WorldWideScience

Sample records for genitalia concealment promotes

  1. Female genitalia concealment promotes intimate male courtship in a water strider.

    Science.gov (United States)

    Han, Chang S; Jablonski, Piotr G

    2009-06-10

    Violent coercive mating initiation is typical for animals with sexual conflict over mating. In these species, the coevolutionary arms-race between female defenses against coercive mating and male counter-adaptations for increased mating success leads to coevolutionary chases of male and female traits that influence the mating. It has been controversial whether one of the sexes can evolve traits that allow them to "win" this arms race. Here, we use morphological analysis (traditional and scanning electron micrographs), laboratory experiments and comparative methods to show how females of a species characterized by typical coercive mating initiation appear to "win" a particular stage of the sexual conflict by evolving morphology to hide their genitalia from direct, forceful access by males. In an apparent response to the female morphological adaptation, males of this species added to their typically violent coercive mounting of the female new post-mounting, pre-copulatory courtship signals produced by tapping the water's surface with the mid-legs. These courtship signals are intimate in the sense that they are aimed at the female, on whom the male is already mounted. Females respond to the signals by exposing their hidden genitalia for copulatory intromission. Our results indicate that the apparent victory of coevolutionary arms race by one sex in terms of morphology may trigger evolution of a behavioral phenotype in the opposite sex.

  2. Female genitalia concealment promotes intimate male courtship in a water strider.

    Directory of Open Access Journals (Sweden)

    Chang S Han

    Full Text Available Violent coercive mating initiation is typical for animals with sexual conflict over mating. In these species, the coevolutionary arms-race between female defenses against coercive mating and male counter-adaptations for increased mating success leads to coevolutionary chases of male and female traits that influence the mating. It has been controversial whether one of the sexes can evolve traits that allow them to "win" this arms race. Here, we use morphological analysis (traditional and scanning electron micrographs, laboratory experiments and comparative methods to show how females of a species characterized by typical coercive mating initiation appear to "win" a particular stage of the sexual conflict by evolving morphology to hide their genitalia from direct, forceful access by males. In an apparent response to the female morphological adaptation, males of this species added to their typically violent coercive mounting of the female new post-mounting, pre-copulatory courtship signals produced by tapping the water's surface with the mid-legs. These courtship signals are intimate in the sense that they are aimed at the female, on whom the male is already mounted. Females respond to the signals by exposing their hidden genitalia for copulatory intromission. Our results indicate that the apparent victory of coevolutionary arms race by one sex in terms of morphology may trigger evolution of a behavioral phenotype in the opposite sex.

  3. Ambiguous Genitalia

    Science.gov (United States)

    ... genetics, endocrinology (hormones), pediatric surgery or urology, and psychology. Questions to ask your doctor • What is my ... hyperplasia: www. hormone. org (search for CAH) • Mayo Clinic information about ambiguous genitalia: www. mayoclinic. com/ health/ ...

  4. Ambiguous Genitalia

    Science.gov (United States)

    ... influence fetal sex development and cause ambiguous genitalia. Chromosomal abnormalities, such as a missing sex chromosome or an ... family history of: Unexplained deaths in early infancy Infertility, absent menstrual periods or excess facial hair in ...

  5. Crisis concealing light

    Directory of Open Access Journals (Sweden)

    Romanou Katy

    2016-01-01

    Full Text Available In this article I discuss the blossoming of musical life in Greece that begun in 1974, simultaneously with the growth of the debt crisis. Communist musicians returned from exile and they were hailed as heroes while their music became indispensible to pre-electoral gatherings. Connected to the return to democracy, music and musicians became extremely important to politicians and loved by the people, and were offered a substantial portion of the money that poured in from the EU. Cold War cultural politics played their role in promoting avant-garde music as well. In comparison, today Greece has a great number of excellent musicians and the architectural infrastructure for the performance and study of music, but these are concealed by the daily hammering of crisis news.

  6. Camouflage, Concealment, and Decoys

    Science.gov (United States)

    2010-11-26

    normal unit supply channels (see appendix E). The LCSS reduces a vehicle’s visual and radar signatures. Stainless steel fibers in the LCSS material...components and the instructions for assembling LCSS structures for different sizes of equipment.) VEGETATION 3-65. Use branches and vines to temporarily...same shape and thermal signature as the target it is meant to conceal.  Ensure that the lines between support poles are gently sloped so that the

  7. Handheld ultrasound concealed weapons detector

    Science.gov (United States)

    Felber, Franklin S.; Wild, Norbert C.; Nunan, Scott C.; Breuner, Dennis; Doft, Frank

    1998-12-01

    A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.

  8. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity.

  9. Differential diagnosis of ambiguous genitalia in Chines e patients

    Institute of Scientific and Technical Information of China (English)

    田秦杰; 葛秦生

    2002-01-01

    Objective: To study the etiology and differential diagnos is of ambiguous genitalia.Methods: One hundred and five cases of ambiguous genitalia with disorders of sexual differentiation were analyzed based on clinical characterist ics and basic research. Results: Ambiguous genitalia are closely related to the functio n of androgen. It could be classified into 3 groups: androgen excess, androgen d eficiency and failure of gonadal differentiation. Differential diagnosis depends on clinical manifestations, chromosome examination, serum hormone determination s, final gonadal pathology, receptor study etc.Conclusion: Ambiguous genitalia are related to abnormal androgen ic effect and early correct etiological diagnosis is the key to its management.

  10. Handheld Concealed Weapons Detector Development

    Science.gov (United States)

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  11. Alternative techniques to study characters of the genitalia in Lepidoptera.

    Science.gov (United States)

    Dias, Fernando M S; Casagrande, Mirna M; Mielke, Olaf H H

    2010-01-01

    The present note aims to describe two alternative methods for observing genitalia in Lepidoptera. The first one provides means to examine both male and female genitalia without spoiling the scales of the abdomen, preserving it attached to the thorax and aesthetically similar to an unexamined specimen. The second one provides ways of observing certain characters on the male genitalia in a non-destructive way, and does not depend on time-consuming removing and dissection of the abdomen. It is expected that the presented techniques will help on morphological studies and on identifying similar species which consistently differ in genitalic armatures.

  12. The evolution of asymmetric genitalia in Coleoptera

    Science.gov (United States)

    de Jong, Paulien; van Beek, Rick; Hoogenboom, Tamara; zu Schlochtern, Melanie Meijer

    2016-01-01

    The evolution of asymmetry in male genitalia is a pervasive and recurrent phenomenon across almost the entire animal kingdom. Although in some taxa the asymmetry may be a response to the evolution of one-sided, male-above copulation from a more ancestral female-above condition, in other taxa, such as Mammalia and Coleoptera, this explanation appears insufficient. We carried out an informal assessment of genital asymmetry across the Coleoptera and found that male genital asymmetry is present in 43% of all beetle families, and at all within-family taxonomic levels. In the most diverse group, Cucujiformia, however, genital asymmetry is comparatively rare. We also reconstructed the phylogeny of the leiodid tribe Cholevini, and mapped aspects of genital asymmetry on the tree, revealing that endophallus sclerites, endophallus, median lobe and parameres are, in a nested fashion, increasingly unlikely to have evolved asymmetry. We interpret these results in the light of cryptic female choice versus sexually antagonistic coevolution and advocate further ways in which the phenomenon may be better understood. This article is part of the themed issue ‘Provocative questions in left–right asymmetry’. PMID:27821530

  13. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  14. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  15. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    B. Verschuere; G. Ben-Shakhar

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories: Th

  16. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  17. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  18. Penetrating trauma to the external genitalia in Operation Iraqi Freedom.

    Science.gov (United States)

    Waxman, S; Beekley, A; Morey, A; Soderdahl, D

    2009-01-01

    This report details the incidence and description of trauma to the external genitalia experienced during Operation Iraqi Freedom at a United States Army Combat Support Hospital, and demonstrates that acceptable rates of testicular salvage are possible in the combat setting. The operating room logs and the Joint Theater Trauma Registry were used to conduct a retrospective review of the patients who sustained genitourinary (GU) injuries at an US Army Combat Support Hospital (CSH) in Iraq from 27 February 2007 to 14 August 2007. Of the 3595 battle trauma injuries seen at the CSH during the time period, 168 (4.7%) had one or more GU injuries for a total of 172 GU injuries. Of these patients, 115 (68%) with GU injuries had one or more injuries to the external genitalia for a total of 119 external GU injuries. Penetrating trauma to the penis and scrotum accounted for 59 of the injuries. In total, 43 testicles were injured in 34 patients (9 had bilateral injuries). In total, 32 testes were repaired primarily and 11 were removed. Injuries to the external genitalia continue to account for the vast majority of GU trauma in a combat setting. Of patients who presented with penetrating testicular trauma, there was a 74.4% salvage rate, which is higher than previous reports of combat external genitalia injuries. Treatment of penetrating trauma to the external genitalia in a combat setting requires attention to tissue preservation while coordinating associated surgical procedures.

  19. Assignment of sex in neonates with ambiguous genitalia.

    Science.gov (United States)

    Reiner, W G

    1999-08-01

    Sex assignment in the newborn with ambiguous genitalia has been based on the adequacy of the phallus in the male, potential fertility in the female, and cosmetic appearance of the reconstructed genitalia. Recent data from both the neurosciences and from clinical research, however, casts doubt on the validity of such criteria for clinical decision making. Current knowledge suggests a need to shift away from the current clinical approach and to incorporate these new data into decisions based on a broader understanding of the etiology of gender identity. Recognition of the primacy of psychosocial and psychosexual developmental outcomes for children with ambiguous genitalia is lending direction to longitudinal outcomes research. New approaches to sex assignment have been suggested, and the paradigm for sex assignment in the newborn period is in transition.

  20. [Advances in the studies of concealed penis].

    Science.gov (United States)

    Fan, Sheng-hai; Li, Xue-de

    2015-09-01

    Concealed penis is usually found in children, which affects the patients both physiologically and psychologically. Some of the patients are wrongly treated by circumcision, which may bring about serious consequences to the sexual life of the patients in their adulthood. In the recent years, this disease has been receiving more and more attention from both doctors and parents. However, controversies remain as to its classification, pathogenesis, pathology, and treatment. This paper focuses on the understanding and advances in the studies of concealed penis.

  1. Rules for clinical diagnosis in babies with ambiguous genitalia.

    Science.gov (United States)

    Low, Y; Hutson, J M

    2003-08-01

    Intersex disorders are rare and complex; yet, in each case of genital ambiguity, accurate and expeditious management is required of the clinician. This article reviews the embryology of sexual differentiation, from which some 'rules' of diagnosis are derived. A simplified approach to the interpretation of clinical signs in ambiguous genitalia is presented and discussed.

  2. Scanning electron microscopy of the male genitalia of Sarcophagidae (Diptera

    Directory of Open Access Journals (Sweden)

    Hugo de Souza Lopes

    1990-03-01

    Full Text Available The male genitalia of nine species of Sarcophagidae (Diptera - Goniophyto honsuensis Rohdendorf, 1962, Tricharaea brevicornis (Wiedemann, 1830, Chaetoravinia derelicta (Walker, 1852, Austrohartigia spinigena (Rondani, 1864, Chrysagria duodecimpunctata Townsend, 1935, Boettcheria bisetosa Parker, 1914, Lipoptilocnema lanei Townsend, 1934, L. crispina (Lopes, 1938 and Euboettcheria alvarengai Lopes & Tibana, 1982 - were examined by scanning electron microscope (SEM and the main morphological features are descirbed.

  3. Frame loss error concealment for SVC

    Institute of Scientific and Technical Information of China (English)

    CHEN Ying; XIE Kai; ZHANG Feng; PANDIT Purvin; BOYCE Jill

    2006-01-01

    Scalable video coding (SVC), as the Scalable Extension of H.264/AVC, is an ongoing international video coding standard designed for network adaptive or device adaptive applications and also offers high coding efficiency. However, packet losses often occur over unreliable networks even for base layer of SVC and have severe impact on the playback quality of compressed video. Until now, no literature has discussed error concealment support for standard SVC bit-stream. In this paper,we provide robust and effective error concealment techniques for SVC with spatial scalability. Experimental results showed that the proposed methods provide substantial improvement, both subjectively and objectively, without a significant complexity overhead.

  4. Female external genitalia on fetal magnetic resonance imaging.

    Science.gov (United States)

    Nemec, S F; Nemec, U; Weber, M; Rotmensch, S; Brugger, P C; Kasprian, G; Krestan, C R; Rimoin, D L; Graham, J M; Prayer, D

    2011-12-01

    To characterize the normal development of the female external genitalia on fetal magnetic resonance imaging (MRI). This retrospective study included MRI examinations of 191 female fetuses (20-36 gestational weeks) with normal anatomy or minor abnormalities, following suspicion of anomalies on prenatal ultrasound examination. Using a 1.5-Tesla unit, the bilabial diameter was measured on T2-weighted sequences. Statistical description, as well as correlation and regression analyses, was used to evaluate bilabial diameter in relation to gestational age. MRI measurements were compared with published ultrasound data. The morphological appearance and signal intensities of the external genitalia were also assessed. Mean bilabial diameters, with 95% CIs and percentiles, were defined. The bilabial diameter as a function of gestational age was expressed by the regression equation: bilabial diameter = - 11.336 + 0.836 × (gestational age in weeks). The correlation coefficient, r = 0.782, was statistically significant (P < 0.001). Bilabial diameter on MRI was not significantly different from that on ultrasound (P < 0.001). In addition, on MRI we observed changes in morphology of the external genitalia and in signal intensities with increasing gestational age. We have provided a reference range of fetal bilabial diameter on MRI, which, in addition to ultrasound findings, may be helpful in the identification of genital anomalies. Copyright © 2011 ISUOG. Published by John Wiley & Sons, Ltd.

  5. Radiological Evaluation of Ambiguous Genitalia with Various Imaging Modalities

    Science.gov (United States)

    Ravi, N.; Bindushree, Kadakola

    2012-07-01

    Disorders of sex development (DSDs) are congenital conditions in which the development of chromosomal, gonadal, or anatomic sex is atypical. These can be classified broadly into four categories on the basis of gonadal histologic features: female pseudohermaphroditism (46,XX with two ovaries); male pseudohermaphroditism (46,XY with two testes); true hermaphroditism (ovotesticular DSD) (both ovarian and testicular tissues); and gonadal dysgenesis, either mixed (a testis and a streak gonad) or pure (bilateral streak gonads). Imaging plays an important role in demonstrating the anatomy and associated anomalies. Ultrasonography is the primary modality for demonstrating internal organs and magnetic resonance imaging is used as an adjunct modality to assess for internal gonads and genitalia. Early and appropriate gender assignment is necessary for healthy physical and psychologic development of children with ambiguous genitalia. Gender assignment can be facilitated with a team approach that involves a pediatric endocrinologist, geneticist, urologist, psychiatrist, social worker, neonatologist, nurse, and radiologist, allowing timely diagnosis and proper management. We describe case series on ambiguous genitalia presented to our department who were evaluated with multiple imaging modalities.

  6. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  7. Fuzzy Comprehensive Appraisal of Concealed Ore Deposits

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper, the transformation from the fuzzy to the accurate process is exemplified by the Jiaodong gold ore deposits concentrated region where the mathematical analysis is used to appraise and forecast regional concealed gold ore deposits. In this sense, this paper presents a new way to the appraisal of the non-traditional mineral resources.

  8. Paraclinoid aneurysm concealed by sphenoid wing meningioma.

    Science.gov (United States)

    Petrecca, Kevin; Sirhan, Denis

    2009-02-01

    The coexistence of brain tumours and aneurysms is rare. In all previously reported cases the aneurysm was detectable by angiography. We report here a case in which a paraclinoid internal carotid artery aneurysm was coexistent and concealed from angiographic detection by an adjacent parasellar meningioma.

  9. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  10. 25 CFR 11.444 - Carrying concealed weapons.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  11. Role of MRI in the evaluation of ambiguous genitalia

    Energy Technology Data Exchange (ETDEWEB)

    Secaf, E. (Dept. of Radiology, Univ. of California School of Medicine, San Francisco, CA (United States) Dept. de Radiologia, Faculdade de Medicina da Univ. de Sao Paulo (Brazil)); Hricak, H. (Dept. of Radiology, Univ. of California School of Medicine, San Francisco, CA (United States) Dept. of Urology, Univ. of California School of Medicine, San Francisco, CA (United States)); Gooding, C.A. (Dept. of Radiology, Univ. of California School of Medicine, San Francisco, CA (United States) Dept. of Pediatrics, Univ. of California School of Medicine, San Francisco, CA (United States)); Ho, V.W. (Dept. of Radiology, Univ. of California School of Medicine, San Francisco, CA (United States)); Gorczyca, D.P. (Dept. of Radiology, Univ. of California School of Medicine, San Francisco, CA (United States) Dept. of Radiology, Univ. of California, Los Angeles, CA (United States)); Ringertz, H. (Dept. of Diagnostic Radiology, Karolinska Hospital, Stockholm (Sweden)); Conte, F.A. (Dept. of Pediatr

    1994-08-01

    Diagnostic accuracy of magnetic resonance imaging (MRI) interpretation was assessed prospectively in patients with ambiguous genitalia or intersex problems. MRI depiction of the uterus was possible in 93 %, the vagina in 95 %, the penis in 100 %, the testis in 88 %, and the ovary in 74 % of patients. The strength of MRI lies in the multiplanar capability and tissue characterization by means of T1- and T2-weighted sequences. MRI contributes to accurate morphologic evaluation of muellerian duct structures, the gonads, and the development of the phallus, all of which are essential for appropriate gender assignment and planning of surgical reconstruction. (orig.)

  12. Experimental demonstration of possible cryptic female choice on male tsetse fly genitalia

    OpenAIRE

    Briceño-Lobo, Daniel; Eberhard-Chabtree, William

    2009-01-01

    artículo -- Universidad de Costa Rica. Escuela de Biología, 2009. Este documento es privado debido a restricciones de derechos de autor del publicador. A possible explanation for one of the most general trends in animal evolution – rapid divergent evolution of animal genitalia – is that male genitalia are used as courtship devices that influence cryptic female choice. But experimental demonstrations of stimulatory effects of male genitalia on female reproductive processes have gen...

  13. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  14. Concealed weapons detection using electromagnetic resonances

    Science.gov (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  15. Wave Absorption Materials Used in Concealment Technique,

    Science.gov (United States)

    1983-01-13

    Accession 7cr NTIS ="AI ?/.’ SG DI TAI ME i Al fiures grphic , tbles eqatio Jtification !.int ths ranlatonwer exracedfro thDbstiuin quavaiabiit Copoaaiebs...and other devices, there is an important problem facing the design of the next generation of aircraft: how can the penetrating and survival...the’direct result of this competition. The concealment technique is a comprehensive technique. In other words, * the new airc-raft model is designed

  16. Embedded wavelet video coding with error concealment

    Science.gov (United States)

    Chang, Pao-Chi; Chen, Hsiao-Ching; Lu, Ta-Te

    2000-04-01

    We present an error-concealed embedded wavelet (ECEW) video coding system for transmission over Internet or wireless networks. This system consists of two types of frames: intra (I) frames and inter, or predicted (P), frames. Inter frames are constructed by the residual frames formed by variable block-size multiresolution motion estimation (MRME). Motion vectors are compressed by arithmetic coding. The image data of intra frames and residual frames are coded by error-resilient embedded zerotree wavelet (ER-EZW) coding. The ER-EZW coding partitions the wavelet coefficients into several groups and each group is coded independently. Therefore, the error propagation effect resulting from an error is only confined in a group. In EZW coding any single error may result in a totally undecodable bitstream. To further reduce the error damage, we use the error concealment at the decoding end. In intra frames, the erroneous wavelet coefficients are replaced by neighbors. In inter frames, erroneous blocks of wavelet coefficients are replaced by data from the previous frame. Simulations show that the performance of ECEW is superior to ECEW without error concealment by 7 to approximately 8 dB at the error-rate of 10-3 in intra frames. The improvement still has 2 to approximately 3 dB at a higher error-rate of 10-2 in inter frames.

  17. Evolution of genitalia: theories, evidence, and new directions.

    Science.gov (United States)

    Eberhard, William G

    2010-01-01

    Many hypotheses have been proposed to explain why male intromittent genitalia consistently tend to diverge more rapidly than other body traits of the same individuals in a wide range of animal taxa. Currently the two most popular involve sexual selection: sexually antagonistic coevolution (SAC) and cryptic female choice (CFC). A review of the most extensive attempts to discriminate between these two hypotheses indicates that SAC is not likely to have played a major role in explaining this pattern of genital evolution. Promising lines for future, more direct tests of CFC include experimental modification of male genital form and female sensory abilities, analysis of possible male-female dialogues during copulation, and direct observations of genital behavior.

  18. A practical approach to ambiguous genitalia in the newborn period.

    Science.gov (United States)

    Lambert, Sarah M; Vilain, Eric J N; Kolon, Thomas F

    2010-05-01

    The evaluation and management of neonates with ambiguous genitalia requires sensitivity, efficiency, and accuracy. The approach to these neonates is facilitated by a multidisciplinary team including urology, endocrinology, genetics, and psychiatry or psychology. Disorders of sex development (DSD) encompass chromosomal DSD, 46,XX DSD, and 46,XY DSD. The 46,XX DSD is the most common DSD and in the majority of these children congenital adrenal hyperplasia is the underlying etiology. The 46,XY DSD is a heterogeneous disorder that often results from a disruption in the production or response to testosterone, dihydrotestosterone, or Mullerian inhibitory substance. Chromosomal DSD includes conditions resulting from abnormal meiosis, including Klinefelter syndrome (47, XXY) and Turner syndrome. The evaluation of children with DSD demands a thorough physical examination, medical history, karyotype, metabolic panel, 17-OH progesterone, testosterone, luteinizing hormone, follicle stimulation hormone, and urinalysis. A radiographic evaluation should begin with an abdominal and pelvic ultrasound but may include magnetic resonance imaging, endoscopy, or laparoscopy.

  19. Anatomy of mole external genitalia: Setting the record straight

    Science.gov (United States)

    Sinclair, Adriane Watkins; Glickman, Stephen; Baskin, Lawrence; Cunha, Gerald R.

    2016-01-01

    Anatomy of male and female external genitalia of adult mice (Mus musculus) and broad-footed moles (Scapanus latimanus) was re-examined to provide more meaningful anatomical terminology. In the past the perineal appendage of male broad-footed moles has been called the penis, while the female perineal appendage has been given several terms (e.g. clitoris, penile clitoris, peniform clitoris and others). Histological examination demonstrates that perineal appendages of male and female broad-footed moles are the prepuce, which in both sexes are covered externally with a hair-bearing epidermis and lacks erectile bodies. The inner preputial epithelium is non-hair-bearing and defines the preputial space in both sexes. The penis of broad-footed moles lies deep within the preputial space, is an “internal organ” in the resting state and contains the penile urethra, os penis, and erectile bodies. The clitoris of broad-footed moles is defined by a U-shaped clitoral epithelial lamina. Residing within clitoral stroma encompassed by the clitoral epithelial lamina is the corpus cavernosum, blood-filled spaces and the urethra. External genitalia of male and female mice are anatomically similar to that of broad-footed moles with the exception that in female mice the clitoris contains a small os clitoridis and lacks defined erectile bodies, while male mice have an os penis and a prominent distal cartilaginous structure within the male urogenital mating protuberance (MUMP). Clitori of female broad-footed moles lack an os clitoridis but contain defined erectile bodies, while male moles have an os penis similar to the mouse but lack the distal cartilaginous structure. PMID:26694958

  20. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    Science.gov (United States)

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  1. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  2. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  3. Color image fusion for concealed weapon detection

    Science.gov (United States)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  4. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour.

  5. Variation in male and female genitalia among ten species of North American Anthocoris (Hemiptera: Heteroptera: Anthocoridae)

    Science.gov (United States)

    We compared morphology of internal reproductive anatomy and genitalia among 10 species of North American Anthocoris (Hemiptera: Heteroptera: Anthocoridae). Reproductive structures of males, including internal reproductive organs (testes, seminal vesicles, ejaculatory bulb, phallus), the left parame...

  6. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults.

    Science.gov (United States)

    Hoy-Ellis, Charles P

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors--internalized heterosexism and concealment of sexual orientation--and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed.

  7. Development of the External Genitalia: Perspectives from the Spotted Hyena (Crocuta crocuta)

    OpenAIRE

    2014-01-01

    This review/research paper summarizes data on development of the external genitalia of the spotted hyena, a fascinating mammal noted for extreme masculinization of the female external genitalia. The female spotted hyena is the only extant mammal that mates and gives birth through a pendulous penis-like clitoris. Our studies indicate that early formation of the phallus in both males and females is independent of androgens; indeed the phallus forms before the fetal testes or ovaries are capable...

  8. The function and evolution of male and female genitalia in Phyllophaga Harris scarab beetles (Coleoptera: Scarabaeidae).

    Science.gov (United States)

    Richmond, M P; Park, J; Henry, C S

    2016-11-01

    Genitalia diversity in insects continues to fuel investigation of the function and evolution of these dynamic structures. Whereas most studies have focused on variation in male genitalia, an increasing number of studies on female genitalia have uncovered comparable diversity among females, but often at a much finer morphological scale. In this study, we analysed the function and evolution of male and female genitalia in Phyllophaga scarab beetles, a group in which both sexes exhibit genitalic diversity. To document the interaction between male and female structures during mating, we dissected flash-frozen mating pairs from three Phyllophaga species and investigated fine-scale morphology using SEM. We then reconstructed ancestral character states using a species tree inferred from mitochondrial and nuclear loci to elucidate and compare the evolutionary history of male and female genitalia. Our dissections revealed an interlocking mechanism of the female pubic process and male parameres that appears to improve the mechanical fit of the copulatory position. The comparative analyses, however, did not support coevolution of male and female structures and showed more erratic evolution of the female genitalia relative to males. By studying a group that exhibits obvious female genitalic diversity, we were able to demonstrate the relevance of female reproductive morphology in studies of male genital diversity.

  9. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  10. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  11. Experimental demonstration of possible cryptic female choice on male tsetse fly genitalia.

    Science.gov (United States)

    Briceño, R D; Eberhard, W G

    2009-11-01

    A possible explanation for one of the most general trends in animal evolution - rapid divergent evolution of animal genitalia - is that male genitalia are used as courtship devices that influence cryptic female choice. But experimental demonstrations of stimulatory effects of male genitalia on female reproductive processes have generally been lacking. Previous studies of female reproductive physiology in the tsetse fly Glossina morsitans suggested that stimulation during copulation triggers ovulation and resistance to remating. In this study we altered the form of two male genital structures that squeeze the female's abdomen rhythmically in G. morsitans centralis and induced, as predicted, cryptic female choice against the male: sperm storage decreased, while female remating increased. Further experiments in which we altered the female sensory abilities at the site contacted by these male structures during copulation, and severely altered or eliminated the stimuli the male received from this portion of his genitalia, suggested that the effects of genital alteration on sperm storage were due to changes in tactile stimuli received by the female, rather than altered male behavior. These data support the hypothesis that sexual selection by cryptic female choice has been responsible for the rapid divergent evolution of male genitalia in Glossina; limitations of this support are discussed. It appears that a complex combination of stimuli trigger female ovulation, sperm storage, and remating, and different stimuli affect different processes in G. morsitans, and that the same processes are controlled differently in G. pallidipes. This puzzling diversity in female triggering mechanisms may be due to the action of sexual selection.

  12. Cryptic female exaggeration: the asymmetric female internal genitalia of Kaliana yuruani (Araneae: Pholcidae).

    Science.gov (United States)

    Huber, Bernhard A

    2006-06-01

    Males of the Venezuelan pholcid spider Kaliana yuruani have unique genitalia, with the procursi about six times as long as usual in the family. The present article describes the previously unknown female, searching for a morphological correlate in the female genitalia to the male's exaggeration. Reconstruction of histological serial sections reveals an internal female complexity that is unequalled in pholcid spiders. An intricate system of ducts and folds is arranged in an asymmetric way, making this the third known case of genital asymmetry in spiders. The term "cryptic female exaggeration" is used in analogy to cryptic female choice, pointing to the fact that from the outside, the female genitalia do not appear unusual. I propose that cryptic female exaggeration may be relatively common in copulatory structures if male exaggerations need to be evaluated according to the female choice by mechanical fit model. Finally, the evolution of genital asymmetry in spiders is contrasted with that in insects.

  13. Variations of the External Male Genitalia in Three Populations of Triatoma infestans Klug, 1834

    Directory of Open Access Journals (Sweden)

    Pires Herton Helder Rocha

    1998-01-01

    Full Text Available Triatoma infestans is the triatomine that presents the greatest dispersion area in South America. However, it is not known whether the original characteristics of this insect remained in its long dispersion process. The purpose of this work was to study comparatively the external male genitalia of insects from different populations of T. infestans, two from Brazil (Minas Gerais and Bahia and one from Bolivia (Cochabamba Valley, and to investigate the correlation between the morphological and behavioral variations. Differences were observed in one of the structures of the external genitalia (endosoma process that could be used to characterize the insects from the three populations studied.

  14. Magnetic resonance neurographic confirmation of extensive Plexiform neurofibroma in neurofibromatosis-1 presenting as ambiguous genitalia

    Directory of Open Access Journals (Sweden)

    Ishan Kumar

    2016-01-01

    Full Text Available Genitourinary involvement of neurofibromatosis is uncommon and genital neurofibromatosis is even rarer. Involvement of clitoris by neurofibroma can lead to clitoromegaly masquerading as a male penis. We report such a case of ambiguous genitalia in a 7-year-old female child presenting with clitoromegaly since birth, in which magnetic resonance imaging (MRI revealed the presence of extensive neurofibromatosis in the clitoris and lumbosacral regions. We emphasize the central role of MRI in evaluation of hormonal and non-hormonal causes of ambiguous genitalia. We further discuss the merits of including MR neurography in the imaging protocol for comprehensive delineation of neurofibromatosis.

  15. The management of dog bite injuries of genitalia in paediatric age

    Directory of Open Access Journals (Sweden)

    Mirko Bertozzi

    2013-01-01

    Full Text Available Dog bite injuries are common in children and represent an important health-care problem. Most dog bite injuries involve the face or an extremity. Victims tend to seek medical care quickly. Dog bites to the external genitalia are rarely reported, but they potentially result in morbidity if improperly managed. Morbidity is also directly related to the severity of initial wound. Guidelines for the management of dog bites include irrigation, dιbridment, antibiotic therapy, consideration of tetanus and rabies immunisation and suture of wounds or surgical reconstruction. Literature review was conducted and focused to analyze the management of dog bite lesions involving external genitalia.

  16. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  17. Management of a 3-year-old child with ambiguous genitalia

    Directory of Open Access Journals (Sweden)

    Amarendra Kumar

    2015-01-01

    Full Text Available True hermaphrodites have characteristics tissue both sex in the form of presence of vagina uterus, fallopian tubes and ovaries as in female and presence of testis seminiferous tubules but penis as in penoscrotal hypospadias and bifid scrotal sac confuses as well developed labia majora. Determination of sex as per parents view in our social set up. The case was provisionally diagnosed as intersex. Total abdominal hysterectomy, bilateral salphingo-oophorectomy and colpectomy were conducted. A 3-year-old child referred by a pediatrician to Nalanda Medical College, child surgical department for investigation and management of his ambiguous genitalia having following features like, urine was not passing from the tip of penis; penis along with apparently looking female genitalia was taken under treatment. Examination under general anesthesia showed a presence of both male/female internal genitalia and gonads with features of external genitalia of both sexes. After total abdominal hysterectomy and human chorionic gonadotrophin treatment growth of phallus and testicle was noted. The child was made male after extirpation of female genitals. This case illustrates that gender correction can be made as per patients consent in adult but at this stage social customs and parents consent dictated the treatment.

  18. Experimental modifications imply a stimulatory function for male tsetse fly genitalia, supporting cryptic female choice theory.

    Science.gov (United States)

    Briceño, R D; Eberhard, William G

    2009-07-01

    One of the most sweeping of all patterns in morphological evolution is that animal genitalia tend to diverge more rapidly than do other structures. Abundant indirect evidence supports the cryptic female choice (CFC) explanation of this pattern, which supposes that male genitalia often function to court females during copulation; but direct experimental demonstrations of a stimulatory function have been lacking. In this study, we altered the form of two male genital structures that squeeze the female's abdomen rhythmically in Glossina pallidipes flies. As predicted by theory, this induced CFC against the male: ovulation and sperm storage decreased, while female remating increased. Further experiments showed that these effects were due to changes in tactile stimuli received by the female from the male's altered genitalia, and were not due to other possible changes in the males due to alteration of their genital form. Stimulation from male genital structures also induces females to permit copulation to occur. Together with previous studies of tsetse reproductive physiology, these data constitute the most complete experimental confirmation that sexual selection (probably by CFC) acts on the stimulatory properties of male genitalia.

