus, for instance, coal burning presents large time lags until operational conditions are reached while hydroelectric generation can react in a matter of some seconds or few minutes to reach the desired productivity. Wind energy production (WEP) can be instantaneously fed to the network to save fuels with low thermal inertia (gas burning for instance), but this source presents sudden variations within few hours. We report here for the first time a method based on information theory to handle WEP. This method has been successful in detecting dynamical changes in magnetic transitions and variations of stock markets. An algorithm called wlzip based on information recognition is used to recognize the information content of a time series. We make use of publically available energy data in Germany to simulate real applications. After a calibration process the system can recognize directly on the WEP data the onset of favorable periods of a desired strength. Optimization can lead to a few hours of anticipation which is enough to control the mixture of WEP with other energy sources, thus saving fuels.

  1. Emotion Words: Adding Face Value.

    Science.gov (United States)

    Fugate, Jennifer M B; Gendron, Maria; Nakashima, Satoshi F; Barrett, Lisa Feldman

    2017-06-12

    Despite a growing number of studies suggesting that emotion words affect perceptual judgments of emotional stimuli, little is known about how emotion words affect perceptual memory for emotional faces. In Experiments 1 and 2 we tested how emotion words (compared with control words) affected participants' abilities to select a target emotional face from among distractor faces. Participants were generally more likely to false alarm to distractor emotional faces when primed with an emotion word congruent with the face (compared with a control word). Moreover, participants showed both decreased sensitivity (d') to discriminate between target and distractor faces, as well as altered response biases (c; more likely to answer "yes") when primed with an emotion word (compared with a control word). In Experiment 3 we showed that emotion words had more of an effect on perceptual memory judgments when the structural information in the target face was limited, as well as when participants were only able to categorize the face with a partially congruent emotion word. The overall results are consistent with the idea that emotion words affect the encoding of emotional faces in perceptual memory. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Role of Informed Consent in a Decision-making on Participation in The Clinical Trial: Multicenter study in Russia “Face to Face”

    Directory of Open Access Journals (Sweden)

    O. I. Zvonareva

    2016-01-01

    getting into the placebo group were also assessed at significantly lower score by group of patients that acquainted with IC together with the researcher (2,87 ± 1,28, vs 3,33 ± 1,17, p = 0,024; 2,51 ±1,25, vs 3,03 ± 1,34, p = 0,022 respectively. Furthermore, it was found that in the case of the researcher’s assistance acquaintance time with IC reduced threefold. We also evaluated the effect of the complexity of IC text on the decision-making process on participation in clinical trials. The group of respondents, who rated the IC as easy, appeared to be more interested in the final results of the study.Conclusion. Thus, when assessing the impact of the researcher on the review process of informed consent with the decision to participate in clinical trials, we found that in the case of assistance of the researcher, the acquaintance time with IC is reduced three times. In addition, this group of patients during the conversation with the researcher shows better and more clear understanding of the nature and general methodology of clinical trials, resulting in an adequate assessment “objective” risk factors for participation in clinical trials. Thus, this group of patients is more informed, compared with an “independent” group. According to the study “Face to Face”, we can recommend mandatory participation of a researcher during review process of the IC.

  3. An information-gain approach to detecting three-way epistatic interactions in genetic association studies

    DEFF Research Database (Denmark)

    Hu, Ting; Chen, Yuanzhu; Kiralis, Jeff W

    2013-01-01

    Background Epistasis has been historically used to describe the phenomenon that the effect of a given gene on a phenotype can be dependent on one or more other genes, and is an essential element for understanding the association between genetic and phenotypic variations. Quantifying epistasis......-way epistasis. Methods Such a measure is based on information gain, and is able to separate all lower order effects from pure three-way epistasis. Results Our method was verified on synthetic data and applied to real data from a candidate-gene study of tuberculosis in a West African population....... In the tuberculosis data, we found a statistically significant pure three-way epistatic interaction effect that was stronger than any lower-order associations. Conclusion Our study provides a methodological basis for detecting and characterizing high-order gene-gene interactions in genetic association studies....

  4. European cinema: face to face with Hollywood

    NARCIS (Netherlands)

    Elsaesser, T.

    2005-01-01

    In the face of renewed competition from Hollywood since the early 1980s and the challenges posed to Europe's national cinemas by the fall of the Wall in 1989, independent filmmaking in Europe has begun to re-invent itself. European Cinema: Face to Face with Hollywood re-assesses the different

  5. A Face Inversion Effect without a Face

    Science.gov (United States)

    Brandman, Talia; Yovel, Galit

    2012-01-01

    Numerous studies have attributed the face inversion effect (FIE) to configural processing of internal facial features in upright but not inverted faces. Recent findings suggest that face mechanisms can be activated by faceless stimuli presented in the context of a body. Here we asked whether faceless stimuli with or without body context may induce…

  6. Designing and Implementing a Retrospective Earthquake Detection Framework at the U.S. Geological Survey National Earthquake Information Center

    Science.gov (United States)

    Patton, J.; Yeck, W.; Benz, H.

    2017-12-01

    The U.S. Geological Survey National Earthquake Information Center (USGS NEIC) is implementing and integrating new signal detection methods such as subspace correlation, continuous beamforming, multi-band picking and automatic phase identification into near-real-time monitoring operations. Leveraging the additional information from these techniques help the NEIC utilize a large and varied network on local to global scales. The NEIC is developing an ordered, rapid, robust, and decentralized framework for distributing seismic detection data as well as a set of formalized formatting standards. These frameworks and standards enable the NEIC to implement a seismic event detection framework that supports basic tasks, including automatic arrival time picking, social media based event detections, and automatic association of different seismic detection data into seismic earthquake events. In addition, this framework enables retrospective detection processing such as automated S-wave arrival time picking given a detected event, discrimination and classification of detected events by type, back-azimuth and slowness calculations, and ensuring aftershock and induced sequence detection completeness. These processes and infrastructure improve the NEIC's capabilities, accuracy, and speed of response. In addition, this same infrastructure provides an improved and convenient structure to support access to automatic detection data for both research and algorithmic development.

  7. Explaining Sad People’s Memory Advantage for Faces

    Science.gov (United States)

    Hills, Peter J.; Marquardt, Zoe; Young, Isabel; Goodenough, Imogen

    2017-01-01

    Sad people recognize faces more accurately than happy people (Hills et al., 2011). We devised four hypotheses for this finding that are tested between in the current study. The four hypotheses are: (1) sad people engage in more expert processing associated with face processing; (2) sad people are motivated to be more accurate than happy people in an attempt to repair their mood; (3) sad people have a defocused attentional strategy that allows more information about a face to be encoded; and (4) sad people scan more of the face than happy people leading to more facial features to be encoded. In Experiment 1, we found that dysphoria (sad mood often associated with depression) was not correlated with the face-inversion effect (a measure of expert processing) nor with response times but was correlated with defocused attention and recognition accuracy. Experiment 2 established that dysphoric participants detected changes made to more facial features than happy participants. In Experiment 3, using eye-tracking we found that sad-induced participants sampled more of the face whilst avoiding the eyes. Experiment 4 showed that sad-induced people demonstrated a smaller own-ethnicity bias. These results indicate that sad people show different attentional allocation to faces than happy and neutral people. PMID:28261138

  8. Energy discrimination for positron emission tomography using the time information of the first detected photons

    Science.gov (United States)

    Therrien, A. C.; Lemaire, W.; Lecoq, P.; Fontaine, R.; Pratte, J.-F.

    2018-01-01

    The advantages of Time-of-Flight positron emission tomography (TOF-PET) have pushed the development of detectors with better time resolution. In particular, Silicon Photomultipliers (SiPM) have evolved tremendously in the past decade and arrays with a fully digital readout are the next logical step (dSiPM). New multi-timestamp methods use the precise time information of multiple photons to estimate the time of a PET event with greater accuracy, resulting in excellent time resolution. We propose a method which uses the same timestamps as the time estimator to perform energy discrimination, thus using data obtained within 5 ns of the beginning of the event. Having collected all the necessary information, the dSiPM could then be disabled for the remaining scintillation while dedicated electronics process the collected data. This would reduce afterpulsing as the SPAD would be turned off for several hundred nanoseconds, emptying the majority of traps. The proposed method uses a strategy based on subtraction and minimal electronics to reject energy below a selected threshold. This method achieves an error rate of less than 3% for photopeak discrimination (threshold at 400 keV) for dark count rates up to 100 cps/μm2, time-to-digital converter resolution up to 50 ps and a photon detection efficiency ranging from 10 to 70%.

  9. IntraFace.

    Science.gov (United States)

    De la Torre, Fernando; Chu, Wen-Sheng; Xiong, Xuehan; Vicente, Francisco; Ding, Xiaoyu; Cohn, Jeffrey

    2015-05-01

    Within the last 20 years, there has been an increasing interest in the computer vision community in automated facial image analysis algorithms. This has been driven by applications in animation, market research, autonomous-driving, surveillance, and facial editing among others. To date, there exist several commercial packages for specific facial image analysis tasks such as facial expression recognition, facial attribute analysis or face tracking. However, free and easy-to-use software that incorporates all these functionalities is unavailable. This paper presents IntraFace (IF), a publicly-available software package for automated facial feature tracking, head pose estimation, facial attribute recognition, and facial expression analysis from video. In addition, IFincludes a newly develop technique for unsupervised synchrony detection to discover correlated facial behavior between two or more persons, a relatively unexplored problem in facial image analysis. In tests, IF achieved state-of-the-art results for emotion expression and action unit detection in three databases, FERA, CK+ and RU-FACS; measured audience reaction to a talk given by one of the authors; and discovered synchrony for smiling in videos of parent-infant interaction. IF is free of charge for academic use at http://www.humansensing.cs.cmu.edu/intraface/.

  10. Cognitive Biases for Emotional Faces in High- and Low-Trait Depressive Participants

    Directory of Open Access Journals (Sweden)

    Yi-Hsing Hsieh

    2004-10-01

    Full Text Available This study examined the association between trait depression and information-processing biases. Thirty participants were divided into high- and low-trait depressive groups based on the median of their depressive subscale scores according to the Basic Personality Inventory. Information-processing biases were measured using a deployment-of-attention task (DOAT and a recognition memory task (RMT. For the DOAT, participants saw one emotional face paired with a neutral face of the same person, and then were forced to choose on which face the color patch had first occurred. The percentage of participants' choices favoring the happy, angry, or sad faces represented the selective attentional bias score for each emotion, respectively. For the RMT, participants rated different types of emotional faces and subsequently discriminated old faces from new faces. The memory strength for each type of face was calculated from hit and false-positive rates, based on the signal detection theory. Compared with the low-trait depressive group, the high-trait depressive group showed a negative cognitive style. This was an enhanced recognition memory for sad faces and a weakened inhibition of attending to sad faces, suggesting that those with high depressive trait may be vulnerable to interpersonal withdrawal.

  11. Face recognition increases during saccade preparation.

    Science.gov (United States)

    Lin, Hai; Rizak, Joshua D; Ma, Yuan-ye; Yang, Shang-chuan; Chen, Lin; Hu, Xin-tian

    2014-01-01

    Face perception is integral to human perception system as it underlies social interactions. Saccadic eye movements are frequently made to bring interesting visual information, such as faces, onto the fovea for detailed processing. Just before eye movement onset, the processing of some basic features, such as the orientation, of an object improves at the saccade landing point. Interestingly, there is also evidence that indicates faces are processed in early visual processing stages similar to basic features. However, it is not known whether this early enhancement of processing includes face recognition. In this study, three experiments were performed to map the timing of face presentation to the beginning of the eye movement in order to evaluate pre-saccadic face recognition. Faces were found to be similarly processed as simple objects immediately prior to saccadic movements. Starting ∼ 120 ms before a saccade to a target face, independent of whether or not the face was surrounded by other faces, the face recognition gradually improved and the critical spacing of the crowding decreased as saccade onset was approaching. These results suggest that an upcoming saccade prepares the visual system for new information about faces at the saccade landing site and may reduce the background in a crowd to target the intended face. This indicates an important role of pre-saccadic eye movement signals in human face recognition.

  12. Enhanced attention amplifies face adaptation.

    Science.gov (United States)

    Rhodes, Gillian; Jeffery, Linda; Evangelista, Emma; Ewing, Louise; Peters, Marianne; Taylor, Libby

    2011-08-15

    Perceptual adaptation not only produces striking perceptual aftereffects, but also enhances coding efficiency and discrimination by calibrating coding mechanisms to prevailing inputs. Attention to simple stimuli increases adaptation, potentially enhancing its functional benefits. Here we show that attention also increases adaptation to faces. In Experiment 1, face identity aftereffects increased when attention to adapting faces was increased using a change detection task. In Experiment 2, figural (distortion) face aftereffects increased when attention was increased using a snap game (detecting immediate repeats) during adaptation. Both were large effects. Contributions of low-level adaptation were reduced using free viewing (both experiments) and a size change between adapt and test faces (Experiment 2). We suggest that attention may enhance adaptation throughout the entire cortical visual pathway, with functional benefits well beyond the immediate advantages of selective processing of potentially important stimuli. These results highlight the potential to facilitate adaptive updating of face-coding mechanisms by strategic deployment of attentional resources. Copyright © 2011 Elsevier Ltd. All rights reserved.

  13. Typical and atypical neurodevelopment for face specialization: An fMRI study

    Science.gov (United States)

    Joseph, Jane E.; Zhu, Xun; Gundran, Andrew; Davies, Faraday; Clark, Jonathan D.; Ruble, Lisa; Glaser, Paul; Bhatt, Ramesh S.

    2014-01-01

    Individuals with Autism Spectrum Disorder (ASD) and their relatives process faces differently from typically developed (TD) individuals. In an fMRI face-viewing task, TD and undiagnosed sibling (SIB) children (5–18 years) showed face specialization in the right amygdala and ventromedial prefrontal cortex (vmPFC), with left fusiform and right amygdala face specialization increasing with age in TD subjects. SIBs showed extensive antero-medial temporal lobe activation for faces that was not present in any other group, suggesting a potential compensatory mechanism. In ASD, face specialization was minimal but increased with age in the right fusiform and decreased with age in the left amygdala, suggesting atypical development of a frontal-amygdala-fusiform system which is strongly linked to detecting salience and processing facial information. PMID:25479816

  14. Consumer facial expression in relation to smoked ham with the use of face reading technology. The methodological aspects and informative value of research results.

    Science.gov (United States)

    Kostyra, Eliza; Rambuszek, Michał; Waszkiewicz-Robak, Bożena; Laskowski, Wacław; Blicharski, Tadeusz; Poławska, Ewa

    2016-09-01

    The study determined the emotional reactions of consumers in relation to hams using face visualization method, which was recorded by FaceReader (FR). The aims of the research were to determine the effect of the ham samples on the type of emotion, to examine more deeply the individual emotional reactions of consumers and to analyse the emotional variability with regard to the temporal measurement of impressions. The research involved testing the effectiveness of measuring emotions in response to the ongoing flavour impression after consumption of smoked hams. It was found that for all of the assessed samples, neutral and negative emotions prevailed as the overall emotions recorded during the assessment of the taste/flavour impression. The range of variability of the overall emotions depended more on the consumer reactions and less on the properties of the assessed product. Consumers expressed various emotions in time and the ham samples evoked different emotional reactions as an effect of duration of the impression. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Information Design for “Weak Signal” detection and processing in Economic Intelligence: A case study on Health resources

    Directory of Open Access Journals (Sweden)

    Sahbi Sidhom

    2011-12-01

    Full Text Available The topics of this research cover all phases of “Information Design” applied to detect and profit from weak signals in economic intelligence (EI or business intelligence (BI. The field of the information design (ID applies to the process of translating complex, unorganized or unstructured data into valuable and meaningful information. ID practice requires an interdisciplinary approach, which combines skills in graphic design (writing, analysis processing and editing, human performances technology and human factors. Applied in the context of information system, it allows end-users to easily detect implicit topics known as “weak signals” (WS. In our approach to implement the ID, the processes cover the development of a knowledge management (KM process in the context of EI. A case study concerning information monitoring health resources is presented using ID processes to outline weak signals. Both French and American bibliographic databases were applied to make the connection to multilingual concepts in the health watch process.

  16. Face recognition, a landmarks tale

    NARCIS (Netherlands)

    Beumer, G.M.

    2009-01-01

    Face recognition is a technology that appeals to the imagination of many people. This is particularly reflected in the popularity of science-fiction films and forensic detective series such as CSI, CSI New York, CSI Miami, Bones and NCIS. Although these series tend to be set in the present, their

  17. A novel BCI based on ERP components sensitive to configural processing of human faces

    Science.gov (United States)

    Zhang, Yu; Zhao, Qibin; Jing, Jin; Wang, Xingyu; Cichocki, Andrzej

    2012-04-01

    This study introduces a novel brain-computer interface (BCI) based on an oddball paradigm using stimuli of facial images with loss of configural face information (e.g., inversion of face). To the best of our knowledge, till now the configural processing of human faces has not been applied to BCI but widely studied in cognitive neuroscience research. Our experiments confirm that the face-sensitive event-related potential (ERP) components N170 and vertex positive potential (VPP) have reflected early structural encoding of faces and can be modulated by the configural processing of faces. With the proposed novel paradigm, we investigate the effects of ERP components N170, VPP and P300 on target detection for BCI. An eight-class BCI platform is developed to analyze ERPs and evaluate the target detection performance using linear discriminant analysis without complicated feature extraction processing. The online classification accuracy of 88.7% and information transfer rate of 38.7 bits min-1 using stimuli of inverted faces with only single trial suggest that the proposed paradigm based on the configural processing of faces is very promising for visual stimuli-driven BCI applications.