  19. Complex female genitalia indicate sperm dumping in armored goblin spiders (Arachnida, Araneae, Oonopidae).

    Science.gov (United States)

    Burger, Matthias

    2010-01-01

    In promiscuous females, sperm ejection from the sperm storage site can be a strong mechanism to influence sperm priority patterns. Sperm dumping is reported from different animals including birds, insects, and humans. In spiders, it has been documented for four species including the oonopid Silhouettella loricatula. Oonopidae are a diverse spider family comprising many species with peculiar female genitalia. Especially in species where studies of mating behavior are difficult, morphological investigations of the genitalia help to understand their function and evolution. In the present study, the genitalia of the oonopids Myrmopopaea sp., Grymeus sp., and Lionneta sp. are investigated by means of histological serial sections and scanning electron microscopy (SEM). The results are compared with previous findings on S. loricatula. In Myrmopopaea sp. and Grymeus sp., the same morphological components are present that are involved in sperm dumping in S. loricatula. Inside the receptaculum, sperm are enclosed in a secretory sac which can be moved to the genital opening and dumped during copulation by muscle contractions. The female genitalia of Lionneta sp. are asymmetric. They show the same characteristics as S. loricatula but all the investigated females were unmated. The results strongly suggest that sperm dumping occurs in Myrmopopaea sp., Grymeus sp., and Lionneta sp. and happens by the same mechanism as in S. loricatula. Sperm dumping might even be common within a clade of oonopids. As in S. loricatula, the sperm transfer forms in the investigated species consist of several spermatozoa. Papillae with unknown function occur on the receptacula of all females.

  20. Limb defects and congenital anomalies of the genitalia in an infant with homozygous alpha-thalassemia.

    Science.gov (United States)

    Abuelo, D N; Forman, E N; Rubin, L P

    1997-01-20

    We describe an infant with homozygous alpha-thalassemia, genital abnormalities, and terminal transverse limb defects, whose limbs demonstrate evidence of loss of tissue and abnormal morphogenesis. We propose these defects were due to either severe fetal anemia or to vascular occlusion by abnormal erythrocytes, resulting in hypoxia of the developing distal limbs and genitalia.

  1. Anthropometric study of male external genitalia of 320 healthy Nigerian adults.

    Science.gov (United States)

    Ajmani, M L; Jain, S P; Saxena, S K

    1985-06-01

    Five basic measurements of the male external genitalia were studied in 320 healthy male medical students belonging to the various parts of Nigeria (West Africa). Their ages range from 17 to 23 years. The measurements were as follows: average length of the penis (81.6 +/- 0.94 mm); circumference of the penis (88.3 +/- 0.02 mm); circumference of the scrotum (212.6 +/- 2.48 mm); length of right testis (46.8 +/- 0.54 mm); width of right testis (32.4 +/- 0.37 mm); length of left testis (46.0 +/- 0.53 mm); and width of left testis (31.4 +/- 0.36 mm). The size of the genitalia increases with the increase in age in younger year groups. The adult stages of genitalia development are reached at the age of 21 years in 89.0% of the individuals. The growth of the genitalia is continued with the increasing height and weight, but this growth slows down after attaining a definite height and weight.

  2. [Decision-making process about sex assignment in the neonate with ambiguous genitalia].

    Science.gov (United States)

    Shimada, Kenji; Matsumoto, Fumi; Tohda, Akira

    2004-02-01

    Although diagnoses and etiologies of underlying disorders of sexual differentiation can be carefully delineated through biochemical, imagine, and chromosomal analyses, the decision-making process about sex assignment in the newborn with ambiguous genitalia is in a state of controversy. The conventional way for the approach to these neonates consists of 4 principles; 1) Urgency of diagnosis and sex assignment, so that early surgical reconstruction could obviate the fear of the parents with each diaper change. 2) Adequacy of the phallus as a male. 3) Fertility, especially 46XX female are sex assigned female because of potential fertility. 4) Cosmetic appearance of the reconstructed genitalia based on the recognition that external female genitalia are generally easier to construct than male. Contrary to these conventional methods, some researchers insist on flexibility in the clinical approach to provide the best possible outcome. It is getting apparent that the quantity, timing, and duration of androgen exposure will play a role in determining the degree of masculinization of the brain, which may potentially decide gender identity before 18 months of age or even in utero, and may influence the psychosexual development of the child. Flexibility in decision-making will allow for options not to remove any tissues including gonads and internal sex organs, or to reconstruct the genitalia until he or she is sure of the gender. This new approach must be proved in the future.

  3. Pigmented concealing powders for the hair loss patient.

    Science.gov (United States)

    Cossman, Jack P; Ladizinski, Barry; Lee, Kachiu C

    2013-12-01

    Patients suffering from alopecia may experience low self-esteem, low self-image, and other psychological consequences. While medical and surgical options for treating hair loss exist, these may be prohibitively expensive or have an unpredictable outcome. In lieu of or in addition to therapeutic approaches, cosmetic options have long been an approach to hair loss. However, patients and clinicians alike often regard cosmetic options to be limited to hairstyling and hairpieces, unaware that newer options, namely pigmented concealing powders, may offer a more practical and seemingly natural camouflage. This article introduces the clinician to concealing powders as a viable option for the hair loss patient.

  4. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  5. Adolescent disclosure and concealment: longitudinal and concurrent associations with aggression.

    Science.gov (United States)

    Leavitt, Chelom E; Nelson, David A; Coyne, Sarah M; Hart, Craig H

    2013-01-01

    This longitudinal study assessed the association between prior (preschool) and concurrent physical and relational aggression as they relate to Russian adolescents' disclosure and concealment patterns with their parents. In the initial preschool study, there were 106 boys and 106 girls (mean age = 60.24 months, SD = 7.81). Both peer nominations and teacher ratings of aggression were obtained for these children. Ten years later, the majority of these children (72.2%; n = 153) completed a longitudinal follow-up battery of assessments. Included in these measures was a self-reported measure of aggression as well as an assessment of the extent to which these adolescents disclosed to and concealed information from their parents. Separate models were estimated by gender of child for the 153 children who participated in both Time 1 and Time 2 data collections. Preschool physical aggression proved an important longitudinal predictor of adolescent disclosure and concealment for girls. Concurrently, self-rated relational aggression was also significantly associated with concealment for both boys and girls.

  6. Ruse and Representations: On Children's Ability to Conceal Information.

    Science.gov (United States)

    Peskin, Joan

    1992-01-01

    Children between three and five years of age engaged in a procedure in which a puppet competitor chose an object which the children preferred. Fewer than 30 percent of three year olds but more than 80 percent of five year olds knew how to conceal their preference from the competitor. (BC)

  7. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  8. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    Science.gov (United States)

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  9. Sensory innervation of the external and internal genitalia of the female rat

    OpenAIRE

    Peters, Lawrence C.; Kristal, Mark B.; Komisaruk, Barry R.

    1987-01-01

    Using a whole-nerve recording method, the genitalia of the female rat were found to receive afferent innervation as follows. Pelvic nerve: vagina, cervix, and perineal skin; hypogastric nerve: cervix and proximal three fifths of the uterus; pudendal nerve: skin of perineum, inner thigh, and clitoral sheath. It is probable that the pudendal and pelvic nerves are activated during copulation, and that all 3 nerves are activated during parturition.

  10. MEDICAL AUDIT OF CHILDREN WITH AMBIGUOUS GENITALIA- REVIEW OF CHILDREN TREATED OVER 18 YEARS

    Directory of Open Access Journals (Sweden)

    Praburam P. M

    2015-10-01

    Full Text Available Introduction: The survival of a newborn or a child presenting with ambiguous genitalia depends upon the timely diagnosis and institution of appropriate medical care. We undertook this study with the aim to determine if appropriate clinical and confirmatory diagnosis was arrived on time and if the treatment instituted was relevant and satisfactory. Methods: All children who were evaluated for ambiguous genitalia under the Department of Pediatric Endocrinology over the preceding 18 years were invited for a review. Data including time taken to make a clinical diagnosis, time taken to confirm the diagnosis, reasons for delay if any, and appropriateness of the sex assigned for rearing and treatment instituted were collected from the charts. Patients were evaluated for adequacy of response to treatment, compliance, problems encountered if any and subjective parental satisfaction. Results: A total of 165 children were diagnosed to have conditions with ambiguous genitalia and were called for a review. 33 children attended the review. 15 were being raised as boys and 18 as girls. 12 children had virilising congenital adrenal hyperplasia (CAH, 6 had cryptorchidism, 6 had hypospadias, 3 had complete and 1 had partial testicular feminisation, 2 had mixed gonadal dysgenesis (MGD, 2 had hypogonadism and 1 was a true hermaphrodite. An appropriate clinical diagnosis was made in 30childrenon the day one and a final confirmatory diagnosis was made within a month in 23. Conclusion: In most conditions presenting with ambiguous genitalia, a clinical and confirmatory diagnosis can be made in a short duration. Initiation of appropriate treatment results in favourable outcomes in terms of growth sexual identity and adaptation.

  11. Human-caused habitat fragmentation can drive rapid divergence of male genitalia.

    Science.gov (United States)

    Heinen-Kay, Justa L; Noel, Holly G; Layman, Craig A; Langerhans, R Brian

    2014-12-01

    The aim of this study rests on three premises: (i) humans are altering ecosystems worldwide, (ii) environmental variation often influences the strength and nature of sexual selection, and (iii) sexual selection is largely responsible for rapid and divergent evolution of male genitalia. While each of these assertions has strong empirical support, no study has yet investigated their logical conclusion that human impacts on the environment might commonly drive rapid diversification of male genital morphology. We tested whether anthropogenic habitat fragmentation has resulted in rapid changes in the size, allometry, shape, and meristics of male genitalia in three native species of livebearing fishes (genus: Gambusia) inhabiting tidal creeks across six Bahamian islands. We found that genital shape and allometry consistently and repeatedly diverged in fragmented systems across all species and islands. Using a model selection framework, we identified three ecological consequences of fragmentation that apparently underlie observed morphological patterns: decreased predatory fish density, increased conspecific density, and reduced salinity. Our results demonstrate that human modifications to the environment can drive rapid and predictable divergence in male genitalia. Given the ubiquity of anthropogenic impacts on the environment, future research should evaluate the generality of our findings and potential consequences for reproductive isolation.

  12. Diabetic fetopathy associated with bilateral adrenal hyperplasia and ambiguous genitalia: a case report

    Directory of Open Access Journals (Sweden)

    Tantbirojn Patou

    2008-07-01

    Full Text Available Abstract Introduction Many fetal malformations can occur because of maternal diabetes. However, ambiguous genital organs have never been reported as an associated finding in the literature. This is the first report of associated ambiguous genital organ and bilateral adrenal hyperplasia in a case of diabetic fetopathy. Case presentation A 19-year-old Thai primigravida with familial history of diabetes mellitus (DM was diagnosed as having gestational DM type 2, based on 100 g oral glucose tolerance test, and was poorly controlled with insulin injections. Delayed targeted ultrasonography at 28 weeks gestation revealed multiple fetal anomalies. The woman underwent low transverse cesarean section at 30 weeks gestation due to preterm labor and transverse lie. The newborn with ambiguous genitalia was delivered but expired after birth. Autopsy findings revealed alobar holoprosencephaly, a prominent forehead, hypotelorism, an absent nose, absent bilateral ears, median cleft lip and palate, preaxial polydactyly of the right hand, accessory spleens, single umbilical artery, markedly enlarged adrenal glands and ambiguous external genitalia The subsequent fetal chromosomal study revealed 46,XX. Conclusion We describe a case of diabetic fetopathy with classic facial malformation and preaxial hallucal polydactyly which has been proposed as a marker of diabetic embryopathy. Bilateral adrenal hyperplasia with ambiguous genitalia, an uncommon associated anomaly, was also identified. It is controversial whether adrenal hyperplasia can be a novel feature of diabetic fetopathy or just a coincidental finding. Further observation and adequate investigation are needed in such cases.

  13. Remarkable morphological features of taxonomic interest in the female genitalia of five Erythrogonia species (Hemiptera: Cicadomorpha: Cicadellidae).

    Science.gov (United States)

    Carvalho, Rachel A; Mejdalani, Gabriel

    2014-01-01

    The female genitalia of the Cicadellidae (leafhoppers) are usually considered more morphologically conservative (i.e., less variable) than the male genitalia at the generic and specific levels. However, various recent publications on the Cicadellinae (sharpshooters) have demonstrated the existence of useful characters in the female genitalia for the recognition of genera and species. Here we describe, illustrate, compare, and discuss peculiar processes, sclerites, and other features of the first pair of valvifers, sternite VIII, and ovipositor valvulae I and II of five species of the sharpshooter genus Erythrogonia (E. calva (Taschenberg, 1884), E. hertha Medler, 1963, E. phoenicea (Signoret, 1853), E. proterva Melichar, 1926, and E. sexguttata (Fabricius, 1803)). This genus includes currently the highest species diversity among the New World Cicadellinae, an agriculturally important subfamily. Comparative notes on other genera of the Cicadellini are added. In agreement with other recent publications, our results challenge the view that the morphology of the female genitalia is almost always conservative in the Cicadellidae.

  14. Could plate tectonics on Venus be concealed by volcanic deposits

    Science.gov (United States)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  15. Temporal Error Concealment Technique for MPEG-4 Video Streams

    Institute of Scientific and Technical Information of China (English)

    DING Xuewen; YANG Zhaoxuan; GUO Yingchun

    2006-01-01

    Concerning inter4v mode employed widely in MPEG-4 video, a new temporal error concealment scheme for MPEG-4 video sequences is proposed, which can selectively interpolate one or four motion vectors (MVs) for the missing macroblock (MB) according to the estimated MB coding mode. Performance of the proposed scheme is compared with the existing schemes with multiple testing sequences at different bit error rates. Experimental results show that the proposed algorithm can mask the impairments caused by transmission errors more efficiently than 0 MV and average MV methods by consuming more time for different bit error rates. It has an acceptable image quality close to that obtained by the selective motion vector matching (SMVM) algorithm, while tak ing less than half of cycles of operations. The proposed concealment scheme is suitable for low complexity video real-time implementations.

  16. Could plate tectonics on Venus be concealed by volcanic deposits

    Science.gov (United States)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  17. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  18. Prevalence of concealed penis among school boys in Shanghai and its relationship with obesity%上海市中小学男生隐匿阴茎流行现状及其与肥胖的关系

    Institute of Scientific and Technical Information of China (English)

    王文; 史慧静; 李丹; 张越; 张博林; 王群; 江小小

    2012-01-01

    [目的]了解上海市6~19岁中小学男生隐匿阴茎的现患率,并分析其与多种肥胖相关身体形态指标的关联. [方法]采用分层整群抽样方法,选取上海市小学1年级~高中3年级共1 787男生,通过外生殖器检查和身体测量,获取不同年龄、不同性发育阶段中小学男生的隐匿阴茎现患率,在为所有每1个病例按照学校和年级相同并且年龄相近原则选取4个对照的基础上,通过条件Logistic回归分析隐匿阴茎与肥胖相关多种身体形态指标的关联. [结果]隐匿阴茎的总检出率为2.5%,尤以11.0~15.9岁年龄组和性发育早期组的检出率较高.BMI、体重、腰围、臀围、腰臀比、肩胛下部皮褶厚度、肱三头肌部皮褶厚度对于隐匿阴茎的相对危险度分别为1.730、1.158、1.252、1.297、13.734、1.248、1.229,差异均有统计学意义. [结论]围青春期肥胖男性的隐匿阴茎问题应引起儿童保健工作者的高度注意,特别是青春发育初期;隐匿阴茎与肥胖相关的多种指标有关,尤其是中心性肥胖.%[Objective] To describe the incidence rate of concealed penis among the primary and secondary school boys in Shanghai and preliminarily explore the correlation between concealed penis and Body Shape Index of school boys. [Methods] Stratification sampling method was applied and then a total of 1 787 students were selected from primary school and secondary schools. Strict physical and genitalia examination were conducted to obtain the data of the participant boys at different ages and different pubertal stages in order to describe the general situation of concealed penis and the correlation was explored between concealed penis and obesity-related indicators based on the method of 1 : 4 conditional Logistic regression analysis. [Results] The incidence rate of concealed penis of the sample school boys was 2. 5%. The higher incidence rate of concealed penis emerged at the age of 11 to 15

  19. Concealed objects detection based on FWT in active millimeter-wave images

    Science.gov (United States)

    Du, Kun; Zhang, Lu; Chen, Wei; Wan, Guolong; Fu, Ruoran

    2017-01-01

    Active millimeter-wave (MMW) near-filed human imaging is a means for concealed objects detection. A method of concealed objects detection based on fast wavelet transforms (FWT) in the usage of active MMW images is presented as a result of image characteristics, which includes high resolution, characteristics varying in different parts of the human, imaging influenced among human, concealed objects and other objects, and different textures of concealed objects. Images segmentation utilizing results of edge detection based on FWT is conducted and preliminary segmentation results can be obtained. Some kinds of concealed objects according to comparing gray value of concealed objects to human average gray value can be detected in this paper. The experiments of concealed objects on images of actual acquisition are conducted with a result of accurate rate 80.92% and false alarm rate 11.78%, illustrating the effectiveness of the method proposed in this paper.

  20. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    Science.gov (United States)

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors.

  1. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆

    Science.gov (United States)

    Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan

    2013-01-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804

  2. Ambiguous genitalia

    Science.gov (United States)

    ... X chromosomes) has the following features: An enlarged clitoris that looks like a small penis . The urethral ... along, above, or below the surface of the clitoris. The labia may be fused and look like ...

  3. Brucella melitensis: a rarely suspected cause of infections of genitalia and the lower urinary tract

    Directory of Open Access Journals (Sweden)

    K. Stamatiou

    Full Text Available We examined the clinical presentation and outcome of Brucellar infections of genitalia and the lower urinary tract through a review of the medical records of 10 cases of male patients with brucellar infections of the genitalia and lower urinary tract. The mean age of the patients with brucellosis was 49.2, (median 52, range 15-77 years. Eleven out of 17 patients were rural residents, 15 reported that they might have consumed unpasteurized dairy products and four reported occupational exposure. Symptoms onset was acute in almost all cases. Scrotal pain, epidedimal swelling and fever were the most common symptoms. The Wright test was positive in 13 patients, while Brucella sp. was isolated from blood cultures in six cases. Only two patients were found with abnormal liver ultrasonography. All patients underwent treatment with doxycycline and aminoglycoside for seven days and doxycycline alone for two months. Most of them responded to antibiotic therapy with rapid regression of symptoms. One patient failed to respond to therapy and presented necrotizing orchitis, as well as abscesses, which required orchectomy. Brucellar infections of the genitalia and lower urinary tract have no specific clinical presentation; the usual laboratory examination is not sufficient to diagnose this kind of infection, therefore it could easily be misdiagnosed. An analytical medical history (including overall dietary habits and recent consumption of non-pasteurized dairy products could indicate Brucelosis as would the persistence of symptoms despite a one-week antibiotic treatment. In general, patients afflicted by brucellar epididymoorchitis respond to Brucellosis antibiotic therapy, except for some rare cases that present necrotizing orchitis and require surgical treatment.

  4. Brucella melitensis: a rarely suspected cause of infections of genitalia and the lower urinary tract

    Directory of Open Access Journals (Sweden)

    K. Stamatiou

    2009-04-01

    Full Text Available We examined the clinical presentation and outcome of Brucellar infections of genitalia and the lower urinary tract through a review of the medical records of 10 cases of male patients with brucellar infections of the genitalia and lower urinary tract. The mean age of the patients with brucellosis was 49.2, (median 52, range 15-77 years. Eleven out of 17 patients were rural residents, 15 reported that they might have consumed unpasteurized dairy products and four reported occupational exposure. Symptoms onset was acute in almost all cases. Scrotal pain, epidedimal swelling and fever were the most common symptoms. The Wright test was positive in 13 patients, while Brucella sp. was isolated from blood cultures in six cases. Only two patients were found with abnormal liver ultrasonography. All patients underwent treatment with doxycycline and aminoglycoside for seven days and doxycycline alone for two months. Most of them responded to antibiotic therapy with rapid regression of symptoms. One patient failed to respond to therapy and presented necrotizing orchitis, as well as abscesses, which required orchectomy. Brucellar infections of the genitalia and lower urinary tract have no specific clinical presentation; the usual laboratory examination is not sufficient to diagnose this kind of infection, therefore it could easily be misdiagnosed. An analytical medical history (including overall dietary habits and recent consumption of non-pasteurized dairy products could indicate Brucelosis as would the persistence of symptoms despite a one-week antibiotic treatment. In general, patients afflicted by brucellar epididymoorchitis respond to Brucellosis antibiotic therapy, except for some rare cases that present necrotizing orchitis and require surgical treatment.

  5. [Sex assignment in intersex children: a brief analysis of "ambiguous genitalia" cases].

    Science.gov (United States)

    Guimarães, Anibal; Barboza, Heloísa Helena

    2014-10-01

    This article takes an ethical approach to briefly analyze current therapeutic guidelines in Brazil for cases diagnosed as "ambiguous genitalia" (one of the "disorders of sexual development", DSD) in intersex children. Except when there is clear risk to the infant's life, there is no medical or institutional consensus on the definition of intersex, DSD, or recommended treatment. Parents or guardians of these minors have the legal right to provide consent for genital surgical interventions. The irreversibility of some procedures calls attention to reports by some intersex adults who underwent such interventions during their childhood or adolescence and now fail to acknowledge the physical or psychosocial benefits that were originally claimed to justify them.

  6. 46,XX Karyotype in a Male with Ambigious Genitalia: A Case Report

    Directory of Open Access Journals (Sweden)

    Mahmut Balkan

    2004-01-01

    Full Text Available 40 days old case who were diagnosed with ambigious genitalia were sentto laboratory of cytogenetics. Mother was 26 years old and have to alivechildren and case were the second child and applied to Child SurgeryDepartment due to continiously vomiting and uneasy conditions. Sexualdevelopment were as male on physical examinations. Cell culture wasapplied for chromosomal analysis. Slides were stained with GiemsaBanding Staining (GTG and 100 cells were totaly counted and karyotypingwere done with 15 metaphase. Chromosome with 46,XX karyotype. Casewere taken under consideration of congenital adrenel hyperplasia afterevalution of karyotype. Case were discussed according to by information ofpresents literatures.

  7. The nitrogen camera and the detection of concealed explosives

    Science.gov (United States)

    Trower, W. P.

    1993-06-01

    The nitrogen camera is an instrument based on a nuclear technique which is capable of imaging nitrogen concentrations with surface densities and amounts typical of currently concealed conventional explosives. Its signal is the totality of high-energy gamma rays detected in the multiscalar mode after the irradiation of a target pixel by a beam from a 50 MeV electron racetrack microtron. The sole interfering signal, from 13C, can be disentangled by two methods. Images of 180 2 × 2 cm 2 pixels, which are shown, eventually will be produced in ˜ 7.2 s. Progress towards an operational nitrogen camera is discussed.

  8. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap

    OpenAIRE

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-01-01

    Background Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. Methods From January 2010 to June 2014, we evaluated 12 patients (12–40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patien...

  9. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  10. Quantitative genetic insights into the coevolutionary dynamics of male and female genitalia.

    Science.gov (United States)

    Evans, Jonathan P; van Lieshout, Emile; Gasparini, Clelia

    2013-07-22

    The spectacular variability that typically characterizes male genital traits has largely been attributed to the role of sexual selection. Among the evolutionary mechanisms proposed to account for this diversity, two processes in particular have generated considerable interest. On the one hand, females may exploit postcopulatory mechanisms of selection to favour males with preferred genital traits (cryptic female choice; CFC), while on the other hand females may evolve structures or behaviours that mitigate the direct costs imposed by male genitalia (sexual conflict; SC). A critical but rarely explored assumption underlying both processes is that male and female reproductive traits coevolve, either via the classic Fisherian model of preference-trait coevolution (CFC) or through sexually antagonistic selection (SC). Here, we provide evidence for this prediction in the guppy (Poecilia reticulata), a polyandrous livebearing fish in which males transfer sperm internally to females via consensual and forced matings. Our results from a paternal half-sibling breeding design reveal substantial levels of additive genetic variation underlying male genital size and morphology-two traits known to predict mating success during non-consensual matings. Our subsequent finding that physically interacting female genital traits exhibit corresponding levels of genetic (co)variation reveals the potential intersexual coevolutionary dynamics of male and female genitalia, thereby fulfilling a fundamental assumption underlying CFC and SC theory.

  11. New Treatment on Bone Marrow Suppress after Chemotherapy of Female Genitalia Cancer

    Institute of Scientific and Technical Information of China (English)

    WU Yuepeng; MEI Zhuoxian; HE Ke; CHEN Wei

    2002-01-01

    Objective This study is to find valid medication to improve the condition of bone marrow suppress in a short period of time after chemotherapy of female genitalia cancer and to create a condition for second - time chemotherapy. Method Thirty- five cases using rhG- CSF were included in the experiment group while cases without rhG - CSF were set as control group. The wbc level in two groups are compared. Result The comparison shows that wbc resumes normal within 22 days in the experiment group while 35 days in the control group. The duration is 13 days less in the experiment group than the control group. From the 21st day after chemotherapy, patients in the experiment group need 2.5 days before another chemotherapy while 12 days for the control group. The average account of wbc in the experiment group is 9.5 × 109/L while 6.2 × 109/L in the control group. The variation in the comparison of 3 groups of data is statistically significant (P < 0.05). Conclusion The above results show that rhG - CSF has positive efficacy on the treatment of bone marrow suppress after chemotherapy of female genitalia cancer and helps the regular chemotherapy proceed smoothly.

  12. The cortical sensory representation of genitalia in women and men: a systematic review

    Directory of Open Access Journals (Sweden)

    Fadwa Cazala

    2015-03-01

    Full Text Available Background: Although genital sensations are an essential aspect of sexual behavior, the cortical somatosensory representation of genitalia in women and men remain poorly known and contradictory results have been reported. Objective: To conduct a systematic review of studies based on electrophysiological and functional neuroimaging studies, with the aim to identify insights brought by modern methods since the early descriptions of the sensory homunculus in the primary somatosensory cortex (SI. Results: The review supports the interpretation that there are two distinct representations of genital sensations in SI, one on the medial surface and the other on the lateral surface. In addition, the review suggests that the secondary somatosensory cortex and the posterior insula support a representation of the affective aspects of genital sensation. Conclusion: In view of the erogenous character of sensations originating in the genitalia, future studies on this topic should systematically assess qualitatively as well as quantitatively the sexually stimulating and/or sexually pleasurable characteristics of sensations felt by subjects in response to experimental stimuli.

  13. Development of the External Genitalia: Perspectives from the Spotted Hyena (Crocuta crocuta)

    Science.gov (United States)

    Cunha, Gerald R.; Risbridger, Gail; Wang, Hong; Place, Ned J.; Grumbach, Mel; Cunha, Tristan J.; Weldele, Mary; Conley, Al J.; Barcellos, Dale; Agarwal, Sanjana; Bhargava, Argun; Drea, Christine; Hammond, Geoffrey L.; Siiteri, Penti; Coscia, Elizabeth M.; McPhaul, Michael J; Baskin, Laurence S.; Glickman, Stephen E.

    2014-01-01

    This review/research paper summarizes data on development of the external genitalia of the spotted hyena, a fascinating mammal noted for extreme masculinization of the female external genitalia. The female spotted hyena is the only extant mammal that mates and gives birth through a pendulous penis-like clitoris. Our studies indicate that early formation of the phallus in both males and females is independent of androgens; indeed the phallus forms before the fetal testes or ovaries are capable of synthesizing androgens. Likewise, pre- and postnatal growth in length of the penis and clitoris is minimally affected by “androgen status”. Nonetheless, several internal morphologies, as well as external surface features of the phallus, are androgen-dependent and thus account for dimorphism between the penis and clitoris. Finally, estrogens play a critical role in penile and clitoral development, specifying the position of the urethral orifice, determining elasticity of the urethral meatus, and facilitating epithelial-epithelial fusion events required for proper formation of the distal urethra/urogenital sinus and prepuce. Accordingly, prenatal inhibition of estrogen synthesis via administration of letrozole (an aromatase inhibitor) leads to malformations of the glans as well as the prepuce (hypospadias). The effects of prenatal androgens, anti-androgens and impaired estrogen synthesis correlated with the tissue expression of androgen and estrogen receptors. PMID:24582573

  14. The cortical sensory representation of genitalia in women and men: a systematic review.

    Science.gov (United States)

    Cazala, Fadwa; Vienney, Nicolas; Stoléru, Serge

    2015-01-01

    Background : Although genital sensations are an essential aspect of sexual behavior, the cortical somatosensory representation of genitalia in women and men remain poorly known and contradictory results have been reported. Objective : To conduct a systematic review of studies based on electrophysiological and functional neuroimaging studies, with the aim to identify insights brought by modern methods since the early descriptions of the sensory homunculus in the primary somatosensory cortex (SI). Results : The review supports the interpretation that there are two distinct representations of genital sensations in SI, one on the medial surface and the other on the lateral surface. In addition, the review suggests that the secondary somatosensory cortex and the posterior insula support a representation of the affective aspects of genital sensation. Conclusion : In view of the erogenous character of sensations originating in the genitalia, future studies on this topic should systematically assess qualitatively as well as quantitatively the sexually stimulating and/or sexually pleasurable characteristics of sensations felt by subjects in response to experimental stimuli.

  15. Target Speaker Detection with Concealed EEG Around the Ear

    Science.gov (United States)

    Mirkovic, Bojana; Bleichner, Martin G.; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  16. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  17. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  18. Concealed target detection using augmented reality with SIRE radar

    Science.gov (United States)

    Saponaro, Philip; Kambhamettu, Chandra; Ranney, Kenneth; Sullivan, Anders

    2013-05-01

    The Synchronous Impulse Reconstruction (SIRE) forward-looking radar, developed by the U.S. Army Research Laboratory (ARL), can detect concealed targets using ultra-wideband synthetic aperture technology. The SIRE radar has been mounted on a Ford Expedition and combined with other sensors, including a pan/tilt/zoom camera, to test its capabilities of concealed target detection in a realistic environment. Augmented Reality (AR) can be used to combine the SIRE radar image with the live camera stream into one view, which provides the user with information that is quicker to assess and easier to understand than each separated. In this paper we present an AR system which utilizes a global positioning system (GPS) and inertial measurement unit (IMU) to overlay a SIRE radar image onto a live video stream. We describe a method for transforming 3D world points in the UTM coordinate system onto the video stream by calibrating for the intrinsic parameters of the camera. This calibration is performed offline to save computation time and achieve real time performance. Since the intrinsic parameters are affected by the zoom of the camera, we calibrate at eleven different zooms and interpolate. We show the results of a real time transformation of the SAR imagery onto the video stream. Finally, we quantify both the 2D error and 3D residue associated with our transformation and show that the amount of error is reasonable for our application.

  19. 3D laser imaging for concealed object identification

    Science.gov (United States)

    Berechet, Ion; Berginc, Gérard; Berechet, Stefan

    2014-09-01

    This paper deals with new optical non-conventional 3D laser imaging. Optical non-conventional imaging explores the advantages of laser imaging to form a three-dimensional image of the scene. 3D laser imaging can be used for threedimensional medical imaging, topography, surveillance, robotic vision because of ability to detect and recognize objects. In this paper, we present a 3D laser imaging for concealed object identification. The objective of this new 3D laser imaging is to provide the user a complete 3D reconstruction of the concealed object from available 2D data limited in number and with low representativeness. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different interfaces of the scene of interest and from experimental results. We show the global 3D reconstruction procedures capable to separate objects from foliage and reconstruct a threedimensional image of the considered object. In this paper, we present examples of reconstruction and completion of three-dimensional images and we analyse the different parameters of the identification process such as resolution, the scenario of camouflage, noise impact and lacunarity degree.

  20. Rhigognostis senilella (Zetterstedt, 1839) and R. marmorosella (Wocke, 1849): two valid species distinguishable in genitalia (Lepidoptera, Plutellidae).

    Science.gov (United States)

    Baraniak, Edward

    2016-02-26

    Rhigognostis senilella was described from Greenland over 150 years ago by Zetterstedt. Its historical range of distribution included also mountains in most of Europe. It was classified in Europe as a boreal-alpine zoogeographic element.  Analysis of the structure of the male and female genitalia over its historical range shows that two distinct species are present. The range of R. senilella (Zetterstedt, 1839) is limited to Greenland and Iceland, whereas the mountains of Europe are inhabited by R. marmorosella (Wocke, 1849). The paper includes keys to distinguish these two species, one based on external characters, another on male or female genitalia.