  18. Discrimination between smiling faces: Human observers vs. automated face analysis.

    Science.gov (United States)

    Del Líbano, Mario; Calvo, Manuel G; Fernández-Martín, Andrés; Recio, Guillermo

    2018-05-11

    This study investigated (a) how prototypical happy faces (with happy eyes and a smile) can be discriminated from blended expressions with a smile but non-happy eyes, depending on type and intensity of the eye expression; and (b) how smile discrimination differs for human perceivers versus automated face analysis, depending on affective valence and morphological facial features. Human observers categorized faces as happy or non-happy, or rated their valence. Automated analysis (FACET software) computed seven expressions (including joy/happiness) and 20 facial action units (AUs). Physical properties (low-level image statistics and visual saliency) of the face stimuli were controlled. Results revealed, first, that some blended expressions (especially, with angry eyes) had lower discrimination thresholds (i.e., they were identified as "non-happy" at lower non-happy eye intensities) than others (especially, with neutral eyes). Second, discrimination sensitivity was better for human perceivers than for automated FACET analysis. As an additional finding, affective valence predicted human discrimination performance, whereas morphological AUs predicted FACET discrimination. FACET can be a valid tool for categorizing prototypical expressions, but is currently more limited than human observers for discrimination of blended expressions. Configural processing facilitates detection of in/congruence(s) across regions, and thus detection of non-genuine smiling faces (due to non-happy eyes). Copyright © 2018 Elsevier B.V. All rights reserved.

  19. Apparatus, System and Method for Fast Detection of Genetic Information by PCR in an Interchangeable Chip

    KAUST Repository

    Wen, Weijia; Wu, Jinbo; Kodzius, Rimantas

    2011-01-01

    A polymerase chain reaction (PCR) device for fast amplification and detection of DNA includes an interchangeable PCR chamber, a temperature control component, and an optical detection system. The DNA amplification is performed on an interchangeable

  20. Attention Capture by Faces

    Science.gov (United States)

    Langton, Stephen R. H.; Law, Anna S.; Burton, A. Mike; Schweinberger, Stefan R.

    2008-01-01

    We report three experiments that investigate whether faces are capable of capturing attention when in competition with other non-face objects. In Experiment 1a participants took longer to decide that an array of objects contained a butterfly target when a face appeared as one of the distracting items than when the face did not appear in the array.…

  1. Efficient search for a face by chimpanzees (Pan troglodytes).

    Science.gov (United States)

    Tomonaga, Masaki; Imura, Tomoko

    2015-07-16

    The face is quite an important stimulus category for human and nonhuman primates in their social lives. Recent advances in comparative-cognitive research clearly indicate that chimpanzees and humans process faces in a special manner; that is, using holistic or configural processing. Both species exhibit the face-inversion effect in which the inverted presentation of a face deteriorates their perception and recognition. Furthermore, recent studies have shown that humans detect human faces among non-facial objects rapidly. We report that chimpanzees detected chimpanzee faces among non-facial objects quite efficiently. This efficient search was not limited to own-species faces. They also found human adult and baby faces--but not monkey faces--efficiently. Additional testing showed that a front-view face was more readily detected than a profile, suggesting the important role of eye-to-eye contact. Chimpanzees also detected a photograph of a banana as efficiently as a face, but a further examination clearly indicated that the banana was detected mainly due to a low-level feature (i.e., color). Efficient face detection was hampered by an inverted presentation, suggesting that configural processing of faces is a critical element of efficient face detection in both species. This conclusion was supported by a simple simulation experiment using the saliency model.

  2. Parametric Analysis of Surveillance Quality and Level and Quality of Intent Information and Their Impact on Conflict Detection Performance

    Science.gov (United States)

    Guerreiro, Nelson M.; Butler, Ricky W.; Hagen, George E.; Maddalon, Jeffrey M.; Lewis, Timothy A.

    2016-01-01

    A loss-of-separation (LOS) is said to occur when two aircraft are spatially too close to one another. A LOS is the fundamental unsafe event to be avoided in air traffic management and conflict detection (CD) is the function that attempts to predict these LOS events. In general, the effectiveness of conflict detection relates to the overall safety and performance of an air traffic management concept. An abstract, parametric analysis was conducted to investigate the impact of surveillance quality, level of intent information, and quality of intent information on conflict detection performance. The data collected in this analysis can be used to estimate the conflict detection performance under alternative future scenarios or alternative allocations of the conflict detection function, based on the quality of the surveillance and intent information under those conditions.Alternatively, this data could also be used to estimate the surveillance and intent information quality required to achieve some desired CD performance as part of the design of a new separation assurance system.

  3. The activation of visual face memory and explicit face recognition are delayed in developmental prosopagnosia.

    Science.gov (United States)

    Parketny, Joanna; Towler, John; Eimer, Martin

    2015-08-01

    Individuals with developmental prosopagnosia (DP) are strongly impaired in recognizing faces, but the causes of this deficit are not well understood. We employed event-related brain potentials (ERPs) to study the time-course of neural processes involved in the recognition of previously unfamiliar faces in DPs and in age-matched control participants with normal face recognition abilities. Faces of different individuals were presented sequentially in one of three possible views, and participants had to detect a specific Target Face ("Joe"). EEG was recorded during task performance to Target Faces, Nontarget Faces, or the participants' Own Face (which had to be ignored). The N250 component was measured as a marker of the match between a seen face and a stored representation in visual face memory. The subsequent P600f was measured as an index of attentional processes associated with the conscious awareness and recognition of a particular face. Target Faces elicited reliable N250 and P600f in the DP group, but both of these components emerged later in DPs than in control participants. This shows that the activation of visual face memory for previously unknown learned faces and the subsequent attentional processing and conscious recognition of these faces are delayed in DP. N250 and P600f components to Own Faces did not differ between the two groups, indicating that the processing of long-term familiar faces is less affected in DP. However, P600f components to Own Faces were absent in two participants with DP who failed to recognize their Own Face during the experiment. These results provide new evidence that face recognition deficits in DP may be linked to a delayed activation of visual face memory and explicit identity recognition mechanisms. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Rheticus Displacement: an Automatic Geo-Information Service Platform for Ground Instabilities Detection and Monitoring

    Science.gov (United States)

    Chiaradia, M. T.; Samarelli, S.; Agrimano, L.; Lorusso, A. P.; Nutricato, R.; Nitti, D. O.; Morea, A.; Tijani, K.

    2016-12-01

    Rheticus® is an innovative cloud-based data and services hub able to deliver Earth Observation added-value products through automatic complex processes and a minimum interaction with human operators. This target is achieved by means of programmable components working as different software layers in a modern enterprise system which relies on SOA (service-oriented-architecture) model. Due to its architecture, where every functionality is well defined and encapsulated in a standalone component, Rheticus is potentially highly scalable and distributable allowing different configurations depending on the user needs. Rheticus offers a portfolio of services, ranging from the detection and monitoring of geohazards and infrastructural instabilities, to marine water quality monitoring, wildfires detection or land cover monitoring. In this work, we outline the overall cloud-based platform and focus on the "Rheticus Displacement" service, aimed at providing accurate information to monitor movements occurring across landslide features or structural instabilities that could affect buildings or infrastructures. Using Sentinel-1 (S1) open data images and Multi-Temporal SAR Interferometry techniques (i.e., SPINUA), the service is complementary to traditional survey methods, providing a long-term solution to slope instability monitoring. Rheticus automatically browses and accesses (on a weekly basis) the products of the rolling archive of ESA S1 Scientific Data Hub; S1 data are then handled by a mature running processing chain, which is responsible of producing displacement maps immediately usable to measure with sub-centimetric precision movements of coherent points. Examples are provided, concerning the automatic displacement map generation process, as well as the integration of point and distributed scatterers, the integration of multi-sensors displacement maps (e.g., Sentinel-1 IW and COSMO-SkyMed HIMAGE), the combination of displacement rate maps acquired along both ascending

  5. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  6. Face processing pattern under top-down perception: a functional MRI study

    Science.gov (United States)

    Li, Jun; Liang, Jimin; Tian, Jie; Liu, Jiangang; Zhao, Jizheng; Zhang, Hui; Shi, Guangming

    2009-02-01

    Although top-down perceptual process plays an important role in face processing, its neural substrate is still puzzling because the top-down stream is extracted difficultly from the activation pattern associated with contamination caused by bottom-up face perception input. In the present study, a novel paradigm of instructing participants to detect faces from pure noise images is employed, which could efficiently eliminate the interference of bottom-up face perception in topdown face processing. Analyzing the map of functional connectivity with right FFA analyzed by conventional Pearson's correlation, a possible face processing pattern induced by top-down perception can be obtained. Apart from the brain areas of bilateral fusiform gyrus (FG), left inferior occipital gyrus (IOG) and left superior temporal sulcus (STS), which are consistent with a core system in the distributed cortical network for face perception, activation induced by top-down face processing is also found in these regions that include the anterior cingulate gyrus (ACC), right oribitofrontal cortex (OFC), left precuneus, right parahippocampal cortex, left dorsolateral prefrontal cortex (DLPFC), right frontal pole, bilateral premotor cortex, left inferior parietal cortex and bilateral thalamus. The results indicate that making-decision, attention, episodic memory retrieving and contextual associative processing network cooperate with general face processing regions to process face information under top-down perception.

  7. Face Pareidolia in the Rhesus Monkey.

    Science.gov (United States)

    Taubert, Jessica; Wardle, Susan G; Flessert, Molly; Leopold, David A; Ungerleider, Leslie G

    2017-08-21

    Face perception in humans and nonhuman primates is rapid and accurate [1-4]. In the human brain, a network of visual-processing regions is specialized for faces [5-7]. Although face processing is a priority of the primate visual system, face detection is not infallible. Face pareidolia is the compelling illusion of perceiving facial features on inanimate objects, such as the illusory face on the surface of the moon. Although face pareidolia is commonly experienced by humans, its presence in other species is unknown. Here we provide evidence for face pareidolia in a species known to possess a complex face-processing system [8-10]: the rhesus monkey (Macaca mulatta). In a visual preference task [11, 12], monkeys looked longer at photographs of objects that elicited face pareidolia in human observers than at photographs of similar objects that did not elicit illusory faces. Examination of eye movements revealed that monkeys fixated the illusory internal facial features in a pattern consistent with how they view photographs of faces [13]. Although the specialized response to faces observed in humans [1, 3, 5-7, 14] is often argued to be continuous across primates [4, 15], it was previously unclear whether face pareidolia arose from a uniquely human capacity. For example, pareidolia could be a product of the human aptitude for perceptual abstraction or result from frequent exposure to cartoons and illustrations that anthropomorphize inanimate objects. Instead, our results indicate that the perception of illusory facial features on inanimate objects is driven by a broadly tuned face-detection mechanism that we share with other species. Published by Elsevier Ltd.

  8. The neural representation of personally familiar and unfamiliar faces in the distributed system for face perception.

    Science.gov (United States)

    Visconti di Oleggio Castello, Matteo; Halchenko, Yaroslav O; Guntupalli, J Swaroop; Gors, Jason D; Gobbini, M Ida

    2017-09-25

    Personally familiar faces are processed more robustly and efficiently than unfamiliar faces. The human face processing system comprises a core system that analyzes the visual appearance of faces and an extended system for the retrieval of person-knowledge and other nonvisual information. We applied multivariate pattern analysis to fMRI data to investigate aspects of familiarity that are shared by all familiar identities and information that distinguishes specific face identities from each other. Both identity-independent familiarity information and face identity could be decoded in an overlapping set of areas in the core and extended systems. Representational similarity analysis revealed a clear distinction between the two systems and a subdivision of the core system into ventral, dorsal and anterior components. This study provides evidence that activity in the extended system carries information about both individual identities and personal familiarity, while clarifying and extending the organization of the core system for face perception.

  9. Informing future research priorities into the psychological and social problems faced by cancer survivors: a rapid review and synthesis of the literature.

    Science.gov (United States)

    Jarrett, N; Scott, I; Addington-Hall, J; Amir, Z; Brearley, S; Hodges, L; Richardson, A; Sharpe, M; Stamataki, Z; Stark, D; Siller, C; Ziegler, L; Foster, C

    2013-10-01

    To establish what is known regarding the psychological and social problems faced by adult cancer survivors (people who are living with and beyond a diagnosis of cancer) and identify areas future research should address. A rapid search of published literature reviews held in electronic data bases was under taken. Inclusion and exclusion criteria, and removal of duplicated papers, reduced the initial number of papers from 4051 to 38. Twenty-two review papers were excluded on grounds of quality and 16 review papers were selected for appraisal. The psychological and social problems for cancer survivors are identified as depression, anxiety, distress, fear of recurrence, social support/function, relationships and impact on family, and quality of life. A substantial minority of people surviving cancer experience depression, anxiety, and distress or fear associated with recurrence or follow up. There is some indication that social support is positively associated with better outcomes. Quality of life for survivors of cancer appears generally good for most people, but an important minority experience a reduction in quality of life, especially those with more advanced disease and reduced social and economic resources. The majority of research knowledge is based on women with breast cancer. The longer term implications of cancer survival have not been adequately explored. Focussing well designed research in the identified areas where less is already known about the psychological and social impact of cancer survival is likely to have the greatest impact on the wellbeing of people surviving cancer. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Electrically detected magnetic resonance of carbon dangling bonds at the Si-face 4H-SiC/SiO2 interface

    Science.gov (United States)

    Gruber, G.; Cottom, J.; Meszaros, R.; Koch, M.; Pobegen, G.; Aichinger, T.; Peters, D.; Hadley, P.

    2018-04-01

    SiC based metal-oxide-semiconductor field-effect transistors (MOSFETs) have gained a significant importance in power electronics applications. However, electrically active defects at the SiC/SiO2 interface degrade the ideal behavior of the devices. The relevant microscopic defects can be identified by electron paramagnetic resonance (EPR) or electrically detected magnetic resonance (EDMR). This helps to decide which changes to the fabrication process will likely lead to further increases of device performance and reliability. EDMR measurements have shown very similar dominant hyperfine (HF) spectra in differently processed MOSFETs although some discrepancies were observed in the measured g-factors. Here, the HF spectra measured of different SiC MOSFETs are compared, and it is argued that the same dominant defect is present in all devices. A comparison of the data with simulated spectra of the C dangling bond (PbC) center and the silicon vacancy (VSi) demonstrates that the PbC center is a more suitable candidate to explain the observed HF spectra.

  11. PolyaPeak: Detecting Transcription Factor Binding Sites from ChIP-seq Using Peak Shape Information

    Science.gov (United States)

    Wu, Hao; Ji, Hongkai

    2014-01-01

    ChIP-seq is a powerful technology for detecting genomic regions where a protein of interest interacts with DNA. ChIP-seq data for mapping transcription factor binding sites (TFBSs) have a characteristic pattern: around each binding site, sequence reads aligned to the forward and reverse strands of the reference genome form two separate peaks shifted away from each other, and the true binding site is located in between these two peaks. While it has been shown previously that the accuracy and resolution of binding site detection can be improved by modeling the pattern, efficient methods are unavailable to fully utilize that information in TFBS detection procedure. We present PolyaPeak, a new method to improve TFBS detection by incorporating the peak shape information. PolyaPeak describes peak shapes using a flexible Pólya model. The shapes are automatically learnt from the data using Minorization-Maximization (MM) algorithm, then integrated with the read count information via a hierarchical model to distinguish true binding sites from background noises. Extensive real data analyses show that PolyaPeak is capable of robustly improving TFBS detection compared with existing methods. An R package is freely available. PMID:24608116

  12. On the early detection of threats in the real world based on open-source information on the internet

    NARCIS (Netherlands)

    Bouma, H.; Rajadell Rojas, O.; Worm, D.T.H.; Versloot, C.A.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time

  13. The Use of Low-frequency Active Channel Signals in an Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-06-01

    Full Text Available This article describes a solution for the protection of the temporary lifting of control over the target machine, while using information leakage detection and prevention systems. It is proposed to use a specially designed channel for alert’s signals through the computer’s power supply.

  14. The Hardware and Software Implementation of Low-Frequency Active Channel Signals in an Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-12-01

    Full Text Available This article discusses a new way of developing a special channel for the alarms, through computer’s power supply network, to solve the problem of protection from removal of the temporary control over the victim’s machine, using information leakage detection and prevention systems.

  15. Editing faces in videos

    OpenAIRE

    Amberg, Brian

    2011-01-01

    Editing faces in movies is of interest in the special effects industry. We aim at producing effects such as the addition of accessories interacting correctly with the face or replacing the face of a stuntman with the face of the main actor. The system introduced in this thesis is based on a 3D generative face model. Using a 3D model makes it possible to edit the face in the semantic space of pose, expression, and identity instead of pixel space, and due to its 3D nature allows...

  16. Normal composite face effects in developmental prosopagnosia.

    Science.gov (United States)

    Biotti, Federica; Wu, Esther; Yang, Hua; Jiahui, Guo; Duchaine, Bradley; Cook, Richard

    2017-10-01

    Upright face perception is thought to involve holistic processing, whereby local features are integrated into a unified whole. Consistent with this view, the top half of one face appears to fuse perceptually with the bottom half of another, when aligned spatially and presented upright. This 'composite face effect' reveals a tendency to integrate information from disparate regions when faces are presented canonically. In recent years, the relationship between susceptibility to the composite effect and face recognition ability has received extensive attention both in participants with normal face recognition and participants with developmental prosopagnosia. Previous results suggest that individuals with developmental prosopagnosia may show reduced susceptibility to the effect suggestive of diminished holistic face processing. Here we describe two studies that examine whether developmental prosopagnosia is associated with reduced composite face effects. Despite using independent samples of developmental prosopagnosics and different composite procedures, we find no evidence for reduced composite face effects. The experiments yielded similar results; highly significant composite effects in both prosopagnosic groups that were similar in magnitude to the effects found in participants with normal face processing. The composite face effects exhibited by both samples and the controls were greatly diminished when stimulus arrangements were inverted. Our finding that the whole-face binding process indexed by the composite effect is intact in developmental prosopagnosia indicates that other factors are responsible for developmental prosopagnosia. These results are also inconsistent with suggestions that susceptibility to the composite face effect and face recognition ability are tightly linked. While the holistic process revealed by the composite face effect may be necessary for typical face perception, it is not sufficient; individual differences in face recognition ability

  17. From face processing to face recognition: Comparing three different processing levels.

    Science.gov (United States)

    Besson, G; Barragan-Jason, G; Thorpe, S J; Fabre-Thorpe, M; Puma, S; Ceccaldi, M; Barbeau, E J

    2017-01-01

    Verifying that a face is from a target person (e.g. finding someone in the crowd) is a critical ability of the human face processing system. Yet how fast this can be performed is unknown. The 'entry-level shift due to expertise' hypothesis suggests that - since humans are face experts - processing faces should be as fast - or even faster - at the individual than at superordinate levels. In contrast, the 'superordinate advantage' hypothesis suggests that faces are processed from coarse to fine, so that the opposite pattern should be observed. To clarify this debate, three different face processing levels were compared: (1) a superordinate face categorization level (i.e. detecting human faces among animal faces), (2) a face familiarity level (i.e. recognizing famous faces among unfamiliar ones) and (3) verifying that a face is from a target person, our condition of interest. The minimal speed at which faces can be categorized (∼260ms) or recognized as familiar (∼360ms) has largely been documented in previous studies, and thus provides boundaries to compare our condition of interest to. Twenty-seven participants were included. The recent Speed and Accuracy Boosting procedure paradigm (SAB) was used since it constrains participants to use their fastest strategy. Stimuli were presented either upright or inverted. Results revealed that verifying that a face is from a target person (minimal RT at ∼260ms) was remarkably fast but longer than the face categorization level (∼240ms) and was more sensitive to face inversion. In contrast, it was much faster than recognizing a face as familiar (∼380ms), a level severely affected by face inversion. Face recognition corresponding to finding a specific person in a crowd thus appears achievable in only a quarter of a second. In favor of the 'superordinate advantage' hypothesis or coarse-to-fine account of the face visual hierarchy, these results suggest a graded engagement of the face processing system across processing

  18. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  19. Managers facing the climatic risks

    International Nuclear Information System (INIS)

    2003-01-01

    This colloquium aimed to analyze the relations between the climatic changes and extreme meteorological events and on the associated risks. It provides information and knowledge on the state of the art concerning the today scientific knowledge, the prevention measures and the adaptation facing the risks and the difficult estimation of the climatic damages costs. (A.L.B.)

  20. Familiarity Enhances Visual Working Memory for Faces

    Science.gov (United States)

    Jackson, Margaret C.; Raymond, Jane E.

    2008-01-01

    Although it is intuitive that familiarity with complex visual objects should aid their preservation in visual working memory (WM), empirical evidence for this is lacking. This study used a conventional change-detection procedure to assess visual WM for unfamiliar and famous faces in healthy adults. Across experiments, faces were upright or…

  1. Change detection in bi-temporal data by canonical information analysis

    DEFF Research Database (Denmark)

    Nielsen, Allan Aasbjerg; Vestergaard, Jacob Schack

    2015-01-01

    combinations with the information theoretical measure mutual information (MI). We term this type of analysis canonical information analysis (CIA). MI allows for the actual joint distribution of the variables involved and not just second order statistics. Where CCA is ideal for Gaussian data, CIA facilitates...

  2. Detection of Informal Settlements from VHR Images Using Convolutional Neural Networks

    NARCIS (Netherlands)

    Mboga, Nicholus; Persello, Claudio; Bergado, John; Stein, Alfred

    2017-01-01

    Information about the location and extent of informal settlements is necessary to guide decision making and resource allocation for their upgrading. Very high resolution (VHR) satellite images can provide this useful information, however, different urban settlement types are hard to be automatically

  3. Series 'Facing Radiation'. 2 Facing radiation is facing residents

    International Nuclear Information System (INIS)

    Hanzawa, Takahiro

    2013-01-01

    The series is to report how general people, who are not at all radiological experts, have faced and understood the problems and tasks of radiation given by the Fukushima Daiichi Nuclear Power Plant Accident (Mar. 2011). The section 2 is reported by an officer of Date City, which localizes at 60 km northern west of the Plant, borders on Iitate Village of Fukushima prefecture, and is indicated as the important area of contamination search (IACS), which the reporter has been conducted for as responsible personnel. In July 2011, the ambient dose was as high as 3.0-3.5 mc-Sv/h and the tentative storage place of contaminated materials was decided by own initiative of residents of a small community, from which the real decontamination started in the City. The target dose after decontamination was defined to be 1.0 mc-Sv/h: however, 28/32 IACS municipalities in the prefecture had not defined the target although they had worked for 2 years after the Accident for their areas exceeding the standard 0.23 mc-Sv/h. At the moment of decontamination of the reporter's own house, he noticed that resident's concerns had directed toward its work itself, not toward the target dose, and wondered if these figures had obstructed to correctly face the radiation. At present that about 2.5 years have passed since the Accident, all of Date citizens have personal accumulated glass dosimeters for seeing the effective external dose and it seems that their dose will not exceed 1 mSv/y if the ambient dose estimated is 0.3-5 mc-Sv/h. Media run to popularity not to face radiation, experts tend to hesitate to face media and residents, and radiation dose will be hardly reduced to zero, despite that correct understanding of radiation is a shorter way for residents' own ease: facing radiation is facing residents. (T.T.)

  4. Locating sensors for detecting source-to-target patterns of special nuclear material smuggling: a spatial information theoretic approach.

    Science.gov (United States)

    Przybyla, Jay; Taylor, Jeffrey; Zhou, Xuesong

    2010-01-01

    In this paper, a spatial information-theoretic model is proposed to locate sensors for detecting source-to-target patterns of special nuclear material (SNM) smuggling. In order to ship the nuclear materials from a source location with SNM production to a target city, the smugglers must employ global and domestic logistics systems. This paper focuses on locating a limited set of fixed and mobile radiation sensors in a transportation network, with the intent to maximize the expected information gain and minimize the estimation error for the subsequent nuclear material detection stage. A Kalman filtering-based framework is adapted to assist the decision-maker in quantifying the network-wide information gain and SNM flow estimation accuracy.

  5. Locating Sensors for Detecting Source-to-Target Patterns of Special Nuclear Material Smuggling: A Spatial Information Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Xuesong Zhou

    2010-08-01

    Full Text Available In this paper, a spatial information-theoretic model is proposed to locate sensors for detecting source-to-target patterns of special nuclear material (SNM smuggling. In order to ship the nuclear materials from a source location with SNM production to a target city, the smugglers must employ global and domestic logistics systems. This paper focuses on locating a limited set of fixed and mobile radiation sensors in a transportation network, with the intent to maximize the expected information gain and minimize the estimation error for the subsequent nuclear material detection stage. A Kalman filtering-based framework is adapted to assist the decision-maker in quantifying the network-wide information gain and SNM flow estimation accuracy.

  6. Brain Signals of Face Processing as Revealed by Event-Related Potentials

    Directory of Open Access Journals (Sweden)

    Ela I. Olivares

    2015-01-01

    Full Text Available We analyze the functional significance of different event-related potentials (ERPs as electrophysiological indices of face perception and face recognition, according to cognitive and neurofunctional models of face processing. Initially, the processing of faces seems to be supported by early extrastriate occipital cortices and revealed by modulations of the occipital P1. This early response is thought to reflect the detection of certain primary structural aspects indicating the presence grosso modo of a face within the visual field. The posterior-temporal N170 is more sensitive to the detection of faces as complex-structured stimuli and, therefore, to the presence of its distinctive organizational characteristics prior to within-category identification. In turn, the relatively late and probably more rostrally generated N250r and N400-like responses might respectively indicate processes of access and retrieval of face-related information, which is stored in long-term memory (LTM. New methods of analysis of electrophysiological and neuroanatomical data, namely, dynamic causal modeling, single-trial and time-frequency analyses, are highly recommended to advance in the knowledge of those brain mechanisms concerning face processing.

  7. Invasive species information networks: Collaboration at multiple scales for prevention, early detection, and rapid response to invasive alien species

    Science.gov (United States)

    Simpson, Annie; Jarnevich, Catherine S.; Madsen, John; Westbrooks, Randy G.; Fournier, Christine; Mehrhoff, Les; Browne, Michael; Graham, Jim; Sellers, Elizabeth A.

    2009-01-01

    Accurate analysis of present distributions and effective modeling of future distributions of invasive alien species (IAS) are both highly dependent on the availability and accessibility of occurrence data and natural history information about the species. Invasive alien species monitoring and detection networks (such as the Invasive Plant Atlas of New England and the Invasive Plant Atlas of the MidSouth) generate occurrence data at local and regional levels within the United States, which are shared through the US National Institute of Invasive Species Science. The Inter-American Biodiversity Information Network's Invasives Information Network (I3N), facilitates cooperation on sharing invasive species occurrence data throughout the Western Hemisphere. The I3N and other national and regional networks expose their data globally via the Global Invasive Species Information Network (GISIN). International and interdisciplinary cooperation on data sharing strengthens cooperation on strategies and responses to invasions. However, limitations to effective collaboration among invasive species networks leading to successful early detection and rapid response to invasive species include: lack of interoperability; data accessibility; funding; and technical expertise. This paper proposes various solutions to these obstacles at different geographic levels and briefly describes success stories from the invasive species information networks mentioned above. Using biological informatics to facilitate global information sharing is especially critical in invasive species science, as research has shown that one of the best indicators of the invasiveness of a species is whether it has been invasive elsewhere. Data must also be shared across disciplines because natural history information (e.g. diet, predators, habitat requirements, etc.) about a species in its native range is vital for effective prevention, detection, and rapid response to an invasion. Finally, it has been our

  8. Dissociation between face perception and face memory in adults, but not children, with developmental prosopagnosia.

    Science.gov (United States)

    Dalrymple, Kirsten A; Garrido, Lúcia; Duchaine, Brad

    2014-10-01

    Cognitive models propose that face recognition is accomplished through a series of discrete stages, including perceptual representation of facial structure, and encoding and retrieval of facial information. This implies that impaired face recognition can result from failures of face perception, face memory, or both. Studies of acquired prosopagnosia, autism spectrum disorders, and the development of normal face recognition support the idea that face perception and face memory are distinct processes, yet this distinction has received little attention in developmental prosopagnosia (DP). To address this issue, we tested the face perception and face memory of children and adults with DP. By definition, face memory is impaired in DP, so memory deficits were present in all participants. However, we found that all children, but only half of the adults had impaired face perception. Thus, results from adults indicate that face perception and face memory are dissociable, while the results from children provide no evidence for this division. Importantly, our findings raise the possibility that DP is qualitatively different in childhood versus adulthood. We discuss theoretical explanations for this developmental pattern and conclude that longitudinal studies are necessary to better understand the developmental trajectory of face perception and face memory deficits in DP. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  9. Dissociation between face perception and face memory in adults, but not children, with developmental prosopagnosia

    Directory of Open Access Journals (Sweden)

    Kirsten A. Dalrymple

    2014-10-01

    Full Text Available Cognitive models propose that face recognition is accomplished through a series of discrete stages, including perceptual representation of facial structure, and encoding and retrieval of facial information. This implies that impaired face recognition can result from failures of face perception, face memory, or both. Studies of acquired prosopagnosia, autism spectrum disorders, and the development of normal face recognition support the idea that face perception and face memory are distinct processes, yet this distinction has received little attention in developmental prosopagnosia (DP. To address this issue, we tested the face perception and face memory of children and adults with DP. By definition, face memory is impaired in DP, so memory deficits were present in all participants. However, we found that all children, but only half of the adults had impaired face perception. Thus, results from adults indicate that face perception and face memory are dissociable, while the results from children provide no evidence for this division. Importantly, our findings raise the possibility that DP is qualitatively different in childhood versus adulthood. We discuss theoretical explanations for this developmental pattern and conclude that longitudinal studies are necessary to better understand the developmental trajectory of face perception and face memory deficits in DP.

  10. Information Limited Oligonucleotide Amplification Assay for Affinity-Based, Parallel Detection Studies.

    Directory of Open Access Journals (Sweden)

    Harish Bokkasam

    Full Text Available Molecular communication systems encounter similar constraints as telecommunications. In either case, channel crosstalk at the receiver end will result in information loss that statistical analysis cannot compensate. This is because in any communication channel there is a physical limit to the amount of information that can be transmitted. We present a novel and simple modified end amplification (MEA technique to generate reduced and defined amounts of specific information in form of short fragments from an oligonucleotide source that also contains unrelated and redundant information. Our method can be a valuable tool to investigate information overflow and channel capacity in biomolecular recognition systems.

  11. Measuring External Face Appearance for Face Classification

    OpenAIRE

    Masip, David; Lapedriza, Agata; Vitria, Jordi

    2007-01-01

    In this chapter we introduce the importance of the external features in face classification problems, and propose a methodology to extract the external features obtaining an aligned feature set. The extracted features can be used as input to any standard pattern recognition classifier, as the classic feature extraction approaches dealing with internal face regions in the literature. The resulting scheme follows a top-down segmentation approach to deal with the diversity inherent to the extern...

  12. Apparatus, System and Method for Fast Detection of Genetic Information by PCR in an Interchangeable Chip

    KAUST Repository

    Wen, Weijia

    2011-03-03

    A polymerase chain reaction (PCR) device for fast amplification and detection of DNA includes an interchangeable PCR chamber, a temperature control component, and an optical detection system. The DNA amplification is performed on an interchangeable chip with volumes as small as 1.25 µl, while the heating and cooling rate may be as fast as 12.7 °C/second ensuring that the total time needed of only 25 minutes to complete the 35 cycle PCR amplification. The PCR may be performed according to a two-temperature approach for denaturing and annealing (Td and Ta) of DNA with the PCR chip, with which the amplification of male-specific SRY gene marker by utilizing raw saliva may be achieved. The genetic identification may be in-situ detected after PCR by the optical detection system.

  13. Enhanced Anomaly Detection Via PLS Regression Models and Information Entropy Theory

    KAUST Repository

    Harrou, Fouzi

    2015-12-07

    Accurate and effective fault detection and diagnosis of modern engineering systems is crucial for ensuring reliability, safety and maintaining the desired product quality. In this work, we propose an innovative method for detecting small faults in the highly correlated multivariate data. The developed method utilizes partial least square (PLS) method as a modelling framework, and the symmetrized Kullback-Leibler divergence (KLD) as a monitoring index, where it is used to quantify the dissimilarity between probability distributions of current PLS-based residual and reference one obtained using fault-free data. The performance of the PLS-based KLD fault detection algorithm is illustrated and compared to the conventional PLS-based fault detection methods. Using synthetic data, we have demonstrated the greater sensitivity and effectiveness of the developed method over the conventional methods, especially when data are highly correlated and small faults are of interest.

  14. Fast detection of genetic information by an optimized PCR in an interchangeable chip.

    KAUST Repository

    Wu, Jinbo

    2012-02-01

    In this paper, we report the construction of a polymerase chain reaction (PCR) device for fast amplification and detection of DNA. This device consists of an interchangeable PCR chamber, a temperature control component as well as an optical detection system. The DNA amplification happens on an interchangeable chip with the volumes as low as 1.25 μl, while the heating and cooling rate was as fast as 12.7°C/second ensuring that the total time needed of only 25 min to complete the 35 cycle PCR amplification. An optimized PCR with two-temperature approach for denaturing and annealing (Td and Ta) of DNA was also formulated with the PCR chip, with which the amplification of male-specific sex determining region Y (SRY) gene marker by utilizing raw saliva was successfully achieved and the genetic identification was in-situ detected right after PCR by the optical detection system.

  15. Enhanced Anomaly Detection Via PLS Regression Models and Information Entropy Theory

    KAUST Repository

    Harrou, Fouzi; Sun, Ying

    2015-01-01

    Accurate and effective fault detection and diagnosis of modern engineering systems is crucial for ensuring reliability, safety and maintaining the desired product quality. In this work, we propose an innovative method for detecting small faults in the highly correlated multivariate data. The developed method utilizes partial least square (PLS) method as a modelling framework, and the symmetrized Kullback-Leibler divergence (KLD) as a monitoring index, where it is used to quantify the dissimilarity between probability distributions of current PLS-based residual and reference one obtained using fault-free data. The performance of the PLS-based KLD fault detection algorithm is illustrated and compared to the conventional PLS-based fault detection methods. Using synthetic data, we have demonstrated the greater sensitivity and effectiveness of the developed method over the conventional methods, especially when data are highly correlated and small faults are of interest.