  1. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  2. 27 CFR 447.62 - False statements or concealment of facts.

    Science.gov (United States)

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  3. Concealed fault analysis based on the CT projection matrix

    Institute of Scientific and Technical Information of China (English)

    Yang Zhen; Yao Wenli; Ma Liuzhu; Wise Lucas

    2016-01-01

    This paper proposes the concept of projection curves based on the theory of CT image reconstruction to probe the internal structure of the working panel prior to formal mining of the working panel. As well as reducing costs, this method provides safe and efficient excavation of the working panel. According to the results of the numerical model and the actual working panel, the new method has been proven to be accurate in detecting the location of the fault that extends into the face. Concealed faults of the internal working panel, as well as the start and end points of the fault, can be detected by this method. Engineering practice has proven that the method is highly reliable, has a highly decisive impact on faults for coal mining, and can be used to guide the safe mining of the working panel.

  4. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  5. Self-envy and the concealment of inner resources.

    Science.gov (United States)

    Berman, A

    1999-01-01

    Self-envy refers to envy of one's own inner resources. This term is an adjunct to the psychodynamic understanding of developmental self-arrest, defined as deliberate and defensive impairment of one's own abilities and accomplishments and the concealment of inner resources. The article suggests possible explanations for the formation of self-envy, emphasizing the formation of envious object representations and the construction of a part of the personality based on these introjections. The effects of self-envy on patient therapist relations are also described, focusing on two particular manifestations: attachment to the therapist as a defense against self-envy and attacking the therapeutic contract as one of the patient's assets. Excerpts from a case study are included.

  6. A new strategy to conceal an object from electromagnetic wave

    CERN Document Server

    Luo, Yu; Chen, Hongsheng; Wu, Bae-Ian; Kong, Jin Au

    2008-01-01

    A new recipe for concealing objects from detection is suggested. Different with traditional cloak which deflects light around the core of the cloak to make the object inside invisible, our cloak guides the light to penetrate the core of the cloak but without striking some region of the cloak shell - the so called folded region. Full wave analytical calculation shows that this cloak will lead to a scattering enhancement instead of scattering reduction in contrast to the traditional cloak; the scattered field distribution can also be changed as if the scatterer is moved from its original position. Such interesting phenomenon indicates the proposed cloak can be used to disguise the true information of the object, e.g. the position, the size, etc, and further mislead the observer and avoid being detected.

  7. Comparative anatomy of the female genitalia of generic-level taxa in tribe Aedini (Diptera: Culicidae). Part XXXIII. Genus Lewnielsenius Reinert, Harbach and Kitching

    Science.gov (United States)

    A morphological analysis of the female genitalia of the species included in genus Lewnielsenius Reinert, Harbach and Kitching was conducted. The genitalia of the type species of the genus, Ln. muelleri (Dyar), are illustrated. Treatment of the genital morphology of the genus includes a detailed de...

  8. Comparative anatomy of the female genitalia of generic-level taxa in tribe Aedini (Diptera: Culicidae). Part XXVIII. Genus Luius Reinert, Harbach and Kitching.

    Science.gov (United States)

    A morphological analysis of the female genitalia of the species included in genus Luius Reinert, Harbach and Kitching was conducted. The genitalia of the type species of the genus, Lu. fengi (Edwards), are illustrated for the first time. Treatment of the genital morphology of the genus includes a ...

  9. Comparative anatomy of the female genitalia of generic-level taxa in tribe Aedini (Diptera: Culicidae). Part XXX. Genus Gilesius Reinert, Harbach and Kitching.

    Science.gov (United States)

    A morphological analysis of the female genitalia of species included in genus Gilesius Reinert, Harbach and Kitching was conducted. The genitalia of the type species of the genus, Gi. pulchriventer (Giles), are illustrated for the first time. Treatment of the genital morphology of the genus includ...

  10. Women with onset of epilepsy prior to marriage: disclose or conceal?

    Science.gov (United States)

    Santosh, Deetha; Kumar, T Santosh; Sarma, P Sankara; Radhakrishnan, Kurupath

    2007-05-01

    We inquired reasons for concealment/disclosure of the history of epilepsy during marriage negotiations and marriage outcomes of 82 consecutive women attending a tertiary referral center based epilepsy clinic in Kerala, southern India. At the time of marriage, 55% concealed and 45% disclosed the history of epilepsy. Majority of those who concealed admitted that they did so fearing breakup of marriage negotiations, and majority of those who disclosed did so to forestall the consequences after marriage of concealing. Compared to those who disclosed, the prevalence of divorce, separation and disturbed marriages were significantly higher among those who concealed. Honest prospective communication during marriage negotiations about epilepsy is important for preserving subsequent married life.

  11. Surgical management of ambiguous genitalia in infants and children: An SGPGI experience

    Directory of Open Access Journals (Sweden)

    Subodh Kumar Das

    2003-01-01

    Full Text Available Introduction: Assignment of a proper gender to a neonate born with ambiguous genitalia is a social emer-gency. Once a sex has been assigned the next critical step is performance, if needed, of a reconstructive procedure in a timely fashion. In an attempt to evaluate our experi-ence with this unique group of patients, we have retro-spectively reviewed the course of 31 children managed surgically at our institute between 1989 and 2000. Patients and Methods: This series consists of 16 geno-type females with congenital adrenal hyperplasia (CAH, 7 male pseudohermaphrodites, 5 children with mixed go-nadal dysgenesis (MGD, and 3 true hermaphrodites. All the 16 patients with CAH underwent vaginoplasty, and clitoral recession. Five of the male pseudohermaphrodites were raised as females. All of them underwent B/L gona-dectomy, and clitoral recession. Perineal vaginoplasty was done in 4 of these patients and I patient who was due for colo-vaginoplasty was lost to follow-up. 2 male pseudoher-maphrodites were raised as males. Both of them under-went B/L orchiopexy and hypospadias repair. Four of the 5 cases of MGD were given a female sex assignment and all 4 underwent gonadectomy due to high risk of gonado-blastoma. In the 5th patient a male gender assignment was given. There were 3 true hermaphrodites, 2 of whom were managed by clitoral recession and vaginoplasty. One pa-tient was diagnosed at the age of 15 years. This patient had been brought up as a male child and presented to us with the complaint of pain in the lower abdomen. Investigations revealed haematometra and haematocolpos and the patient had to undergo B/L salpingo-oophorectomy and hysterectomy. Results: The postoperative period in most of the pa-tients was uneventful except for 2 minor complications. The cosmetic results have been excellent. 2 patients were lost to follow-up. Follow-up in the rest of the patients ranged from 9 months to 6.3 years and all the patients were found well adjusted

  12. Legal, ethical, and human rights considerations for physicians treating children with atypical or ambiguous genitalia.

    Science.gov (United States)

    Greenberg, Julie A

    2017-06-01

    Some governments, human rights organizations, intersex organizations, and doctors have called for a moratorium on genital and gonadal surgeries for infants born with atypical or ambiguous genitalia. Moratorium supporters believe that the surgeries carry physical and emotional risks, the psychosocial benefits of these procedures have not been proven, and the surgeries violate the patients׳ fundamental human rights if they are performed before these patients can provide informed consent. Given these calls for a moratorium, treatment teams must determine how to treat their patients and how to counsel their patients׳ parents. This article examines the treatment teams׳ ethical and legal responsibilities and provides advice for treatment teams to follow that will protect their patients and their practices. Copyright © 2017. Published by Elsevier Inc.

  13. [The serum copper/serum iron ratio in malignant tumors of the female genitalia].

    Science.gov (United States)

    Maas, D H; Hinckers, H J

    1975-08-01

    Copper and iron in blood of 83 women with maligne tumors of the genitalia were regulary controled before, during and till 69 weeks after therapy. The relation between the copper/iron-ratio and the expansion and histology of the tumors, the success of the therapy and the incidence of a recurrence was checked for any significancy. Our results show the improtance of the ratio in the diagnosis and differentialdiagnosis of the ovarian-cancer and the corpus-uteri-cancer, and in the success-controll during tumor-therapy. In the group of the patients with collum-uteri-cancer we found a significant difference in the copper/iron-ratio of the patients with and without a recurrence during the controllperiod after therapy, which emphasizes the importance of this copper/iron-ratio.

  14. Notes on Neotropical Proconiini (Hemiptera: Cicadellidae: Cicadellinae: VII: First detailed description of the female genitalia of a Diestostemma species

    Directory of Open Access Journals (Sweden)

    Gabriel Mejdalani

    2010-10-01

    Full Text Available Diestostemma Amyot & Serville, 1843 is a diverse sharpshooter genus with 32 species. A description and illustrations of Diestostemma nasutum Schmidt, 1910 are provided. The species, previously known from Ecuador, is newly recorded from Colombia. Both the male and female genitalia are described for the first time. This is the first detailed description of the female genitalia of a Diestostemma species. Diestostemma nasutum can be distinguished from the other species of the genus by the following features of the aedeagus: shaft with the distal third distinctly curved dorsally; base of basiventral aedeagal process with a lobe directed anteriorly; and basiventral aedeagal process bifurcated on its basal portion. The style of D. nasutum, whose apical portion is broad, distinctly curved inward, and with the apex subtruncate, is also quite distinctive. We compared the female genitalia of D. nasutum with those of other Proconiini genera. Our results confirm the perception that the female genitalia in this tribe can be a source of useful taxonomic characters.

  15. Morphology of Mouse External Genitalia: Implications for a Role of Estrogen in Sexual Dimorphism of the Mouse Genital Tubercle

    Science.gov (United States)

    Yang, Jennifer H.; Menshenina, Julia; Cunha, Gerald R.; Place, Ned; Baskin, Laurence S.

    2012-01-01

    Purpose We examined the role of androgens and estrogens in mammalian sexual differentiation by morphological characterization of adult wt and mutant mouse external genitalia. We tested the hypothesis that external genitalia development depends on androgen and estrogen action. Materials and Methods We studied serial sections of the external genitalia of the CD-1 and C57BL6 wt strains of adult mice (Charles River Laboratories, Wilmington, Massachusetts). We recorded linear measurements of key structures in each specimen, including the urethra, erectile tissue, bone and cartilage. We used similar methodology to analyze mice mutant for estrogen receptor α (αERKO) and androgen receptor (XTfm/Y) (Jackson Laboratory, Bar Harbor, Maine). Results Morphology in XTfm/Y adult murine external genitalia was remarkably similar to that in wt females. Bone and clitoral length was similar in wt females and XTfm/Y mice. Conversely the αERKO clitoris was 59% longer and bone length in αERKO females was many-fold longer than that in female wt mice or XTfm/Y mutants. The αERKO clitoris contained cartilage, which is typical of the wt penis but never observed in the wt clitoris. Serum testosterone was not increased in female αERKO mice 10 days postnatally when sex differentiation occurs, suggesting that masculinization of the αERKO clitoris is not a function of androgen. Conclusions Masculinization of the αERKO clitoris suggests a role for estrogen in the development of female external genitalia. We propose that normal external genital development requires androgen and estrogen action. PMID:20728117

  16. Eliminating bias in randomized controlled trials: importance of allocation concealment and masking.

    Science.gov (United States)

    Viera, Anthony J; Bangdiwala, Shrikant I

    2007-02-01

    Randomization in randomized controlled trials involves more than generation of a random sequence by which to assign subjects. For randomization to be successfully implemented, the randomization sequence must be adequately protected (concealed) so that investigators, involved health care providers, and subjects are not aware of the upcoming assignment. The absence of adequate allocation concealment can lead to selection bias, one of the very problems that randomization was supposed to eliminate. Authors of reports of randomized trials should provide enough details on how allocation concealment was achieved so the reader can determine the likelihood of success. Fortunately, a plan of allocation concealment can always be incorporated into the design of a randomized trial. Certain methods minimize the risk of concealment failing more than others. Keeping knowledge of subjects' assignment after allocation from subjects, investigators/health care providers, or those assessing outcomes is referred to as masking (also known as blinding). The goal of masking is to prevent ascertainment bias. In contrast to allocation concealment, masking cannot always be incorporated into a randomized controlled trial. Both allocation concealment and masking add to the elimination of bias in randomized controlled trials.

  17. Prenatal diethylstilbestrol induces malformation of the external genitalia of male and female mice and persistent second-generation developmental abnormalities of the external genitalia in two mouse strains

    Science.gov (United States)

    Mahawong, Phitsanu; Sinclair, Adriane; Li, Yi; Schlomer, Bruce; Rodriguez, Esequiel; Max, Ferretti M.; Liu, Baomei; Baskin, Laurence S.; Cunha, Gerald R.

    2014-01-01

    Potential trans-generational influence of diethylstilbestrol (DES) exposure emerged with reports of effects in grandchildren of DES-treated pregnant women and of reproductive tract tumors in offspring of mice exposed in utero to DES. Accordingly, we examined the trans-generational influence of DES on development of external genitalia (ExG) and compared effects of in utero DES exposure in CD-1 and C57BL/6 mice injected with oil or DES every other day from gestational days 12 to 18. Mice were examined at birth, and on 5 to 120 days postnatal to evaluate ExG malformations. Of 23 adult (≥60 days) prenatally DES-exposed males, features indicative of urethral meatal hypospadias (see text for definitions) ranged from 18 to 100% in prenatally DES-exposed CD-1 males and 31 to 100% in prenatally DES-exposed C57BL/6 males. Thus, the strains differed in the incidence of male urethral hypospadias. Ninety-one percent of DES-exposed CD-1 females and 100% of DES-exposed C57BL/6 females had urethral-vaginal fistula. All DES-exposed CD-1 and C57BL/6 females lacked an os clitoris. None of the prenatally oil-treated CD-1 and C57BL/6 male and female mice had ExG malformations. For the second-generation study, 10 adult CD-1 males and females, from oil- and DES-exposed groups, respectively, were paired with untreated CD-1 mice for 30 days, and their offspring evaluated for ExG malformations. None of the F1 DES-treated females were fertile. Nine of 10 prenatally DES-exposed CD-1 males sired offspring with untreated females, producing 55 male and 42 female pups. Of the F2 DES-lineage adult males, 20% had exposed urethral flaps, a criterion of urethral meatal hypospadias. Five of 42 (11.9%) F2 DES lineage females had urethral-vaginal fistula. In contrast, all F2 oil-lineage males and all oil-lineage females were normal. Thus, prenatal DES exposure induces malformations of ExG in both sexes and strains of mice, and certain malformations are transmitted to the second-generation. PMID

  18. Male-female conflict and genitalia: failure to confirm predictions in insects and spiders.

    Science.gov (United States)

    Eberhard, William G

    2004-02-01

    Some recent models suggest a new role for evolutionary arms races between males and females in sexual selection. Female resistance to males is proposed to be driven by the direct advantage to the female of avoiding male-imposed reductions in the number of offspring she can produce, rather than by the indirect advantage of selecting among possible sires for her offspring, as in some traditional models of sexual selection by female choice. This article uses the massive but hitherto under-utilized taxonomic literature on genitalic evolution to test, in a two-step process, whether such new models of arms races between males and females have been responsible for rapid divergent evolution of male genitalia. The test revolves around the prediction that 'new arms races' are less likely to occur in species in which females are largely or completely protected from unwanted sexual attentions from males (e.g. species which mate in leks or in male swarms, in which males attract females from a distance, or in which females initiate contact by attracting males from a distance). The multiple possible mechanical functions of male genitalia are summarized, and functions of male genitalic structures in 43 species in 21 families of Diptera are compiled. Functions associated with intromission and insemination (e.g. seizing and positioning the female appropriately, pushing past possible barriers within the female, orienting within the female to achieve sperm transfer), which are unlikely to be involved in new arms races when females are protected, are shown to be common (> 50 % of documented cases). This information is then used to generate the new arms race prediction: differences in genitalic form among congeneric species in which females are protected should be less common than differences among congeneric species in which females are vulnerable to harassment by males. This prediction was tested using a sample of 361 genera of insects and spiders. The prediction clearly failed, even

  19. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-02

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  20. An event study on the concealment of the blending ratio of waste paper.

    Science.gov (United States)

    Yamaguchi, Keiko

    2009-05-01

    We conducted an event study on the concealment of the blending ratio of waste paper with virgin pulp in Japan. By investigating 10 companies in the paper industry between May 30, 2007 and January 18, 2008, we clearly show that stock prices of the relevant companies were affected by the news on the concealment of the blending ratio of waste paper. In addition, the impact of the second event was found to be greater than that of the first event. Therefore, the concealment of major companies negatively affects the stock prices of non-major companies, which did not conceal information during this period. Thus, bad news is negatively assessed by the market, and this influence has spread in the paper industry in general.

  1. The Effects of Concealing Academic Achievement Information on Adolescents’ Self-Concept

    National Research Council Canada - National Science Library

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    ... or not. Results showed that participants with low academic achievement in the concealing-achievement-information condition had higher levels of state self-esteem and more self-representation suppression...

  2. Living together apart: perceived concealment as a signal of exclusion in marital relationships.

    Science.gov (United States)

    Finkenauer, Catrin; Kerkhof, Peter; Righetti, Francesca; Branje, Susan

    2009-10-01

    This article examines how perceiving concealment in close relationships influences marital well-being. It suggests that the perception of concealment from a partner signals separateness from one's partner and contributes to feelings of perceived partner exclusion. These feelings of exclusion, in turn, should negatively affect relational quality. These predictions are tested in a prospective study among 199 newlywed couples. Results suggest that perceiving concealment reduced marital adjustment and trust and increased conflict over time. Importantly, change in perceived partner exclusion mediated these effects. This article demonstrates that the perception of concealment (a) has deleterious effects on relational well-being in the long run and (b) is harmful in part because it elicits feelings of exclusion.

  3. A del(X(p11 carrying SRY sequences in an infant with ambiguous genitalia

    Directory of Open Access Journals (Sweden)

    Abd El-Fatah S

    2006-04-01

    Full Text Available Abstract Background SRY (sex-determining region, Y is the gene responsible of gonadal differentiation in the male and it is essential for the regular development of male genitalia. Translocations involving the human sex chromosomes are rarely reported, however here we are reporting a very rare translocation of SRY gene to the q -arm of a deleted X chromosome. This finding was confirmed by cytogenetic, fluorescent in situ hybridization (FISH and polymerase chain reaction (PCR. Case presentation A 7-month infant was clinically diagnosed as an intersex case, with a phallus, labia majora and minora, a blind vagina and a male urethra. Neither uterus nor testes was detected by Ultrasonography. G-banding of his chromosomes showed 46,X,del(X(p11 and fluorescent in situ hybridization (FISH analysis showed a very small piece from the Y chromosome translocated to the q-arm of the del(X. Polymerase chain reaction (PCR analysis revealed the presence of material from the sex-determining region Y (SRY gene. Conclusion It is suggested that the phenotype of the patient was caused by activation of the deleted X chromosome with SRY translocation, which is responsible for gonadal differentiation.

  4. Surgical options in disorders of sex development (dsd) with ambiguous genitalia.

    Science.gov (United States)

    Vidal, Isabelle; Gorduza, Daniela Brindusa; Haraux, Elodie; Gay, Claire-Lise; Chatelain, Pierre; Nicolino, Marc; Mure, Pierre-Yves; Mouriquand, Pierre

    2010-04-01

    Disorders of sexual development (DSD) include three main groups of patients: (1) The virilised 46,XX DSD essentially represented by congenital adrenal hyperplasia (CAH) ; (2) The undervirilised 46,XY DSD essentially represented by hypospadias; and (3) the chromosomic jigsaws essentially represented by mixed gonadal dysgenesis. It is in this last group that gender assignment remains a difficult decision involving various indicators, which can be split into four categories: (1) the inside sex (i.e., genes, hormones and target tissues); (2) the outside sex (i.e., anatomy of genitalia including size of the genital tubercle, mullerian cavity and potential adult height of the patient); (3) the functional sex (i.e., potential sexuality and fertility); and (4) and the social sex (i.e., the cultural medium in which the child is brought up). The challenge is to outline the future individual identity of the child in the postnatal period using these indicators. Current evolutions of surgical techniques of 'feminisation' and 'masculinisation' are described as well as their outcomes.

  5. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  6. Long term follow-up of a child with ambiguous genitalia, mixed gonadal dysgenesis, and unusual mosaicism.

    Science.gov (United States)

    Ostrow, Vlady; De Luca, Francesco

    2009-09-01

    Mixed gonadal dysgenesis (MGD) is a condition of abnormal and asymmetrical gonadal development. This disorder is typically associated with 45,X/46,XY mosaicism; however, other karyotypes have been rarely reported. The phenotype characterizing MGD is highly variable, although in most cases ambiguous genitalia are found. In addition, many individuals with MGD exhibit stigmata of Turner's syndrome. We describe a patient with MGD, found to have a 45,X/47,XYY karyotype, with the majority of the cell lines being 47,XYY. To our knowledge, our report is the first to describe the long-term follow-up of a patient with ambiguous genitalia diagnosed at birth with 45,X/47,XYY mosaicism.

  7. Variations in the male genitalia of Aedes (Stegomyia Albopictus (Skuse from Chandigarh and its surrounding areas (Diptera: Culicidae

    Directory of Open Access Journals (Sweden)

    Sagandeep Kaur

    2014-09-01

    Full Text Available The Asian tiger mosquito Aedes albopictus is the most dominant species of subgenus Stegomyia and is medically important from the standpoint of transmitting wide range of human pathogens of deadly diseases like dengue, yellow fever and chikungunya. During present investigations, it has been observed that IX tergum in the male genitalia of Aedes albopictus varies greatly. It shows variations with respect to the presence or absence of lateral projections on the IX tergum, as well as in the shape and size of median and lateral projections. The shape of IX tergum in the male genitalia of Aedes species is of great taxonomic importance as it is a diagnostic character of the species. These variations have been observed both in natural populations collected from various breeding sites as well as in the adults reared in laboratory. The observed differences have not been noticed by any of the previous workers.

  8. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  9. [Abortion in unsafe conditions. Concealment, illegality, corruption and negligence].

    Science.gov (United States)

    Ortiz Ortega, A

    1993-01-01

    "Abortion practiced under conditions of risk" is a phrase used to refer to illegal abortion. The phrase does not highlight the disappearance of risk when legislation changes. Rather, it calls attention to the fact that legal restrictions significantly increase dangers while failing to discourage women determined to terminate pregnancies. The International Planned Parenthood Federation defines abortion under conditions of risk as the use of nonoptimal technology, lack of counseling and services to orient the woman's decision and provide postabortion counseling, and the limitation of freedom to make the decision. The phrase encompasses concealment, illegality, corruption, and negligence. It is designed to impose a reproductive health perspective in response to an unresolved social conflict. Steps have been developed to improve the situation of women undergoing abortion even without a change in its legal status. Such steps include training and purchase of equipment for treatment of incomplete abortions and development of counseling and family planning services. The central difficulty of abortion induced in conditions of risk derives from the laws imposing the need for secrecy. In Mexico, the abortion decision belongs to the government and the society, while individual absorb the consequences of the practice of abortion. Public decision making about abortion is dominated by the concept that the female has an obligation to carry any pregnancy to term. Women who interfere with male descendency and practice a sexuality distinct from reproduction are made to pay a price in health and emotional balance. Resolution of the problem of abortion will require new concepts in terms of legal status, public health issues, and the rights of women. The problem becomes more pressing as abortion becomes more common in a country anxious to advance in the demographic transition. Only a commitment to the reproductive health of women and the full development of their rights as citizens will

  10. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  11. The Functional Significance of Chiral Genitalia: Patterns of Asymmetry, Functional Morphology and Mating Success in the Praying Mantis Ciulfina baldersoni.

    Directory of Open Access Journals (Sweden)

    Gregory I Holwell

    Full Text Available Genital asymmetry is relatively common and widespread throughout the animal kingdom. The functional significance of genital asymmetry is however, poorly understood for most species. Male praying mantids of the genus Ciulfina are remarkable in possessing complex and directionally asymmetric genital phallomeres in some species, and chirally dimorphic/antisymmetric genitalia in others. Here we explore the chiral dimorphism in male genitalia of Ciulfina baldersoni which appear to exhibit genital antisymmetry. We test whether genital orientation influences mating success, copulation duration and the attachment duration of spermatophores. Additionally we investigate genital interactions between male and females using x-ray micro-computed tomography (micro-CT and scanning electron microscopy (SEM. Lastly we assess whether genital asymmetry is associated with non-genital morphological asymmetry of a range of traits. Our results highlight the complex functional morphology of genitalia in this praying mantis species and yet demonstrate no functional difference between dextral and sinistral morphs other than the direction of attachment with both morphs enjoying equal levels of mating success. Chiral morphs also did not strongly associate with any other forms of asymmetry. We therefore conclude that genital chirality in Ciulfina baldersoni is a likely case of antisymmetry with no functional significance to genital orientation, and is likely to be selectively neutral.

  12. Comparative anatomy of the female genitalia of generic-level taxa in tribe Aedini (Diptera: Culicidae). Part XXXVIII. Genus Petermattinglyius Reinert, Harbach and Kitching.

    Science.gov (United States)

    A comparative, morphological analysis of the female genitalia of species of the genus Petermattinglyius Reinert, Harbach and Kitching was conducted and a composite description is provided. Petermattinglyius is divided into two subgenera, Petermattinglyius and Aglaonotus Reinert, Harbach and Kitchin...

  13. Uniparental Disomy in Somatic Mosaicism 45,X/46,XY/46,XX Associated with Ambiguous Genitalia.

    Science.gov (United States)

    Serra, Alexandre; Denzer, Friederike; Hiort, Olaf; Barth, Thomas F; Henne-Bruns, Doris; Barbi, Gotthold; Rettenberger, Günther; Wabitsch, Martin; Just, Walter; Leriche, Clothilde

    2015-01-01

    Disorders of sex development (DSD) affect the development of chromosomal, gonadal and/or anatomical sex. We analyzed a patient with ambiguous genitalia aiming to correlate the genetic findings with the phenotype. Blood and tissue samples from a male patient with penoscrotal hypospadias were analyzed by immunohistochemistry, karyotyping and FISH. DNA was sequenced for the AR, SRY and DHH genes, and further 26 loci in different sex chromosomes were analyzed by MLPA. The gonosomal origin was evaluated by simple tandem repeat (STR) analysis and SNP array. Histopathology revealed a streak gonad, a fallopian tube and a rudimentary uterus, positive for placental alkaline phosphatase, cytokeratin-7 and c-kit, and negative for estrogen, androgen and progesterone receptors, alpha-inhibin, alpha-1-fetoprotein, β-hCG, and oct-4. Karyotyping showed a 45,X/46,XY mosaicism, yet FISH showed both 46,XX/46,XY mosaicism (gonad and urethral plate), 46,XX (uterus and tube) and 46,XY karyotypes (rudimentary testicular tissue). DNA sequencing revealed intact sequences in SOX9, WNT4, NR0B1, NR5A1, CYP21A2, SRY, AR, and DHH. STR analysis showed only one maternal allele for all X chromosome markers (uniparental isodisomy, UPD), with a weaker SRY signal and a 4:1 ratio in the X:Y signal. Our findings suggest that the observed complex DSD phenotype is the result of somatic gonosomal mosaicism and UPD despite a normal blood karyotype. The presence of UPD warrants adequate genetic counseling for the family and frequent, lifelong, preventive follow-up controls in the patient.

  14. How many more guns?: Estimating the effect of allowing licensed concealed handguns on a college campus.

    Science.gov (United States)

    Bouffard, Jeffrey A; Nobles, Matt R; Wells, William; Cavanaugh, Michael R

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased prevalence of concealed handguns would lead to increases in other negative consequences, such as accidental shootings. Little empirical research has examined the potential outcomes of such a policy change, nor has existing research examined the prerequisite issue of whether lifting these bans would result in substantial increases in the prevalence of concealed handguns among students. Using a sample of undergraduate classrooms selected from five academic buildings at a public university in Texas, this study examines the potential impact of lifting the concealed handgun ban on the likelihood that a given classroom would contain at least one legally carried handgun. Results reveal that the impact of potential policy changes in this area vary based on the building under consideration and the measure of potential handgun prevalence. Limitations of the study and implications for future research on the issue of concealed handgun carrying on college campuses are discussed.

  15. Drug-related deaths with evidence of intracorporeal drug concealment at autopsy: five case reports.

    Science.gov (United States)

    Wilcher, Glenn

    2011-12-01

    Intracorporeal concealment of illicit drugs is a rare observation at coronial autopsy examinations. The article reports 5 cases of accidental drug overdoses at the Westmead Coronial Morgue, Sydney New South Wales, over a 6-year period with evidence of intracorporeal drug concealment known as body packing or body stuffing. Three different forms of anatomic concealment of drugs are illustrated, Case 2 involving therapeutic medication in the form of glass ampoules for parenteral injection not previously reported. Three deaths were the result of acute toxicity due to polydrug abuse rather than as a consequence of the body packing behavior and rupture of the drug packaging, with the intracorporeal drug concealments an adjunct finding at the autopsy examinations. The cause of death in Case 3 was the direct result of acute cocaine intoxication due to rupture of drug packages in the rectum and mucosal absorption. The article details forensic sociological aspects of drug concealment and subcultural group human behavior that can assist in providing information for the initiation of investigations.

  16. Experiment and calculation on seismic behavior of RC composite core walls with concealed steel truss

    Institute of Scientific and Technical Information of China (English)

    Wanlin CAO; Weihua CHANG; Changjun ZHAO; Jianwei ZHANG

    2009-01-01

    To improve the seismic performance of reinforced concrete core walls, reinforced concrete com-posite core walls with concealed steel truss were proposed and systemically investigated. Two 1/6 scale core wall specimens, including a normal reinforced concrete core wall and a reinforced concrete composite core wall with concealed steel truss, were designed. The experimental study on seismic performance under cyclic loading was carried out. The load-carrying capacity, stiffness, ductility,hysteretic behavior and energy dissipation of the core walls were discussed. The test results showed that the seismic performance of core walls is improved greatly by the concealed steel truss. The calculated results were found to agree well with the actual measured ones.

  17. Real-time detection of concealed chemical hazards under ambient light conditions using Raman spectroscopy.

    Science.gov (United States)

    Cletus, Biju; Olds, William; Fredericks, Peter M; Jaatinen, Esa; Izake, Emad L

    2013-07-01

    Current concerns regarding terrorism and international crime highlight the need for new techniques for detecting unknown and hazardous substances. A novel Raman spectroscopy-based technique, spatially offset Raman spectroscopy (SORS), was recently devised for noninvasively probing the contents of diffusely scattering and opaque containers. Here, we demonstrate a modified portable SORS sensor for detecting concealed substances in-field under different background lighting conditions. Samples including explosive precursors, drugs, and an organophosphate insecticide (chemical warfare agent surrogate) were concealed inside diffusely scattering packaging including plastic, paper, and cloth. Measurements were carried out under incandescent and fluorescent light as well as under daylight to assess the suitability of the probe for different real-life conditions. In each case, it was possible to identify the substances against their reference Raman spectra in less than 1 min. The developed sensor has potential for rapid detection of concealed hazardous substances in airports, mail distribution centers, and customs checkpoints.

  18. Development and biological function of the female gonads and genitalia in IGF-I deficiency -- Laron syndrome as a model.

    Science.gov (United States)

    Laron, Zvi

    2006-01-01

    Laron syndrome (LS) or primary GH insensitivity is a unique human model to study the effects of congenital IGF-I deficiency. Within our cohort of 63 patients with LS, 15 female patients were regularly followed since birth or infancy, throughout puberty. We observed that they were short at birth, with small genitalia and gonads -- during puberty, developed delayed puberty but eventually reached between 16 and 19 1/2 years full sexual development. Reproduction is unaffected at a young adult age. It is concluded that IGF-I in concert with the sex hormones has a modulatory but not essential function on female sexual development and maturation.

  19. Error Concealment in Image Communication Using Edge Map Watermarking and Spatial Smoothing

    CERN Document Server

    Sodagari, Shabnam; Avanaki, Alireza Nasiri

    2010-01-01

    We propose a novel error concealment algorithm to be used at the receiver side of a lossy image transmission system. Our algorithm involves hiding the edge map of the original image at the transmitter within itself using a robust watermarking scheme. At the receiver, wherever a lost block is detected, the extracted edge information is used as border constraint for the spatial smoothing employing the intact neighboring blocks in order to conceal errors. Simulation results show the superiority of our technique over existing methods even in case of high packet loss ratios in the communication network.