  16. Remote Sensing and Geographic Information System (GIS) Technologies for Natural Hazard Risk Site Detection

    International Nuclear Information System (INIS)

    Wenzel, H.

    2007-01-01

    Satellite imageries and digital elevation data of Turkey are investigated for detecting sites prone to natural hazards. Digital image processing methods used to enhance satellite data and to produce morphometric maps in order to contribute to the detection of causal factors related to landslides, local site conditions influencing and/or experiencing earthquake damage intensity or those of tsunami and storm surge hazard sites at the coasts

  17. Unveiling combinatorial regulation through the combination of ChIP information and in silico cis-regulatory module detection

    Science.gov (United States)

    Sun, Hong; Guns, Tias; Fierro, Ana Carolina; Thorrez, Lieven; Nijssen, Siegfried; Marchal, Kathleen

    2012-01-01

    Computationally retrieving biologically relevant cis-regulatory modules (CRMs) is not straightforward. Because of the large number of candidates and the imperfection of the screening methods, many spurious CRMs are detected that are as high scoring as the biologically true ones. Using ChIP-information allows not only to reduce the regions in which the binding sites of the assayed transcription factor (TF) should be located, but also allows restricting the valid CRMs to those that contain the assayed TF (here referred to as applying CRM detection in a query-based mode). In this study, we show that exploiting ChIP-information in a query-based way makes in silico CRM detection a much more feasible endeavor. To be able to handle the large datasets, the query-based setting and other specificities proper to CRM detection on ChIP-Seq based data, we developed a novel powerful CRM detection method ‘CPModule’. By applying it on a well-studied ChIP-Seq data set involved in self-renewal of mouse embryonic stem cells, we demonstrate how our tool can recover combinatorial regulation of five known TFs that are key in the self-renewal of mouse embryonic stem cells. Additionally, we make a number of new predictions on combinatorial regulation of these five key TFs with other TFs documented in TRANSFAC. PMID:22422841

  18. Instant PrimeFaces starter

    CERN Document Server

    Hlavats, Ian

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Instant Primefaces Starter is a fast-paced, introductory guide designed to give you all the information you need to start using Primfaces, instantly.Instant PrimeFaces Starter is great for developers looking to get started quickly with PrimeFaces. It's assumed that you have some JSF experience already, as well as familiarity with other Java technologies such as CDI and JPA and an understanding of MVC principles, object-relational mapping (ORM),

  19. The Functional Neuroanatomy of Human Face Perception.

    Science.gov (United States)

    Grill-Spector, Kalanit; Weiner, Kevin S; Kay, Kendrick; Gomez, Jesse

    2017-09-15

    Face perception is critical for normal social functioning and is mediated by a network of regions in the ventral visual stream. In this review, we describe recent neuroimaging findings regarding the macro- and microscopic anatomical features of the ventral face network, the characteristics of white matter connections, and basic computations performed by population receptive fields within face-selective regions composing this network. We emphasize the importance of the neural tissue properties and white matter connections of each region, as these anatomical properties may be tightly linked to the functional characteristics of the ventral face network. We end by considering how empirical investigations of the neural architecture of the face network may inform the development of computational models and shed light on how computations in the face network enable efficient face perception.

  20. Face Recognition and Tracking in Videos

    Directory of Open Access Journals (Sweden)

    Swapnil Vitthal Tathe

    2017-07-01

    Full Text Available Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face tracking framework that is capable of face detection using Haar features, recognition using Gabor feature extraction, matching using correlation score and tracking using Kalman filter. The method has good recognition rate for real-life videos and robust performance to changes due to illumination, environmental factors, scale, pose and orientations.

  1. A novel seizure detection algorithm informed by hidden Markov model event states

    Science.gov (United States)

    Baldassano, Steven; Wulsin, Drausin; Ung, Hoameng; Blevins, Tyler; Brown, Mesha-Gay; Fox, Emily; Litt, Brian

    2016-06-01

    Objective. Recently the FDA approved the first responsive, closed-loop intracranial device to treat epilepsy. Because these devices must respond within seconds of seizure onset and not miss events, they are tuned to have high sensitivity, leading to frequent false positive stimulations and decreased battery life. In this work, we propose a more robust seizure detection model. Approach. We use a Bayesian nonparametric Markov switching process to parse intracranial EEG (iEEG) data into distinct dynamic event states. Each event state is then modeled as a multidimensional Gaussian distribution to allow for predictive state assignment. By detecting event states highly specific for seizure onset zones, the method can identify precise regions of iEEG data associated with the transition to seizure activity, reducing false positive detections associated with interictal bursts. The seizure detection algorithm was translated to a real-time application and validated in a small pilot study using 391 days of continuous iEEG data from two dogs with naturally occurring, multifocal epilepsy. A feature-based seizure detector modeled after the NeuroPace RNS System was developed as a control. Main results. Our novel seizure detection method demonstrated an improvement in false negative rate (0/55 seizures missed versus 2/55 seizures missed) as well as a significantly reduced false positive rate (0.0012 h versus 0.058 h-1). All seizures were detected an average of 12.1 ± 6.9 s before the onset of unequivocal epileptic activity (unequivocal epileptic onset (UEO)). Significance. This algorithm represents a computationally inexpensive, individualized, real-time detection method suitable for implantable antiepileptic devices that may considerably reduce false positive rate relative to current industry standards.

  2. Efficient search for a face by chimpanzees (Pan troglodytes)

    OpenAIRE

    Tomonaga, Masaki; Imura, Tomoko

    2015-01-01

    The face is quite an important stimulus category for human and nonhuman primates in their social lives. Recent advances in comparative-cognitive research clearly indicate that chimpanzees and humans process faces in a special manner; that is, using holistic or configural processing. Both species exhibit the face-inversion effect in which the inverted presentation of a face deteriorates their perception and recognition. Furthermore, recent studies have shown that humans detect human faces amon...

  3. Evaluation of information-theoretic similarity measures for content-based retrieval and detection of masses in mammograms

    International Nuclear Information System (INIS)

    Tourassi, Georgia D.; Harrawood, Brian; Singh, Swatee; Lo, Joseph Y.; Floyd, Carey E.

    2007-01-01

    The purpose of this study was to evaluate image similarity measures employed in an information-theoretic computer-assisted detection (IT-CAD) scheme. The scheme was developed for content-based retrieval and detection of masses in screening mammograms. The study is aimed toward an interactive clinical paradigm where physicians query the proposed IT-CAD scheme on mammographic locations that are either visually suspicious or indicated as suspicious by other cuing CAD systems. The IT-CAD scheme provides an evidence-based, second opinion for query mammographic locations using a knowledge database of mass and normal cases. In this study, eight entropy-based similarity measures were compared with respect to retrieval precision and detection accuracy using a database of 1820 mammographic regions of interest. The IT-CAD scheme was then validated on a separate database for false positive reduction of progressively more challenging visual cues generated by an existing, in-house mass detection system. The study showed that the image similarity measures fall into one of two categories; one category is better suited to the retrieval of semantically similar cases while the second is more effective with knowledge-based decisions regarding the presence of a true mass in the query location. In addition, the IT-CAD scheme yielded a substantial reduction in false-positive detections while maintaining high detection rate for malignant masses

  4. Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2013-12-01

    Full Text Available This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels. Traffic analysis envisages certain measures to control the security of the Russian Federation information technology infrastructure and, most importantly, to establish the reasons of the occurred and predictable computer incidents.

  5. NEW APPROACHES IN DECEPTION DETECTION II. ACTIVE INTERVIEWING STRATEGIES AND CONTEXTUAL INFORMATION

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2015-05-01

    Full Text Available Meta-analytical evidence shows that behavioural indicators of deception are scant, poorly diagnostic and inconsistent. This has yielded a shift in deception detection research. Rather than passively scrutinising the communication sender to find tell-tale behavioural indicators of deception, the deception judge needs to (a adopt an active role by using interviewing techniques specifically designed to detect deception, or (b focus on contextual (rather than behavioural deception cues. In the previous paper (Masip & Herrero, 2015a, we reviewed the antecedents of this change in focus, as well as the theoretical grounding of the new approaches. Here we describe specific interviewing strategies for detecting deception, as well as the (still scant research on contextual deception indicia. In doing this, we hope to offer the reader a detailed perspective on the recent developments in this specific area of psychology and law.

  6. A Shape-Based Account for Holistic Face Processing

    Science.gov (United States)

    Zhao, Mintao; Bülthoff, Heinrich H.; Bülthoff, Isabelle

    2016-01-01

    Faces are processed holistically, so selective attention to 1 face part without any influence of the others often fails. In this study, 3 experiments investigated what type of facial information (shape or surface) underlies holistic face processing and whether generalization of holistic processing to nonexperienced faces requires extensive…

  7. Spectral and physiological information from chlorophyll fluorescence signals in the detection of pine damage

    Energy Technology Data Exchange (ETDEWEB)

    Meinander, O. [Finnish Meteorological Inst., Helsinki (Finland). Air Quality Dept.; Somersalo, S. [Helsinki Univ., Helsinki (Finland). Dept. of Plant Biology

    1995-12-31

    Photosynthesis is often among the first targets of the air pollution stress of plants. As chlorophyll fluorescence is a process competing with photosynthetic electron transport it can be employed to study the potential photosynthetic capacity and to detect damage to the photosynthetic apparatus. Many previous studies have shown that chlorophyll fluorescence can be a powerful tool in the detection of forest damage. In this preliminary study, singular value analysis of the fluorescence induction curves was used together with the traditional way of analyzing fluorescence measurements. The experimental data were collected from ozone and carbon dioxide fumigated Scots pine saplings. (author)

  8. Spectral and physiological information from chlorophyll fluorescence signals in the detection of pine damage

    Energy Technology Data Exchange (ETDEWEB)

    Meinander, O [Finnish Meteorological Inst., Helsinki (Finland). Air Quality Dept.; Somersalo, S [Helsinki Univ., Helsinki (Finland). Dept. of Plant Biology

    1996-12-31

    Photosynthesis is often among the first targets of the air pollution stress of plants. As chlorophyll fluorescence is a process competing with photosynthetic electron transport it can be employed to study the potential photosynthetic capacity and to detect damage to the photosynthetic apparatus. Many previous studies have shown that chlorophyll fluorescence can be a powerful tool in the detection of forest damage. In this preliminary study, singular value analysis of the fluorescence induction curves was used together with the traditional way of analyzing fluorescence measurements. The experimental data were collected from ozone and carbon dioxide fumigated Scots pine saplings. (author)

  9. Prosopagnosia when all faces look the same

    CERN Document Server

    Rivolta, Davide

    2014-01-01

    This book provides readers with a simplified and comprehensive account of the cognitive and neural bases of face perception in humans. Faces are ubiquitous in our environment and we rely on them during social interactions. The human face processing system allows us to extract information about the identity, gender, age, mood, race, attractiveness and approachability of other people in about a fraction of a second, just by glancing at their faces.  By introducing readers to the most relevant research on face recognition, this book seeks to answer the questions: “Why are humans so fast at recognizing faces?”, “Why are humans so efficient at recognizing faces?”, “Do faces represent a particular category for the human visual system?”, What makes face perception in humans so special?, “Can our face recognition system fail”?  This book presents the author’s findings on face perception during his research studies on both normal subjects and subjects with prosopagnosia, a neurological disorder cha...

  10. The hierarchical brain network for face recognition.

    Science.gov (United States)

    Zhen, Zonglei; Fang, Huizhen; Liu, Jia

    2013-01-01

    Numerous functional magnetic resonance imaging (fMRI) studies have identified multiple cortical regions that are involved in face processing in the human brain. However, few studies have characterized the face-processing network as a functioning whole. In this study, we used fMRI to identify face-selective regions in the entire brain and then explore the hierarchical structure of the face-processing network by analyzing functional connectivity among these regions. We identified twenty-five regions mainly in the occipital, temporal and frontal cortex that showed a reliable response selective to faces (versus objects) across participants and across scan sessions. Furthermore, these regions were clustered into three relatively independent sub-networks in a face-recognition task on the basis of the strength of functional connectivity among them. The functionality of the sub-networks likely corresponds to the recognition of individual identity, retrieval of semantic knowledge and representation of emotional information. Interestingly, when the task was switched to object recognition from face recognition, the functional connectivity between the inferior occipital gyrus and the rest of the face-selective regions were significantly reduced, suggesting that this region may serve as an entry node in the face-processing network. In sum, our study provides empirical evidence for cognitive and neural models of face recognition and helps elucidate the neural mechanisms underlying face recognition at the network level.

  11. Resilience in the face of post-election violence in Kenya: the mediating role of social networks on wellbeing among older people in the Korogocho informal settlement, Nairobi.

    Science.gov (United States)

    Bennett, Rachel; Chepngeno-Langat, Gloria; Evandrou, Maria; Falkingham, Jane

    2015-03-01

    Older people in slum settings are a vulnerable sub-group during crises, yet have received minimal attention in the development discourse. This paper examines the protective role of different types of social networks for older slum dwellers' wellbeing during adversity by investigating the relationship between social networks, the Kenyan 2007/08 post-election violence, and dimensions of wellbeing namely self-rated health, life satisfaction and happiness amongst older people in the Korogocho slum, Nairobi. The analyses are based on conditional change logistic regression models using data from a unique longitudinal survey of the health and wellbeing of older people. The results show that maintaining or increasing formal local networks reduced the detrimental effects of the post-election violence for older people's wellbeing, whilst household environment and informal local and non-local networks did not influence the relationship. Consequently, the paper provides evidence that supporting inclusive community organisations which are accessible to older people can be valuable in promoting the resilience of this population group. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. The Probability of Detection in the Telephone Line of Device of the Unauthorized Removal of Information

    Directory of Open Access Journals (Sweden)

    I. V. Svintsov

    2011-06-01

    Full Text Available The article discusses the theory of quantitative description of the possible presence in the telephone line devices unauthorized removal of information, investigated with the help of probability theory.

  13. Holistic processing of face configurations and components.

    Science.gov (United States)

    Hayward, William G; Crookes, Kate; Chu, Ming Hon; Favelle, Simone K; Rhodes, Gillian

    2016-10-01

    Although many researchers agree that faces are processed holistically, we know relatively little about what information holistic processing captures from a face. Most studies that assess the nature of holistic processing do so with changes to the face affecting many different aspects of face information (e.g., different identities). Does holistic processing affect every aspect of a face? We used the composite task, a common means of examining the strength of holistic processing, with participants making same-different judgments about configuration changes or component changes to 1 portion of a face. Configuration changes involved changes in spatial position of the eyes, whereas component changes involved lightening or darkening the eyebrows. Composites were either aligned or misaligned, and were presented either upright or inverted. Both configuration judgments and component judgments showed evidence of holistic processing, and in both cases it was strongest for upright face composites. These results suggest that holistic processing captures a broad range of information about the face, including both configuration-based and component-based information. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  14. Quantifying characteristics of information-technology applications based on expert knowledge for detection of oestrus and mastitis in dairy cows.

    Science.gov (United States)

    van Asseldonk, M A; Huirne, R B; Dijkhuizen, A A

    1998-10-09

    Expert opinions were elicited about the characteristics at the commercial-farm level of on-line information technology (IT) applications that are able to detect oestrus and mastitis in dairy cows. Since actual data of these characteristics are not available, judgmental data provided an alternative means to interpret the implications of research results for commercial farms. Applications included were activity measurement, milk-production measurement, electrical conductivity of quarter milk, automated concentrate feeders and milk-temperature measurement. Sensitivity and specificity of detection of oestrus (OD), clinical-mastitis (CMD) and subclinical-mastitis (SCMD) were ascertained. Conjoint-analysis was used to assess the effect of each application indirectly by decomposing the evaluated overall detection characteristics of a predefined number of IT combinations. The individual experts were consistent in evaluating the alternatives, but there was variation in estimates among experts. Estimations of the main effects of the applications and important first-order interactions were incorporated into the detection models. Implementation of all applications under study resulted in overall sensitivities and specificities of 82% and 90%, 73% and 87%, 58% and 82% for OD, CMD and SCMD, respectively. Further research is necessary that should take into account costs and benefits of the different detection systems based on the current status of farm performance (e.g. OD and mastitis incidence) and farm structure (e.g. farm size, years in operation of the milking parlour and parlour layout). Research to do this is currently in progress.

  15. Psychophysical estimate of plantar vibration sensitivity brings additional information to the detection threshold in young and elderly subjects

    Directory of Open Access Journals (Sweden)

    Yves Jammes

    Full Text Available Objective: Vibration detection threshold of the foot sole was compared to the psychophysical estimate of vibration in a wide range of amplitudes in young (20–34 years old and elderly subjects (53–67 years old. Methods: The vibration detection threshold was determined on the hallux, 5th metatarsal head, and heel at frequencies of 25, 50 and 150 Hz. For vibrations of higher amplitude (reaching 360 μm, the Stevens power function (Ψ = k * Φn allowed to obtain regression equations between the vibration estimate (Ψ and its physical magnitude (Φ, the n coefficient giving the subjective intensity in vibration perception. We searched for age-related changes in the vibration perception by the foot sole. Results: In all participants, higher n values were measured at vibration frequencies of 150 Hz and, compared to the young adults the elderly had lower n values measured at this frequency. Only in the young participants, the vibration detection threshold was lowered at 150 Hz. Conclusion: The psychophysical estimate brings further information than the vibration detection threshold which is less affected by age. Significance: The clinical interest of psychophysical vibration estimate was assessed in a patient with a unilateral alteration of foot sensitivity. Keywords: Vibration sensitivity, Vibration detection threshold, Foot sole, Elderly

  16. Simple New Method of Detecting Lies By Identifying Invisible Unique Physiological Reflex Response Appearing Often Less Than 10-15 Seconds on the Specific Parts of Face of Lying Person; Quick Screening of Potential Murderers & Problematic Persons.

    Science.gov (United States)

    Omura, Yoshiaki; Nihrane, Abdallah; Lu, Dominic; Jones, Marilyn K; Shimotsuura, Yasuhiro; Ohki, Motomu

    2015-01-01

    Frequently, we cannot find any significant visible changes when somebody lies, but we found there are significant invisible changes appearing in specific areas of the face when somebody lies and their location often depends on whether the lie is serious with or without physical violence involvement. These abnormalities were detected non-invasively at areas: 1) lobules and c) a small round area of each upper lateral side of forehead; 2) the skin between the base of the 2 orifices of the nose and the upper end of upper lip and 3) Alae of both sides of nose. These invisible significant changes usually last less than 15 seconds after telling a lie. In these areas, Bi-Digital O-Ring Test (BDORT), which received a U.S. Patent in 1993, became significantly weak with an abnormal value of (-)7 and TXB2, measured non-invasively, was increased from 0.125-0.5ng to 12.5-15ng (within the first 5 seconds) and then went back down to less than 1ng (after 15 seconds). These unique changes can be documented semi-permanently by taking photographs of the face of people who tell a lie, within as short as 10 seconds after saying a lying statement. These abnormal responses appear in one or more of the above-mentioned 3 areas 1), 2) & 3). At least one abnormal pupil with BDORT of (-)8-(-)12 & marked reduction in Acetylcholine and abnormal increase in any of 3 Alzheimer's disease associated factors Apolipoprotein (Apo) E4, β-Amyloid (1-42), Tau protein, viral and bacterial infections were detected in both pupils and forehead of murderers and people who often have problems with others. Analysis of well-known typical examples of recent mass murderers was presented as examples. Using these findings, potential murderers and people who are very likely to develop problems with others can be screened within 5-10 minutes by examining their facial photographs and signatures before school admission or employment.

  17. Development of Fire Detection Algorithm at Its Early Stage Using Fire Colour and Shape Information

    Science.gov (United States)

    Suleiman Abdullahi, Zainab; Hamisu Dalhatu, Shehu; Hassan Abdullahi, Zakariyya

    2018-04-01

    Fire can be defined as a state in which substances combined chemically with oxygen from the air and give out heat, smoke and flame. Most of the conventional fire detection techniques such as smoke, fire and heat detectors respectively have a problem of travelling delay and also give a high false alarm. The algorithm begins by loading the selected video clip from the database developed to identify the present or absence of fire in a frame. In this approach, background subtraction was employed. If the result of subtraction is less than the set threshold, the difference is ignored and the next frame is taken. However, if the difference is equal to or greater than the set threshold then it subjected to colour and shape test. This is done by using combined RGB colour model and shape signature. The proposed technique was very effective in detecting fire compared to those technique using only motion or colour clues.

  18. Schizophrenia alters intra-network functional connectivity in the caudate for detecting speech under informational speech masking conditions.

    Science.gov (United States)

    Zheng, Yingjun; Wu, Chao; Li, Juanhua; Li, Ruikeng; Peng, Hongjun; She, Shenglin; Ning, Yuping; Li, Liang

    2018-04-04

    Speech recognition under noisy "cocktail-party" environments involves multiple perceptual/cognitive processes, including target detection, selective attention, irrelevant signal inhibition, sensory/working memory, and speech production. Compared to health listeners, people with schizophrenia are more vulnerable to masking stimuli and perform worse in speech recognition under speech-on-speech masking conditions. Although the schizophrenia-related speech-recognition impairment under "cocktail-party" conditions is associated with deficits of various perceptual/cognitive processes, it is crucial to know whether the brain substrates critically underlying speech detection against informational speech masking are impaired in people with schizophrenia. Using functional magnetic resonance imaging (fMRI), this study investigated differences between people with schizophrenia (n = 19, mean age = 33 ± 10 years) and their matched healthy controls (n = 15, mean age = 30 ± 9 years) in intra-network functional connectivity (FC) specifically associated with target-speech detection under speech-on-speech-masking conditions. The target-speech detection performance under the speech-on-speech-masking condition in participants with schizophrenia was significantly worse than that in matched healthy participants (healthy controls). Moreover, in healthy controls, but not participants with schizophrenia, the strength of intra-network FC within the bilateral caudate was positively correlated with the speech-detection performance under the speech-masking conditions. Compared to controls, patients showed altered spatial activity pattern and decreased intra-network FC in the caudate. In people with schizophrenia, the declined speech-detection performance under speech-on-speech masking conditions is associated with reduced intra-caudate functional connectivity, which normally contributes to detecting target speech against speech masking via its functions of suppressing masking-speech signals.

  19. Fault Detection and Diagnosis for Gas Turbines Based on a Kernelized Information Entropy Model

    Directory of Open Access Journals (Sweden)

    Weiying Wang

    2014-01-01

    Full Text Available Gas turbines are considered as one kind of the most important devices in power engineering and have been widely used in power generation, airplanes, and naval ships and also in oil drilling platforms. However, they are monitored without man on duty in the most cases. It is highly desirable to develop techniques and systems to remotely monitor their conditions and analyze their faults. In this work, we introduce a remote system for online condition monitoring and fault diagnosis of gas turbine on offshore oil well drilling platforms based on a kernelized information entropy model. Shannon information entropy is generalized for measuring the uniformity of exhaust temperatures, which reflect the overall states of the gas paths of gas turbine. In addition, we also extend the entropy to compute the information quantity of features in kernel spaces, which help to select the informative features for a certain recognition task. Finally, we introduce the information entropy based decision tree algorithm to extract rules from fault samples. The experiments on some real-world data show the effectiveness of the proposed algorithms.

  20. Fault detection and diagnosis for gas turbines based on a kernelized information entropy model.

    Science.gov (United States)

    Wang, Weiying; Xu, Zhiqiang; Tang, Rui; Li, Shuying; Wu, Wei

    2014-01-01

    Gas turbines are considered as one kind of the most important devices in power engineering and have been widely used in power generation, airplanes, and naval ships and also in oil drilling platforms. However, they are monitored without man on duty in the most cases. It is highly desirable to develop techniques and systems to remotely monitor their conditions and analyze their faults. In this work, we introduce a remote system for online condition monitoring and fault diagnosis of gas turbine on offshore oil well drilling platforms based on a kernelized information entropy model. Shannon information entropy is generalized for measuring the uniformity of exhaust temperatures, which reflect the overall states of the gas paths of gas turbine. In addition, we also extend the entropy to compute the information quantity of features in kernel spaces, which help to select the informative features for a certain recognition task. Finally, we introduce the information entropy based decision tree algorithm to extract rules from fault samples. The experiments on some real-world data show the effectiveness of the proposed algorithms.

  1. A Research-Informed Approach to Teaching About Exoplanet Detection in STEM Classrooms

    Science.gov (United States)

    Brissenden, Gina; Wallace, C. S.; Prather, E. E.; Traub, W. A.; Greene, W. M.; Biferno, A. A.

    2014-01-01

    JPL’s NASA Exoplanet Exploration Program’s (ExEP) Public Engagement Program, in collaboration with the Center for Astronomy Education (CAE), is engaged in a research and curriculum development program to bring the science of exoplanet detection into STEM classrooms. In recent years, there has been a significant increase in the number of astronomers pursuing research related to exoplanets, along with a significant increase in interest amongst students and the general public regarding the topic of exoplanets. CAE has previously developed a curriculum unit (including Think-Pair-Share questions and a Lecture-Tutorial) to help students develop a deeper understanding of the Doppler method for detecting extrasolar planets. To date, there is a nearly nonexistent research base on students’ conceptual and reasoning difficulties related to the science of the transit and gravitational microlensing methods for detecting extrasolar planets. Appropriate for physical science classrooms from middle school to the introductory college level, the learner-centered active engagement activities we are developing are going through an iterative research and assessment process to ensure that they enable students to achieve increased conceptual understandings and reasoning skills in these areas. In this talk, we will report on our development process for two new Lecture-Tutorials that help students learn about the transit and gravitational microlensing methods for finding exoplanets.

  2. Physical activity in young adults: a signal detection analysis of Health Information National Trends Survey (HINTS) 2007 data.

    Science.gov (United States)

    Valle, Carmina G; Tate, Deborah F; Mayer, Deborah K; Allicock, Marlyn; Cai, Jianwen; Campbell, Marci K

    2015-01-01

    Many young adults are insufficiently active to achieve the health benefits of regular physical activity. Using signal detection analysis of data from the 2007 Health Information National Trends Survey, the authors examined distinct subgroups of 18-39 year-old adults who vary in their likelihood of not meeting physical activity recommendations. We randomly split the sample and conducted signal detection analysis on the exploratory half to identify subgroups and interactions among sociodemographic and health communication variables that predicted engaging in less than 150 minutes per week of moderate-intensity physical activity (low physical activity). We compared rates of low physical activity among subgroups with similarly defined subgroups in the validation sample. Overall, 62% of participants did not meet physical activity recommendations. Among 8 subgroups identified, low physical activity rates ranged from 31% to 90%. Predictors of low physical activity were general health, body mass index (BMI), perceived cancer risk, health-related Internet use, and trust in information sources. The least active subgroup (90% low physical activity) included young adults in poor to good health with a BMI of 30.8 or more (obese). The most active subgroup (31% low physical activity) comprised those in very good to excellent health, who used a website to help with diet, weight, or physical activity, and had little to no trust in health information on television. Findings suggest potential intervention communication channels and can inform targeted physical activity interventions for young adults.

  3. Dissociation of face-selective cortical responses by attention.

    Science.gov (United States)

    Furey, Maura L; Tanskanen, Topi; Beauchamp, Michael S; Avikainen, Sari; Uutela, Kimmo; Hari, Riitta; Haxby, James V

    2006-01-24

    We studied attentional modulation of cortical processing of faces and houses with functional MRI and magnetoencephalography (MEG). MEG detected an early, transient face-selective response. Directing attention to houses in "double-exposure" pictures of superimposed faces and houses strongly suppressed the characteristic, face-selective functional MRI response in the fusiform gyrus. By contrast, attention had no effect on the M170, the early, face-selective response detected with MEG. Late (>190 ms) category-related MEG responses elicited by faces and houses, however, were strongly modulated by attention. These results indicate that hemodynamic and electrophysiological measures of face-selective cortical processing complement each other. The hemodynamic signals reflect primarily late responses that can be modulated by feedback connections. By contrast, the early, face-specific M170 that was not modulated by attention likely reflects a rapid, feed-forward phase of face-selective processing.

  4. Learning discriminant face descriptor.

    Science.gov (United States)

    Lei, Zhen; Pietikäinen, Matti; Li, Stan Z

    2014-02-01

    Local feature descriptor is an important module for face recognition and those like Gabor and local binary patterns (LBP) have proven effective face descriptors. Traditionally, the form of such local descriptors is predefined in a handcrafted way. In this paper, we propose a method to learn a discriminant face descriptor (DFD) in a data-driven way. The idea is to learn the most discriminant local features that minimize the difference of the features between images of the same person and maximize that between images from different people. In particular, we propose to enhance the discriminative ability of face representation in three aspects. First, the discriminant image filters are learned. Second, the optimal neighborhood sampling strategy is soft determined. Third, the dominant patterns are statistically constructed. Discriminative learning is incorporated to extract effective and robust features. We further apply the proposed method to the heterogeneous (cross-modality) face recognition problem and learn DFD in a coupled way (coupled DFD or C-DFD) to reduce the gap between features of heterogeneous face images to improve the performance of this challenging problem. Extensive experiments on FERET, CAS-PEAL-R1, LFW, and HFB face databases validate the effectiveness of the proposed DFD learning on both homogeneous and heterogeneous face recognition problems. The DFD improves POEM and LQP by about 4.5 percent on LFW database and the C-DFD enhances the heterogeneous face recognition performance of LBP by over 25 percent.

  5. Oracle ADF Faces cookbook

    CERN Document Server

    Gawish, Amr

    2014-01-01

    This is a cookbook that covers more than 80 different recipes to teach you about different aspects of Oracle ADF Faces. It follows a practical approach and covers how to build your components for reuse in different applications. This book will also help you in tuning the performance of your ADF Faces application. If you are an ADF developer who wants to harness the power of Oracle ADF Faces to create exceptional user interfaces and reactive applications, this book will provide you with the recipes needed to do just that. You will not need to be familiar with Oracle ADF Faces, but you should be

  6. Face inversion increases attractiveness.

    Science.gov (United States)

    Leder, Helmut; Goller, Juergen; Forster, Michael; Schlageter, Lena; Paul, Matthew A

    2017-07-01

    Assessing facial attractiveness is a ubiquitous, inherent, and hard-wired phenomenon in everyday interactions. As such, it has highly adapted to the default way that faces are typically processed: viewing faces in upright orientation. By inverting faces, we can disrupt this default mode, and study how facial attractiveness is assessed. Faces, rotated at 90 (tilting to either side) and 180°, were rated on attractiveness and distinctiveness scales. For both orientations, we found that faces were rated more attractive and less distinctive than upright faces. Importantly, these effects were more pronounced for faces rated low in upright orientation, and smaller for highly attractive faces. In other words, the less attractive a face was, the more it gained in attractiveness by inversion or rotation. Based on these findings, we argue that facial attractiveness assessments might not rely on the presence of attractive facial characteristics, but on the absence of distinctive, unattractive characteristics. These unattractive characteristics are potentially weighed against an individual, attractive prototype in assessing facial attractiveness. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  7. An analysis of contingent factors for the detection of strategic relevance in business information technologies

    Directory of Open Access Journals (Sweden)

    Antonio Paños Álvarez

    2005-01-01

    Full Text Available Information Technologies are resources able to create competitive advantages for companies. In this analysis, the Resource-based perspective have taken special relevance, because it is argued that this advantages should be identified, reached and maintained. This work is positioned in the analysis of several contingent factors in the process of pointing the possible assesment of these advantages. It is aproaching a portfolio for helping to select what Information Technologies are valuable for what companies and in what activity areas and the study of in what way the sector, the technological innovation profile, the size and the financial capacity of the companies affects this process

  8. An attempt of using straight-line information for building damage detection based only on post-earthquake optical imagery

    International Nuclear Information System (INIS)

    Dong, Laigen; Ye, Yuanxin; Shan, Jie

    2014-01-01

    It is important to grasp damage information in stricken areas after an earthquake in order to perform quick rescue and recovery activities. Recent research into remote sensing techniques has shown significant ability to generate quality damage information. The methods based on only post-earthquake data are widely researched especially because there are no pre-earthquake reference data in many cities of the world. This paper addresses a method for detection of damaged buildings using only post-event satellite imagery so that scientists and researchers can take advantage of the ability of helicopters and airplanes to fly over the damage faster. Statistical information of line segments extracted from post-event satellite imagery, such as mean length (ML) and weighted tilt angel standard deviation (WTASD), are used for discriminating the damaged and undamaged buildings

  9. Face Prediction Model for an Automatic Age-invariant Face Recognition System

    OpenAIRE

    Yadav, Poonam

    2015-01-01

    07.11.14 KB. Emailed author re copyright. Author says that copyright is retained by author. Ok to add to spiral Automated face recognition and identi cation softwares are becoming part of our daily life; it nds its abode not only with Facebooks auto photo tagging, Apples iPhoto, Googles Picasa, Microsofts Kinect, but also in Homeland Security Departments dedicated biometric face detection systems. Most of these automatic face identification systems fail where the e ects of aging come into...

  10. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  11. Surveillance in the Information Age: Text Quantification, Anomaly Detection, and Empirical Evaluation

    Science.gov (United States)

    Lu, Hsin-Min

    2010-01-01

    Deep penetration of personal computers, data communication networks, and the Internet has created a massive platform for data collection, dissemination, storage, and retrieval. Large amounts of textual data are now available at a very low cost. Valuable information, such as consumer preferences, new product developments, trends, and opportunities,…

  12. Channel Estimation and Information Symbol Detection for DS-UWB Communication Systems

    Directory of Open Access Journals (Sweden)

    Wei Wang

    2014-01-01

    estimation, the one-step predictor of information symbol is used and the estimation error is also considered as a multiplicative noise. The solutions to the above two problems are obtained by solving a couple of Riccati equations together with two Lyapunov equations.

  13. Breaking camouflage and detecting targets require optic flow and image structure information.

    Science.gov (United States)

    Pan, Jing Samantha; Bingham, Ned; Chen, Chang; Bingham, Geoffrey P

    2017-08-01

    Use of motion to break camouflage extends back to the Cambrian [In the Blink of an Eye: How Vision Sparked the Big Bang of Evolution (New York Basic Books, 2003)]. We investigated the ability to break camouflage and continue to see camouflaged targets after motion stops. This is crucial for the survival of hunting predators. With camouflage, visual targets and distracters cannot be distinguished using only static image structure (i.e., appearance). Motion generates another source of optical information, optic flow, which breaks camouflage and specifies target locations. Optic flow calibrates image structure with respect to spatial relations among targets and distracters, and calibrated image structure makes previously camouflaged targets perceptible in a temporally stable fashion after motion stops. We investigated this proposal using laboratory experiments and compared how many camouflaged targets were identified either with optic flow information alone or with combined optic flow and image structure information. Our results show that the combination of motion-generated optic flow and target-projected image structure information yielded efficient and stable perception of camouflaged targets.