  20. One-shot genitalia are not an evolutionary dead end - Regained male polygamy in a sperm limited spider species

    Directory of Open Access Journals (Sweden)

    Michalik Peter

    2011-07-01

    Full Text Available Abstract Background Monogynous mating systems with extremely low male mating rates have several independent evolutionary origins and are associated with drastic adaptations involving self-sacrifice, one-shot genitalia, genital damage, and termination of spermatogenesis immediately after maturation. The combination of such extreme traits likely restricts evolutionary potential perhaps up to the point of making low male mating rates irreversible and hence may constitute an evolutionary dead end. Here, we explore the case of a reversion to multiple mating from monogynous ancestry in golden orb-web spiders, Nephila senegalensis. Results Male multiple mating is regained by the loss of genital damage and sexual cannibalism but spermatogenesis is terminated with maturation, restricting males to a single loading of their secondary mating organs and a fixed supply of sperm. However, males re-use their mating organs and by experimentally mating males to many females, we show that the sperm supply is divided between copulations without reloading the pedipalps. Conclusion By portioning their precious sperm supply, males achieve an average mating rate of four females which effectively doubles the maximal mating rate of their ancestors. A heritage of one-shot genitalia does not completely restrict the potential to increase mating rates in Nephila although an upper limit is defined by the available sperm load. Future studies should now investigate how males use this potential in the field and identify selection pressures responsible for a reversal from monogynous to polygynous mating strategies.

  1. Rotation of the external genitalia in male Phlebotomine sand flies (Diptera, Psychodidae) in laboratory conditions and in captured specimens in Algarve, Portugal.

    Science.gov (United States)

    Ferrolho, J; Maia, C; Gomes, J; Alves-Pires, C; Cristóvão, J M; Campino, L; Afonso, M O

    2015-10-01

    Protozoal parasites are the causative agents of many insect-borne infectious diseases worldwide with impact on human and animal health. Leishmaniasis is caused by Leishmania spp. and transmitted by female Phlebotomine sand flies. In Portugal, two species of Phlebotomus (Larroussius), namely Phlebotomus perniciosus and Phlebotomus ariasi are the proven vectors of Leishmania infantum. Phlebotomine females and males rest and breed in the same sites; and these locations can be predicted according to the male external genitalia maturation. Therefore, this study aimed to determine the timing of complete rotation of the male external genitalia in laboratory conditions and to characterize the external genitalia rotation in field captured males to predict the male and female sand fly breeding and resting sites. This knowledge can be applied in the design and implementation of integrated sand fly control strategies targeting these sites.

  2. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    Science.gov (United States)

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  3. A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives

    Science.gov (United States)

    Karam, Mostafa A.; Meyer, Doug

    2011-06-01

    Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.

  4. Remembering or Concealing Mythical and Historical Events in the Cityscape of Early Roman Ephesus

    DEFF Research Database (Denmark)

    2015-01-01

    The cityscape of early Roman Ephesus incorporated and referenced narratives from the city’s past. But there are some gaps in the stories being told. Do these gaps in the narratives demonstrate an intentional concealment of segments of the city’s history? This article discusses the meanings of the...

  5. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    Science.gov (United States)

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…

  6. Digital image processing in the SECURE concealed-object detection system

    Science.gov (United States)

    Smith, Steven W.

    1993-04-01

    A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

  7. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    Science.gov (United States)

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  8. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    Science.gov (United States)

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…

  9. Novel, ERP-based, concealed information detection: Combining recognition-based and feedback-evoked ERPs.

    Science.gov (United States)

    Sai, Liyang; Lin, Xiaohong; Rosenfeld, J Peter; Sang, Biao; Hu, Xiaoqing; Fu, Genyue

    2016-02-01

    The present study introduced a novel variant of the concealed information test (CIT), called the feedback-CIT. By providing participants with feedbacks regarding their memory concealment performance during the CIT, we investigated the feedback-related neural activity underlying memory concealment. Participants acquired crime-relevant memories via enacting a lab crime, and were tested with the feedback-CIT while EEGs were recorded. We found that probes (e.g., crime-relevant memories) elicited larger recognition-P300s than irrelevants among guilty participants. Moreover, feedback-related negativity (FRN) and feedback-P300 could also discriminate probes from irrelevants among guilty participants. Both recognition- and feedback-ERPs were highly effective in distinguishing between guilty and innocent participants (recognition-P300: AUC=.73; FRN: AUC=.95; feedback-P300: AUC=.97). This study sheds new light on brain-based memory detection, such that feedback-related neural signals can be employed to detect concealed memories.

  10. Ego Identity, Social Anxiety, Social Support, and Self-Concealment in Lesbian, Gay, and Bisexual Individuals

    Science.gov (United States)

    Potoczniak, Daniel J.; Aldea, Mirela A.; DeBlaere, Cirleen

    2007-01-01

    This study examined a model in which the relationship between social anxiety and two dimensions of ego identity (commitment and exploration) was expected to be mediated by social support and self-concealment for a sample of lesbian, gay, and bisexual individuals (N=347). Statistically significant paths were found from social anxiety to social…

  11. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt;

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  12. A time period study on the efficiency of luminol in the detection of bloodstains concealed by paint on different surfaces.

    Science.gov (United States)

    Nagesh, Deepthi; Ghosh, Shayani

    2017-02-11

    Forensic Science is the application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system. It is a science which relies on physical evidence; one of the important physical evidences being blood. The purpose of this research was to determine the efficacy of luminol reagent in detecting bloodstains on different surfaces, concealed by multiple layers of paint, over a period of time and also to compare the intensities of chemiluminescence exhibited by them. In this study, dry wall, wooden planks and metal surfaces were identified as commonly encountered surfaces at crime scenes and hence 25 of each surface were simulated and blood was spattered, which were then concealed by progressive layers of paint specific to each surface. Thereafter, each surface was critically observed for the intensity of chemiluminescence, following the application of luminol and the results were documented as photographs. The research was conducted for duration of 50 days, in order to study the effect of ageing of concealment upon detection of bloodstains using luminol. Varying intensities of chemiluminescence were displayed by all the three simulated surfaces deposited with paint over bloodstains up to three layers of concealment, depending on the nature of the surface which were captured using photography. The highest intensity of chemiluminescence was shown by concealed bloodstains on dry wall and metal surfaces, despite the number of layers of concealment. However, an increase in the number of layers of concealment produced a significant decrease in the intensity of chemiluminescenece displayed by the bloodstains concealed by paint upon reacting with luminol on metal sheets, which was not found to be uniform and consistent on the other surfaces. These findings highlight the fact that bloodstains concealed by paint could be effectively detected by luminol reagent, despite the nature and ageing of concealment and thereby provide a lead to

  13. Description of the male genitalia of Belminus rugulosus Stål and Belminus corredori Galvão & Angulo, and comments on the holotype of Parabelminus yurupucu Lent & Wygodzinsky (Hemiptera: Heteroptera: Reduviidae: Triatominae: Bolboderini).

    Science.gov (United States)

    Gil-Santana, Hélcio R; Galvão, Cleber

    2013-12-13

    The male genitalia of Belminus rugulosus Stål and Belminus corredori Galvão & Angulo are described and illustrated for the first time. Comments on the holotype of Parabelminus yurupucu Lent & Wygodzinsky are presented (Hemiptera: Heteroptera: Reduviidae: Triatominae: Bolboderini). A discussion on previous data in the literature on male genitalia of species of Belminus Stål is provided.

  14. Morphology of the external genitalia of the adult male and female mice as an endpoint of sex differentiation

    Science.gov (United States)

    Weiss, Dana A.; Rodriguez, Esequiel; Cunha, Tristan; Menshenina, Julia; Barcellos, Dale; Chan, Lok Yun; Risbridger, Gail; Baskin, Laurence; Cunha, Gerald

    2013-01-01

    Adult external genitalia (ExG) are the endpoints of normal sex differentiation. Detailed morphometric analysis and comparison of adult mouse ExG has revealed 10 homologous features distinguishing the penis and clitoris that define masculine vs. feminine sex differentiation. These features have enabled the construction of a simple metric to evaluate various intersex conditions in mutant or hormonally manipulated mice. This review focuses on the morphology of the adult mouse penis and clitoris through detailed analysis of histologic sections, scanning electron microscopy, and three-dimensional reconstruction. We also present previous results from evaluation of “non-traditional” mammals, such as the spotted hyena and wallaby to demonstrate the complex process of sex differentiation that involves not only androgen-dependent processes, but also estrogen-dependent and hormone-independent mechanisms. PMID:21893161

  15. Evulvalution: the portrayal of women's external genitalia and physique across time and the current barbie doll ideals.

    Science.gov (United States)

    Schick, Vanessa R; Rima, Brandi N; Calabrese, Sarah K

    2011-01-01

    Media images of the female body commonly represent reigning appearance ideals of the era in which they are published. To date, limited documentation of the genital appearance ideals in mainstream media exists. Analysis 1 sought to describe genital appearance ideals (i.e., mons pubis and labia majora visibility, labia minora size and color, and pubic hair style) and general physique ideals (i.e., hip, waist, and bust size, height, weight, and body mass index [BMI]) across time based on 647 Playboy Magazine centerfolds published between 1953 and 2007. Analysis 2 focused exclusively on the genital appearance ideals embodied by models in 185 Playboy photographs published between 2007 and 2008. Taken together, results suggest the perpetuation of a "Barbie Doll" ideal characterized by a low BMI, narrow hips, a prominent bust, and hairless, undefined genitalia resembling those of a prepubescent female.

  16. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  17. A Novel Technique of Error Concealment Method Selection in Texture Images Using ALBP Classifier

    Directory of Open Access Journals (Sweden)

    Z. Tothova

    2010-06-01

    Full Text Available There are many error concealment techniques for image processing. In the paper, the focus is on restoration of image with missing blocks or macroblocks. Different methods can be optimal for different kinds of images. In recent years, great attention was dedicated to textures, and specific methods were developed for their processing. Many of them use classification of textures as an integral part. It is also of an advantage to know the texture classification to select the best restoration technique. In the paper, selection based on texture classification with advanced local binary patterns and spatial distribution of dominant patterns is proposed. It is shown, that for classified textures, optimal error concealment method can be selected from predefined ones, resulting then in better restoration. For testing, three methods of extrapolation and texture synthesis were used.

  18. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  19. Robust spatio-temporal error concealment for packet- lossy H.264 video transmission

    Institute of Scientific and Technical Information of China (English)

    LIAO Ning; YAN Dan; QUAN Zi-yi; MEN Ai-dong

    2006-01-01

    In this article, a spatio-temporal post-processing error concealment algorithm designed initially for a H. 264video-streaming scheme over packet-lossy networks has been presented. It aims at optimizing subjective quality of restored video and the conventional objective metric, peak signal-to-noise ratio (PSNR), as well, under the constraints of low delay and computational complexity, which are critical to real-time applications and portable devices having limited resources.Specifically, it takes into consideration physical property of motion to achieve more meaningful perceptual video quality.Further, a content-adaptive bilinear spatial interpolation approach and a temporal error concealment approach are combined under a unified boundary match criterion based on texture and motion activity analysis. Extensive experiments have demonstrated that the proposal not only result in better reconstruction, objectively and subjectively, than the reference software model benchmark, but also results in better robustness to different video sequences.

  20. A mock terrorism application of the P300-based concealed information test.

    Science.gov (United States)

    Meixner, John B; Rosenfeld, J Peter

    2011-02-01

    Previous studies examining the P300-based concealed information test typically tested for mock crime or autobiographical details, but no studies have used this test in a counterterrorism scenario. Subjects in the present study covertly planned a mock terrorist attack on a major city. They were then given three separate blocks of concealed information testing, examining for knowledge of the location, method, and date of the planned terrorist attack, using the Complex Trial Protocol (Rosenfeld et al., 2008). With prior knowledge of the probe items, we detected 12/12 guilty subjects as having knowledge of the planned terrorist attack with no false positives among 12 innocent subjects. Additionally, we were able to identify 10/12 subjects and among them 20/30 crime-related details with no false positives using restricted a priori knowledge of the crime details, suggesting that the protocol could potentially identify future terrorist activity.

  1. Detection of concealed information by P3 and frontal EEG asymmetry.

    Science.gov (United States)

    Matsuda, Izumi; Nittono, Hiroshi; Allen, John J B

    2013-03-14

    Psychophysiological detection of deception has seen increased attention in both research and applied settings. In this field, the most scientifically validated paradigm is the Concealed Information Test (CIT). The CIT does not directly deal with whether a participant is lying, but examines whether a participant recognizes a critical relevant detail, inferred by differences in physiological responses between critical and non-critical items. Although event-related potential (ERP) approaches to the CIT have shown high accuracy, a combination of measures might improve the test's performance. We thus assessed whether a new CIT index, frontal EEG asymmetry that is supposed to reflect differences in approach/withdrawal motivation, would prove useful. Nineteen participants were asked to steal one item in a mock crime, and were then administered two CITs while concealing the stolen item. One CIT included the stolen item (i.e., guilty condition), whereas the other CIT did not (i.e., innocent condition). In the guilty condition, the concealed stolen item elicited greater relative left frontal alpha activity (indicative of relative right frontal cortical activity) as compared to the other items, suggesting that the recognition of the concealed item might have induced withdrawal motivation. Although the discrimination between guilty and innocent conditions by the asymmetry score alone was not as good as that by the ERP P3 index, combining the asymmetry score and P3 improved the detection performance significantly. The results suggest that the frontal EEG asymmetry can be used as a new measure in the CIT that provides additional information beyond that captured by the traditional ERP index.

  2. Gambling on debt:problem gamblers strategies for concealing deviant identities

    OpenAIRE

    Downs, Carolyn

    2015-01-01

    Problem gamblers are not easy to identify, they do not overdose and present at hospital, they are not visibly drunk in the way people abusing alcohol might be. Thus problem gambling has been labelled ‘the hidden addiction’ (Ladoucer, 2004) a term which also illustrates how problem gamblers become adept at concealing their behaviour; that is, protecting their deviant identities and normalising their actions. Impacts from problem gambling on the wider family and community include the loss of ac...

  3. ARPA/NIJ/Rome Laboratory concealed weapon detection program: an overview

    Science.gov (United States)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.

    1996-06-01

    Recent advances in passive and active imaging and non- imaging sensor technology offer the potential to detect weapons that are concealed beneath a person's clothing. Sensors that are discussed in this paper are characterized as either non-imaging or imaging. Non-imaging sensors include wide band radar and portal devices such as metal detectors. In general the strength of non-imaging sensors rest with the fact that they are generally inexpensive and can rapidly perform bulk separation between regions where persons are likely to be carrying concealed weapons and those regions that are likely to contain persons who are unarmed. The bulk process is typically accomplished at the expense of false alarm rate. Millimeter-wave (MMW), microwave, x-ray, acoustic, magnetic, and infrared (IR) imaging sensor technologies provide with greater certainty the means to isolate persons within a crowd that are carrying concealed weapons and to identify the weapon type. The increased certainty associated with imaging sensors is accomplished at the expense of cost and bulk surveillance of the crowd. CWD technologies have a variety of military and civilian applications. This technology focus area addresses specific military needs under the Defense Advanced Research Projects Agency's (DARPA) operations other than war/law enforcement (OOTW/LE). Additionally, this technology has numerous civilian law enforcement applications that are being investigated under the National Institute of Justice's (NIJ) Concealed Weapons Detection program. This paper discusses the wide variety of sensors that might be employed in support of a typical scenario, the strengths and weaknesses of each of the sensors relative to the given scenario, and how CWD breadboards will be tested to determine the optimal CWD application. It rapidly becomes apparent that no single sensor will completely satisfy the CWD mission necessitating the fusion of two or more of these sensors.

  4. An Improved Motion JPEG2000 Decoder for Error Concealment of Segmentation Symbol Faults

    Directory of Open Access Journals (Sweden)

    Mahmoud Reza Hashemi

    2008-03-01

    Full Text Available The motion JPEG2000 (MJP2 video coding standard uses intraframe compression and provides practical features such as fast coding, easy editing, and error robustness. Error robustness and concealment are some of the crucial requirements of any decoder in error prone applications. In this paper, a new error concealment method for MJP2 decoder has been proposed. The proposed method exploits the remaining temporal redundancies within the MJP2 coded video sequences for error concealment. The realized MJP2 decoder is able to detect and remove the artifacts produced by highly damaged bit planes that were not detected by the segmentation symbol, one of the error resilience tools in MJP2. Simulation results indicate that the proposed decoder can effectively remove such artifacts in the decoded erroneous MJP2 bit streams and improve the PSNR of the corrupted frames by up to 6.8 dB. An average of 0.2 dB improvement has been observed over a relatively large number of test cases and various error rates.

  5. An Improved Motion JPEG2000 Decoder for Error Concealment of Segmentation Symbol Faults

    Directory of Open Access Journals (Sweden)

    Hashemi MahmoudReza

    2008-01-01

    Full Text Available The motion JPEG2000 (MJP2 video coding standard uses intraframe compression and provides practical features such as fast coding, easy editing, and error robustness. Error robustness and concealment are some of the crucial requirements of any decoder in error prone applications. In this paper, a new error concealment method for MJP2 decoder has been proposed. The proposed method exploits the remaining temporal redundancies within the MJP2 coded video sequences for error concealment. The realized MJP2 decoder is able to detect and remove the artifacts produced by highly damaged bit planes that were not detected by the segmentation symbol, one of the error resilience tools in MJP2. Simulation results indicate that the proposed decoder can effectively remove such artifacts in the decoded erroneous MJP2 bit streams and improve the PSNR of the corrupted frames by up to 6.8 dB. An average of 0.2 dB improvement has been observed over a relatively large number of test cases and various error rates.

  6. Network-aware perceptual error concealment method for H.264 video with side information

    Institute of Scientific and Technical Information of China (English)

    MA Han-jie; CHEN Yao-wu

    2010-01-01

    In order to improve the video quality of transmission with data loss,a spatial and temporal error concealment method was proposed,which considered both the state information of the network and the perceptual weight of the video content.The proposed method dynamically changed the reliability weight of the neighboring macroblock,which was used to conceal the lost macroblocks according to the packet loss rate of the current channel state.The perceptual weight map was utilized as side information to do weighted pixel interpolation and side-match based motion compensation for spatial and temporal error concealment,respectively.And the perceptual weight of the neighboring macroblocks was adaptively modified according to the perceptual weight of the lost macroblocks.Compared with the method used in H.264 joint model,experiment results show that the proposed method performs well both in subjective video quality and objective video quality,and increases the average peak signal-to-noise ratio(PSNR)of the whole frame by about 0.4 dB when the video bitstreams are transmitted with packets loss.

  7. Hydrogeological Studies to Identify the Trend of Concealed Section of the North Tabriz Fault (Iran).

    Science.gov (United States)

    Rajabpour, Hossein; Vaezihir, Abdorreza

    2017-05-01

    The North Tabriz Fault (NTF) is the predominant regional-scale tectonic structure in the northwest of Iran. In the east side of the city of Tabriz, a portion of the fault trend has been completely concealed by recent sediments and urbanization. In this paper, some hydrogeological methods are used to locate the concealed sector. As is clear from the pumping tests results, despite the fact that the northern observation wells were closer to the pumping wells than the southern ones, they have not been affected by pumping. Conversely, all southern wells were affected by pumping and displayed decline of the water table. In addition, obvious differences in groundwater levels combined with clear differences in groundwater quality within a short distance across the probable fault trend are sufficient reasons for the presence of the fault that behaves as a barrier to groundwater lateral flows. Significant change in the elevation of the bedrock base of the aquifer over less than 200 m suggests that the fault has near vertical dip. These results indicate that the inferred trend of the NTF closely conforms to its actual trend. Therefore, the hydrogeological studies can be complementary tools to determine the position and trend of concealed faults. © 2016, National Ground Water Association.

  8. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

    Directory of Open Access Journals (Sweden)

    Peng Foong Ho

    2014-01-01

    Full Text Available Traditionally, picture-based password systems employ password objects (pictures/icons/symbols as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user’s actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set’s input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user’s actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.

  9. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  10. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Clothing adjustments for concealed soft body armor during moderate physical exertion.

    Science.gov (United States)

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2015-01-01

    Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA.

  12. [The use of restorative medicine technologies for the rehabilitation of the patients presenting with endometriosis of external genitalia].

    Science.gov (United States)

    Makarenko, L V; Krutova, V A; Gordon, K V

    2012-01-01

    This paper reports the results of analysis of the psycho-emotional status and pain syndrome in the women presenting with endometriosis of external genitalia treated with a combination of hormonal preparations and balneotherapy. A total of 216 infertile patients were involved in the study. The duration of the infertility period varied from 1.5 to 19 years. All the patients underwent surgical intervention. The influence of rehabilitative therapy on the quantitative vital indices (psycho-emotional adaptation to the social environment and pain intensity) was estimated before and after the treatment. The patients were divided into 3 groups. Those of group 1 received an oral contraceptive (30 mcg of ethinylestradiol plus 2 mg dienogest) as a continuous three-cycle course (63 tablets) followed by its discontinuation for the 7 day menstrual period and the final three-cycle course (total duration of therapy 6 months). The patients of group 2 were treated with injections of agonists of gonadotropin releasing hormone (GnRH) at a dose of 3.75 mg once every 4 weeks (total duration 6 months). In group 3, the injections of GnRH agonists (3.75 mg once every 4 weeks, total duration 6 months) were combined with a course of balneotherapy using radon. All the three rehabilitative modalities produced a well-apparent positive effect. Chronic pelvic pain before treatment was reported by 90,3% of the patients. After the treatment, the number of such women in groups 1, 2, and 3 decreased to 20,8%, 12,5%, and 30,6% respectively Dyspareunia in the pre-treatment period was diagnosed in 66,7% of the patients. After treatment, this pathology persisted only in 23,6%, 18,1%, and 31,9% of the patients in groups 1, 2, and 3 respectively. Psycho-emotional disorders before treatment were documented in 90,3% of the patients compared with 27,8%, 25%, and 30,6% after therapy. It is concluded that all the three therapeutic modalities markedly improved health conditions of the patients presenting with

  13. Morphology of the larvae, male genitalia and DNA sequences of Anopheles (Kerteszia pholidotus (Diptera: Culicidae from Colombia

    Directory of Open Access Journals (Sweden)

    Jesús Eduardo Escovar

    2014-07-01

    Full Text Available Since 1984, Anopheles (Kerteszia lepidotus has been considered a mosquito species that is involved in the transmission of malaria in Colombia, after having been incriminated as such with epidemiological evidence from a malaria outbreak in Cunday-Villarrica, Tolima. Subsequent morphological analyses of females captured in the same place and at the time of the outbreak showed that the species responsible for the transmission was not An. lepidotus, but rather Anopheles pholidotus. However, the associated morphological stages and DNA sequences of An. pholidotus from the foci of Cunday-Villarrica had not been analysed. Using samples that were caught recently from the outbreak region, the purpose of this study was to provide updated and additional information by analysing the morphology of female mosquitoes, the genitalia of male mosquitoes and fourth instar larvae of An. pholidotus, which was confirmed with DNA sequences of cytochrome oxidase I and rDNA internal transcribed spacer. A total of 1,596 adult females were collected in addition to 37 larval collections in bromeliads. Furthermore, 141 adult females, which were captured from the same area in the years 1981-1982, were analysed morphologically. Ninety-five DNA sequences were analysed for this study. Morphological and molecular analyses showed that the species present in this region corresponds to An. pholidotus. Given the absence of An. lepidotus, even in recent years, we consider that the species of mosquitoes that was previously incriminated as the malaria vector during the outbreak was indeed An. pholidotus, thus ending the controversy.

  14. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  15. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    Science.gov (United States)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  16. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    Science.gov (United States)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  17. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    Science.gov (United States)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  18. [Genitalia of three species of Heilipus Germar (Coleoptera: Curculionidae) that damage avocado fruits (Persea americana Mill.) in Mexico and Costa Rica].

    Science.gov (United States)

    Castañeda-Vildózola, Alvaro; Valdez-Carrasco, Jorge; Equihua-Martínez, Armando; González-Hernández, Héctor; Romero-Nápoles, Jesús; Solís-Aguilar, Juan F; Ramírez-Alarcón, Samuel

    2007-01-01

    The male and female genitaliae of three species of the genus Heilipus Germar (H. lauri Boheman, H. pittieri Barber and H. trifasciatus Fabricius) that damage avocado fruits (Persea americana Mill.) in Mexico and Costa Rica are described and illustrated. The aedeagus, spiculum gastrale, styli of 8th sternite are different in each one of the three species studied and can be used for specific identification.

  19. Error Concealment Based on Matching-Principles in MPEG-2 Image

    Institute of Scientific and Technical Information of China (English)

    HAOLuguo; WANGZhaohua; GUOHui; SUHansong

    2004-01-01

    The MPEG-2 compression algorithm is very sensitive to transmission errors due to the use of variable-length coding. Any errors can lead to noticeable degradation of image quality seriously, so that in part or entire slice information is lost until the next resynchronization point is reached. Error concealment (EC) methods offer one way of dealing with this problem. In this paper,two new algorithms, namely spatial EC based on edgematching and temporal EC based on block-matching, are presented to reconstruct the corrupted regions. According to the simulation results of experiments, the proposed methods can recover the high-quality MPEG-2 images.

  20. Concealing the Level-3 features of Fingerprint in a Facial Image

    Directory of Open Access Journals (Sweden)

    Dr.R.Seshadri,

    2010-11-01

    Full Text Available individual based on their physical, chemical and behavioral characteristics of the person. Biometrics is increasingly being used for authentication and protection purposes and this has generated considerable interest from many parts of the information technology people. In this paper we proposed facial image Watermarking methods that can embedded fingerprint level-3 features information into host facial images. This scheme has the advantage that in addition to facial matching, the recovered fingerprint level-3 features during the decoding can be used to establish the authentication. Here the proposed system concealing of vital information human being for identification and at the same time the system protect themselves fromattackers.

  1. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  2. CHIM-geoelectrochemical method in search of concealed mineralisation in China and Australia

    Institute of Scientific and Technical Information of China (English)

    LUO Xianrong; HOU Baohong; WEN Meilanna; ZENG Nanshi; John Keeling; Roger Fidler; Adrian Fabris

    2008-01-01

    A version of the geoelectrochemical prospecting technique developed in China was demonstrated in Chi-na and Australia to test its suitability under both Chinese and Australian conditions. This paper briefly describes the mechanism and effectiveness of the technique applied to search of concealed mineralisation through regolith cover, based on both experimental and field tests. This paer deals with three main aspects of the method: a) how metallic ions are released from orebodies by electrochemical dissolution; b) how these ions migrate to the collector and are deposited as elements by electrochemical extraction in the presence of an electric field; and c) the effectiveness of the method illustrated by some case studies.

  3. SPECIES ISOLATION, GENITAL MECHANICS, AND THE EVOLUTION OF SPECIES-SPECIFIC GENITALIA IN THREE SPECIES OF MACRODACTYLUS BEETLES (COLEOPTERA, SCARABEIDAE, MELOLONTHINAE).

    Science.gov (United States)

    Eberhard, William G

    1992-12-01

    The question asked was why male genitalic structures have diverged in three syntopic species of Macrodactylus beetles. Four hypotheses were evaluated: 1. The ways in which male genitalia mesh with internal female structures indicate that selection for species isolation via mechanical exclusion ("lock and key") is unlikely to explain the genitalic differences. 2. The specific mate recognition hypothesis also clearly fails to explain genitalic differences due to the implausibility of postulated environmental effects on genitalia, and lack of postulated coevolution of male and female morphologies. 3. Selection for species isolation via differences in genitalic stimulation (sensory lock and key) is unlikely due to relatively infrequent cross-specific pair formation and intromission in the field, and "excessive" numbers of species-specific genitalic structures and male courtship behavior patterns which nevertheless occasionally fail. It also fails to explain the frequent failure of intraspecific copulations to result in sperm transfer. This hypothesis cannot, however, be rejected as confidently as the previous hypotheses. 4. Conditions under which sexual selection by cryptic female choice could take place are common. Females frequently exercise their ability to prevent sperm transfer by conspecific males even after intromission has occurred, and females generally mate repeatedly, probably with different males. Males behave as if cryptic female choice is occurring, courting assiduously while their genitalia are within the female. Sexual selection by female choice could thus contribute to the divergence in genitalic structures. © 1992 The Society for the Study of Evolution.

  4. Effect of breeding activity on the microflora of the external genitalia and in the semen of stallions, and the relationship between micro-organisms on the skin and on the external genitalia.

    Science.gov (United States)

    Guimarães, T; Miranda, C; Pinto, M; Silva, E; Damásio, L; Costa, A L; Correia, M J; Duarte, J C; Cosinha, C; Lopes, G; Thompson, G; Rocha, A

    2014-12-01

    A possible role of breeding activities in the composition of the microbial population in stallions' external genitalia (EG) and the relationship between micro-organisms colonizing the skin of the abdomen and the ones colonizing the EG have not been studied. In experiment 1, EG microbiological samples were collected from 41 stallions used for both natural cover and semen collection (BST) and from 18 non-breeding stallions (NBST). A higher (p micro-organisms isolated from the EG were present in semen, albeit with a numerically lower prevalence. In 7 stallions, six microbial species isolated from semen were absent from the EG cultures, suggesting contamination by the operator. In experiment 3, a numerically higher number of micro-organism species was isolated from the EG of 31 stallions, than from their skin of the ventral abdomen in contact with the penis or from the skin of the thorax. With the sole exception of Escherichia coli, potentially pathogenic bacteria were only isolated from the EG but not from the skin. Results suggest that breeding activity increased the number of species colonizing the EG; most species isolated from the EG were also found in semen even if with a lower frequency, and additional semen contamination seemed to occur during its manipulation. Many micro-organism species of the skin were also isolated from the penis, but independently of being or not in contact with the penis, skin did not seem to provide an adequate environment for the growth of potentially pathogenic bacteria that were isolated from EG, with the sole exception for E. coli.

  5. Patients' Priorities Regarding Female-to-Male Gender Affirmation Surgery of the Genitalia-A Pilot Study of 47 Patients in Sweden.

    Science.gov (United States)

    Jacobsson, Josephine; Andréasson, My; Kölby, Lars; Elander, Anna; Selvaggi, Gennaro

    2017-06-01

    No surgical technique is reported to be the best option for gender-affirmation surgery (GAS) of the genitalia in transmen. Although patients' preferences are central when choosing a surgical technique, no studies have evaluated this factor. To investigate transmen's priorities and preferences regarding GAS of the genitalia. From November 2015 to March 2016, 54 transmen with the diagnosis of gender dysphoria who were referred to Sahlgrenska University Hospital for discussion of therapeutic steps (surgery and hormonal treatments) were asked to complete a questionnaire on different attributes achievable with GAS, such as sexual and urinary function and appearance. Forty-seven patients (87%) completed the questionnaire. Age ranged from 18 to 52 years (mean = 26 years, SD = 7.4 years). At the time of interview, no patient had undergone GAS of the genitalia. Answers to completed questionnaires. Seventy-six percent of patients identified themselves as male, and 24% wrote other terms such as "mostly male," "inter-gender" and "non-binary." Gender identity had a significant impact on patients' preferences for two questions: the importance of vaginal removal and the importance of having a penis that would be passable in places such as male dressing rooms. These items were more important to patients identifying themselves as male. The most important attributes requested were preserved orgasm ability and tactile sensation. The least important attribute was removal of the vagina, followed by having a penis of human material, minimal scarring, and size. The ability to urinate while standing was considered a high priority by some and a low priority by others. All answers ranged from "unimportant" to "imperative." This series of patients demonstrates a considerable heterogeneity among transmen in their gender identity and preferences regarding GAS of the genitalia, which supports the need for several techniques. Patients must be accurately informed on the different techniques and

  6. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (rs = -0.23, P = 0.049), MCS (rs = -0.24, P = 0.04) and RAID (rs = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  7. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    Science.gov (United States)

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P penis. PMID:27622092

  8. Ultra wide band millimeter wave holographic ``3-D`` imaging of concealed targets on mannequins

    Energy Technology Data Exchange (ETDEWEB)

    Collins, H.D.; Hall, T.E.; Gribble, R.P. [Pacific Northwest Lab., Richland, WA (United States). Acoustics & Electromagnetic Imaging Group

    1994-08-01

    Ultra wide band (chirp frequency) millimeter wave ``3-D`` holography is a unique technique for imaging concealed targets on human subjects with extremely high lateral and depth resolution. Recent ``3-D`` holographic images of full size mannequins with concealed weapons illustrate the efficacy of this technique for airport security. A chirp frequency (24 GHz to 40 GHz) holographic system was used to construct extremely high resolution images (optical quality) using polyrod antenna in a bi-static configuration using an x-y scanner. Millimeter wave chirp frequency holography can be simply described as a multi-frequency detection and imaging technique where the target`s reflected signals are decomposed into discrete frequency holograms and reconstructed into a single composite ``3-D`` image. The implementation of this technology for security at airports, government installations, etc., will require real-time (video rate) data acquisition and computer image reconstruction of large volumetric data sets. This implies rapid scanning techniques or large, complex ``2-D`` arrays and high speed computing for successful commercialization of this technology.