  14. Enhanced 3D face processing using an active vision system

    DEFF Research Database (Denmark)

    Lidegaard, Morten; Larsen, Rasmus; Kraft, Dirk

    2014-01-01

    We present an active face processing system based on 3D shape information extracted by means of stereo information. We use two sets of stereo cameras with different field of views (FOV): One with a wide FOV is used for face tracking, while the other with a narrow FOV is used for face identification...

  15. Remote versus face-to-face check-ups for asthma.

    Science.gov (United States)

    Kew, Kayleigh M; Cates, Christopher J

    2016-04-18

    Asthma remains a significant cause of avoidable morbidity and mortality. Regular check-ups with a healthcare professional are essential to monitor symptoms and adjust medication.Health services worldwide are considering telephone and internet technologies as a way to manage the rising number of people with asthma and other long-term health conditions. This may serve to improve health and reduce the burden on emergency and inpatient services. Remote check-ups may represent an unobtrusive and efficient way of maintaining contact with patients, but it is uncertain whether conducting check-ups in this way is effective or whether it may have unexpected negative consequences. To assess the safety and efficacy of conducting asthma check-ups remotely versus usual face-to-face consultations. We identified trials from the Cochrane Airways Review Group Specialised Register (CAGR) up to 24 November 2015. We also searched www.clinicaltrials.gov, the World Health Organization (WHO) trials portal, reference lists of other reviews and contacted trial authors for additional information. We included parallel randomised controlled trials (RCTs) of adults or children with asthma that compared remote check-ups conducted using any form of technology versus standard face-to-face consultations. We excluded studies that used automated telehealth interventions that did not include personalised contact with a health professional. We included studies reported as full-text articles, as abstracts only and unpublished data. Two review authors screened the literature search results and independently extracted risk of bias and numerical data. We resolved any disagreements by consensus, and we contacted study authors for missing information.We analysed dichotomous data as odds ratios (ORs) using study participants as the unit of analysis, and continuous data as mean differences using the random-effects models. We rated all outcomes using the Grading of Recommendations Assessment, Development and

  16. Combining time-frequency and spatial information for the detection of sleep spindles

    Directory of Open Access Journals (Sweden)

    Christian eO'Reilly

    2015-02-01

    Full Text Available EEG sleep spindles are short (0.5-2.0 s bursts of activity in the 11-16 Hz band occurring during non-rapid eye movement (NREM sleep. This sporadic activity is thought to play a role in memory consolidation, brain plasticity, and protection of sleep integrity. Many automatic detectors have been proposed to assist or replace experts for sleep spindle scoring. However, these algorithms usually detect too many events making it difficult to achieve a good tradeoff between sensitivity (Se and false detection rate (FDr. In this work, we propose a semi-automatic detector comprising a sensitivity phase based on well-established criteria followed by a specificity phase using spatial and spectral criteria.In the sensitivity phase, selected events are those which amplitude in the 10 – 16 Hz band and spectral ratio characteristics both reject a null hypothesis (p <0.1 stating that the considered event is not a spindle. This null hypothesis is constructed from events occurring during rapid eye movement (REM sleep epochs. In the specificity phase, a hierarchical clustering of the selected candidates is done based on events’ frequency and spatial position along the anterior-posterior axis. Only events from the classes grouping most (at least 80% spindles scored by an expert are kept. We obtain Se = 93.2% and FDr = 93.0% in the first phase and Se = 85.4% and FDr = 86.2% in the second phase. For these two phases, Matthew’s correlation coefficients are respectively 0.228 and 0.324. Results suggest that spindles are defined by specific spatio-spectral properties and that automatic detection methods can be improved by considering these features.

  17. The Impact of Integrated Maneuver Guidance Information on UAS Pilots Performing the Detect and Avoid Task

    Science.gov (United States)

    Rorie, Conrad; Fern, Lisa

    2015-01-01

    The integrated human-in-the-loop (iHITL) simulation examined the effect of four different Detect-and-Avoid (DAA) display concepts on unmanned aircraft system (UAS) pilots' ability to maintain safe separation. The displays varied in the type and amount of guidance they provided to pilots. The study's background and methodology are discussed, followed by the 'measured response' data (i.e., pilots' end-to-end response time in reacting to traffic alerts on their DAA display). Results indicate that display type had a significant impact on how long pilot's spent interacting with the interface (i.e., edit times).

  18. Brain responses differ to faces of mothers and fathers.

    Science.gov (United States)

    Arsalidou, Marie; Barbeau, Emmanuel J; Bayless, Sarah J; Taylor, Margot J

    2010-10-01

    We encounter many faces each day but relatively few are personally familiar. Once faces are familiar, they evoke semantic and social information known about the person. Neuroimaging studies demonstrate differential brain activity to familiar and non-familiar faces; however, brain responses related to personally familiar faces have been more rarely studied. We examined brain activity with fMRI in adults in response to faces of their mothers and fathers compared to faces of celebrities and strangers. Overall, faces of mothers elicited more activity in core and extended brain regions associated with face processing, compared to fathers, celebrity or stranger faces. Fathers' faces elicited activity in the caudate, a deep brain structure associated with feelings of love. These new findings of differential brain responses elicited by faces of mothers and fathers are consistent with psychological research on attachment, evident even during adulthood. 2010 Elsevier Inc. All rights reserved.

  19. Revisiting Information Technology tools serving authorship and editorship: a case-guided tutorial to statistical analysis and plagiarism detection.

    Science.gov (United States)

    Bamidis, P D; Lithari, C; Konstantinidis, S T

    2010-12-01

    With the number of scientific papers published in journals, conference proceedings, and international literature ever increasing, authors and reviewers are not only facilitated with an abundance of information, but unfortunately continuously confronted with risks associated with the erroneous copy of another's material. In parallel, Information Communication Technology (ICT) tools provide to researchers novel and continuously more effective ways to analyze and present their work. Software tools regarding statistical analysis offer scientists the chance to validate their work and enhance the quality of published papers. Moreover, from the reviewers and the editor's perspective, it is now possible to ensure the (text-content) originality of a scientific article with automated software tools for plagiarism detection. In this paper, we provide a step-bystep demonstration of two categories of tools, namely, statistical analysis and plagiarism detection. The aim is not to come up with a specific tool recommendation, but rather to provide useful guidelines on the proper use and efficiency of either category of tools. In the context of this special issue, this paper offers a useful tutorial to specific problems concerned with scientific writing and review discourse. A specific neuroscience experimental case example is utilized to illustrate the young researcher's statistical analysis burden, while a test scenario is purpose-built using open access journal articles to exemplify the use and comparative outputs of seven plagiarism detection software pieces.

  20. Revisiting Information Technology tools serving authorship and editorship: a case-guided tutorial to statistical analysis and plagiarism detection

    Science.gov (United States)

    Bamidis, P D; Lithari, C; Konstantinidis, S T

    2010-01-01

    With the number of scientific papers published in journals, conference proceedings, and international literature ever increasing, authors and reviewers are not only facilitated with an abundance of information, but unfortunately continuously confronted with risks associated with the erroneous copy of another's material. In parallel, Information Communication Technology (ICT) tools provide to researchers novel and continuously more effective ways to analyze and present their work. Software tools regarding statistical analysis offer scientists the chance to validate their work and enhance the quality of published papers. Moreover, from the reviewers and the editor's perspective, it is now possible to ensure the (text-content) originality of a scientific article with automated software tools for plagiarism detection. In this paper, we provide a step-bystep demonstration of two categories of tools, namely, statistical analysis and plagiarism detection. The aim is not to come up with a specific tool recommendation, but rather to provide useful guidelines on the proper use and efficiency of either category of tools. In the context of this special issue, this paper offers a useful tutorial to specific problems concerned with scientific writing and review discourse. A specific neuroscience experimental case example is utilized to illustrate the young researcher's statistical analysis burden, while a test scenario is purpose-built using open access journal articles to exemplify the use and comparative outputs of seven plagiarism detection software pieces. PMID:21487489

  1. Group spike-and-slab lasso generalized linear models for disease prediction and associated genes detection by incorporating pathway information.

    Science.gov (United States)

    Tang, Zaixiang; Shen, Yueping; Li, Yan; Zhang, Xinyan; Wen, Jia; Qian, Chen'ao; Zhuang, Wenzhuo; Shi, Xinghua; Yi, Nengjun

    2018-03-15

    Large-scale molecular data have been increasingly used as an important resource for prognostic prediction of diseases and detection of associated genes. However, standard approaches for omics data analysis ignore the group structure among genes encoded in functional relationships or pathway information. We propose new Bayesian hierarchical generalized linear models, called group spike-and-slab lasso GLMs, for predicting disease outcomes and detecting associated genes by incorporating large-scale molecular data and group structures. The proposed model employs a mixture double-exponential prior for coefficients that induces self-adaptive shrinkage amount on different coefficients. The group information is incorporated into the model by setting group-specific parameters. We have developed a fast and stable deterministic algorithm to fit the proposed hierarchal GLMs, which can perform variable selection within groups. We assess the performance of the proposed method on several simulated scenarios, by varying the overlap among groups, group size, number of non-null groups, and the correlation within group. Compared with existing methods, the proposed method provides not only more accurate estimates of the parameters but also better prediction. We further demonstrate the application of the proposed procedure on three cancer datasets by utilizing pathway structures of genes. Our results show that the proposed method generates powerful models for predicting disease outcomes and detecting associated genes. The methods have been implemented in a freely available R package BhGLM (http://www.ssg.uab.edu/bhglm/). nyi@uab.edu. Supplementary data are available at Bioinformatics online.

  2. Human wagering behavior depends on opponents' faces.

    Directory of Open Access Journals (Sweden)

    Erik J Schlicht

    Full Text Available Research in competitive games has exclusively focused on how opponent models are developed through previous outcomes and how peoples' decisions relate to normative predictions. Little is known about how rapid impressions of opponents operate and influence behavior in competitive economic situations, although such subjective impressions have been shown to influence cooperative decision-making. This study investigates whether an opponent's face influences players' wagering decisions in a zero-sum game with hidden information. Participants made risky choices in a simplified poker task while being presented opponents whose faces differentially correlated with subjective impressions of trust. Surprisingly, we find that threatening face information has little influence on wagering behavior, but faces relaying positive emotional characteristics impact peoples' decisions. Thus, people took significantly longer and made more mistakes against emotionally positive opponents. Differences in reaction times and percent correct were greatest around the optimal decision boundary, indicating that face information is predominantly used when making decisions during medium-value gambles. Mistakes against emotionally positive opponents resulted from increased folding rates, suggesting that participants may have believed that these opponents were betting with hands of greater value than other opponents. According to these results, the best "poker face" for bluffing may not be a neutral face, but rather a face that contains emotional correlates of trustworthiness. Moreover, it suggests that rapid impressions of an opponent play an important role in competitive games, especially when people have little or no experience with an opponent.

  3. Face perception in the mind's eye.

    Science.gov (United States)

    Righart, Ruthger; Burra, Nicolas; Vuilleumier, Patrik

    2011-03-01

    Perceptual filling-in occurs when visual stimuli are recognized in impoverished viewing conditions. Whether missing information is filled-in during face perception and which stages might be involved in this process are still unresolved questions. Because an identity can be brought to mind by seeing eyes only, we hypothesized that missing information might be filled-in from a memory trace for the whole face identity. We presented participants with faces in phase 1 and later we presented eyes-only in phase 2. For some of these eyes in phase 2, the whole face had been presented in the previous phase, for others identical eyes had been presented. Event-related potentials (ERPs) revealed an N170 component that was more negative when eyes were preceded by a whole face in the previous phase compared to eyes preceded by identical eyes-only. A more positive-going late positive complex (LPC) was also found, suggesting enhanced retrieval of face memory representations when eyes were preceded by whole faces. Our results show that pre-existing representations of face identity can influence early stages of visual encoding, 170 ms after stimulus onset. These effects may reflect top-down modulation by memory on visual recognition processes by filling-in the missing facial information.

  4. Sensitivity to feature displacement in familiar and unfamiliar faces: beyond the internal/external feature distinction.

    Science.gov (United States)

    Brooks, Kevin R; Kemp, Richard I

    2007-01-01

    Previous studies of face recognition and of face matching have shown a general improvement for the processing of internal features as a face becomes more familiar to the participant. In this study, we used a psychophysical two-alternative forced-choice paradigm to investigate thresholds for the detection of a displacement of the eyes, nose, mouth, or ears for familiar and unfamiliar faces. No clear division between internal and external features was observed. Rather, for familiar (compared to unfamiliar) faces participants were more sensitive to displacements of internal features such as the eyes or the nose; yet, for our third internal feature-the mouth no such difference was observed. Despite large displacements, many subjects were unable to perform above chance when stimuli involved shifts in the position of the ears. These results are consistent with the proposal that familiarity effects may be mediated by the construction of a robust representation of a face, although the involvement of attention in the encoding of face stimuli cannot be ruled out. Furthermore, these effects are mediated by information from a spatial configuration of features, rather than by purely feature-based information.

  5. A multi-view face recognition system based on cascade face detector and improved Dlib

    Science.gov (United States)

    Zhou, Hongjun; Chen, Pei; Shen, Wei

    2018-03-01

    In this research, we present a framework for multi-view face detect and recognition system based on cascade face detector and improved Dlib. This method is aimed to solve the problems of low efficiency and low accuracy in multi-view face recognition, to build a multi-view face recognition system, and to discover a suitable monitoring scheme. For face detection, the cascade face detector is used to extracted the Haar-like feature from the training samples, and Haar-like feature is used to train a cascade classifier by combining Adaboost algorithm. Next, for face recognition, we proposed an improved distance model based on Dlib to improve the accuracy of multiview face recognition. Furthermore, we applied this proposed method into recognizing face images taken from different viewing directions, including horizontal view, overlooks view, and looking-up view, and researched a suitable monitoring scheme. This method works well for multi-view face recognition, and it is also simulated and tested, showing satisfactory experimental results.

  6. From Data to Knowledge — Faster: GOES Early Fire Detection System to Inform Operational Wildfire Response and Management

    Science.gov (United States)

    Koltunov, A.; Quayle, B.; Prins, E. M.; Ambrosia, V. G.; Ustin, S.

    2014-12-01

    Fire managers at various levels require near-real-time, low-cost, systematic, and reliable early detection capabilities with minimal latency to effectively respond to wildfire ignitions and minimize the risk of catastrophic development. The GOES satellite images collected for vast territories at high temporal frequencies provide a consistent and reliable source for operational active fire mapping realized by the WF-ABBA algorithm. However, their potential to provide early warning or rapid confirmation of initial fire ignition reports from conventional sources remains underutilized, partly because the operational wildfire detection has been successfully optimized for users and applications for which timeliness of initial detection is a low priority, contrasting to the needs of first responders. We present our progress in developing the GOES Early Fire Detection (GOES-EFD) system, a collaborative effort led by University of California-Davis and USDA Forest Service. The GOES-EFD specifically focuses on first detection timeliness for wildfire incidents. It is automatically trained for a monitored scene and capitalizes on multiyear cross-disciplinary algorithm research. Initial retrospective tests in Western US demonstrate significantly earlier identification detection of new ignitions than existing operational capabilities and a further improvement prospect. The GOES-EFD-β prototype will be initially deployed for the Western US region to process imagery from GOES-NOP and the rapid and 4 times higher spatial resolution imagery from GOES-R — the upcoming next generation of GOES satellites. These and other enhanced capabilities of GOES-R are expected to significantly improve the timeliness of fire ignition information from GOES-EFD.

  7. Morphing morphing faces

    NARCIS (Netherlands)

    Lier, R.J. van

    2009-01-01

    We have made cyclic morphing animations using two different faces. The morphing animations gradually evolved from one face to the other, and vice versa. When free viewing, the perceived changes were not very large, but the changes could easily be observed. Observers were asked to fixate on a dot

  8. Retinal Information Processing for Minimum Laser Lesion Detection and Cumulative Damage

    Science.gov (United States)

    1992-09-17

    macula and especially the fovea. This is the region where information processing is most important, as it must make up for the poor optical quality of the...the fovea and portions of the central macula leave the retina with only large receptive field ganglion cells. In these cases, the ordinary mechanical... degeneration or failure of neurons following laser exposure without subsequent therapy. As the research progressed, significant progress was made in cat

  9. Technology survey on video face tracking

    Science.gov (United States)

    Zhang, Tong; Gomes, Herman Martins

    2014-03-01

    With the pervasiveness of monitoring cameras installed in public areas, schools, hospitals, work places and homes, video analytics technologies for interpreting these video contents are becoming increasingly relevant to people's lives. Among such technologies, human face detection and tracking (and face identification in many cases) are particularly useful in various application scenarios. While plenty of research has been conducted on face tracking and many promising approaches have been proposed, there are still significant challenges in recognizing and tracking people in videos with uncontrolled capturing conditions, largely due to pose and illumination variations, as well as occlusions and cluttered background. It is especially complex to track and identify multiple people simultaneously in real time due to the large amount of computation involved. In this paper, we present a survey on literature and software that are published or developed during recent years on the face tracking topic. The survey covers the following topics: 1) mainstream and state-of-the-art face tracking methods, including features used to model the targets and metrics used for tracking; 2) face identification and face clustering from face sequences; and 3) software packages or demonstrations that are available for algorithm development or trial. A number of publically available databases for face tracking are also introduced.

  10. Applying Information Retrieval Techniques to Detect Duplicates and to Rank References in the Preliminary Phases of Systematic Literature Reviews

    Directory of Open Access Journals (Sweden)

    Ramon Abilio

    2015-08-01

    Full Text Available Systematic Literature Review (SLR is a means to synthesize relevant and high quality studies related to a specific topic or research questions. In the Primary Selection stage of an SLR, the selection of studies is usually performed manually by reading title, abstract and keywords of each study. In the last years, the number of published scientific studies has grown increasing the effort to perform this sort of reviews. In this paper, we proposed strategies to detect non-papers and duplicated references in results exported by search engines, and strategies to rank the references in decreasing order of importance for an SLR, regarding the terms in the search string. These strategies are based on Information Retrieval techniques. We implemented the strategies and carried out an experimental evaluation of their applicability using two real datasets. As results, the strategy to detect non-papers presented 100% of precision and 50% of recall; the strategy to detect duplicates detected more duplicates than the manual inspection; and one of the strategies to rank relevant references presented 50% of precision and 80% of recall. Therefore, the results show that the proposed strategies can minimize the effort in the Primary Selection stage of an SLR.

  11. An information technology enabled sustainability test-bed (ITEST) for occupancy detection through an environmental sensing network

    Energy Technology Data Exchange (ETDEWEB)

    Dong, Bing; Lam, Khee Poh; Zhang, Rui; Chiou, Yun-Shang [Center for Building Performance and Diagnostics, Carnegie Mellon University, Pittsburgh, PA 15213 (United States); Andrews, Burton; Hoeynck, Michael; Benitez, Diego [Research and Technology Center, Robert BOSCH LLC, Pittsburgh, PA 15212 (United States)

    2010-07-15

    This paper describes a large-scale wireless and wired environmental sensor network test-bed and its application to occupancy detection in an open-plan office building. Detection of occupant presence has been used extensively in built environments for applications such as demand-controlled ventilation and security; however, the ability to discern the actual number of people in a room is beyond the scope of current sensing techniques. To address this problem, a complex sensor network is deployed in the Robert L. Preger Intelligent Workplace comprising a wireless ambient-sensing system, a wired carbon dioxide sensing system, and a wired indoor air quality sensing system. A wired camera network is implemented as well for establishing true occupancy levels to be used as ground truth information for deriving algorithmic relationships with the environment conditions. To our knowledge, this extensive and diverse ambient-sensing infrastructure of the ITEST setup as well as the continuous data-collection capability is unprecedented. Final results indicate that there are significant correlations between measured environmental conditions and occupancy status. An average of 73% accuracy on the occupancy number detection was achieved by Hidden Markov Models during testing periods. This paper serves as an exploration to the research of ITEST for occupancy detection in offices. In addition, its utility extends to a wide variety of other building technology research areas such as human-centered environmental control, security, energy efficient and sustainable green buildings. (author)

  12. Race perception and gaze direction differently impair visual working memory for faces: An event-related potential study.

    Science.gov (United States)

    Sessa, Paola; Dalmaso, Mario

    2016-01-01

    Humans are amazingly experts at processing and recognizing faces, however there are moderating factors of this ability. In the present study, we used the event-related potential technique to investigate the influence of both race and gaze direction on visual working memory (i.e., VWM) face representations. In a change detection task, we orthogonally manipulated race (own-race vs. other-race faces) and eye-gaze direction (direct gaze vs. averted gaze). Participants were required to encode identities of these faces. We quantified the amount of information encoded in VWM by monitoring the amplitude of the sustained posterior contralateral negativity (SPCN) time-locked to the faces. Notably, race and eye-gaze direction differently modulated SPCN amplitude such that other-race faces elicited reduced SPCN amplitudes compared with own-race faces only when displaying a direct gaze. On the other hand, faces displaying averted gaze, independently of their race, elicited increased SPCN amplitudes compared with faces displaying direct gaze. We interpret these findings as denoting that race and eye-gaze direction affect different face processing stages.

  13. Electrophysiological correlates of social information processing for detecting agents in social interaction scenes: P200 and N250 components

    Directory of Open Access Journals (Sweden)

    Crivelli Davide

    2016-04-01

    Full Text Available According to interaction theories, the detection of situated agents and the understanding of their intentions and mental states are mediated by smart perceptual and embodied mechanisms. While the network supporting agency-attribution, action understanding, and grasping of others’ mental state is quite known, the actual mental chronometry of such social perception processes is still not clear. We then designed an exploratory study to investigate electrophysiological correlates (ERPs and source localization of information-processing for the detection of potential agents in realistic interaction scenes. Morphological and statistical analyses of electrophysiological data highlighted that the manipulation the nature of a potential agent, the gesture it executed and the relative position of an interagent was differently associated to the modulation of specific relevant middle-latency ERP components, labelled as P200 and N250, and of their relative intra-cortical current density distribution within the first 300 ms from the appearance of the stimulus.

  14. Information

    International Nuclear Information System (INIS)

    Boyard, Pierre.

    1981-01-01

    The fear for nuclear energy and more particularly for radioactive wastes is analyzed in the sociological context. Everybody agree on the information need, information is available but there is a problem for their diffusion. Reactions of the public are analyzed and journalists, scientists and teachers have a role to play [fr

  15. Strategic information security: facing the cyber impact

    CSIR Research Space (South Africa)

    Grobler, M

    2010-10-01

    Full Text Available ://www.internetworldstats.com/stats.htm. [12] J. Lewis, "MI6 chief blows his cover as wife's Facebook account reveals family holidays, showbiz friends and links to David Irving", Accessed 201006/14, Available online at http://www.dailymail.co.uk/news/article-1197562/MI6-chief... online as web access grows in South Africa", Accessed 201004/08, Available online at http://www.guardian.co.uk/world/2010/jan/14/internet-five-million-south-africa. [22] SPAMfighter News, "SABRIC - Phishing scams rising in South Africa", SPAMfighter...

  16. Detection of relationships among multi-modal brain imaging meta-features via information flow.

    Science.gov (United States)

    Miller, Robyn L; Vergara, Victor M; Calhoun, Vince D

    2018-01-15

    Neuroscientists and clinical researchers are awash in data from an ever-growing number of imaging and other bio-behavioral modalities. This flow of brain imaging data, taken under resting and various task conditions, combines with available cognitive measures, behavioral information, genetic data plus other potentially salient biomedical and environmental information to create a rich but diffuse data landscape. The conditions being studied with brain imaging data are often extremely complex and it is common for researchers to employ more than one imaging, behavioral or biological data modality (e.g., genetics) in their investigations. While the field has advanced significantly in its approach to multimodal data, the vast majority of studies still ignore joint information among two or more features or modalities. We propose an intuitive framework based on conditional probabilities for understanding information exchange between features in what we are calling a feature meta-space; that is, a space consisting of many individual featurae spaces. Features can have any dimension and can be drawn from any data source or modality. No a priori assumptions are made about the functional form (e.g., linear, polynomial, exponential) of captured inter-feature relationships. We demonstrate the framework's ability to identify relationships between disparate features of varying dimensionality by applying it to a large multi-site, multi-modal clinical dataset, balance between schizophrenia patients and controls. In our application it exposes both expected (previously observed) relationships, and novel relationships rarely considered investigated by clinical researchers. To the best of our knowledge there is not presently a comparably efficient way to capture relationships of indeterminate functional form between features of arbitrary dimension and type. We are introducing this method as an initial foray into a space that remains relatively underpopulated. The framework we propose is

  17. Own-race and own-age biases facilitate visual awareness of faces under interocular suppression

    Directory of Open Access Journals (Sweden)

    Timo eStein

    2014-08-01

    Full Text Available The detection of a face in a visual scene is the first stage in the face processing hierarchy. Although all subsequent, more elaborate face processing depends on the initial detection of a face, surprisingly little is known about the perceptual mechanisms underlying face detection. Recent evidence suggests that relatively hard-wired face detection mechanisms are broadly tuned to all face-like visual patterns as long as they respect the typical spatial configuration of the eyes above the mouth. Here, we qualify this notion by showing that face detection mechanisms are also sensitive to face shape and facial surface reflectance properties. We used continuous flash suppression (CFS to render faces invisible at the beginning of a trial and measured the time upright and inverted faces needed to break into awareness. Young Caucasian adult observers were presented with faces from their own race or from another race (race experiment and with faces from their own age group or from another age group (age experiment. Faces matching the observers’ own race and age group were detected more quickly. Moreover, the advantage of upright over inverted faces in overcoming CFS, i.e. the face inversion effect, was larger for own-race and own-age faces. These results demonstrate that differences in face shape and surface reflectance influence access to awareness and configural face processing at the initial detection stage. Although we did not collect data from observers of another race or age group, these findings are a first indication that face detection mechanisms are shaped by visual experience with faces from one’s own social group. Such experience-based fine-tuning of face detection mechanisms may equip in-group faces with a competitive advantage for access to conscious awareness.

  18. Psychophysical thresholds of face visibility during infancy

    DEFF Research Database (Denmark)

    Gelskov, Sofie; Kouider, Sid

    2010-01-01

    The ability to detect and focus on faces is a fundamental prerequisite for developing social skills. But how well can infants detect faces? Here, we address this question by studying the minimum duration at which faces must appear to trigger a behavioral response in infants. We used a preferential...... looking method in conjunction with masking and brief presentations (300 ms and below) to establish the temporal thresholds of visibility at different stages of development. We found that 5 and 10 month-old infants have remarkably similar visibility thresholds about three times higher than those of adults....... By contrast, 15 month-olds not only revealed adult-like thresholds, but also improved their performance through memory-based strategies. Our results imply that the development of face visibility follows a non-linear course and is determined by a radical improvement occurring between 10 and 15 months....

  19. RGB-D-T based Face Recognition

    DEFF Research Database (Denmark)

    Nikisins, Olegs; Nasrollahi, Kamal; Greitans, Modris

    2014-01-01

    Facial images are of critical importance in many real-world applications from gaming to surveillance. The current literature on facial image analysis, from face detection to face and facial expression recognition, are mainly performed in either RGB, Depth (D), or both of these modalities. But......, such analyzes have rarely included Thermal (T) modality. This paper paves the way for performing such facial analyzes using synchronized RGB-D-T facial images by introducing a database of 51 persons including facial images of different rotations, illuminations, and expressions. Furthermore, a face recognition...... algorithm has been developed to use these images. The experimental results show that face recognition using such three modalities provides better results compared to face recognition in any of such modalities in most of the cases....

  20. Acquiring Structural Information on Virus Particles with Charge Detection Mass Spectrometry

    Science.gov (United States)

    Keifer, David Z.; Motwani, Tina; Teschke, Carolyn M.; Jarrold, Martin F.

    2016-06-01

    Charge detection mass spectrometry (CDMS) is a single-molecule technique particularly well-suited to measuring the mass and charge distributions of heterogeneous, MDa-sized ions. In this work, CDMS has been used to analyze the assembly products of two coat protein variants of bacteriophage P22. The assembly products show broad mass distributions extending from 5 to 15 MDa for A285Y and 5 to 25 MDa for A285T coat protein variants. Because the charge of large ions generated by electrospray ionization depends on their size, the charge can be used to distinguish hollow shells from more compact structures. A285T was found to form T = 4 and T = 7 procapsids, and A285Y makes a small number of T = 3 and T = 4 procapsids. Owing to the decreased stability of the A285Y and A285T particles, chemical cross-linking was required to stabilize them for electrospray CDMS. Graphical Abstract[Figure not available: see fulltext.

  1. Detecting the chaotic nature in a transitional boundary layer using symbolic information-theory quantifiers.

    Science.gov (United States)

    Zhang, Wen; Liu, Peiqing; Guo, Hao; Wang, Jinjun

    2017-11-01

    The permutation entropy and the statistical complexity are employed to study the boundary-layer transition induced by the surface roughness. The velocity signals measured in the transition process are analyzed with these symbolic quantifiers, as well as the complexity-entropy causality plane, and the chaotic nature of the instability fluctuations is identified. The frequency of the dominant fluctuations has been found according to the time scales corresponding to the extreme values of the symbolic quantifiers. The laminar-turbulent transition process is accompanied by the evolution in the degree of organization of the complex eddy motions, which is also characterized with the growing smaller and flatter circles in the complexity-entropy causality plane. With the help of the permutation entropy and the statistical complexity, the differences between the chaotic fluctuations detected in the experiments and the classical Tollmien-Schlichting wave are shown and discussed. It is also found that the chaotic features of the instability fluctuations can be approximated with a number of regular sine waves superimposed on the fluctuations of the undisturbed laminar boundary layer. This result is related to the physical mechanism in the generation of the instability fluctuations, which is the noise-induced chaos.

  2. Hole Feature on Conical Face Recognition for Turning Part Model

    Science.gov (United States)

    Zubair, A. F.; Abu Mansor, M. S.

    2018-03-01

    Computer Aided Process Planning (CAPP) is the bridge between CAD and CAM and pre-processing of the CAD data in the CAPP system is essential. For CNC turning part, conical faces of part model is inevitable to be recognised beside cylindrical and planar faces. As the sinus cosines of the cone radius structure differ according to different models, face identification in automatic feature recognition of the part model need special intention. This paper intends to focus hole on feature on conical faces that can be detected by CAD solid modeller ACIS via. SAT file. Detection algorithm of face topology were generated and compared. The study shows different faces setup for similar conical part models with different hole type features. Three types of holes were compared and different between merge faces and unmerge faces were studied.

  3. Static human face recognition using artificial neural networks

    International Nuclear Information System (INIS)

    Qamar, R.; Shah, S.H.; Javed-ur-Rehman

    2003-01-01

    This paper presents a novel method of human face recognition using digital computers. A digital PC camera is used to take the BMP images of the human faces. An artificial neural network using Back Propagation Algorithm is developed as a recognition engine. The BMP images of the faces serve as the input patterns for this engine. A software 'Face Recognition' has been developed to recognize the human faces for which it is trained. Once the neural network is trained for patterns of the faces, the software is able to detect and recognize them with success rate of about 97%. (author)

  4. An automated tuberculosis screening strategy combining X-ray-based computer-aided detection and clinical information

    Science.gov (United States)

    Melendez, Jaime; Sánchez, Clara I.; Philipsen, Rick H. H. M.; Maduskar, Pragnya; Dawson, Rodney; Theron, Grant; Dheda, Keertan; van Ginneken, Bram

    2016-04-01

    Lack of human resources and radiological interpretation expertise impair tuberculosis (TB) screening programmes in TB-endemic countries. Computer-aided detection (CAD) constitutes a viable alternative for chest radiograph (CXR) reading. However, no automated techniques that exploit the additional clinical information typically available during screening exist. To address this issue and optimally exploit this information, a machine learning-based combination framework is introduced. We have evaluated this framework on a database containing 392 patient records from suspected TB subjects prospectively recruited in Cape Town, South Africa. Each record comprised a CAD score, automatically computed from a CXR, and 12 clinical features. Comparisons with strategies relying on either CAD scores or clinical information alone were performed. Our results indicate that the combination framework outperforms the individual strategies in terms of the area under the receiving operating characteristic curve (0.84 versus 0.78 and 0.72), specificity at 95% sensitivity (49% versus 24% and 31%) and negative predictive value (98% versus 95% and 96%). Thus, it is believed that combining CAD and clinical information to estimate the risk of active disease is a promising tool for TB screening.

  5. Role of the precuneus in the detection of incongruency between tactile and visual texture information: A functional MRI study.

    Science.gov (United States)

    Kitada, Ryo; Sasaki, Akihiro T; Okamoto, Yuko; Kochiyama, Takanori; Sadato, Norihiro

    2014-11-01

    Visual clues as to the physical substance of manufactured objects can be misleading. For example, a plastic ring can appear to be made of gold. However, we can avoid misidentifying an object׳s substance by comparing visual and tactile information. As compared to the spatial properties of an object (e.g., orientation), however, little information regarding physical object properties (material properties) is shared between vision and touch. How can such different kinds of information be compared in the brain? One possibility is that the visuo-tactile comparison of material information is mediated by associations that are previously learned between the two modalities. Previous studies suggest that a cortical network involving the medial temporal lobe and precuneus plays a critical role in the retrieval of information from long-term memory. Here, we used functional magnetic resonance imaging (fMRI) to test whether these brain regions are involved in the visuo-tactile comparison of material properties. The stimuli consisted of surfaces in which an oriented plastic bar was placed on a background texture. Twenty-two healthy participants determined whether the orientations of visually- and tactually-presented bar stimuli were congruent in the orientation conditions, and whether visually- and tactually-presented background textures were congruent in the texture conditions. The texture conditions revealed greater activation of the fusiform gyrus, medial temporal lobe and lateral prefrontal cortex compared with the orientation conditions. In the texture conditions, the precuneus showed greater response to incongruent stimuli than to congruent stimuli. This incongruency effect was greater for the texture conditions than for the orientation conditions. These results suggest that the precuneus is involved in detecting incongruency between tactile and visual texture information in concert with the medial temporal lobe, which is tightly linked with long-term memory. Copyright

  6. Gaze Cueing by Pareidolia Faces

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2013-12-01

    Full Text Available Visual images that are not faces are sometimes perceived as faces (the pareidolia phenomenon. While the pareidolia phenomenon provides people with a strong impression that a face is present, it is unclear how deeply pareidolia faces are processed as faces. In the present study, we examined whether a shift in spatial attention would be produced by gaze cueing of face-like objects. A robust cueing effect was observed when the face-like objects were perceived as faces. The magnitude of the cueing effect was comparable between the face-like objects and a cartoon face. However, the cueing effect was eliminated when the observer did not perceive the objects as faces. These results demonstrated that pareidolia faces do more than give the impression of the presence of faces; indeed, they trigger an additional face-specific attentional process.