  9. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  10. Spatially offset Raman spectroscopy (SORS) for the analysis and detection of packaged pharmaceuticals and concealed drugs.

    Science.gov (United States)

    Olds, William J; Jaatinen, Esa; Fredericks, Peter; Cletus, Biju; Panayiotou, Helen; Izake, Emad L

    2011-10-10

    Spatially offset Raman spectroscopy (SORS) is a powerful new technique for the non-invasive detection and identification of concealed substances and drugs. Here, we demonstrate the SORS technique in several scenarios that are relevant to customs screening, postal screening, drug detection and forensics applications. The examples include analysis of a multi-layered postal package to identify a concealed substance; identification of an antibiotic capsule inside its plastic blister pack; analysis of an envelope containing a powder; and identification of a drug dissolved in a clear solvent, contained in a non-transparent plastic bottle. As well as providing practical examples of SORS, the results highlight several considerations regarding the use of SORS in the field, including the advantages of different analysis geometries and the ability to tailor instrument parameters and optics to suit different types of packages and samples. We also discuss the features and benefits of SORS in relation to existing Raman techniques, including confocal microscopy, wide area illumination and the conventional backscattered Raman spectroscopy. The results will contribute to the recognition of SORS as a promising method for the rapid, chemically specific analysis and detection of drugs and pharmaceuticals.

  11. Survey of state-of-the-art technology in remote concealed weapon detection

    Science.gov (United States)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Vannicola, Vincent C.; Wicks, Michael C.

    1995-09-01

    Recent advances in millimeter-wave (MMV), microwave, and infrared (IR) technologies provide the means to detect concealed weapons remotely through clothing and is some cases through walls. Since the developemnt of forward-looking infrared instruments, work has been ongoing in attempting to use these devices for concealed weapon detection based on temperatrue differences between metallic weapons and in the infrared has led to the development of techniques based on lower frequencies. Focal plane arrays operating MMW frequencies are becoming available which eliminate the need for a costly and slow mechanical scanner for generating images. These radiometric sensors also detect temperature differences between weapons and the human body background. Holographic imaging systems operating at both microwave and MMW frequencies have been developed which generate images of near photographic quality through clothing and through thin, nonmetallic walls. Finally, a real- aperture radar is useful for observing people and detecting weapons through walls and in the field under reduced visibility conditions. This paper will review all of these technologies and give examples of images generated by each type of sensor. An assessment of the future of this technology with regard to law enforcement applications will also be given.

  12. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    Science.gov (United States)

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields.

  13. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    Science.gov (United States)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  14. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  15. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  16. Specific morphogenetic events in mouse external genitalia sex differentiation are responsive/dependent upon androgens and/or estrogens.

    Science.gov (United States)

    Rodriguez, Esequiel; Weiss, Dana A; Ferretti, Max; Wang, Hong; Menshenia, Julia; Risbridger, Gail; Handelsman, David; Cunha, Gerald; Baskin, Laurence

    2012-10-01

    The objective of this study was to perform a comprehensive morphologic analysis of developing mouse external genitalia (ExG) and to determine specific sexual differentiation features that are responsive to androgens or estrogens. To eliminate sex steroid signaling postnatally, male and female mice were gonadectomized on the day of birth, and then injected intraperitoneally every other day with DES (200 ng/g), DHT (1 μg/g), or oil. On day-10 postnatal male and female ExG were dissected, fixed, embedded, serially sectioned and analyzed. We identified 10 sexually dimorphic anatomical features indicative of normal penile and clitoral differentiation in intact mice. Several (but not all) penile features were impaired or abolished as a result of neonatal castration. Those penile features remaining after neonatal castration were completely abolished with attendant clitoral development in androgen receptor (AR) mutant male mice (X(Tfm)/Y and X/Y AR-null) in which AR signaling is absent both pre- and postnatally. Administration of DHT to neonatally castrated males restored development of all 10 masculine features to almost normal levels. Neonatal ovariectomy of female mice had little effect on clitoral development, whereas treatment of ovariectomized female mice with DHT induced partial masculinization of the clitoris. Administration of DES to neonatally gonadectomized male and female mice elicited a spectrum of development abnormalities. These studies demonstrate that the presence or absence of androgen prenatally specifies penile versus clitoral identity. Differentiated penile features emerge postnatally and are sensitive to and dependent upon prenatal or pre- and postnatal androgen. Emergence of differentiated clitoral features occurs postnatally in either intact or ovariectomized females. It is likely that each penile and clitoral feature has a unique time-course of hormonal dependency/sensitivity.

  17. [Transaxillary concealing single incision endoscopic thoracic sympathectomy in the treatment of palmar hyperhidrosis: a novel surgical approach].

    Science.gov (United States)

    Lin, Min; Tu, Yuan-rong; Lai, Fan-cai; Li, Xu; Chen, Jian-feng; Luo, Rong-gang; Lin, Jian-bo

    2013-11-05

    To evaluate the cosmetic effect and safety of transaxillary concealing single incision endoscopic thoracic sympathectomy in the treatment of palmar hyperhidrosis (PH). Retrospective study was conducted for 326 PH cases undergoing transaxillary concealing single incision endoscopic thoracic bilateral sympathectomy during January 2009 and March 2011. All operations were successfully performed without severe complication and mortality. No conversion into open technique was necessary. The mean unilateral operative duration was 5.8 (5-8) min. It was calculated from the time of skin incision to the application of dressing over wound. The mean follow-up period was 25 (8-38) months. All patients achieved excellent cosmetic effects with undetectable incision. Transaxillary concealing single incision endoscopic thoracic sympathectomy is a safe and effective procedure for treating primary PH. Incision is undetectable with excellent cosmetic effect. It is worthy of wider popularization.

  18. Concealment of time delay signature of chaotic output in a slave semiconductor laser with chaos laser injection

    Science.gov (United States)

    Wu, Tianan; Sun, Weiyang; Zhang, Xiaoxu; Zhang, Shenghai

    2016-12-01

    An improved chaotic laser system, which has a slave semiconductor laser (SL) injected by a master SL with double optical feedback (DOF), is proposed, so that the time delay (TD) signature can be successfully concealed from both intensity and phase chaos via choosing appropriate parameters. The TD signature is investigated by employing autocorrelation function (ACF) and mutual information (MI) function. Through analyzing the influence on TD signature in the region of injection current and injection strength for the slave SL, we find that, for both intensity chaos and phase chaos, the TD signature can be easily concealed under weak injection strength. When the injection strength is strong, we can not only successfully conceal TD signature, but also improve the bandwidth of chaotic laser output by choosing the optimal detuning frequency.

  19. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  20. An error resilient scheme for H.264 video coding based on distortion estimated mode decision and nearest neighbor error concealment

    Institute of Scientific and Technical Information of China (English)

    LEE Tien-hsu; WANG Jong-tzy; CHEN Jhih-bin; CHANG Pao-chi

    2006-01-01

    Although H.264 video coding standard provides several error resilience tools, the damage caused by error propagation may still be tremendous. This work is aimed at developing a robust and standard-compliant error resilient coding scheme for H.264and uses techniques of mode decision, data hiding, and error concealment to reduce the damage from error propagation. This paper proposes a system with two error resilience techniques that can improve the robustness of H.264 in noisy channels. The first technique is Nearest Neighbor motion compensated Error Concealment (NNEC) that chooses the nearest neighbors in the reference frames for error concealment. The second technique is Distortion Estimated Mode Decision (DEMD) that selects an optimal mode based on stochastically distorted frames. Observed simulation results showed that the rate-distortion performances of the proposed algorithms are better than those of the compared algorithms.

  1. Brief Report: How Do They Manage Social Interaction? The Influence of Concealing Academic Achievement Information on Self-Monitoring by Adolescents with Low Achievement

    Science.gov (United States)

    Zhang, Baoshan; Zhao, Jun-Yan; Yu, Guoliang

    2010-01-01

    During social interactions people self-monitor their behavior at least partially to conceal socially devalued characteristics. This study examined the influences of concealing academic achievement on self-monitoring in an academically-relevant social interaction. An interview paradigm called for school-aged adolescent participants (total N = 86)…

  2. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    Science.gov (United States)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  3. Parenting beliefs and practices of opiate-addicted parents: concealment and taboo.

    Science.gov (United States)

    Hogan, Diane M

    2003-07-01

    The lifestyle associated with opiate dependence, including drug taking, the buying and selling of drugs, and contact with other drug users, carries potential risks for the safety and well-being of children of drug-using parents. Based on a qualitative interview study conducted with 50 opiate-dependent parents in Dublin, Ireland, the parenting beliefs and practices in relation to children's exposure to drugs and the associated lifestyle are described. Parents saw their lifestyle as potentially risky for their children and their families. The most common strategy adopted by parents was to conceal their drug-related activities and maintain a strict family taboo about these activities. Intervention programmes should be offered to support effective family communication about parental drug dependence.

  4. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  5. A MODIFIED EDGE-ORIENTED SPATIAL INTERPOLATION ALGORITHM FOR CONSECUTIVE BLOCKS ERROR CONCEALMENT

    Institute of Scientific and Technical Information of China (English)

    Fu Wei; Xing Guangzhong

    2007-01-01

    This paper proposes a low-complexity spatial-domain Error Concealment (EC) algorithm for recovering consecutive blocks error in still images or Intra-coded (Ⅰ) frames of video sequences. The proposed algorithm works with the following steps. Firstly the Sobel operator is performed on the top and bottom adjacent pixels to detect the most likely edge direction of current block area. After that one-Dimensional (1D) matching is used on the available block boundaries. Displacement between edge direction candidate and most likely edge direction is taken into consideration as an important factor to improve stability of 1D boundary matching. Then the corrupted pixels are recovered by linear weighting interpolation along the estimated edge direction. Finally the interpolated values are merged to get last recovered picture. Simulation results demonstrate that the proposed algorithms obtain good subjective quality and higher Peak Signal-to-Noise Ratio (PSNR) than the methods in literatures for most images.

  6. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  7. Design of an active millimeter-wave concealed-object imaging system

    Science.gov (United States)

    Paulter, Nicholas G.; Grossman, Erich N.; Stenbakken, G. N.; Waltrip, B. C.; Nolen, Shalva; Reintsema, Carl D.

    2001-08-01

    The research and design of an active millimeter-wave concealed object imaging system is described. Several illumination and detection methods were analyzed via computer simulation to assess the effects of system parameters on the signal-to-noise ratio of the detected signal. The results of many of these simulations were experimentally verified using either a 10 MHz or a 100 GHz measurement system. Based on this assessment, two design using pulsed illuminate with gated detection were selected for development. Pulsed illumination is provided using a pulsed broadband noise source. For detecting the reflected noise pulse, two methods were examined, one using micro bolometers and the other using electrooptics. Based on imaging system considerations, such as cost of manufacture, ruggedness, etc., and technical parameters, micro bolometer arrays were selected for further development. The electronics interface, including image display capability, was developed. We examined the absorption of some common clothing materials at 100 Ghz and compared this to results previously reported.

  8. Theoretical analysis on water-inrush mechanism of concealed collapse pillars in floor

    Institute of Scientific and Technical Information of China (English)

    Tang Junhua; Bai Haibo; Yao Banghua; Wu Yu

    2011-01-01

    In order to study the water-inrush mechanism of concealed collapse pillars from the mechanical view,a mechanical model for water-inrush of collapse pillars has been established based on thick plate theory of elastic mechanics in this paper. By solving this model the deformation of water-resistant rock strata under the action of water pressure and the expression of critical water pressure for collapse pillar waterinrush have been obtained The research results indicate that: the boundary conditions and strength of water-resistant strata play important roles in influencing water-inrush of collapse pillars. The critical water-inrush pressure is determined by both relative thickness and absolute thickness of water-resistant strata.

  9. Sparsity-based Image Error Concealment via Adaptive Dual Dictionary Learning and Regularization.

    Science.gov (United States)

    Liu, Xianming; Zhai, Deming; Zhou, Jiantao; Wang, Shiqi; Zhao, Debin; Gao, Huijun

    2016-10-31

    In this paper, we propose a novel sparsity-based image error concealment (EC) algorithm through Adaptive Dual dictionary Learning and Regularization (ADLR). We define two feature spaces: the observed space and the latent space, corresponding to the available regions and the missing regions of image under test, respectively. We learn adaptive and complete dictionaries individually for each space, where the training data are collected via an adaptive template matching mechanism. Based on the piecewise stationarity of natural images, a local correlation model is learned to bridge the sparse representations of the aforementioned dual spaces, allowing us to transfer the knowledge of the available regions to the missing regions for EC purpose. Eventually, the EC task is formulated as a unified optimization problem, where the sparsity of both spaces and the learned correlation model are incorporated. Experimental results show that the proposed method outperforms the state-of-the-art techniques in terms of both objective and perceptual metrics.

  10. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...... systems largely ignore the dynamics of the statistical evolution of the speech signal, possibly leading to perceptually annoying artifacts. To address this problem, we propose the use of hidden Markov models for PLC. With a hidden Markov model (HMM) tracking the evolution of speech signal parameters, we...... demonstrate how PLC is performed within a statistical signal processing framework. Moreover, we show how the HMM is used to index a specially designed PLC module for the particular signal context, leading to signal-contingent PLC. Simulation examples, objective tests, and subjective listening tests...

  11. Remote concealing any arbitrary objects with multi-folded transformation optics

    CERN Document Server

    Zheng, Bin; Hao, Ran; Zhang, Xianmin; Liu, Xu; Li, Erping; Chen, Hongsheng

    2015-01-01

    Remote concealing any arbitrary object is a very interesting topic but is still impossible so far. In this Letter, we introduce a novel way to design a remote cloaking device that is applicable to any object at a certain distance. This is achieved by using multi-folded transformation optics in which we remotely generate a zero-field region that no field can penetrate inside but it will not disturb the far-field scattering electromagnetic field. As a result, any object in such zero-field region can stay or move freely but remains invisible. Our proposed idea can be further extended to design an object independent remote illusion optics, which can transform any arbitrary objects into another object without knowing the details of the objects. The proposed multi-folded transformation optics will be very useful in the design of remote devices.

  12. Doing everyday occupations both conceals and reveals the phenomenon of being aged.

    Science.gov (United States)

    Wright-St Clair, Valerie A; Kerse, Ngaire; Smythe, Elizabeth

    2011-04-01

    The phenomenon of ageing is so commonplace that it is ordinarily taken-for-granted, with little call to question its meaning. Of importance to occupational therapists is the recent appeal to understand older adults' ordinary ways of everyday living. The aim of this interpretive phenomenological study was to understand the meaning of 'being aged' through the everyday experiences of those who are long-lived. The writings of two philosophers, Hans-Georg Gadamer and Martin Heidegger, guided the study's design and research methods. Being aged in the context of everyday living was the phenomenon of interest. Individual interviews were conducted with 15 community-dwelling New Zealand elders: four Maori aged 71-93 years and 11 non-Maori aged 80-97 years. Stories of going about daily occupations and particular moments in the day were elicited during conversational-style interviews. Hermeneutic methods and phenomenological reflection were used to analyse the data. Two overarching notions were illuminated. The ordinary ways of 'being in the every day', such as having a routine and a familiar purposefulness, conceal being aged. In contrast, 'experiencing the unaccustomed', such as suddenly noticing an unaccustomed weakness or oldness, in the midst of doing deeply familiar occupations is an announcing of being aged. CONCLUSIONS and As such, engaging in everyday, familiar occupations holds the potential to both conceal and reveal the phenomenon of being aged. These results point to the importance of illuminating the lived experience of occupational engagement as a fruitful way of informing occupation-focussed practice. © 2010 The Authors. Australian Occupational Therapy Journal © 2010 Australian Association of Occupational Therapists.

  13. Concealed fertility and extended female sexuality in a non-human primate (Macaca assamensis.

    Directory of Open Access Journals (Sweden)

    Ines Fürtbauer

    Full Text Available In numerous primates living in mixed-sex groups, females display probabilistic cues of fertility to simultaneously concentrate paternity to dominant males while diluting it amongst others as a means to reduce the risk of infanticide and to increase male care for offspring. A few species, however, lack these cues and potentially conceal fertility from males; yet, to date, little is known about mating patterns and their underlying proximate mechanisms in such species. Here, we investigated mating activity and sexual consortships relative to female reproductive state in wild Assamese macaques (Macaca assamensis, a species where females lack prominent anogenital swellings and copulation calls. During two mating seasons (2837 contact hours we recorded sexual and social behaviors, sexual consortships, and collected 1178 fecal samples (n = 15 females which were analyzed for progestogen concentrations to assess female reproductive state and to determine the timing of ovulation and conception. Although mostly conceiving in their first ovarian cycle, females were sexually receptive throughout the entire 4-month mating season, and within-cycle mating frequencies were not increased during fertile phases. Dominant males did not monopolize fertile matings, and consortships by high-ranking males lasted for long periods, which were not exclusively linked to female fertile phases. Furthermore, females copulated promiscuously but not randomly, i.e. for almost every female, matings were concentrated to a certain male, irrespective of male rank. Collectively, we demonstrate that fertility is undisclosed to males. The extreme extended female sexuality facilitated by concealed fertility may allow females to create differentiated mating relationships within a promiscuous mating system. Our study provides important new insight into the plasticity of female sexuality in non-human primates.

  14. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    Directory of Open Access Journals (Sweden)

    Lawrence A. Farwell

    2014-12-01

    Full Text Available A classification concealed information test (CIT used the brain fingerprinting method of applying P300 event-related potential (ERP in detecting information that is 1 acquired in real life and 2 unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to 3 types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified. We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP? versus comparison CIT (Does a probe produce a larger ERP than an irrelevant? using P300 plus the late negative component (LNP; together, P300-MERMER. Comparison CIT produced a significantly higher error rate (20% and lower statistical confidences -- mean 67%; information-absent mean was 28.9%, less than chance (50%. We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  15. Bilateral Waveform Similarity Overlap-and-Add Based Packet Loss Concealment for Voice over IP

    Directory of Open Access Journals (Sweden)

    J.F. Yeh

    2013-08-01

    Full Text Available This paper invested a bilateral waveform similarity overlap-and-add algorithm for voice packet lost. Since Packet lost will cause the semantic misunderstanding, it has become one of the most essential problems in speech communication. This investment is based on waveform similarity measure using overlap-and-Add algorithm and provides the bilateral information to enhance the speech signal reconstruction. Traditionally, it has been improved that waveform similarity overlap-and-add (WSOLA technique is an effective algorithm to deal with packet loss concealment (PLC for real-time time communication. WSOLA algorithm is widely applied to deal with the length adaptation and packet loss concealment of speech signal. Time scale modification of audio signal is one of the most essential research topics in data communication, especially in voice of IP (VoIP. Herein, the proposed the bilateral WSOLA (BWSOLA that is derived from WSOLA. Instead of only exploitation one direction speech data, the proposed method will reconstruct the lost voice data according to the preceding and cascading data. The related algorithms have been developed to achieve the optimal reconstructing estimation. The experimental results show that the quality of the reconstructed speech signal of the bilateral WSOLA is much better compared to the standard WSOLA and GWSOLA on different packet loss rate and length using the metrics PESQ and MOS. The significant improvement is obtained by bilateral information and proposed method. The proposed bilateral waveform similarity overlap-and-add (BWSOLA outperforms the traditional approaches especially in the long duration data loss.

  16. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    Science.gov (United States)

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  17. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  18. Concealed Fertility and Extended Female Sexuality in a Non-Human Primate (Macaca assamensis)

    Science.gov (United States)

    Fürtbauer, Ines; Heistermann, Michael; Schülke, Oliver; Ostner, Julia

    2011-01-01

    In numerous primates living in mixed-sex groups, females display probabilistic cues of fertility to simultaneously concentrate paternity to dominant males while diluting it amongst others as a means to reduce the risk of infanticide and to increase male care for offspring. A few species, however, lack these cues and potentially conceal fertility from males; yet, to date, little is known about mating patterns and their underlying proximate mechanisms in such species. Here, we investigated mating activity and sexual consortships relative to female reproductive state in wild Assamese macaques (Macaca assamensis), a species where females lack prominent anogenital swellings and copulation calls. During two mating seasons (2837 contact hours) we recorded sexual and social behaviors, sexual consortships, and collected 1178 fecal samples (n = 15 females) which were analyzed for progestogen concentrations to assess female reproductive state and to determine the timing of ovulation and conception. Although mostly conceiving in their first ovarian cycle, females were sexually receptive throughout the entire 4-month mating season, and within-cycle mating frequencies were not increased during fertile phases. Dominant males did not monopolize fertile matings, and consortships by high-ranking males lasted for long periods, which were not exclusively linked to female fertile phases. Furthermore, females copulated promiscuously but not randomly, i.e. for almost every female, matings were concentrated to a certain male, irrespective of male rank. Collectively, we demonstrate that fertility is undisclosed to males. The extreme extended female sexuality facilitated by concealed fertility may allow females to create differentiated mating relationships within a promiscuous mating system. Our study provides important new insight into the plasticity of female sexuality in non-human primates. PMID:21853074

  19. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction

    Science.gov (United States)

    Singh, Pradeep; Ajmera, Deepal-Haresh; Xiao, Shui-Sheng; Liu, Xiong; Peng, Bin

    2016-01-01

    Background The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. Material and Methods To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. Results The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient’s age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated (P < or = 0.05) with extraction difficulty under regression models. Conclusions In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Practical Implications: Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice. Key words:Third molar, impacted, extraction, mandibular, facial type. PMID:27694781

  20. EFFECT OF METOPROLOL ON ATRIAL FIBRILLATORY RATE, ATRIOVENTRICULAR NODAL CONCEALED CONDUCTION, AND VENTRICULAR RESPONSE DURING ATRIAL-FIBRILLATION IN PIGS

    NARCIS (Netherlands)

    VANDENBERG, MP; DELANGEN, CDJ; CRIJNS, HJGM; HAAKSMA, J; BEL, KJ; WESSELING, H; LIE, KI

    1994-01-01

    We wished to elucidate the effect of beta-blockade on fibrillatory rate and atrioventricular (AV) nodal concealed conduction during atrial fibrillation (AF). Subsequent to determination of the effect on atrial functional refractoriness with the extrastimulus technique (basic cycle length 400 ms), th

  1. P300 amplitudes in the concealed information test are less affected by depth of processing than electrodermal responses

    Science.gov (United States)

    Gamer, Matthias; Berti, Stefan

    2012-01-01

    The Concealed Information Test (CIT) has been used in the laboratory as well as in field applications to detect concealed crime related memories. The presentation of crime relevant details to guilty suspects has been shown to elicit enhanced N200 and P300 amplitudes of the event-related brain potentials (ERPs) as well as greater skin conductance responses (SCRs) as compared to neutral test items. These electrophysiological and electrodermal responses were found to incrementally contribute to the validity of the test, thereby suggesting that these response systems are sensitive to different psychological processes. In the current study, we tested whether depth of processing differentially affects N200, P300, and SCR amplitudes in the CIT. Twenty participants carried out a mock crime and became familiar with central and peripheral crime details. A CIT that was conducted 1 week later revealed that SCR amplitudes were larger for central details although central and peripheral items were remembered equally well in a subsequent explicit memory test. By contrast, P300 amplitudes elicited by crime related details were larger but did not differ significantly between question types. N200 amplitudes did not allow for detecting concealed knowledge in this study. These results indicate that depth of processing might be one factor that differentially affects central and autonomic nervous system responses to concealed information. Such differentiation might be highly relevant for field applications of the CIT. PMID:23162454

  2. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  3. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  4. Geochemical Data for Samples Collected in 2008 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2009-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.

  5. Notes on Neotropical Proconiini (Insecta: Hemiptera: Cicadellidae. VIII: morphology of the male and female genitalia of Paraulacizes munda, revalidated from synonymy of P. confusa

    Directory of Open Access Journals (Sweden)

    Gabriel Mejdalani

    2015-10-01

    Full Text Available ABSTRACT Paraulacizes munda (Fowler, 1899 has been considered a junior synonym of P. confusa (Signoret, 1855. These two species were described from Mexico. Here it is shown that P. munda can be distinguished from P. confusa by the color and size of the body. Hence, the former is revalidated from synonymy of the latter. Descriptions and illustrations of the male and female genitalia of P. munda, which are necessary for an accurate identification of leafhopper species in general, are provided for the first time. Paraulacizes munda can be distinguished from the other 11 species currently included in Paraulacizes by the following combination of features: ground color of anterior dorsum yellow or pale yellow; dorsal processes of male pygofer strongly inflated apically; style with apex transversely truncate, not projected inward; atrial processes of aedeagus, in lateral view, not distinctly curved apically; female sternite VII with small median lobe on posterior margin and pair of dark brown marks posteromedially. This is the first detailed description of the first and second ovipositor valvulae of a Paraulacizes species. The female genitalia of Paraulacizes are compared with those of the related genera Aulacizes Amyot & Serville, 1843 and Proconosama Young, 1968.

  6. Concealment, communication and stigma: The perspectives of HIV-positive immigrant Black African men and their partners living in the United Kingdom.

    Science.gov (United States)

    Owuor, John Oa; Locke, Abigail; Heyman, Bob; Clifton, Andrew

    2016-12-01

    This study explored the perspectives of Black men, originally from East Africa, living in the United Kingdom and their partners on what it means to live with diagnosed HIV. This article reports on concealment of HIV-positive status as a strategy adopted by the affected participants to manage the flow of information about their HIV-positive status. Analysis of the data, collected using in-depth interviews involving 23 participants, found widespread selective concealment of HIV-positive status. However, a few respondents had 'come out' publicly about their condition. HIV prevention initiatives should recognise concealment as a vital strategy in managing communication about one's HIV-positive status.

  7. Systematic changes in tonic physiological activities during the Concealed Information Test.

    Science.gov (United States)

    Ogawa, Tokihiro; Matsuda, Izumi; Hirota, Akihisa; Takasawa, Noriyoshi

    2014-12-01

    Many studies on the Concealed Information Test have focused on phasic physiological changes that are temporally locked to stimulus presentation. However, little is known about changes in tonic, basal physiological levels throughout a stimulus series. This study focused on changes in tonic physiological activities during the CIT. Thirty-nine participants carried out a mock theft and subsequently received a CIT. Skin conductance, heart rate, and normalized pulse volume (NPV) were recorded. The pre-stimulus physiological level of these measures throughout the CIT series was compared across a question series with different serial positions of the relevant item. Results showed that changes in the pre-stimulus level differed depending on the serial position of the relevant item. Skin conductance declined throughout the series, but showed a transient increase after relevant item presentation. Heart rate was relatively constant throughout the series, but decreased after relevant item presentation. NPV continued to decrease until the relevant item, but increased thereafter, indicating a pattern similar to the classic Peak of Tension concept. In addition, the pre-stimulus NPV showed a significant relevant-irrelevant difference. Theoretical and practical implications of these findings are discussed.

  8. [Effects of recollection and familiarity on recognition memory in the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru; Shibuya, Yusuke

    2013-08-01

    The effects of recollection and familiarity on recognition memory in the Concealed Information Test (CIT) were investigated. In the learning phase, participants encoded 20 words that were presented in one of four frames on a personal computer screen. Next, in the recognition test, the participants were divided into "Remember judgment (Recollection)" or "Know judgment (Familiarity)" groups, based on their Remember/Know judgment when recognizing learned items. In the CIT phase, physiological responses to questions about learned (i.e., critical) and non-learned (i.e., non-critical) items were measured and recorded. The results indicated that there was a deceleration of respiration speed (RS), an increase in skin conductance response (SCR), and a drop in heart rate in responses to critical items for both groups. Furthermore, the effect sizes of RS and SCR were greater in the "Remember judgment" group compared to the "Know judgment" group. These results suggest that critical response patterns are generated by recollection and familiarity. However, the more vividly participants recognized critical items the larger were the magnitudes of RS and SCR response patterns.

  9. Genetic Algorithm Based Image Steganography for Enhancement of Concealing Capacity and Security

    Directory of Open Access Journals (Sweden)

    yoti

    2013-06-01

    Full Text Available This paper proposes a Genetic Algorithm based steganography for enhancement of embedding capacity and security. Steganography is a method to provide secret communication between sender and receiver by concealing message in cover image. LSB bit encoding method is that the simplest encoding method to cover secret message in color pictures and grayscale pictures. Steganalysis is a method of detecting secret message hidden in a cover image. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detection of hidden message in an image. This paper presents a secured steganography method using genetic algorithm to protect against the RS attack in color images. The proposed steganography scheme embeds message in integer wavelet transform coefficients by using a mapping function. This mapping function based on GA in an 8x8 block on the input cover color image. After embedding the message optimal pixel adjustment process is applied. By applying the OPAP the error difference between the cover image and stego image is minimized. Frequency domain technique is used to increase the robustness of proposed method. Use of IWT prevents the floating point precision problems of the wavelet filter. GA is used to increase the hiding capacity of image and maintains the quality of image. Experimental results are shows that the proposed steganography method is more secured against RS attack as compared to existing methods. Result showed that Peak signal to noise ratio and image utilization, 49.65 db and 100% respectively.

  10. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  11. Fourier transform infared spectroscopic imaging for the identification of concealed drug residue particles and fingerprints

    Science.gov (United States)

    Ricci, Camilla; Chan, K. L. Andrew; Kazarian, Sergei G.

    2006-09-01

    Conventional FTIR spectroscopy and microscopy has been widely used in forensic science. New opportunities exist to obtain rapid chemical images and to enhance the sensitivity of detection of trace materials using attenuated total reflection (ATR) Fourier transform infrared (FTIR) spectroscopy coupled with a focal-plane array (FPA) detector. In this work, the sensitivity of ATR-FTIR spectroscopic imaging using three different kinds of ATR crystals (Ge coupled with an infrared microscope, ZnSe and diamond) and resulting in three different optical arrangements for the detection of model drug particles is discussed. Model systems of ibuprofen and paracetamol particles having a size below 32 micrometers have been prepared by sieving. The sensitivity level in the three different approaches has been compared and it has been found that both micro and macro-ATR imaging methods have proven to be a promising techniques for the identification of concealed drug particles. To demonstrate the power and applicability of FTIR chemical imaging to forensic research, various examples are discussed. This includes investigation of the changes of chemical nature of latent fingerprint residue under controlled conditions of humidity and temperature studied by ATR-FTIR imaging. This study demonstrates the potential of spectroscopic imaging for visualizing the chemical changes of fingerprints.

  12. Ambulatory blood pressure monitoring during pregnancy with a new, small, easily concealed monitor.

    Science.gov (United States)

    Tape, T G; Rayburn, W F; Bremer, K D; Schnoor, T A

    1994-12-01

    Before establishing the utility of ambulatory blood pressure monitoring during pregnancy, we evaluated the accuracy of a small, easily concealed monitor. The 59 normotensive pregnant patients were between 13 and 26 gestational weeks. For each monitor reading, two trained observers independently and simultaneously recorded blood pressures using a mercury manometer connected to the monitor cuff. Seven readings in three positions (sitting upright, semirecumbent, standing) were performed on each patient. Averaged differences between the observers' and monitor readings varied from -2.2 to -0.9 mm Hg (systolic) and from -2.8 to -0.6 (fifth-phase diastolic), indicating slight but clinically unimportant overestimation by the monitor. Correlations between averaged observers' readings and the monitor ranged from 0.79 to 0.92 (systolic) and from 0.85 to 0.92 (fifth-phase diastolic). Overall, the observers agreed with the monitor within 5 mm Hg on 94% of systolic readings and 99% of fifth-phase diastolic readings. There was no statistically significant difference in accuracy with changes in body position. We conclude that this small, quiet, noninvasive device accurately determined blood pressures during pregnancy.

  13. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults.

    Science.gov (United States)

    Wong, Janine W Y; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-10-22

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues.

  14. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  15. Experimental Assessment of Linear Sampling and Factorization Methods for Microwave Imaging of Concealed Targets

    Directory of Open Access Journals (Sweden)

    M. N. Akıncı

    2015-01-01

    Full Text Available Shape reconstruction methods are particularly well suited for imaging of concealed targets. Yet, these methods are rarely employed in real nondestructive testing applications, since they generally require the electrical parameters of outer object as a priori knowledge. In this regard, we propose an approach to relieve two well known shape reconstruction algorithms, which are the linear sampling and the factorization methods, from the requirement of the a priori knowledge on electrical parameters of the surrounding medium. The idea behind this paper is that if a measurement of the reference medium (a medium which can approximate the material, except the inclusion can be supplied to these methods, reconstructions with very high qualities can be obtained even when there is no information about the electrical parameters of the surrounding medium. Taking the advantage of this idea, we consider that it is possible to use shape reconstruction methods in buried object detection. To this end, we perform several experiments inside an anechoic chamber to verify the approach against real measurements. Accuracy and stability of the obtained results show that both the linear sampling and the factorization methods can be quite useful for various buried obstacle imaging problems.