  7. Gaze cueing by pareidolia faces.

    Science.gov (United States)

    Takahashi, Kohske; Watanabe, Katsumi

    2013-01-01

    Visual images that are not faces are sometimes perceived as faces (the pareidolia phenomenon). While the pareidolia phenomenon provides people with a strong impression that a face is present, it is unclear how deeply pareidolia faces are processed as faces. In the present study, we examined whether a shift in spatial attention would be produced by gaze cueing of face-like objects. A robust cueing effect was observed when the face-like objects were perceived as faces. The magnitude of the cueing effect was comparable between the face-like objects and a cartoon face. However, the cueing effect was eliminated when the observer did not perceive the objects as faces. These results demonstrated that pareidolia faces do more than give the impression of the presence of faces; indeed, they trigger an additional face-specific attentional process.

  8. Developing an Open Source, Reusable Platform for Distributed Collaborative Information Management in the Early Detection Research Network

    Science.gov (United States)

    Hart, Andrew F.; Verma, Rishi; Mattmann, Chris A.; Crichton, Daniel J.; Kelly, Sean; Kincaid, Heather; Hughes, Steven; Ramirez, Paul; Goodale, Cameron; Anton, Kristen; hide

    2012-01-01

    For the past decade, the NASA Jet Propulsion Laboratory, in collaboration with Dartmouth University has served as the center for informatics for the Early Detection Research Network (EDRN). The EDRN is a multi-institution research effort funded by the U.S. National Cancer Institute (NCI) and tasked with identifying and validating biomarkers for the early detection of cancer. As the distributed network has grown, increasingly formal processes have been developed for the acquisition, curation, storage, and dissemination of heterogeneous research information assets, and an informatics infrastructure has emerged. In this paper we discuss the evolution of EDRN informatics, its success as a mechanism for distributed information integration, and the potential sustainability and reuse benefits of emerging efforts to make the platform components themselves open source. We describe our experience transitioning a large closed-source software system to a community driven, open source project at the Apache Software Foundation, and point to lessons learned that will guide our present efforts to promote the reuse of the EDRN informatics infrastructure by a broader community.

  9. Label-Informed Non-negative Matrix Factorization with Manifold Regularization for Discriminative Subnetwork Detection.

    Science.gov (United States)

    Watanabe, Takanori; Tunc, Birkan; Parker, Drew; Kim, Junghoon; Verma, Ragini

    2016-10-01

    In this paper, we present a novel method for obtaining a low dimensional representation of a complex brain network that: (1) can be interpreted in a neurobiologically meaningful way, (2) emphasizes group differences by accounting for label information, and (3) captures the variation in disease subtypes/severity by respecting the intrinsic manifold structure underlying the data. Our method is a supervised variant of non-negative matrix factorization (NMF), and achieves dimensionality reduction by extracting an orthogonal set of subnetworks that are interpretable, reconstructive of the original data, and also discriminative at the group level. In addition, the method includes a manifold regularizer that encourages the low dimensional representations to be smooth with respect to the intrinsic geometry of the data, allowing subjects with similar disease-severity to share similar network representations. While the method is generalizable to other types of non-negative network data, in this work we have used structural connectomes (SCs) derived from diffusion data to identify the cortical/subcortical connections that have been disrupted in abnormal neurological state. Experiments on a traumatic brain injury (TBI) dataset demonstrate that our method can identify subnetworks that can reliably classify TBI from controls and also reveal insightful connectivity patterns that may be indicative of a biomarker.

  10. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  11. A face in a (temporal) crowd.

    Science.gov (United States)

    Hacker, Catrina M; Meschke, Emily X; Biederman, Irving

    2018-03-20

    Familiar objects, specified by name, can be identified with high accuracy when embedded in a rapidly presented sequence of images at rates exceeding 10 images/s. Not only can target objects be detected at such brief presentation rates, they can also be detected under high uncertainty, where their classification is defined negatively, e.g., "Not a Tool." The identification of a familiar speaker's voice declines precipitously when uncertainty is increased from one to a mere handful of possible speakers. Is the limitation imposed by uncertainty, i.e., the number of possible individuals, a general characteristic of processes for person individuation such that the identifiability of a familiar face would undergo a similar decline with uncertainty? Specifically, could the presence of an unnamed celebrity, thus any celebrity, be detected when presented in a rapid sequence of unfamiliar faces? If so, could the celebrity be identified? Despite the markedly greater physical similarity of faces compared to objects that are, say, not tools, the presence of a celebrity could be detected with moderately high accuracy (∼75%) at rates exceeding 7 faces/s. False alarms were exceedingly rare as almost all the errors were misses. Detection accuracy by moderate congenital prosopagnosics was lower than controls, but still well above chance. Given the detection of the presence of a celebrity, all subjects were almost always able to identify that celebrity, providing no role for a covert familiarity signal outside of awareness. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Component-Based Cartoon Face Generation

    Directory of Open Access Journals (Sweden)

    Saman Sepehri Nejad

    2016-11-01

    Full Text Available In this paper, we present a cartoon face generation method that stands on a component-based facial feature extraction approach. Given a frontal face image as an input, our proposed system has the following stages. First, face features are extracted using an extended Active Shape Model. Outlines of the components are locally modified using edge detection, template matching and Hermit interpolation. This modification enhances the diversity of output and accuracy of the component matching required for cartoon generation. Second, to bring cartoon-specific features such as shadows, highlights and, especially, stylish drawing, an array of various face photographs and corresponding hand-drawn cartoon faces are collected. These cartoon templates are automatically decomposed into cartoon components using our proposed method for parameterizing cartoon samples, which is fast and simple. Then, using shape matching methods, the appropriate cartoon component is selected and deformed to fit the input face. Finally, a cartoon face is rendered in a vector format using the rendering rules of the selected template. Experimental results demonstrate effectiveness of our approach in generating life-like cartoon faces.

  13. How fast is famous face recognition?

    Directory of Open Access Journals (Sweden)

    Gladys eBarragan-Jason

    2012-10-01

    Full Text Available The rapid recognition of familiar faces is crucial for social interactions. However the actual speed with which recognition can be achieved remains largely unknown as most studies have been carried out without any speed constraints. Different paradigms have been used, leading to conflicting results, and although many authors suggest that face recognition is fast, the speed of face recognition has not been directly compared to fast visual tasks. In this study, we sought to overcome these limitations. Subjects performed three tasks, a familiarity categorization task (famous faces among unknown faces, a superordinate categorization task (human faces among animal ones and a gender categorization task. All tasks were performed under speed constraints. The results show that, despite the use of speed constraints, subjects were slow when they had to categorize famous faces: minimum reaction time was 467 ms, which is 180 ms more than during superordinate categorization and 160 ms more than in the gender condition. Our results are compatible with a hierarchy of face processing from the superordinate level to the familiarity level. The processes taking place between detection and recognition need to be investigated in detail.

  14. Facing My Fears (Editorial

    Directory of Open Access Journals (Sweden)

    Lindsay Glynn

    2008-03-01

    Full Text Available I’m scared. I’m nervous. In a few short weeks the contractors and electricians will take over my library for several months. They will drill huge gouges in the concrete floor, hammer, saw, scrape,move, wire, etc. No doubt they may have to be asked to keep their voices down once or twice. Half of the print journal collection will be relocated to accommodate a new teaching lab that will also double as an information commons. The planning has been going on for many months. We have consulted with other libraries, reviewed the literature, identified the needs of our various user groups, measured space,tested technical possibilities, and met with architects and engineers. Up until now the new lab was an organic idea on paper, discussed over coffee and in meetings. That’s fairly easy to deal with. But just around the corner it becomes a reality and I’m a bag of nerves. Have we made the right decisions? Will it address all our needs? Is there anything I forgot to consider? What if our users don’t like it? What if it is a complete failure?!Theoretically, it should be ok. I’ve followed the right steps and worked with a creative, talented and dedicated team. This is different from trying out a new instructional technique or reorganizing the information desk. This is big. I talk the evidence based talk regularly, but now I am walking the walk in a bigger way than I had ever imagined. Change can be frightening. Moving out of comfort zones is not easy. Having said that, the challenge can be invigorating and the change, refreshing. I find myself welcoming the change as much as I dread it. I’ll face my fears and see it through to the implementation and evaluations and beyond. And hey, no matter what the outcome, it should make for a good paper. If anyone else out there is going through a similar process, I’d be interested in comparing notes. I invite you to try something new this year in your work environment or in your professional activities

  15. A Novel Computational Method for Detecting DNA Methylation Sites with DNA Sequence Information and Physicochemical Properties.

    Science.gov (United States)

    Pan, Gaofeng; Jiang, Limin; Tang, Jijun; Guo, Fei

    2018-02-08

    DNA methylation is an important biochemical process, and it has a close connection with many types of cancer. Research about DNA methylation can help us to understand the regulation mechanism and epigenetic reprogramming. Therefore, it becomes very important to recognize the methylation sites in the DNA sequence. In the past several decades, many computational methods-especially machine learning methods-have been developed since the high-throughout sequencing technology became widely used in research and industry. In order to accurately identify whether or not a nucleotide residue is methylated under the specific DNA sequence context, we propose a novel method that overcomes the shortcomings of previous methods for predicting methylation sites. We use k -gram, multivariate mutual information, discrete wavelet transform, and pseudo amino acid composition to extract features, and train a sparse Bayesian learning model to do DNA methylation prediction. Five criteria-area under the receiver operating characteristic curve (AUC), Matthew's correlation coefficient (MCC), accuracy (ACC), sensitivity (SN), and specificity-are used to evaluate the prediction results of our method. On the benchmark dataset, we could reach 0.8632 on AUC, 0.8017 on ACC, 0.5558 on MCC, and 0.7268 on SN. Additionally, the best results on two scBS-seq profiled mouse embryonic stem cells datasets were 0.8896 and 0.9511 by AUC, respectively. When compared with other outstanding methods, our method surpassed them on the accuracy of prediction. The improvement of AUC by our method compared to other methods was at least 0.0399 . For the convenience of other researchers, our code has been uploaded to a file hosting service, and can be downloaded from: https://figshare.com/s/0697b692d802861282d3.

  16. A Novel Computational Method for Detecting DNA Methylation Sites with DNA Sequence Information and Physicochemical Properties

    Directory of Open Access Journals (Sweden)

    Gaofeng Pan

    2018-02-01

    Full Text Available DNA methylation is an important biochemical process, and it has a close connection with many types of cancer. Research about DNA methylation can help us to understand the regulation mechanism and epigenetic reprogramming. Therefore, it becomes very important to recognize the methylation sites in the DNA sequence. In the past several decades, many computational methods—especially machine learning methods—have been developed since the high-throughout sequencing technology became widely used in research and industry. In order to accurately identify whether or not a nucleotide residue is methylated under the specific DNA sequence context, we propose a novel method that overcomes the shortcomings of previous methods for predicting methylation sites. We use k-gram, multivariate mutual information, discrete wavelet transform, and pseudo amino acid composition to extract features, and train a sparse Bayesian learning model to do DNA methylation prediction. Five criteria—area under the receiver operating characteristic curve (AUC, Matthew’s correlation coefficient (MCC, accuracy (ACC, sensitivity (SN, and specificity—are used to evaluate the prediction results of our method. On the benchmark dataset, we could reach 0.8632 on AUC, 0.8017 on ACC, 0.5558 on MCC, and 0.7268 on SN. Additionally, the best results on two scBS-seq profiled mouse embryonic stem cells datasets were 0.8896 and 0.9511 by AUC, respectively. When compared with other outstanding methods, our method surpassed them on the accuracy of prediction. The improvement of AUC by our method compared to other methods was at least 0.0399 . For the convenience of other researchers, our code has been uploaded to a file hosting service, and can be downloaded from: https://figshare.com/s/0697b692d802861282d3.

  17. Detection of ancestry informative HLA alleles confirms the admixed origins of Japanese population.

    Science.gov (United States)

    Nakaoka, Hirofumi; Mitsunaga, Shigeki; Hosomichi, Kazuyoshi; Shyh-Yuh, Liou; Sawamoto, Taiji; Fujiwara, Tsutomu; Tsutsui, Naohisa; Suematsu, Koji; Shinagawa, Akira; Inoko, Hidetoshi; Inoue, Ituro

    2013-01-01

    The polymorphisms in the human leukocyte antigen (HLA) region are powerful tool for studying human evolutionary processes. We investigated genetic structure of Japanese by using five-locus HLA genotypes (HLA-A, -B, -C, -DRB1, and -DPB1) of 2,005 individuals from 10 regions of Japan. We found a significant level of population substructure in Japanese; particularly the differentiation between Okinawa Island and mainland Japanese. By using a plot of the principal component scores, we identified ancestry informative alleles associated with the underlying population substructure. We examined extent of linkage disequilibrium (LD) between pairs of HLA alleles on the haplotypes that were differentiated among regions. The LDs were strong and weak for pairs of HLA alleles characterized by low and high frequencies in Okinawa Island, respectively. The five-locus haplotypes whose alleles exhibit strong LD were unique to Japanese and South Korean, suggesting that these haplotypes had been recently derived from the Korean Peninsula. The alleles characterized by high frequency in Japanese compared to South Korean formed segmented three-locus haplotype that was commonly found in Aleuts, Eskimos, and North- and Meso-Americans but not observed in Korean and Chinese. The serologically equivalent haplotype was found in Orchid Island in Taiwan, Mongol, Siberia, and Arctic regions. It suggests that early Japanese who existed prior to the migration wave from the Korean Peninsula shared ancestry with northern Asian who moved to the New World via the Bering Strait land bridge. These results may support the admixture model for peopling of Japanese Archipelago.

  18. Configuration perception and face memory, and face context effects in developmental prosopagnosia.

    Science.gov (United States)

    Huis in 't Veld, Elisabeth; Van den Stock, Jan; de Gelder, Beatrice

    2012-01-01

    This study addresses two central and controversial issues in developmental prosopagnosia (DP), configuration- versus feature-based face processing and the influence of affective information from either facial or bodily expressions on face recognition. A sample of 10 DPs and 10 controls were tested with a previously developed face and object recognition and memory battery (Facial Expressive Action Stimulus Test, FEAST), a task measuring the influence of emotional faces and bodies on face identity matching (Face-Body Compound task), and an emotionally expressive face memory task (Emotional Face Memory task, FaMe-E). We show that DPs were impaired in upright, but not inverted, face matching but they performed at the level of controls on part-to-whole matching. Second, DPs showed impaired memory for both neutral and emotional faces and scored within the normal range on the Face-Body Compound task. Third, configural perception but not feature-based processing was significantly associated with memory performance. Taken together the results indicate that DPs have a deficit in configural processing at the perception stage that may underlie the memory impairment.

  19. Facial emotion recognition, face scan paths, and face perception in children with neurofibromatosis type 1.

    Science.gov (United States)

    Lewis, Amelia K; Porter, Melanie A; Williams, Tracey A; Bzishvili, Samantha; North, Kathryn N; Payne, Jonathan M

    2017-05-01

    This study aimed to investigate face scan paths and face perception abilities in children with Neurofibromatosis Type 1 (NF1) and how these might relate to emotion recognition abilities in this population. The authors investigated facial emotion recognition, face scan paths, and face perception in 29 children with NF1 compared to 29 chronological age-matched typically developing controls. Correlations between facial emotion recognition, face scan paths, and face perception in children with NF1 were examined. Children with NF1 displayed significantly poorer recognition of fearful expressions compared to controls, as well as a nonsignificant trend toward poorer recognition of anger. Although there was no significant difference between groups in time spent viewing individual core facial features (eyes, nose, mouth, and nonfeature regions), children with NF1 spent significantly less time than controls viewing the face as a whole. Children with NF1 also displayed significantly poorer face perception abilities than typically developing controls. Facial emotion recognition deficits were not significantly associated with aberrant face scan paths or face perception abilities in the NF1 group. These results suggest that impairments in the perception, identification, and interpretation of information from faces are important aspects of the social-cognitive phenotype of NF1. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Individual differences in adaptive coding of face identity are linked to individual differences in face recognition ability.

    Science.gov (United States)

    Rhodes, Gillian; Jeffery, Linda; Taylor, Libby; Hayward, William G; Ewing, Louise

    2014-06-01

    Despite their similarity as visual patterns, we can discriminate and recognize many thousands of faces. This expertise has been linked to 2 coding mechanisms: holistic integration of information across the face and adaptive coding of face identity using norms tuned by experience. Recently, individual differences in face recognition ability have been discovered and linked to differences in holistic coding. Here we show that they are also linked to individual differences in adaptive coding of face identity, measured using face identity aftereffects. Identity aftereffects correlated significantly with several measures of face-selective recognition ability. They also correlated marginally with own-race face recognition ability, suggesting a role for adaptive coding in the well-known other-race effect. More generally, these results highlight the important functional role of adaptive face-coding mechanisms in face expertise, taking us beyond the traditional focus on holistic coding mechanisms. PsycINFO Database Record (c) 2014 APA, all rights reserved.