  16. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  17. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm(-1) were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Content-adaptive robust error concealment for packet-lossy H.264 video streaming

    Institute of Scientific and Technical Information of China (English)

    LIAO Ning; YAN Dan; QUAN Zi-yi; MEN Ai-dong

    2006-01-01

    In this paper, we present a spatio-temporal post-processing error concealment (EC) algorithm designed initially for a H.264 video-streaming scheme over packet-lossy networks. It aims at optimizing the subjective quality of the restored video under the constraints of low delay and computational complexity, which are critical to real-time applications and portable devices having limited resources. Specifically, it takes into consideration the physical property of motion field in order to achieve more meaningful perceptual video quality, in addition to the improved objective PSNR. Further, a simple bilinear spatial interpolation approach is combined with the improved boundary-match (B-M) based temporal EC approach according to texture and motion activity analysis. Finally, we propose a low complexity temporal EC method based on motion vector interpolation as a replacement of the B-M based approach in the scheme under low-computation requirement, or as a complement to further improve the scheme's performance in applications having enough computation resources. Extensive experiments demonstrated that the proposal features not only better reconstruction, objectively and subjectively, than JM benchmark, but also robustness to different video sequences.

  19. “亲亲相隐”原则的当代反思及启示%Modern reflection and enlightenment of“concealment for kin”

    Institute of Scientific and Technical Information of China (English)

    付颖光; 崔士岚

    2013-01-01

      从伦理基础和客观现实分析,“亲亲相隐”原则都更符合人性。但是通过对其成立与适用的社会基础、内在矛盾、适用范围的反思发现,现代社会适用这一原则还需要关注、解决一些现实问题,才能更好地促进社会法治建设。%The principle of“concealment for kin”— hushing kin’s crimes up, ethically and objectively satisfies emotional demands of human. It has been analyzed from three as-pects in the paper: social foundation for its application, internal contradiction and scope of application. A conclusion has been drawn naturally that in applying the principle to prac-tice, more attention should be paid to some practical problems so as to promote the con-struction of social and legal systems.

  20. Theoretical Studies on Concealed Courses of Physical Education of Vocational Education%职业教育隐性体育课程的理论研究

    Institute of Scientific and Technical Information of China (English)

    王富印; 马海霞; 赵冰岩

    2012-01-01

    Concealed course of physical education is a curriculum theory that aims to cultivate the students' mental health and their social adaptability. Physical education at vocational schools serves for vocational education and the students' professional quality. Because of the specialty of the vocational education' s training goals and its ed- ucation objects, with the chance of curriculum reforms, the physical education should make the theoretical and practical studies on concealed courses of vocational education, set the educational idea serving for the students' professional quality, choose the materials and pedagogical contents in accordance with the vocational education, the teaching methods in accordance with the students at vocational education school, adopt various teaching activities, and promote the healthy development of physical education of vocational education.%隐性体育课程是以显性体育课程为载体的,以培养学生健康心理和社会适应能力为目标的教育思想和课程理论。职教体育要为职业教育服务,为学生的职业素质养成服务。职业教育的培养目标和教育对象有其特殊性,学校体育要以课程改革为契机,开展职业教育隐性体育课程的理论与实践研究,树立为学生职业素养服务的教育理念,科学地选择具有职业特点的教材和教学内容,灵活运用适合职业学生的教学方法和手段,开展多种形式的教育教学活动,推动职教体育的健康发展。

  1. Morfologia comparada da genitália masculina de Galerucini (Coleoptera, Chrysomelidae, Galerucinae Comparative morphology of male genitalia of Galerucini (Coleoptera, Chrysomelidae, Galerucinae

    Directory of Open Access Journals (Sweden)

    Luciano de A. Moura

    2009-01-01

    Full Text Available A morfologia da genitália, especialmente a do macho, tem sido muito utilizada para elucidar problemas taxonômicos e evolutivos de crisomelídeos e paticularmente em Galerucini. Nesta contribuição, representantes de gêneros de Galerucini das subtribos que ocorrem nas Regiões Neotropical e Neártica foram selecionados para estudo. Descrições comparativas e ilustrações da genitália masculina são apresentadas para as espécies: Coelomera lanio (Dalman, 1823 e Dircema nigripenne (Fabricius, 1792 (Subtribo Galerucina; Exora encaustica (Germar, 1824 e Uaupesia amazona (Weise, 1921 (Subtribo Metacyclina; Paranapiacaba teinturieri (Allard, 1894 e Isotes eruptiva (Bechyné, 1955 (Subtribo Luperina. O spiculum gastrale está presente nas espécies estudadas de Metacyclina e Luperina. No lobo médio, as estruturas basais em forma de gancho direcionadas ventralmente só não ocorrem em P. teinturieri e em I. eruptiva, que possuem um processo em forma de capuz protegendo o orifício basal. A fenestra sub-basal é observada em C. lanio e em U. amazona; o flagellum, um esclerito do saco interno, ocorre somente em U. amazona. O conhecimento da morfologia da genitália masculina em Galerucini ainda é incipiente e deve ser ampliado, com a inclusão de inúmeros gêneros ainda não estudados.The morphology of the genitalia, especially of the male, has been used to elucidate taxonomical and evolutive questions in chrysomelids, particularly Galerucini. In this contribution, we selected genera representing the Nearctic and Neotropical subtribes of Galerucini. We provide comparative descriptions and illustrations of male genitalia of six species: Coelomera lanio (Dalman, 1823 and Dircema nigripenne (Fabricius, 1792 (Subtribe Galerucina; Exora encaustica (Germar, 1824 and Uaupesia amazona (Weise, 1921 (Subtribe Metacyclina; Paranapiacaba teinturieri (Allard, 1894 and Isotes eruptiva (Bechyné, 1955 (Subtribe Luperina. The spiculum gastrale is present in the

  2. Geochemical Characteristics, Genesis of Concealed Cu-rich Ore Body in the Jinchuan Deposit, Northwestern China, and Its Prospecting

    Institute of Scientific and Technical Information of China (English)

    GAO Yalin; TANG Zhongli; ZHANG Mingjie; TIAN Yulong; XIAO Lizhong

    2009-01-01

    The Jinchuan deposit is hosted by the olivine-rich ultramafic rock body, which is the third-largest magmatic sulfide Ni-Cu deposit in the world currently being exploited. Seeking new relaying resources in the deep and the border of the deposit becomes more and more important. The ore body, ore and geochemistry characteristics of the concealed Cu-rich ore body are researched. Through spatial analysis and comparison with the neighboring Ⅱ1 main ore body, the mineralization rule of the concealed Cu-rich ore body is summed up. It is also implied that Cu-rich magma may exist between Ni-rich magma and ore pulp during iiquation differentiation in deep-stage chambers, which derives from deep-mantle Hi-MgO basalt magma. It is concluded that the type of ore body has features of both magmatic liquation and late reconstruction action. It has experienced three stages: deep liquation and pulsatory injection of the Cu-and PPGE-rich magma, concentration of tectonic activation, and the later magma hydrothermai superimposition. In addition, the Pb and S isotopes indicate the magma of I6 concealed Cu-rich ore body originates predominantly from mantle; however, it is interfused by minute crust material. Finally, it is inferred that the genesis of the Cu-Ni sulfide deposit is complex and diverse, and the prospect of seeking new deep ore bodies within similar deposits is promising, especially Cu-rich ore bodies.

  3. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  4. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  5. Sphincter-preserving RO total mesorectal excision with resection of internal genitalia combined with pre- or postoperative chemoradiation for T4 rectal cancer in females

    Institute of Scientific and Technical Information of China (English)

    Bartlomiej Szynglarewicz; Rafal Matkowski; Piotr Kasprzak; Daniel Sydor; Jozef Forgacz; Marek Pudelko; Jan Kornafel

    2007-01-01

    AIM: To evaluate the impact of chemoradiation administered pre- or postoperatively on prognosis in females following RO extended resection with sphincterpreserving total mesorectal excision (TME) for locally advanced rectal cancer and to assess the association between chemoradiation and intra- and postoperative variables.METHODS: Twenty-one females were treated for locally advanced but preoperatively assessed as primarily resectable rectal cancer involving reproductive organs. Anterior resection with TME and excision of internal genitalia was combined with neo- or adjuvant chemoradiation. Two-year disease-free survival analysis was performed with the Kaplan-Meier method and logrank test. The association between chemoradiation and other variables was evaluated with the Fisher's exact test and Mann-Whitney test.RESULTS: Survival rate decreased in anaemic females (51.5% vs 57.4%), in patients older than 60 years (41.8% vs 66.7%) with poorly differentiated cancers (50.0% vs 55.6%) and tumors located ≤ 7 cm from the anal verge (42.9% vs 68.1%) but with the lack of importance. Patients with negative lymph nodes and women chemoradiated preoperatively had significantly favourable prognosis (85.7% vs 35.7%; P= 0.03 and 80.0% vs 27.3%; P = 0.01, respectively). Preoperative chemoradiation compared to adjuvant radiochemotherapy was not significantly associated with the duration of surgery, incidence of intraoperative bowel perforation and blood loss ≥ 1 L, rate of postoperative bladder and anorectal dysfunction, and minimal distal resection margin. It significantly influenced minimal radial margin (mean 4.2 mm vs 1.1 mm; P < 0.01).CONCLUSION: Despite involving internal genitalia, long-term disease-free survival and sphincter preservation may be achieved with combined-modality therapy for females with T4 locally advanced rectal carcinoma. Neoadjuvant chemoradiation does not compromise functional results and may significantly improve oncological outcomes probably due to

  6. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    Science.gov (United States)

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  7. African land degradation in a world of global atmospheric change: fertilization conceals degradation?

    Science.gov (United States)

    Le, Lulseged Tamene, Paul L. G. Vlek, Quang Bao

    2009-04-01

    Land degradation is one of the most widespread environmental problems worldwide. The sub-Saharan Africa (SSA) is one of the most seriously affected regions with huge implications on food security and economic development. To plan plausible management measures, understanding the magnitude of the problem and identification of hotspot areas are necessary. Analysis of remote sensing and climate data observed from space for the period 1982 - 2003 showed significant improvement in vegetation productivity across 30% of SSA with decline on 5% of the subcontinent. Global change in atmospheric chemistry is likely responsible for the observed increasing trend in vegetation productivity. Such widespread greening observed from space could mask anthropogenic land degradation processes such as land conversion, selective logging, and soil nutrient mining. To assess this possible masking effect, a re-analysis of the vegetation productivity dynamics, taking into account atmospheric fertilization, was conducted. This was performed by analyzing the long-term trend in vegetation productivity of pristine lands (areas with minimum human- and climate- related impacts) identified across different biomes in SSA. The baseline slope values of biomass accrual calculated for those pristine lands were estimated and used to re-calculate the long-term trend of green biomass with and without the impact of atmospheric fertilization. This ultimately enabled to delineate the areas that would have experienced significant loss in vegetation productivity had the atmospheric chemistry not changed. The result suggests that seven times more than the area of actual productivity decline in SSA is affected by land degradation processes that are concealed by atmospheric fertilization. With this rate of surreptitious loss of vital land attributes and with the current rate of population growth (3%), the SSA subcontinent may soon lack the land resources necessary to foster economic development. Spatially

  8. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  9. A time-sequence functional analysis of mating behaviour and genital coupling in Drosophila: role of cryptic female choice and male sex-drive in the evolution of male genitalia.

    Science.gov (United States)

    Jagadeeshan, S; Singh, R S

    2006-07-01

    Male genitalia in Drosophila exemplify strikingly rapid and divergent evolution, whereas female genitalia are relatively invariable. Whereas precopulatory and post-copulatory sexual selection has been invoked to explain this trend, the functional significance of genital structures during copulation remains obscure. We used time-sequence analysis to study the functional significance of external genitalic structures during the course of copulation, between D. melanogaster and D. simulans. This functional analysis has provided new information that reveals the importance of male-driven copulatory mechanics and strategies in the rapid diversification of genitalia. The posterior process, which is a recently evolved sexual character and present only in males of the melanogaster clade, plays a crucial role in mounting as well as in genital coupling. Whereas there is ample evidence for precopulatory and/or post-copulatory female choice, we show here that during copulation there is little or no physical female choice, consequently, males determine copulation duration. We also found subtle differences in copulatory mechanics between very closely related species. We propose that variation in male usage of novel genitalic structures and shifts in copulatory behaviour have played an important role in the diversification of genitalia in species of the Drosophila subgroup.

  10. Emergency Victim Care. A Training Manual for Emergency Medical Technicians. Module 10. Injuries of the Eye, Ear, Nose, Abdomen, Central Nervous System and Genitalia. Burns and Environmental Injuries. Revised.

    Science.gov (United States)

    Ohio State Dept. of Education, Columbus. Div. of Vocational Education.

    This training manual for emergency medical technicians, one of 14 modules that comprise the Emergency Victim Care textbook, covers injuries of the eyes, ears, nose, abdomen, central nervous system (CNS), and genitalia; burns; and environmental injuries. Objectives stated for the two chapters are for the student to be able to describe procedures…

  11. Emergency Victim Care. A Training Manual for Emergency Medical Technicians. Module 10. Injuries of the Eye, Ear, Nose, Abdomen, Central Nervous System and Genitalia. Burns and Environmental Injuries. Revised.

    Science.gov (United States)

    Ohio State Dept. of Education, Columbus. Div. of Vocational Education.

    This training manual for emergency medical technicians, one of 14 modules that comprise the Emergency Victim Care textbook, covers injuries of the eyes, ears, nose, abdomen, central nervous system (CNS), and genitalia; burns; and environmental injuries. Objectives stated for the two chapters are for the student to be able to describe procedures…

  12. Detection of concealed substances in sealed opaque plastic and coloured glass containers using SORS

    Science.gov (United States)

    Bloomfield, Matthew; Loeffen, Paul W.; Matousek, Pavel

    2010-10-01

    The reliable detection of concealed substances in sealed opaque plastic and coloured glass containers, with low falsealarm rate, is a problem in numerous areas of security. For example, in aviation security, there is no reliable methodology for alarm resolution of substances with high chemical specificity unless the substances are in optically transparent containers. We present a recently developed method called Spatially Offset Raman Spectroscopy (SORS) which enables the discrimination of the Raman spectrum of the content substance from the Raman spectrum of the container material with no prior knowledge of either, thereby allowing unambiguous identification of the container contents. The method is effective with coloured plastic containers that are several millimetres thick and which are not see-through to the eye and also for coloured glass bottles. Such cases do not typically yield to conventional backscatter Raman spectroscopy (or have poor false-alarm rates) since the content signal is often overwhelmed by the signal from the container, which may in addition have a strong interfering fluorescence background. SORS measurement can be performed in a few seconds by shining a laser light onto the container and then measuring the Raman signal at the excitation point but also at one or more offset positions. Each measurement has different relative orthogonal contributions from the container and contents Raman spectra, so that, with no prior knowledge, the pure spectra of both the container and contents can be extracted - either by scaled subtraction or via multivariate statistical methods. The content spectrum can then be compared to a reference library of pure materials to give a threat evaluation with a confidence level not compromised by interfering signals originating from the container wall. In this paper, we describe the methods and their optimization, and characterize their performance in practical screening applications. The study shows that there is

  13. Imaging the concealed section of the Whakatane fault below Whakatane city, New Zealand, with a shear wave land streamer system

    Science.gov (United States)

    Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.

    2016-04-01

    The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth

  14. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  15. 木马隐藏技术与防范方法%Concealing technology of Trojan horses and prevention

    Institute of Scientific and Technical Information of China (English)

    许名; 杨仝; 郑连清; 张串绒

    2011-01-01

    To reinforce network security and prevent Trojan horse attacks, a concealing technology by triple jump in load and thread guard is analyzed and implemented with an example, and a Trojan horse using the technology is programmed, and the hidden nature and survivability of the Trojan horse is enhanced by it.Finally, the corresponding cleaning method is put forward.Experimental results show that the Trojan horse completes the expected hidden features, and can penetrate the latest Rising anti-virus software, Rising Firewall and general hardware firewalls, which demonstrate the feasibility and effectiveness of the concealing technology.%为加固网络安全、防范木马攻击,结合实例研究了一种木马隐藏技术,实现了基于加载三级跳和线程守护的隐藏技术,增强了木马的隐蔽性与抗毁性,并提出了该技术相应的防范措施和清除方法.实验结果表明,融入该隐藏技术的木马程序完成了预期的隐藏功能并可以穿透最新的瑞星杀毒软件、瑞星防火墙及硬件防火墙,表明了该隐藏技术的可行性与有效性.

  16. Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication

    Science.gov (United States)

    El-Shafai, Walid

    2015-09-01

    3D multi-view video (MVV) is multiple video streams shot by several cameras around a single scene simultaneously. Therefore it is an urgent task to achieve high 3D MVV compression to meet future bandwidth constraints while maintaining a high reception quality. 3D MVV coded bit-streams that are transmitted over wireless network can suffer from error propagation in the space, time and view domains. Error concealment (EC) algorithms have the advantage of improving the received 3D video quality without any modifications in the transmission rate or in the encoder hardware or software. To improve the quality of reconstructed 3D MVV, we propose an efficient adaptive EC algorithm with multi-hypothesis modes to conceal the erroneous Macro-Blocks (MBs) of intra-coded and inter-coded frames by exploiting the spatial, temporal and inter-view correlations between frames and views. Our proposed algorithm adapts to 3D MVV motion features and to the error locations. The lost MBs are optimally recovered by utilizing motion and disparity matching between frames and views on pixel-by-pixel matching basis. Our simulation results show that the proposed adaptive multi-hypothesis EC algorithm can significantly improve the objective and subjective 3D MVV quality.

  17. Description of a New Species of the Andean Butterfly Genus Forsterinaria Gray (Lepidoptera: Nymphalidae) with Considerations on an Apparently New Structure in Male Genitalia.

    Science.gov (United States)

    Zubek, A; Pyrcz, T W; Boyer, P

    2014-02-01

    The butterfly genus Forsterinaria Gray is the only strictly montane representative of the diverse Neotropical subtribe Euptychiina (Nymphalidae, Satyrinae), with 24 described species. Recent research in some of the most isolated and highly diverse Andean regions, such as central Peru, show that its total species richness is still underestimated. An example is the new species described here, Forsterinaria emo n. sp., which is particularly interesting because of an unusual structure discovered in its male genitalia which consists of a bunch of bristle-like processes, composing a fringe-like formation on the dorsum of the tegumen. No similar, homologous structure was found in any congener, nor indeed, in any species of diurnal Lepidoptera. Scanning electron microscope studies revealed that the microstructure of the processes resembles a membrane lining the tegumen. Its function is unknown but two hypotheses are discussed based on a comparative study with other genital structures of butterflies. We argue that it may help stabilizing the partners in the process of mating or it may serve as a 'mating plug', preventing the female from multiple copulations.

  18. WAYS OF COPING AND PSYCHOLOGICAL WELL-BEING IN CANCER PATIENT: A COMPARATIVE STUDY BETWEEN CONCEALED AND UNCONCEALED PATIENTS

    Directory of Open Access Journals (Sweden)

    Koijam Shantibala Devi

    2016-08-01

    Full Text Available Persons with cancer have to go through many painful conditions, face with new and challenging situations the illness brought to their life. Subsequently, all must cope with new stressors; in dealing with the changed situation (s they might feel loss of control over their life events. Moreover, if the patients are involved in treatment process, it may add up more stress. However, at times, patients with advanced cancer also do desire information on risks and prognosis. Therefore, determining ways of coping with challenges in life posed by cancer and also comparing psychological wellbeing between patients who do not know (Concealed group and who know about the diagnosis (Unconcealed group will be helpful in developing a better treatment plans for cancer patients. MATERIALS AND METHODS A total of seventy six (76 cancer patients visiting Department of Radiotherapy, Regional Institute of Medical Sciences (RIMS, Imphal, during February 2014 to December 2014 were enrolled in this study. The total patients were divided into two groups of equal number i.e. 36 each for concealed and unconcealed groups and both the groups were administered the semi-structured questionnaire, Ways of Coping (Folkman S and Lazarus RS, 1985 and The Psychological Wellbeing Index (Dupuy, 1984 and the data were analysed using SPSS version 20.0. RESULTS Comparison on the patients’ ways of coping and also on psychological wellbeing schedule shows no significant difference between the two study groups i.e. concealed and unconcealed groups. Findings on ways of coping subscales are confronting (p=.340, distancing (p=.928, self-control (p=.808, seeking social support (p=.868, accepting responsibility (p=.692, escape-avoidance (p=.941, planful problem solving (p=.106, and positive reappraisal (p=.390, and relation between the two study groups on psychological wellbeing schedule subscales are anxiety (p=.513, depressed mood (p=.700, positive wellbeing (p=.429, self-control (p=.571

  19. Promoting proximal formative assessment with relational discourse

    Science.gov (United States)

    Scherr, Rachel E.; Close, Hunter G.; McKagan, Sarah B.

    2012-02-01

    The practice of proximal formative assessment - the continual, responsive attention to students' developing understanding as it is expressed in real time - depends on students' sharing their ideas with instructors and on teachers' attending to them. Rogerian psychology presents an account of the conditions under which proximal formative assessment may be promoted or inhibited: (1) Normal classroom conditions, characterized by evaluation and attention to learning targets, may present threats to students' sense of their own competence and value, causing them to conceal their ideas and reducing the potential for proximal formative assessment. (2) In contrast, discourse patterns characterized by positive anticipation and attention to learner ideas increase the potential for proximal formative assessment and promote self-directed learning. We present an analysis methodology based on these principles and demonstrate its utility for understanding episodes of university physics instruction.

  20. Orienting response elicitation by personally significant information under subliminal stimulus presentation: demonstration using the concealed information test.

    Science.gov (United States)

    Maoz, Keren; Breska, Assaf; Ben-Shakhar, Gershon

    2012-12-01

    Considerable evidence suggests that subliminal information can trigger cognitive and neural processes. Here, we examined whether elicitation of orienting response by personally significant (PS) verbal information requires conscious awareness of the input. Subjects were exposed to the Concealed Information Test (CIT), in which autonomic responses for autobiographical items are typically larger than for control items. These items were presented subliminally using two different masking protocols: single or multiple presentation of the masked item. An objective test was used to verify unawareness to the stimuli. As predicted, PS items elicited significantly stronger skin conductance responses than the control items in both exposure conditions. The results extend previous findings showing that autonomic responses can be elicited following subliminal exposure to aversive information, and also may have implications on the applied usage of the CIT.

  1. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    Science.gov (United States)

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity.

  2. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  3. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    Science.gov (United States)

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  4. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain fingerprint

  5. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  6. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    Science.gov (United States)

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  7. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  8. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  9. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  10. Quality assessment of reporting of randomization, allocation concealment, and blinding in traditional chinese medicine RCTs: A review of 3159 RCTs identified from 260 systematic reviews

    Directory of Open Access Journals (Sweden)

    He Xiangyu

    2011-05-01

    Full Text Available Abstract Background Randomized controlled trials (RCTs which are of poor quality tend to exaggerate the effect estimate and lead to wrong or misleading conclusions. The aim of this study is to assess the quality of randomization methods, allocation concealment and blinding within traditional Chinese medicine (TCM RCTs, discuss issues identified for current TCM RCTs, and provide suggestions for quality improvement. Methods We searched Chinese Biomedical Database (CBM, 1978 to July 31, 2009 and the Cochrane Library (Issue 2, 2009 to collect TCM systematic reviews and meta-analyses according to inclusion/exclusion criteria, from which RCTs could be identified. The quality assessment involved whether the randomization methods, allocation concealment and blinding were adequate or not based the study reported. Stratified analyses were conducted of different types of diseases published in different journals (both Chinese and foreign using different interventions. SPSS 15.0 software was used for statistic analyses. Results A total of 3159 RCTs were included, of which 2580 were published in Chinese journals and 579 in foreign journals. There were 381 (12% RCTs which used adequate randomization methods; 207 (7% RCTs which used adequate allocation concealment and 601 (19% which used adequate blinding; there were 130 (4% RCTs which both used adequate randomization methods and allocation concealment; and there were only 100 (3% RCTs which used adequate randomization methods, allocation concealment, as well as blinding. In the RCTs published in foreign journals, the adequate randomization methods, allocation concealment and blinding accounted for a relatively large proportion (25%, 26%, and 60%, respectively and increased with years, while in the RCTs published in Chinese journals, only the adequate randomization methods improved over time. The quality of non-drug intervention (chiefly acupuncture RCTs was higher than that of drug intervention RCTs. In drug

  11. Trace Levels of Staphylococcal Enterotoxin Bioactivity Are Concealed in a Mucosal Niche during Pulmonary Inflammation.

    Directory of Open Access Journals (Sweden)

    Antoine Ménoret

    Full Text Available Pathogen and cellular by-products released during infection or trauma are critical for initiating mucosal inflammation. The localization of these factors, their bioactivity and natural countermeasures remain unclear. This concept was studied in mice undergoing pulmonary inflammation after Staphylococcal enterotoxin A (SEA inhalation. Highly purified bronchoalveolar lavage fluid (BALF fractions obtained by sequential chromatography were screened for bioactivity and subjected to mass spectrometry. The Inflammatory and inhibitory potentials of the identified proteins were measured using T cells assays. A potent pro-inflammatory factor was detected in BALF, and we hypothesized SEA could be recovered with its biological activity. Highly purified BALF fractions with bioactivity were subjected to mass spectrometry. SEA was the only identified protein with known inflammatory potential, and unexpectedly, it co-purified with immunosuppressive proteins. Among them was lactoferrin, which inhibited SEA and anti-CD3/-CD28 stimulation by promoting T cell death and reducing TNF synthesis. Higher doses of lactoferrin were required to inhibit effector compared to resting T cells. Inhibition relied on the continual presence of lactoferrin rather than a programming event. The data show a fraction of bioactive SEA resided in a mucosal niche within BALF even after the initiation of inflammation. These results may have clinical value in human diagnostic since traces levels of SEA can be detected using a sensitive bioassay, and may help pinpoint potential mediators of lung inflammation when molecular approaches fail.

  12. Studies on male genitalia of sarcophagidae (Diptera based on scanning electron microscope observations Estudos sobre a genitália masculina de Sarcophagidae (Diptera baseados em observações de microscópio de varredura

    Directory of Open Access Journals (Sweden)

    Antônio Cesar Rios Leite

    1989-06-01

    Full Text Available Male genitalia of Oxyvinia exicisa (Lopes, Oxysarcodexia thomax (Walker, O. fluminensis Lopes, Sarcodexia lambens (Wiedemann, Peckia chrysostoma (Wiedemann and Liopygia ruficornis (Fabricius were studied based on scanning electron microscope photography. Some important details were evidentiated with this method.As genitálias dos machos de Oxyvinia excisa (Lopes, Oxysarcodexia tornax (Walker, O. fluminensis Lopes, sarcodexia lambens (Wiedemann, Peckia chrysostoma (Wiedemann e Liopygia ruficornis (Fabricius foram estudadas com base em fotografias de microscópio de varredura. Alguns detalhes importantes foram evidenciados por este método.

  13. Uso racional: a fonte energética oculta Rational use: the concealed energy source

    Directory of Open Access Journals (Sweden)

    Luiz Augusto Horta Nogueira

    2007-04-01

    Full Text Available Os sistemas energéticos modernos são complexas redes de exploração de recursos naturais, com sucessivos processos de conversão e transporte de energia e um elevado nível de perdas, cuja redução constitui uma fonte virtual de energia, que deve ser mais bem explorada, com vantagens econômicas e ambientais. Nestas notas se revisam os conceitos de perdas em sistemas energéticos e a evolução do marco institucional brasileiro para fomento do uso racional de energia, apresentando-se as perspectivas para a redução dos desperdícios de energia em alguns usos finais: refrigeração doméstica, aquecimento de água residencial, veículos leves e cogeração. São apresentados os potenciais totais estimados de economia de energia elétrica e combustíveis, desagregados por setores de consumo.Modern energy systems are complex exploitation networks of natural resources with successive conversion and energy transportation processes and a high level of losses. These losses constitute a virtual energy source that must be better exploited in order to provide economic and environmental advantages. Here, the concept of energy system loss and the evolution of Brazilian institutional framework to enhance the promotion of a rational use of energy will be presented, as well as the perspectives to reduce energy waste in end uses: domestic refrigeration, residential water heat, light vehicles and cogeneration. The estimated total capacities of electric energy and fuel economy (by consuming sectors are also presented.

  14. High-sensitivity and cost-effective system for infrared imaging of concealed objects in dynamic mode

    Science.gov (United States)

    Gordiyenko, E.; Yefremenko, V.; Pearson, J.; Bader, S. D.; Novosad, V.

    2005-05-01

    Novel, cost-efficient, and highly-sensitive IR imaging systems play an important role in homeland security functions. Technical limitations in the areas of sensitivity, contrast ratio, bandwidth and cost continue to constrain imaging capabilities. We have designed and prototyped a compact computer-piloted high sensitivity infrared imaging system. The device consists of infrared optics, cryostat, low-noise pre-amplifier, Analog-to-Digital hardware, feedback electronics, and unique image processing software. Important advantages of the developed system are: (i) Eight electronic channels are available for simultaneous registration of IR and visible images in multiple spectral ranges, (ii) Capability of real-time analysis such as comparing the "sensed" image with "reference" images from a database, (iii) High accuracy temperature measurement of multiple points on the image by referencing the radiation intensity from the object to a black body model, (iv) Image generation by real-time integration of images from multiple sensors operating from the visible to the terahertz range. The device was tested with a liquid-nitrogen-cooled, single-pixel HgCdTe detector for imaging in 8-12 microns range. The demonstrated examples of infrared imaging of concealed objects in static and dynamic modes include a hammer (metal head and wooden handle), plastic imitator of handguns hidden under clothes, powder in an envelope, and revealing complex wall structures under decorative plaster.

  15. NGC1448 and IC 3639: Two Concealed Black Holes Lurking in our Cosmic Backyard Unveiled by NuSTAR

    Science.gov (United States)

    Stern, Daniel; Boorman, Peter; Annuar, Ady; Gandhi, Poshak; Alexander, D. M.; Lansbury, George B.; Asmus, Daniel; Ballantyne, David R.; Bauer, Franz E.; Boggs, Steven E.; Brandt, W. Niel; Brightman, Murray; Christensen, Finn; Craig, William W.; Farrah, Duncan; Goulding, Andy D.; Hailey, Charles James; Harrison, Fiona; Hoenig, Sebastian; Koss, Michael; LaMassa, Stephanie M.; Masini, Alberto; Murray, Stephen S.; Ricci, Claudio; Risaliti, Guido; Rosario, David J.; Stanley, Flora; Zhang, William

    2017-01-01

    We present NuSTAR observations of two nearby Active Galactic Nuclei (AGN), NGC 1448 and IC 3639, located at distances of 12 Mpc and 54 Mpc, respectively. NuSTAR high-energy X-ray (> 10 keV) observations, combined with archival lower energy X-ray observations from Chandra and Suzaku, reveal both sources to contain heavily obscured, accreting super-massive black holes. NGC 1448 is one of the nearest luminous galaxies to the Milky Way, yet the AGN at its centre was only discovered in 2009. Using state-of-the-art models, we constrain the obscuring column density (NH) of gas concealing both AGN, finding them to be extreme, with NH values well into the Compton-thick (CT) regime with N(H) > 3e24 /cm2. NGC 1448 has an intrinsic X-ray luminosity of L(24 keV) ˜ 5e40 erg/s, making it one of the lowest luminosity CT AGN known. IC 3639, on the other hand, has one of the strongest iron fluorescence emission lines known. We also discuss multi-wavelength diagnostics at optical and mid-infrared energies as indirect indicators to penetrate through the obscuring veils and probe the intrinsic properties of the AGN. Through detailed studies such as we present here, NuSTAR is showing that there are still plenty of interesting discoveries awaiting to be made, even in the nearby Universe.

  16. The dengue virus conceals double-stranded RNA in the intracellular membrane to escape from an interferon response

    Science.gov (United States)

    Uchida, Leo; Espada-Murao, Lyre Anni; Takamatsu, Yuki; Okamoto, Kenta; Hayasaka, Daisuke; Yu, Fuxun; Nabeshima, Takeshi; Buerano, Corazon C.; Morita, Kouichi

    2014-01-01

    The dengue virus (DENV) circulates between humans and mosquitoes and requires no other mammals or birds for its maintenance in nature. The virus is well-adapted to humans, as reflected by high-level viraemia in patients. To investigate its high adaptability, the DENV induction of host type-I interferon (IFN) was assessed in vitro in human-derived HeLa cells and compared with that induced by the Japanese encephalitis virus (JEV), a closely related arbovirus that generally exhibits low viraemia in humans. A sustained viral spread with a poor IFN induction was observed in the DENV-infected cells, whereas the JEV infection resulted in a self-limiting and abortive infection with a high IFN induction. There was no difference between DENV and JEV double-stranded RNA (dsRNA) as IFN inducers. Instead, the dsRNA was poorly exposed in the cytosol as late as 48 h post-infection (p.i.), despite the high level of DENV replication in the infected cells. In contrast, the JEV-derived dsRNA appeared in the cytosol as early as 24 h p.i. Our results provided evidence for the first time in DENV, that concealing dsRNA in the intracellular membrane diminishes the effect of the host defence mechanism, a strategy that differs from an active suppression of IFN activity. PMID:25491663

  17. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  18. 简述隐藏合页式门窗五金及型材%Brief introduction of hardwares and profiles for concealed hinge window and door

    Institute of Scientific and Technical Information of China (English)

    孙波

    2009-01-01

    针对最近某些建筑项目中要求合页隐藏的门窗的情况.本文就五金及相关型材进行了讨论.%In recent years, some customers and architects asked the hinges of windows or doors to be concealed. On their request, the author made research on the related profile and hardware.

  19. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Science.gov (United States)

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  20. Metazoan promoters

    DEFF Research Database (Denmark)

    Lenhard, Boris; Sandelin, Albin Gustav; Carninci, Piero

    2012-01-01

    Promoters are crucial for gene regulation. They vary greatly in terms of associated regulatory elements, sequence motifs, the choice of transcription start sites and other features. Several technologies that harness next-generation sequencing have enabled recent advances in identifying promoters...... and their features, helping researchers who are investigating functional categories of promoters and their modes of regulation. Additional features of promoters that are being characterized include types of histone modifications, nucleosome positioning, RNA polymerase pausing and novel small RNAs. In this Review, we...... discuss recent findings relating to metazoan promoters and how these findings are leading to a revised picture of what a gene promoter is and how it works....

  1. Novel, real-time standoff detection of explosives and other substances concealed under clothing, integrated into standard TV images via data fusion

    Science.gov (United States)

    Diamond, G. G.; Gohel, R. B.

    2009-05-01

    A novel and low-cost technique of standoff detection is presented that permits the detection of explosives and other contraband substances that are hidden under clothing at standoff distances . The technique uses NIR beams of wavelengths found in ordinary domestic remote controls, combined with various signal recovery techniques commonly used in astronomy. This alternative technique, whilst sophisticated, utilises readily available optoelectronic components. It is inherently far more portable than currently available commercial alternatives and is easy to use. A pre-production prototype successfully detected and identified the common homemade explosives, ammonium nitrate and hydrogen peroxide, which were concealed behind clothing from a distance of 5 metres under daytime conditions. In principle, this distance could be extended as far as 50 metres without a significant increase in cost or complexity. Another advantage of this device is that apart from providing standoff chemical signatures and analyses of concealed substances, this it can simultaneously superimpose the chemical information on top of a normal TV image in a data fusion approach; that is, an image appears on the screen , the area/subject of interest can be zoomed in on and enlarged and a representation of a chemical spectrum appears on the screen underneath the image. A supplemental technique is also reported upon that, under the appropriate circumstances, enable actual imaging of concealed objects to be accomplished.

  2. An algorithm to unveil the inner structure of objects concealed by beam divergence in radiographic image acquisition systems

    Energy Technology Data Exchange (ETDEWEB)

    Almeida, G. L.; Silvani, M. I. [Instituto de Engenharia Nuclear - CNEN, Caixa Postal 68550, CEP 21945-970, Rio de Janeiro (Brazil); Lopes, R. T. [Laboratório de Instrumentação Nuclear - UFRJ, Caixa Postal 68509, CEP 21945-970, Rio de Janeiro (Brazil)

    2014-11-11

    Two main parameters rule the performance of an Image Acquisition System, namely, spatial resolution and contrast. For radiographic systems using cone beam arrangements, the farther the source, the better the resolution, but the contrast would diminish due to the lower statistics. A closer source would yield a higher contrast but it would no longer reproduce the attenuation map of the object, as the incoming beam flux would be reduced by unequal large divergences and attenuation factors. This work proposes a procedure to correct these effects when the object is comprised of a hull - or encased in it - possessing a shape capable to be described in analytical geometry terms. Such a description allows the construction of a matrix containing the attenuation factors undergone by the beam from the source until its final destination at each coordinate on the 2D detector. Each matrix element incorporates the attenuation suffered by the beam after its travel through the hull wall, as well as its reduction due to the square of distance to the source and the angle it hits the detector surface. When the pixel intensities of the original image are corrected by these factors, the image contrast, reduced by the overall attenuation in the exposure phase, are recovered, allowing one to see details otherwise concealed due to the low contrast. In order to verify the soundness of this approach, synthetic images of objects of different shapes, such as plates and tubes, incorporating defects and statistical fluctuation, have been generated, recorded for further comparison and afterwards processed to improve their contrast. The developed algorithm which, generates processes and plots the images has been written in Fortran 90 language. As the resulting final images exhibit the expected improvements, it therefore seemed worthwhile to carry out further tests with actual experimental radiographies.

  3. The Concealing Of Women In Residential Space%住宅空间女性的隐匿

    Institute of Scientific and Technical Information of China (English)

    周艺晶

    2016-01-01

    有关空间性别问题的讨论来源于19世纪末在欧美国家兴起的女性主义运动。这个运动致力于为女性谋求与男性平等的社会地位。这一理想的诉求反映在建筑学领域的空间上,便引发出了另一种对空间属性的解读。有关空间与性别的探讨开始正式成为设计话语的一部分。通过住宅这一主要被大众使用的典型空间去回顾传统住宅中的女性空间,以及剖析现代住宅空间中女性的失语和隐匿。并以此分析未来住宅设计的趋势和发展方向。%The discussion on gendered space can be traced back to nineteenth century when feminist movement rose in western countries. This movement aimed at helping women strive for the same social status as men. In fact, the impact of this appeal has spread to the field of architecture, which led to another interpretation of space feature. As a result, gendered space has officialy been one part of design context. Feminine space in traditional residence is reviewed and concealing state of women in modern residence is analyzed in detail. The design tendency and development orientation of residence in the future are also under discussion.

  4. Geometrical configurations of unphased diffraction-limited antennas in passive millimetre-wave imaging systems for concealed weapon detection

    Science.gov (United States)

    Serenelli, Roberto

    2004-12-01

    This paper analyzes simple imaging configurations to scan a human body, suitable as passive or active millimetre-wave imaging systems for concealed weapon detection (CWD). The first cylindrical configuration allows a 360 degrees scan: N unphased diffraction-limited antennas each of size L are placed on a circular support surrounding the subject (allowing scanning in the horizontal plane with N non-overlapping independent beams), and this circle is mechanically displaced over the whole body height. An analytical formula gives the maximum obtainable spatial resolution for different dimensions of the circular scanning device and operating frequencies, and the number of receivers achieving this optimal resolution. Constraints to be taken into account are diffraction, the usable total length of the circle, and the full coverage by the N beams over the subject, which is modelled as a cylinder with variable radius, coaxial with the scanning circle. Numerical calculations of system resolution are shown for different operating microwave (MW) and millimetre-wave (MMW) frequencies; in order to study off-axis performances, situations where the subject is not coaxial with the scanning device are also considered. For the case of a parallelepiped to be imaged instead of a cylinder, a linear array configuration is analyzed similarly to the circular one. A theoretical study is carried out to design other curved arrays, filled with unphased diffraction-limited antennas, for the imaging of linear subjects with finer resolution. Finally, the application of such configurations is considered for the design of active imaging systems, and different system architectures are discussed.

  5. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  6. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  7. Lissencephaly, abnormal genitalia and refractory epilepsy: case report of XLAG syndrome Lisencefalia, genitália ambígua e epilepsia refratária: relato de caso da síndrome XLAG

    Directory of Open Access Journals (Sweden)

    Mônica Jaques Spinosa

    2006-12-01

    Full Text Available INTRODUCTION: X-linked lissencephaly with ambiguous genitalia (XLAG is a recently described genetic disorder caused by mutation in the aristaless-related homeobox (ARX gene (Xp22.13. Patients present with lissencephaly, agenesis of the corpus callosum, refractory epilepsy of neonatal onset, acquired microcephaly and male genotype with ambiguous genitalia. CASE REPORT: Second child born to healthy nonconsanguineous parents, presented with seizures within the first hour of life that remained refractory to phenobarbital, phenytoin and midazolam. Examination identified microcephaly, axial hypotonia, pyramidal signs and ambiguous genitalia. EEG showed disorganized background activity and seizures starting at the right midtemporal, central and occipital regions. MRI showed diffuse pachygyria, moderate thickening of the cortex, enlarged ventricles, agenesis of the corpus callosum and septum pellucidum. Karyotype showed a 46,XY genotype. Additional findings were hypercalciuria, vesicoureteral reflux, patent ductus arteriosus and chronic diarrhea.INTRODUÇÃO: Lisencefalia com genitália ambígua ligada ao X (XLAG é doença genética recentemente descrita, causada por mutação no gene aristaless-related homeobox (ARX (Xp22.13. Os pacientes apresentam lisencefalia, agenesia de corpo caloso, epilepsia refratária com início no período neonatal, microcefalia adquirida e genótipo masculino com genitália ambígua. RELATO DE CASO: Segundo filho de pais não-consangüíneos, apresentou crises na primeira hora de vida que permaneceram refratárias a fenobarbital, fenitoína e midazolam. Apresentava microcefalia, hipotonia axial, sinais de liberação piramidal e genitália ambígua. EEG demonstrou atividade de base desorganizada, crises convulsivas com início nas regiões temporal-média, central e occipital direitas. RNM demonstrou paquigiria difusa, moderado espessamento do córtex, ventrículos aumentados, agenesia de corpo caloso e septo pel

  8. Disclosing and Concealing

    DEFF Research Database (Denmark)

    Flyverbom, Mikkel

    2016-01-01

    The ubiquity of digital technologies and the datafication of many domains of social liferaise important questions about governance. In the emergent field of internet governancestudies, most work has explored novel governance arrangements, institutional developmentsand the effects of interactions...... among public and private actors in the emergence of the internetas a matter of concern in global politics. But the digital realm involves more subtle forms ofgovernance and politics that also deserve attention. In this paper, I suggest that the 'ordering'effects of digital infrastructures also revolve...... around what I term the ‘management of visibilities’.Drawing on insights from science and technology studies and sociologies of visibility, the paperarticulates how digital technologies afford and condition ordering through the production ofvisibilities and the guidance of attention. The basic tenet...

  9. Drotaverine - a Concealed Cytostatic!

    Science.gov (United States)

    Pavel, Ioana Z; Heller, Lucie; Sommerwerk, Sven; Loesche, Anne; Al-Harrasi, Ahmed; Csuk, René

    2017-01-01

    Drotaverine (also known as dihydroperparine or No-Spa(®) ) is an antispasmodic drug closely related to papaverin. Drotaverin also acts as a cytostatic compound for several human tumor cell lines and nonmalignant mouse fibroblasts, and EC50 values as low as 3.0 μM were observed in SRB assays for HT-29 human colorectal carcinoma cells. Small structural changes (e.g., aromatization, benzylic oxidation) led to a reduced activity or a complete loss of cytotoxicity. Staining of the cells with acridine orange showed the cell membrane of the dead cells to be still intact, and a slight G1/G0 arrest in the treated cells was observed after 24 h. Extra annexin V-FITC/PI assays and flow cytometry revealed drotaverine mainly to act as a cytostatic and only to a minor extent as cytotoxic agent.

  10. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  11. 内核入侵隐藏技术的研究与实现%Research and Realization of Concealment Technology Based on Kernel Hacking

    Institute of Scientific and Technical Information of China (English)

    李鹏; 王汝传

    2011-01-01

    Makes research on code concealment technology based on kernel hacking module without loadable kernel.It firstly analyzes the difference in kernel hacking method between module with loadable kernel and module without loadable kernel.Then.it expatiates the eight main steps of kernel hacking, which includes computing the address of system call table, calculating the address of kmalloc function, programming kernel space memory assignment function, implementing invasion codes, processing assembly code, extracting code segments and relocation information, assigning kernel space memory, and writing assigned memory.Based on summarizing the concealment technical principles of kernel hacking codes, finally designs and implements the kernel hacking technologies, which includes concealing file information, process information and network connections.%对不支持可加载模块的系统内核入侵代码隐藏技术进行了研究.比较了内核支持可加载模块和内核不支持可加载模块的内核入侵的方法区别,阐述了内核入侵在求解系统调用表的地址、kmalloc函数的地址、编写函数分配内核空间内存、编写入侵代码、汇编代码处理、提取代码段及重定位信息、分配内核空间的内存、代码写入分配的内存等八个主要流程.在总结入侵代码隐藏技术原理的基础上,给出了入侵代码隐藏文件信息、进程信息和网络连接技术的详细设计实现.

  12. Obstacle avoidance and concealed target detection using the Army Research Lab ultra-wideband synchronous impulse reconstruction (UWB SIRE) forward imaging radar

    Science.gov (United States)

    Nguyen, Lam; Wong, David; Ressler, Marc; Koenig, Francois; Stanton, Brian; Smith, Gregory; Sichina, Jeffrey; Kappra, Karl

    2007-04-01

    The U.S. Army Research Laboratory (ARL), as part of a mission and customer funded exploratory program, has developed a new low-frequency, ultra-wideband (UWB) synthetic aperture radar (SAR) for forward imaging to support the Army's vision of an autonomous navigation system for robotic ground vehicles. These unmanned vehicles, equipped with an array of imaging sensors, will be tasked to help detect man-made obstacles such as concealed targets, enemy minefields, and booby traps, as well as other natural obstacles such as ditches, and bodies of water. The ability of UWB radar technology to help detect concealed objects has been documented in the past and could provide an important obstacle avoidance capability for autonomous navigation systems, which would improve the speed and maneuverability of these vehicles and consequently increase the survivability of the U. S. forces on the battlefield. One of the primary features of the radar is the ability to collect and process data at combat pace in an affordable, compact, and lightweight package. To achieve this, the radar is based on the synchronous impulse reconstruction (SIRE) technique where several relatively slow and inexpensive analog-to-digital (A/D) converters are used to sample the wide bandwidth of the radar signals. We conducted an experiment this winter at Aberdeen Proving Ground (APG) to support the phenomenological studies of the backscatter from positive and negative obstacles for autonomous robotic vehicle navigation, as well as the detection of concealed targets of interest to the Army. In this paper, we briefly describe the UWB SIRE radar and the test setup in the experiment. We will also describe the signal processing and the forward imaging techniques used in the experiment. Finally, we will present imagery of man-made obstacles such as barriers, concertina wires, and mines.

  13. Health Promotion

    DEFF Research Database (Denmark)

    Povlsen, Lene; Borup, I.

    2015-01-01

    In 1953 when the Nordic School of Public Health was founded, the aim of public health programmes was disease prevention more than health promotion. This was not unusual, since at this time health usually was seen as the opposite of disease and illness. However, with the Ottawa Charter of 1986......, the World Health Organization made a crucial change to view health not as a goal in itself but as the means to a full life. In this way, health promotion became a first priority and fundamental action for the modern society. This insight eventually reached NHV and in 2002 - 50 years after the foundation...... - an associate professorship was established with a focus on health promotion. Nevertheless, the concept of health promotion had been integrated with or mentioned in courses run prior to the new post. Subsequently, a wide spectrum of courses in health promotion was introduced, such as Empowerment for Child...

  14. 基于场景检测的错误隐藏技术%Error concealment based on scene change detection

    Institute of Scientific and Technical Information of China (English)

    赖昌材; 郝重阳; 沈向余

    2006-01-01

    提出了可以用于H.264/AVC解码器的基于场景变换检测的错误隐藏机制,首先利用H.264/AVC的快速准确的检测是否发生场景切换,根据场景切换检测结果对预测帧和I帧分别提出相应的时间空间自适应的错误隐藏方法. 实验结果表明,所提方法在错误隐藏的重构图像质量在主观感觉和客观PSNR定量上,都比通常的方法有明显的提高;与传统错误隐藏方法相比,本文的基于场景切换检测的错误隐藏机制鲁棒性高,更能适应的H.264/AVC更为复杂的多种应用场合.%Conventional temporal error concealment method will become ineffective for corrupt macroblocks (MBs) once scene changes occur in video sequences. In this paper, we propose a scene change detection based error concealment methodology for H.264/AVC. We use the encoding mode information of macroblocks in a frame to detect the scene change for inter frames. Then a method to detect scene change for intra frames is proposed. Based on the new characters of H.264/AVC and the results of presented scene change detection, the block based temporal concealment with boundary match criteria and spatial error concealment scheme is adaptively adopted for inter and intra frames. The proposed methodology can make use of the available redundancy in bit streams as possible. A new video sequence with several scene changes is created, and its simulation results demonstrate the robustness of the proposed methodology and its considerable improvement in visual quality of reconstructed pictures.

  15. Lead isotopic exploration intersecting mineralization zones for the depth forecast of concealed deposits——A case from Longbohe Cu deposit,Jinping, Yunnan Province,China

    Institute of Scientific and Technical Information of China (English)

    常向阳; 朱炳泉; 邹日

    2000-01-01

    Pb isotopic geochemical exploration intersecting mineralization zones have been well developed in the light of the eigenvalues V1 and V2 of three-dimensional topological projection of Pb isotopic data. The newly developed theoretical model forecasting concealed deposits has been verified in the evaluation of Longbohe copper deposit in Jinping, Yunnan Province, which is consistent with the observed law of depth variation for Pb isotopes. The forecasting results show that the depth of buried major orebody should occur at about -50 to -400 m and deeper within the eastern and western mineralization belts of Longbohe copper deposit.

  16. 改良隐匿性阴茎手术17例报告%Analysis of a surgical method for concealed penis repair

    Institute of Scientific and Technical Information of China (English)

    冯宁翰; 许斌; 杨杰; 吴宏飞; 眭元庚; 顾民; 张炜; 华立新; 王增军

    2011-01-01

    目的 探讨治疗幼儿隐匿性阴茎的简单有效术式.方法 回顾性分析2005年7月至2008年12月17例应用阴茎脱套加固定术治疗的隐匿性阴茎患者临床资料和随访资料.17例患者合并包茎5例,手术运用阴茎脱套加固定术,在行包皮整形的同时延长阴茎.结果 所有手术均获成功,手术时间平均1.25h,所有患者均得到12月以上的随访,本组所有患者术后阴茎头均能在自然状况下显露,阴茎发育满意,外观效果好,无并发症.结论 阴茎脱套加根部固定术是治疗隐匿性阴茎的一种切实有效术式,手术风险小,成功率高.%Objective To explore a simple surgical technique for congenital concealed penis repair.Methods Clinical data of 17 cases with concealed penis whose penis were all treated by anchoring the penoscrotal and penopubic junctions and skin coverage by a local flap, from 2005 to 2008 in our hospital, were retrospectively analyzed.Results 17 consecutive patients were treated in 2005~2008.They underwent penoplasty and circumcision, at the same time extending the penis.All operations were successful and the average operative time was 75 min.All patients received more than 12 months following up after operations.They were satisfied with the development of the penis, appearance effects, and no complications.Conclusion Revealing the concealed penis is a complicated procedure.This surgical approach used in the study is a promising method with good effect and little complication for concealed penis repair.

  17. Correction for concealed penis after misdiagnosis and mistherapy%隐匿性阴茎误诊误治后的矫治

    Institute of Scientific and Technical Information of China (English)

    周如意; 陈军; 阳晓林; 潘泽意; 黄明义; 李中华

    2012-01-01

    目的:探讨隐匿性阴茎被误诊为包皮过长并行包皮环切术后的有效补救手术方法.方法:对21例隐匿性阴茎被误诊为包皮过长并行包皮环切术后的患者,采用改良的Devine术式矫治隐匿性阴茎和阴囊中隔带蒂皮瓣修复阴茎的皮肤缺损,观察其疗效.结果:21例患者阴茎外观均获恢复或接近正常,无一例出现皮瓣坏死,其中2例出现阴茎水肿,3月后恢复正常.随访1~2年无一例阴茎回缩,排尿勃起功能正常.结论:隐匿性阴茎误诊为包皮过长行包皮环切后,用改良的Devine术式治疗隐匿性阴茎和阴囊中隔带蒂皮瓣修复阴茎皮肤缺损是一种较好的手术补救方法.%Objective To study the effective correction for concealed penis after being misdiagnosed redundant prepuce and operated by circumcision. Methods 21 concealed penis patients misdiagnosed redundant prepuce and operated by circumcision were corrected by improved Devine's operation through midline scrotal flap with vessel pedicle for defectofskin. Results Shapes of 21 patients' penis were all recovered or nearly normal, and none appeared skin flap necrosis. Two cases appeared edeama of the penis, but recoverd after 3 month. The penises were all developed normal without problem of uresis and erectile function. Conclusion Improved Devine's operation for concealed penis associated with midline scrotal flap with vessel pedicle for defectofskin is a effective remediation for concealed penis after misdiagnosis and mistherapy.

  18. Devine improved surgical treatment conceals the penis 40 case analysis%改良Devine术治疗隐匿阴茎40例分析

    Institute of Scientific and Technical Information of China (English)

    黄建忠; 刘连地; 庄东阳; 黄唯庶

    2012-01-01

    目的:探讨简单有效的隐匿阴茎手术方式.方法:采用改良Devine术式,切除阴茎皮下异常的纤维条索状组织,将阴茎根部白膜和真皮固定于耻骨筋膜上.结果:所有手术均获成功,平均手术时间50min,随访6个月~6年,阴茎发育满意,外观效果好,未见阴茎回缩,无并发症.结论:改良Devine术式操作简单,术野好,手术效果满意,是治疗隐匿阴茎实用有效的手术方法.%Objective Explore simple effective conceals the penis operation method. Methods Modified Devine operation,with the exception of the penis subcutaneous article fiber cable shape organization,penis root white film and leather fixed in the pubis fascia. Results All are performed success.average operation time 50 min,were followed up for 6 months to 6 years,the penis development satisfied,exterior effect is good,did not see the penis retraction,and no complications. Conclusions Improved Devine operation simple operation.good operative field, surgery with satisfactory effect.is the treatment conceals a practical and effective operation method penis.

  19. 小儿隐匿阴茎(附13例报告)%Concealed Penis in Children A Report of 13 Cases

    Institute of Scientific and Technical Information of China (English)

    杨楚墩; 舒涛; 代世希

    1987-01-01

    Concealed penis is a congenital abnormality in which the skin is unattached to the penile shaft. It is not very rare in children. Thirteen cases of concealed penis were treated from Jan. 1984 to Aug. 1986. All of them had difficult miturition and wetting. The penis seemed to be abrsent, Icases were associated with phimosis. Two underwent a simple circumcision but still had a buried penis after operation. One treated with bilateral longitudinal incision and transverse suture was also unsatisfactory. The other ten were terated with phalloplasty. A lengthening of the penis from 1.6 to 3cm(mean 2.2cm)was acheived postoperatively. In the follow-up study, 8 were satisfactory. as indicated by a normal appearance of the penis, cornplete exposure of the glans and the normal micturition, and 2 had incomplete exposure glans but normal micturition. The authors emphasize the importance of fixing the skin to the peaile base. The associated phimosis should be corrceted simultaneously.%作者自1984年以来共收治了13例隐匿阴茎的患儿,其中10例行阴茎体固定术,经随访观察8例疗放优,2例明显改善,无失败病例.文中对该症的病因,诊断和治疗进行了讨论.

  20. Genetic Diversity of SCN5A Gene and Its Possible Association with the Concealed Form of Brugada Syndrome Development in Polish Group of Patients

    Directory of Open Access Journals (Sweden)

    Beata Uziębło-Życzkowska

    2014-01-01

    Full Text Available Brugada Syndrome (BS is an inherited channelopathy associated with a high incidence of sudden cardiac death. The paper presents the discovery of new genetic variants of SCN5A gene which might be associated with the development of a concealed form of Brugada Syndrome. The study involved a group of 59 patients (37 men with suspected concealed form of Brugada Syndrome. Pharmacological provocation with intravenous ajmaline administration was performed. Six patients with positive test results were subjected to molecular analysis of SCN5A gene with MSSCP method. Additionally, MSSCP genotyping was performed for samples obtained from the family members with Brugada Syndrome, despite the fact that they had negative ajmaline challenge test results. Genetic examinations of the SCN5A gene at 6 positive patients showed 6 known polymorphisms, 8 new single nucleotide point (SNP variants located at exons, and 12 new single nucleotide point variants located at introns. Among new SNPs localized in SCN5A gene exons three SNPs affected the protein sequence.

  1. 82例隐匿性阴茎分型与治疗%The Type and Treatment of 82 Cases of Concealed Penis

    Institute of Scientific and Technical Information of China (English)

    杨正荣

    2015-01-01

    Objective:To analyse the type and treatment of concealed penis.Method:From April 2011 to July 2012 in our hospital the experience of 84 concealed penis patients was summarized.They were divided into bands type,phimosis type,obesity,small holster according to the pathological changes of concealed penis,the control group received drug treatment,the observation group were given targeted operation treatment,“penis dorsal Y.V”operation was used for phimosis type,bands type was used cable fiber cable release,resection.The small holster was inverted“Y.V”operation.Severe obesity type would be on both sides of the tunica albuginea penis body fixed on the root of the penis,penis skin.Result:The patients in the observation group were more significantly improve the situation,the total effective rate was 95.24%,the total effective rate of the control group was only 47.62%. Conclusion:The classified and treatment according to different condition for concealed penis,is advantageous to the correction in patients with concealed penis,can improve their quality of life.%目的:分析探讨隐匿性阴茎的类型及治疗方式。方法:总结2011年4月-2012年7月笔者所在医院诊治的84例隐匿阴茎患者的经验。根据隐匿阴茎的病变情况可分为索带型、包茎型、肥胖型、小皮套型,对照组进行药物治疗,观察组给予针对性手术治疗,包茎型进行阴茎背侧“Y.V”手术,索带型进行纤维索带松解、切除。小皮套型进行倒“Y.V”手术。严重单纯肥胖型者,将阴茎皮肤固定于阴茎根部的阴茎体两侧白膜上。结果:观察组患者改善情况较为显著,其总有效率达到了95.24%,对照组总有效率仅为47.62%。结论:对隐匿阴茎进行分型,并按照不同病情进行治疗,有利于纠正患者隐匿阴茎,提高其生活质量。

  2. 隐伏矿体定位预测的方法学基础及方法论%METHODOLOGICAL FOUNDATION AND METHODOLOGY FOR THE LOCATION FORECASTING OF CONCEALED OREBODY

    Institute of Scientific and Technical Information of China (English)

    祝洪臣; 张炯飞; 权恒

    2000-01-01

    The location forecasting of concealed orebody is the frontier and stress of research in metallogeny and metallogenic prognosis. This paper discusses on the methodological foundation and methodology for the location forecasting of concealed orebody. The author points out: (1) big-ideas, small-scale, and high-precison are the methodological foundation for the location forecasting of concealed oredody; (2) metallogenic analysis is the methodology for the location forecasting of concealed orebody; (3) structural analysis is the best way for the location forecasting of concealed orebody; and (4) the combinative forecasting method is a new tool for the location forecasting of concealed orebody.%隐伏矿体定位预测是当前成矿学和成矿预测学的科学前沿和研究重点.重点讨论了隐伏矿体定位预测的方法学基础及方法论.指出:(1)大思路、小尺度、高精度是隐伏矿体定位预测的方法学基础;(2)成矿分析是隐伏矿体定位预测的方法论;(3)结构分析是隐伏矿体定位预测的最有效途径;(4)组合预测方法是隐伏矿体定位预测的新工具.

  3. Promoting Models

    Science.gov (United States)

    Li, Qin; Zhao, Yongxin; Wu, Xiaofeng; Liu, Si

    There can be multitudinous models specifying aspects of the same system. Each model has a bias towards one aspect. These models often override in specific aspects though they have different expressions. A specification written in one model can be refined by introducing additional information from other models. The paper proposes a concept of promoting models which is a methodology to obtain refinements with support from cooperating models. It refines a primary model by integrating the information from a secondary model. The promotion principle is not merely an academic point, but also a reliable and robust engineering technique which can be used to develop software and hardware systems. It can also check the consistency between two specifications from different models. A case of modeling a simple online shopping system with the cooperation of the guarded design model and CSP model illustrates the practicability of the promotion principle.

  4. 隐匿阴茎不同术式的疗效比较%Comparison of different surgical techniques for treatment of concealed penis

    Institute of Scientific and Technical Information of China (English)

    李波涌; 张国富; 王欢; 唐秀英; 李斌; 范星球; 林海岳

    2010-01-01

    Objective To compare the effects of different surgical techniques for treatment of concealed penis. Methods A retrospective review of 219 patients underwent surgical correction of concealed penis between 1986 and 2007 was performed. The mean age was (10.3±2.4) years(3-15 years). The penile length was (1.9±0. 5)cm(0. 5-3. 0 cm)before operation. Ninty-three patients were the severe degree of concealed penis. The others were the moderate degree. All patients under-went operation with different techniques, including Johnston's technique in 34, Devine's technique in 42, modified Devinds technique in 125 and Brisson's technique in 18. The increased length of penile af-ter operation was compared among the 4 groups with different surgical techniques by statistical meth-od. Results The postoperative increased length of penile in Johnston's technique, Devine's tech-nique, modified Devine's technique and Brisson's technique was (1.8 ± 0. 4) cm, (2. 0 ± 0. 5) cm, (2.1±0.4)cm and (2.3±0.4)cm respectively. The difference was significant by ANOVA test (F=13.1,P<0. 001). Devines technique, modified DevineSs technique and Brisson's technique were better than Johnston's technique considering the increased length of penile. The complication of severe penile lymphedema of 4 groups developed in 8, 5, 6 and 2 patients respectively. Conclusion Modified De-vine's technique has the satisfactory increasing of penile length for treatment of concealed penis and less complication rate after operation.%目的 探讨隐匿阴茎不同术式的疗效.方法 回顾性分析1986-2007年手术治疗219例隐匿阴茎患儿临床资料.年龄3~15(10.3±2.4)岁.术前测量阴茎外露长度0.5~3.0(1.9±0.5)cm,其中重度93例,中度126例.采用Johnston术34例,Devine术42例,改良Devine术125例,Brisson术18例.比较4种术式患儿术后阴茎长度增加的差异. 结果 Johnston术、Devine术、改良Devine术和Brisson术患儿术后阴茎外露增加长度分别为(1.8±0.4)、(2

  5. Sex difference in choice of concealed or exposed refuge sites by preschool children viewing a model leopard in a playground simulation of antipredator behavior

    Directory of Open Access Journals (Sweden)

    Richard G. Coss

    2016-07-01

    Full Text Available The current study of preschool children characterizes a semi-natural extension of experimental questions on how human ancestors evaded predation when encountering dangerous felids. In a pretend game on a playground, we presented full-size leopard and deer models to children (N = 39 in a repeatedmeasures experimental design. Prior to viewing the model presented 15-m away, each child was instructed by the experimenter to go where she or he would feel safe. The rationale for this study was based on the anthropological construct of “sexual dinichism,” positing that, during the Pliocene, smaller-bodied hominin females engaged in more arboreal behavior than larger-bodied males. Consistent with this construct, our previous simulation research using images of an African rock outcrop showed that, after viewing a lion, girls preferred a tree as refuge rather than a crevice or large boulder whereas boys did not differentiate these refuge sites. In this follow-up study, we predicted that, after viewing the model leopard, the preschool girls would differ from the boys by not choosing enclosed refuge sites analogous to the crevice. Analyses of a contingency table for the leopard model supported this hypothesis by yielding a significant interaction of sex and refuge location (p = .031, d = .76, the source of which was a reliably larger percentage of girls not choosing concealed refuge (p = .005, d = 2.3. The interaction of sex and refuge location for the model deer was not significant (p > .5. Our findings suggest that, in contrast to the deer, the girls selected exposed playground refuge sites rather than concealing ones to maintain visual contact with the leopard as a contingency for future action

  6. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (ppresent pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation.

  7. Cochrane系统评价中如何处理分配方案隐藏%How Allocation Concealment Is Handled in Cochrane Reviews

    Institute of Scientific and Technical Information of China (English)

    Philippa Middleton

    2004-01-01

    Objective ① To document the way in which allocation concealment is described and coded for studies included in Cochrane Reviews.②To feed back any gaps or miscodings to individual review groups.③ To suggest changes and expansions to advice on how to code and describe allocation concealment methods.Methods The coding and description of methods of allocation concealment for studies included in all 1 596 reviews on issue 1, 2003 of The Cochrane Library are being extracted.So far results are available for 10.8% (173/1 596) of reviews containing 1 844 studies, from 10 Collaborative Review Groups (CRGs).Discrepancies, and inconsistencies with the Cochrane Reviewers' Handbook, are being documented and analysed.Results The current coding of the adequacy of allocation concealment in studies included in Cochrane reviews is not likely to be very accurate.This is due to failure to describe methods of allocation concealment (38.6% of the sample of 1 844 studies) as well as miscoding (at least an additional 9.2%).The most common method for studies coded A was some variation of envelope use (133/675-19.7% of all A codes). The most common "method" for studies coded B was method unclear or not described in the report of the study (426/665, 64% of all B codes).Conclusions Since adequate allocation concealment is so important in protecting against bias in randomised controlled trials, it needs to be accurately coded and described.We need to improve how this is done for studies included in Cochrane Reviews.Since over half the studies coded as D were likely to have been where reviewers omitted to enter a code, the default should be changed from D to "code not supplied".Structural changes to RevMan are suggested-ideally the addition of a separate new study quality assessment table with fixed headings as well as the facility to enter free text.Suggestions for improving coding in particular reviews will be fed back to CRGs in the next stages of this project.Suggestions for

  8. Borselino术矫治隐匿性阴茎的临床疗效研究%Clinical Study of Borselino Procedure in the Treatment of Concealed Penis

    Institute of Scientific and Technical Information of China (English)

    李永林

    2013-01-01

    Objective To evaluate the effect of Borselino procedure in the treatment of concealed penis. Methods 27 patients with concealed penis admitted to our hospital from May 2011 to January 2012 were selected. The clinical manifestations of these patients were small penis, penis concealed under skin, abdominal skin only reaching prepuce, prepuce wrapping penis like bird beak but not attached to penis. When the base of penis was squeezed, the penis was exposed. All the 27 patients were treated by Borselino procedures. Results All the 27 patients had satisfactory effect. When the penis was limp, the penis, penis scrotum groove and penis pubis groove were exposed obviously. The scar after surgery was like one after circumcisions, which was relatively aesthetic. The complication after surgery was mild edema of prepuce, and disappeared two or three months after surgery. All the patients were followed up for three to six months and no patients relapsed. Conclusion Borselino procedure is a very good method, which not only relieves the pathologic abnormalities, but also keeps the integrity of penile ventral skin.%目的 探讨采用Borselino术矫治隐匿性阴茎的治疗效果.方法 选取2011年5月-2012年1月我院收治的27例隐匿性阴茎患儿,临床表现为阴茎外观短小,阴茎体均完全隐匿于皮下,腹壁皮肤平面仅及包皮,包皮呈鸟嘴样包住阴茎,与阴茎体不附着,挤压阴茎根部阴茎体显露正常.27例患儿均采用Borselino术进行矫治.结果 27例患儿均获得满意的效果.疲软时阴茎显露明显,阴茎阴囊沟和阴茎耻骨沟正常显露.术后阴茎瘢痕类似包茎环切术后,比较美观.术后并发症仅为包皮轻度水肿,术后2~3个月内完全消退.术后随访3~6个月,无术后复发病例.结论 Borselino术是治疗隐匿性阴茎的一个很好的方法,较好地解除了其病理异常,保留了阴茎腹侧皮肤的完整性,术后瘢痕少,阴茎外观佳.

  9. 半脱套松解法治疗隐匿阴茎疗效探讨%Half-gloving cordectomy: A modified procedure for concealed penis

    Institute of Scientific and Technical Information of China (English)

    孙伟桂; 郑奇传; 蒋堃

    2012-01-01

    Objective : To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. Methods : We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6. 8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. Results: The operation was successful in all the patients, with the operative time of 15 - 45 (mean 33) minutes, hospital stay of 2 -5 (mean 3.5) days, but no complications except mild foreskin edema in 5 eases. The external penis was prolonged from 0.5 - 2. 8 (mean 1.4) cm preoperatively to 3.2?.5 (mean 3.9) cm postoperatively. The patients were followed up for 1? years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. Conclusion; The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.%目的:探讨一种改良简化隐匿阴茎术式,既有较好手术效果,又减少减轻各种术后并发症. 方法:58例隐匿阴茎患者,平均年龄6.8(3 ~15)岁.术式包括矫正狭窄包皮口使阴茎头完全显露、半脱套法翻转包皮并矫形、沿白膜表面切除发育不良条索带达阴茎悬韧带前端、使阴茎体释放但不作白膜固定. 结果:所有患者均一次性手术成功,手术时间平均33(15~45)min,术后阴茎体外长度从术前平均1.4(0.5~2.8)cm增至3.9(3.2~8.5)cm.所有患者术后随访1~3年,包括阴茎外观、长度和自我感觉等,均效果满意.该术式简便、并发症少且术后恢复快.手术不影响阴茎根部深处神经血管和阴茎悬韧带等,不损伤阴茎本身结构及功能. 结论:该

  10. Ambigüidade genital: a percepção da doença e os anseios dos pais Ambiguous genitalia: perception of the disease and parents anxiety

    Directory of Open Access Journals (Sweden)

    Carlos Antonio Bruno da Silva

    2006-03-01

    anguish noted in the neonatal period are expressed by the fear of death, incurable disease and medication. During childhood, of the surgical procedure (ambiguous genitalia and sexuality (homosexuality. During puberty and adulthood there's the fear of marginalization, prejudice, homosexuality and infertility. There is anguish related to pointing at the guilty party, sexual definition (ambiguity and the need for secrecy. CONCLUSIONS: ambiguous genitalia is a highly complex condition affecting the family psychological balance. In situations of genital ambiguity determining and demystifying fears and expectations should be part of the therapeutic plan.

  11. Linfangite granulomatosa de genitália infantil: relato de caso e revisão da literatura Granulomatous lymphangitis of children's genitalia: report of a case and review of the literature

    Directory of Open Access Journals (Sweden)

    Ana Paula Camargo Martins

    2008-10-01

    Full Text Available Linfangite granulomatosa de genitália não-infecciosa é causa rara de linfedema genital autolimitado e idiopático em crianças(4, 6, 9. A maioria dos casos de linfedema com granuloma não-infeccioso de genitália em pacientes jovens ocorre em associação à doença de Crohn subseqüente ou concomitante(1, 3, 4, 9. O caso relatado é de um menino de 14 anos que apresentava história de linfedema genital principalmente em região dorsal do corpo do pênis, poupando prepúcio, parte distal do pênis e saco escrotal. Estudos laboratoriais não revelavam doenças sistêmicas. O exame anatomopatológico da peça revelou tratar-se de linfangite granulomatosa não-infecciosa.Non-infectious granulomatous lymphangitis of genitalia is a rare cause of self-limited and idiopathic genital lymphoedema in children(4, 6, 9. Most cases of lymphoedema with non-infectious genital granulomas in young patients occur subsequent to or concomitant with Crohn's disease(1, 3, 4, 9. The case described is of a 14-year-old boy with history of genital lymphoedema mainly on the dorsal region of the body of the penis, sparing the prepuce, the distal part of the penis and the scrotum. Laboratory studies did not reveal systemic diseases. The histopathological analysis showed it was non-infectious granulomatous lymphangitis.

  12. Classification and surgical correction of the concealed penis (77 cases report)%隐匿阴茎的分型与手术治疗(附77例报告)

    Institute of Scientific and Technical Information of China (English)

    张国强; 陈卫华; 孙旭

    2009-01-01

    Objective To better understand the pathological types of concealed penis and make the responding surgical procedures. Methods Total of 77 patients with concealed penis from Mar. 1998 to Mar. 2008 who underwent surgical treatment in our hospital were reviewed and analyzed. According to different pathological change of concealed penis, 77 patients were classified into four pathological types such as phimosis type, fascia bands type, micropenile skin sleeve type and obesity type. Different surgical procedures were used respectively targeted on their pathological classification. The phimosis type patients were mainly treated by relaxing the narrow prepuce ring, and penile dorsal Y-V plasty for inadequate penile skin, the fascia bands type patients by removing the dysgenic dartos fascia bands, the micropenile skin sleeve type patients by penile dorsal and ventral Y-V plasty and the serious obesity type patients by fixing the penile skin into the lateral Buck's fascia at the base of the penis. Results All patients with concealed penis were all improved in appearance and accessibility after responding surgical. Conclusion The pathological classification of the concealed penis patient would be helpful to clinical diagnosis, different surgical treatment selection and further facilitated the cure of concealed penis.%目的 提高对隐匿阴茎的认识,介绍一种手术治疗方法 .方法 总结1998年3月至2008年3月,诊治77例隐匿阴茎的经验.根据隐匿阴茎的不同病理改变,将其分为包茎型、索带型、小皮套型和肥胖型4种类型.包茎型通过阴茎背侧"Y-V"成形弥补阴茎体皮肤不足.索带型以纤维索带松解、切除为主.小皮套型需做背、腹侧"Y-V"成形.单纯肥胖型可观察、等待.严重者,将阴茎皮肤固定于阴茎根部的阴茎体两侧白膜上.结果 术后所有病例外观均得到改善.结论 对隐匿阴茎进行分型,按不同情况进行相应处理,有利于纠正隐匿阴茎.

  13. 胸内食管吻合口隐匿瘘的诊断与治疗%Diagnosis and Management of Concealed Intrathoracic Anastomotic Leak of Esophagus

    Institute of Scientific and Technical Information of China (English)

    刘奎; 杨秀芝; 王明钊; 王栋; 王滋宗; 沈毅; 魏煜程

    2012-01-01

    Objective To investigate diagnosis and treatment of concealed intrathoracic anastomotic leak of the esophagus. Methods We retrospectively analyzed the clinical data of 32 patients who presented with unexplained sepsis (temperature > 38 ℃ and elevated white blood cell count) after esophagectomy and intrathoracic anastomosis for esophageal carcinoma or gastric cardia carcinoma in Affiliated Hospital, Medical College of Qingdao University from January 2006 to December 2010. All the patients underwent oral water-soluble contrast esophagogram and oral water-soluble contrast computerized tomography of the chest. None of the patients had any sign of contrast leak in these diagnostic examinations, but their chest computerized tomography all showed peri-anastomotic bubble and encapsulated effusion. Fifteen patients were treated as concealed intrathoracic anastomotic leak of the esophagus, including fasting, broad spectrum antibiotic treatment, -. prolonged gastrointestinal decompression and enteral nutrition via naso-intestinal feeding tube. The other 17 patients were not treated as anastomotic leak of the esophagus and only received broad spectrum antibiotic treatment. Results None of the 15 patients who were treated as concealed intrathoracic anastomotic leak finally developed anastomotic leak proved by oral water-soluble contrast esophagogram and computerized tomography of the chest (0%, 0/15). Among the 17 patients who were not treated as anastomotic leak, fourteen patients developed anastomotic leak later (82. 4%, 14/17), 2 patients died of aorto-esophageal fistula and 3 patients died of multiple organ dysfunction syndrome. Conclusion Peri-anastomotic bubble and irregular encapsulated effusion in oral water-soluble contrast esophagogram and computerized tomography of the chest should be considered as specific signs of concealed intrathoracic anastomotic leak of esophagus after esophagectomy and intrathoracic anastomosis. Patients with such signs should be treated

  14. 耻骨上及会阴部入路手术治疗隐匿性阴茎%Treatment of concealed penis by operating through suprapubic and perineal approach

    Institute of Scientific and Technical Information of China (English)

    杨金存; 王海涛; 胡南; 张诚; 李霞

    2010-01-01

    目的 探索耻骨上及会阴部入路手术治疗隐匿性阴茎的矫形效果.方法 耻骨上切口,切断阴茎浅、深悬韧带,将阴茎海绵体剥离至耻骨弓,使阴茎延长2~3 cm.阴茎根部两侧小切口,将对应的阴茎与腹壁交界处的皮下筋膜缝合固定,防止阴茎回缩至阴囊内.结果 2007年至2009年,应用此方法治疗隐匿性阴茎16例,均取得了成功.随访半年,静息状态阴茎长度增长,整形效果良好,无并发症,患者满意.结论 耻骨上及会阴部联合入路手术治疗隐匿性阴茎疗效确切.%Objective To search a new option for the correction of concealed penis by operating through suprapubic and perineal approach. Methods The operation consisted of there incisions including a suprapubic approach to transect suspensory ligament of penis in order to separate and prolong cavernous body of penis for 2-3 em and two perineal approaches to sew up the superficial fascia between penis and abdominal wall in order to prevent penis from recovering to scrotum. Results From 2007 to 2009 sixteen patients of concealed penis were surgically corrected by this method. The good function and certain result were achieved. After followed up half a year, the operative results were satisfactory with no complications. Conclusion Treatment of concealed penis by operating through suprapubic and perineal approach is an ideal and effective method for the correction of concealed penis.

  15. Foreskin-deglove and shaft-fix procedure in correcting the concealed penis%改良阴茎脱套固定术治疗小儿隐匿阴茎85例报道

    Institute of Scientific and Technical Information of China (English)

    王荣; 陈力; 王雪刚; 陈宣余; 韩伟伟; 侯丹; 曾甫清; 章小平

    2012-01-01

    Objective:To observe the effect of Foreskin-deglove and shaft-fix procedure in correcting the concealed penis. Methods; Totally 85 cases of concealed penis in children from October 2004 to February 2011 were treated with Foreskin-deglove and shaft-fix procedure. Results: All of the cases were treated successfully. Significant lymphedema occurred in 17 cases and completely return to normal in 2 to 3 months. All patients have been followed up 2-14 months after operation and there was no recurrence retraction of the penile. Conclusions; Concealed penis is due to congenital Dartoic fascia dysplasia of penile shaft. Foreskin-deglove and shaft-fix procedure is an effective, simple and ideal method in treating concealed penis.%目的:探讨改良阴茎脱套固定术治疗小儿隐匿阴茎的有效性.方法:2004年10月~2011年2月采用改良阴茎脱套固定术治疗小儿隐匿阴茎85例.结果:所有患儿均顺利完成手术,17例患儿术后出现明显包皮水肿,2~3个月恢复正常.术后随访2~14个月,所有患儿阴茎体显露充分,阴茎无明显退缩现象.结论:隐匿阴茎的形成与先天性阴茎皮肤浅筋膜层发育异常有关,改良阴茎脱套固定术式具有手术视野显露良好、操作简单、效果满意等优点,是小儿隐匿阴茎治疗的理想方法.

  16. 手术治疗儿童隐匿性阴茎62例临床分析%Clinical Analysis of Operation on 62 children with concealed penis

    Institute of Scientific and Technical Information of China (English)

    李振; 刘建民

    2012-01-01

    目的 探讨隐匿性阴茎的诊断、鉴别诊断要点,分析隐匿性阴茎不同外科治疗方法的适应证及优缺点.方法 62例隐匿性阴茎患儿,根据不同类型采用不同手术方法进行手术矫正治疗,对手术治疗效果进行分析.结果 62例患者手术均获成功,术后住院5~10 d,均痊愈出院.随访3个月至2年,术后阴茎均显露良好,无严重并发症发生.结论 儿童隐匿性阴茎的治疗应该采用个性化方案,选择最佳的方法进行治疗,延长阴茎的长度,改善阴茎外观.%Objective To sum up the diagnosis and differential diagnosis of concealed penis,analyze the indications and advantages of different operative methods for concealed penis.Methods 62 children with concealed penis were treated by different surgical operations according to the different types,and the effect of surgical treatment was arelyzed.Results Opertaions were successed in all 62 cases,children were discharged after 5 ~ 10 operation days.After follow-up for 3 months to 2 years,62 children had received good recovered with an effective exposure of penis and no severe edema and other complications.Conclusion Children with concealed penis should be given personalized scheme,choose the best method to extend the length of the penis and improve the penis appearance.

  17. De morseir syndrome presenting as ambiguous genitalia

    Directory of Open Access Journals (Sweden)

    Anubhav Thukral

    2012-01-01

    Full Text Available Background: A 10-year-old boy presented with genital ambiguity, poor linear growth, and delayed milestones. The aim and to highlight that although rare but congenital, hypogonadotropic hypogonadism may rarely present as ambiguity. Materials and Methods: The patient was found to have bilateral cryptorchidism with proximal penile hypospadias, microphallus with a proportionate dwarfism with mildly delayed bone age, and karyotype 46XY. Euthyroid with normal steroid axis, growth hormone insufficient as suggested by auxology, low IGF1, and poor response to clonidine stimulation. MRI brain shows hypoplastic corpus callosum, hypoplastic anterior pituitary, and ectopic posterior pituitary bright spot. Results: The patient underwent laparoscopic removal of right intrabdominal testis and orchidoplexy was performed on the left one. Testicular biopsy revealed no malignancy and growth hormone replacement was initiated. The patient awaits definitive repair of hypospadias. Conclusion: As a provisional diagnosis of combined growth hormone and gonadotropin deficiency, most probable diagnosis is septo-optic dysplasia or de moseir syndrome leading to genital ambiguity.

  18. Genitalia-associated microbes in insects.

    Science.gov (United States)

    Otti, Oliver

    2015-03-01

    In sexual reproduction different types of symbiotic relationships between insects and microbes have become established. For example, some bacteria have evolved almost exclusive vertical transmission and even define the compatibility of insect mating partners. Many strictly sexually transmitted diseases have also been described in insects. Apart from such rather specific relationships the role of opportunistic infections in the reproductive process has been widely neglected. Opportunistic microbes transmitted passively during mating might impose an energetic cost, as the immune system will need to be alert and will use resources to fight potential intruders. Through mating wounds and contaminated reproductive organs opportunistic microbes might be transferred to mating partners and even enter the body cavity. Females as the "receiving" sex are particularly likely to have evolved adaptations to avoid or reduce opportunistic infections. Males of several species show highly complex seminal fluids, which as well as containing components that influence a males' fertilization success, also possess antimicrobial substances. The role of antimicrobials in the reproductive process is not well understood. Some evidence hints at the protection of sperm against microbes, indicating a role for natural selection in shaping the evolution of reproductive traits. By highlighting the potential importance of microbes in sexual selection and their role in reproduction in general I will make a case for studies in sexual selection, especially the ones investigating postcopulatory processes, that should incorporate environmental, as well as genotypic variation, in reproductive traits.

  19. [Human papillomavirus infection in male genitalia].

    Science.gov (United States)

    Cano Garfias, R; Villarreal Peral, C; Juárez Azpilcueta, A

    1995-10-01

    A prospective and transversal study in 100 patients since January to December of 1994, was done, to know the human papiloma virus infection prevalence in male genitals. The patients were studied by a clinical history, genital area colposcopic revision after acetic acid 5% application, biopsy of the lesion and histopathology study. The patients age was among 16 to 71 years old, with a media of 38.8 years old. The sexual activity beginning was from 12 to 27 years old, with an average of 18 years old. Forty one percent of the patients have had sexual relations with prostitutes, 26% have had sexually transmitted diseases, 9% of the patients referred only 1 sexual mate and 82% had human papiloma virus infection.

  20. Gunshot wounds to the male external genitalia.

    Science.gov (United States)

    Gomez, R G; Castanheira, A C; McAninch, J W

    1993-10-01

    We report on 23 patients with genital gunshot wounds treated since 1977. Of these 23 patients 16 received 1 shot and 7 received multiple shots. The bullet affected the scrotum in 12 patients, the penis in 4, and the penis and scrotum in the remaining 7. The same missile also compromised the thigh in 15 patients, with major vascular damage in 2. Management was based on serial clinical evaluation and aggressive imaging, related to the missile trajectory. Staging studies were 100% accurate in the patients in whom they were done. Nine patients had damage to the testis (7, 1 bilaterally) and/or spermatic cord (2): 5 required orchiectomy, in 3 the testis was repaired and in 2 the bullet transected the vas, which was ligated with nonabsorbable suture for later repair. Six patients had damage to the corpora, which were repaired. Three patients had urethral rupture (bulbar in 2 and penile in 1): primary repair was feasible in 2 and in 1 (with extensive urethral loss after a shotgun blast) a suprapubic tube was placed for delayed reconstruction. Ten patients had skin penetration only, 5 of whom were managed nonoperatively. There were no major complications or mortality. Also, there were no delayed problems in the nonoperated patients. Erection and normal voiding were reportedly present in all who underwent reconstruction and returned for followup. Early surgical exploration with conservative debridement and primary repair of damaged structures is the preferred treatment for these injuries.

  1. Integrated geophysical imaging of a concealed mineral deposit: a case study of the world-class Pebble porphyry deposit in southwestern Alaska

    Science.gov (United States)

    Shah, Anjana K.; Bedrosian, Paul A.; Anderson, Eric D.; Kelley, Karen D.; Lang, James

    2013-01-01

    We combined aeromagnetic, induced polarization, magnetotelluric, and gravity surveys as well as drillhole geologic, alteration, magnetic susceptibility, and density data for exploration and characterization of the Cu-Au-Mo Pebble porphyry deposit. This undeveloped deposit is almost completely concealed by postmineralization sedimentary and volcanic rocks, presenting an exploration challenge. Individual geophysical methods primarily assist regional characterization. Positive chargeability and conductivity anomalies are observed over a broad region surrounding the deposit, likely representing sulfide minerals that accumulated during multiple stages of hydrothermal alteration. The mineralized area occupies only a small part of the chargeability anomaly because sulfide precipitation was not unique to the deposit, and mafic rocks also exhibit strong chargeability. Conductivity anomalies similarly reflect widespread sulfides as well as water-saturated glacial sediments. Mineralogical and magnetic susceptibility data indicate magnetite destruction primarily within the Cu-Au-Mo mineralized area. The magnetic field does not show a corresponding anomaly low but the analytic signal does in areas where the deposit is not covered by postmineralization igneous rocks. The analytic signal shows similar lows over sedimentary rocks outside of the mineralized area, however, and cannot uniquely distinguish the deposit. We find that the intersection of positive chargeability anomalies with analytic signal lows, indicating elevated sulfide concentrations but low magnetite at shallow depths, roughly delineates the deposit where it is covered only by glacial sediments. Neither chargeability highs nor analytic signal lows are present where the deposit is covered by several hundred meters of sedimentary and volcanic rocks, but a 3D resistivity model derived from magnetotelluric data shows a corresponding zone of higher conductivity. Gravity data highlight geologic features within the

  2. Characterization of a concealed antigen Hq05 from the hard tick Haemaphysalis qinghaiensis and its effect as a vaccine against tick infestation in sheep.

    Science.gov (United States)

    Gao, Jinliang; Luo, Jianxun; Fan, Ruiquan; Schulte-Spechtel, Ulrike C; Fingerle, Volker; Guan, Guiquan; Zhao, Haiping; Li, Youquan; Ren, Qiaoyun; Ma, Miling; Liu, Zhijie; Liu, Aihong; Dang, Zhisheng; Sugimoto, Chihiro; Yin, Hong

    2009-01-14

    Positive clone Hq05 of Haemaphysalis qinghaiensis (named following those cDNA clones cloned from the tick before) was obtained by differentially screening of a cDNA library of the tick with rabbit anti-tick salivary gland serum and rabbit anti-tick saliva serum. Hq05 contains an open reading frame (ORF) of 540bp that codes for 179amino acid residues with a coding capacity of 20kDa. Sequence similarity and phylogenetic analyses indicated that Hq05 was a novel gene. Expression analysis by reverse transcription-polymerase chain reaction indicated that the gene was expressed in nymphal and adult stage of H. qinghaiensis tick and its salivary glands, but not in midguts. The cDNA was expressed as glutathione S-transferase (GST)-fused protein in a procariotic system. Western blot showed that only rabbit anti-H. qinghaiensis salivary gland serum could recognize the expressed GST-Hq05 (46kDa) protein, while both rabbit negative serum and rabbit anti-H. qinghaiensis saliva serum could not react with the expressed protein. This proved the recombinant protein was a "concealed" antigen of H. qinghaiensis. Vaccination of sheep with rHq05 conferred a significant protective immunity in sheep, resulting in a 40% reduction of the amount of eggs laid by each tick and the hatching capability of eggs decreased by 37% compared to the controls. These results showed that rHq05 could be a candidate tick vaccine molecule for the control of H. qinghaiensis.

  3. 基于宏块模式预测的时域错误隐藏算法%Temporal Error Concealment Algorithm Based on Macroblock Mode Prediction

    Institute of Scientific and Technical Information of China (English)

    朱冰莲; 刘剑东

    2009-01-01

    Aiming at the problem that the compressed video stream will inevitable be corrupted because of the wireless channel errors, which may degrade the reconstructed image quality, this paper presents an efficient temporal error concealment method which based on improved border-matching function and flexible macroblock mode of H.264 video standard. It utilizes the relativity between lost macroblock and other surrounding macroblocks to predict the block mode, and estimates the motion vector of the lost macroblock depending on the block mode. Simulation results under 3GPP/3GPP2 wireless channel show the proposed method performs better quality than other approaches with the same RTP packet loss rate.%针对压缩视频码流在无线信道传输过程中由于数据丢失或错误面导致的重构图像质量的问题,提出一种时域错误隐藏方法.在对边界匹配函数改进的基础上,根据H.264视频标准具有灵活的宏块分割模式的特点,利用受损宏块与其周围宏块的相关性预测分块模式进行运动矢量估计.实验结果表明,在相同的RTP包丢失率情况下,该算法与其他算法相比,能恢复出更高质量的图像.

  4. Especie nueva de Scybalocanthon (Coleoptera: Scarabaeinae: Canthonini y descripción de la variación del órgano genital masculino A new species of Scybalocanthon (Coleoptera: Scarabaeinae: Canthonini and description of the variation of the male genitalia

    Directory of Open Access Journals (Sweden)

    Fredy Molano Rendón

    2010-12-01

    Full Text Available Se describe Scybalocanthon arcabuquensis Molano y Medina, sp.nov. La distribución de esta especie se encuentra restringida a los bosques de roble del municipio de Arcabuco, Departamento de Boyacá, sobre la cordillera Oriental de los Andes en Colombia. El órgano genital del macho se describe e ilustra, se discute la variación de las estructuras del saco interno de varias especies del género, y se proponen algunas estructuras del órgano genital como posibles caracteres únicos que definen el género.Scybalocanthon arcabuquensis Molano y Medina, sp. nov. is described. The species is restricted to the oak forest at Arcabuco municipality, department of Boyacá, Eastern Cordillera of the Colombian Andes. The male genitalia is described and illustrated, the variation of structures of the internal sac is discussed for various species of the genus and some structures from the internal male genitalia are proposed as possible unique characters useful for defining the genus.

  5. Ocultamiento del Mensaje de Señales de Voz usando la Transformada de Ondita Haar Discreta Message Concealment of Voice Signals using the Discrete Haar Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Alejandro Martínez

    2010-01-01

    Full Text Available Este trabajo presenta un método de ocultamiento del mensaje para transmisión de señales de voz utilizando codificación por medio de bancos de filtros multi-resolución de análisis y de síntesis para la Transformada de Ondita Haar Discreta. Por medio de un banco de filtros Haar multi-resolución se realiza la separación de la señal en sus componentes y después se realiza una distorsión reversible de la síntesis multi-resolución de sus señales componentes, obteniendo una señal de salida que, aunque mantiene la misma información de la señal de entrada, el mensaje de la señal de voz que esta porta queda oculto en ella misma. Este método puede aplicarse para la transmisión codificada de señales de voz ya sea en su forma digital o analógica, y por su simplicidad resulta adecuado para implementarse en sistemas electrónicos digitales, ya sea como un arreglo de compuertas programables por campo, o como circuito integrado de aplicación específica.This work introduces a message concealment method for voice signals transmission using codification through multi-resolution filter banks implementation for analysis and synthesis for the Discrete Haar Wavelet Transform. Through these multi-resolution filter banks of Haar wavelet the voice signal can be split in its components, and later a reversible distortion of the synthesis of its multi-resolution component signals is made, obtaining an output signal that, although maintains the same information of the original input signal, hides the message of the carried voice signal in itself. This method can be applied in codified transmission of voice, analog or digital signals, and due to the simplicity of the method it’s suitable to be implemented on digital electronic systems like FPGA, or ASIC.

  6. RICE SUCROSE SYNTHASE PROMOTER

    DEFF Research Database (Denmark)

    2000-01-01

    A promoter is described. The promoter comprises a nucleotide sequence corresponding to that shown as SEQ ID No. 1 or a variant, homologue or derivative thereof.......A promoter is described. The promoter comprises a nucleotide sequence corresponding to that shown as SEQ ID No. 1 or a variant, homologue or derivative thereof....

  7. Mobile 3DTV Oriented Interlaced Coding and Error Concealment Method%面向移动通信的3DTV 交织编码错误隐藏方法

    Institute of Scientific and Technical Information of China (English)

    张少敏; 郁梅

    2013-01-01

    Mobile 3DTV is different from traditional 3DTV in video format and coding structure, moreover, it requires low computational complexity due to the power limitation. In this paper, different view interlaced coding and error concealment schemes are proposed for mobile 3DTV. The left and right views are first interlaced followed by the stereo SEI structure used for encoding. If packets are lost during the transmission, different error concealment schemes are selected according to different types of errors. Experimental results show that the proposed method achieves satisfactory error concealment effects with low computational complexity.%  针对移动通信 Mobile 3DTV 和传统3DTV 视频表示格式与编码结构的差异以及 Mobile 3DTV 低计算复杂度的特点,提出一种面向 Mobile 3DTV 交织编码的立体视频错误隐藏方法。新方法在编码之前先将左右视点进行交织处理,然后按照 Stereo SEI 的编码结构编码传输,在解码端根据像素的不同错误类型有针对地选择相应低计算复杂度的错误隐藏方法恢复丢失信息。实验表明,该方法在解码端得到的恢复效果较好,并且计算复杂度较低。

  8. H.264高清视频解码实时错误掩盖算法%Real-time Error Concealment Algorithm for H.264 High Definition Video Decoding

    Institute of Scientific and Technical Information of China (English)

    谢涛; 李志华; 黄轶伦

    2011-01-01

    针对IP网络丢包条件下的H.264高清视频实时解码问题,分析高清视频码流的特点,提出一种实时错误掩盖算法.该算法利用丢失片的边缘宏块信息,以垂直距离为权值加权平均预测得到错误宏块的运动矢量,进而完成错误掩盖.实验表明,与Joint模型中的错误掩盖算法相比,该算法提升了重建图像的主观质量和客观质量,计算复杂度较低,错误掩盖效果较好,适用于高清实时解码.%Aiming at real-time decode H.264 video on IP network with packet losses, an effective error concealment algonthm is proposed depending on the analysis of high definition video streams.By use of the edge macro-blocks information of the lost slice.the motion vector of corrupted macro-block is predicted, and the error concealment is completed.Experimental results show that.compared with the error concealment of Joint Model(JM), the proposed algorithm improves the objective quality and subjective quality of reconstructed images.The algorithm does not increase the complexity of the decoding, but achieves better recovery results.It is ideal for real-time decoding for high definition video.

  9. 包皮脱鞘三点固定术治疗隐匿性阴茎%Treatment on concealed penis with the technique of foreskin-deglove and three-site-ifxation

    Institute of Scientific and Technical Information of China (English)

    孙洋; 赵海腾; 何蓉; 陈其民; 孙杰

    2014-01-01

    目的:研究报道一种治疗隐匿性阴茎的手术方法。方法五年来我院收治隐匿性阴茎患者共223名。采用包皮环切入路,脱退皮肤至阴茎根部,将阴茎海绵体、耻骨前浅筋膜和包皮的皮下组织缝合固定。纵向切开背侧包皮,扩大包皮开口,重新定位缝合伤口。结果所有患者中,4例出现阴茎回缩,11例发生不同程度的包皮内板水肿。其余阴茎术后形态良好。结论包皮脱鞘三点固定术治疗隐匿性阴茎是有效的。%ObjectiveTo study and report a surgical procedure on the disease of concealed penis.Methods During the last 5 years, 223 patients of concealed penis were treated in our hospital. The operation was done through the incision of circumcision. Foreskin was degloved deep to the root of the penis. Bilateral tunica albuginea was sutured together with the suprapubic Scarpa's fascia and preputial subcutaneous tissue. Dorsal slit was made to enlarge the opening of foreskin. Results All patients recovered uneventfully with good cosmetic appearance, except penile shaft retraction occurred in 4 of them and foreskin inferior board edema in 11 of them.Conclusion The technique of foreskin-deglove and three-site-fixation is effective in treating concealed penis.

  10. 三角函数解题中隐含信息的挖掘%On Working Out the Concealed Message in Solving the Problems of the Trigonometric Function

    Institute of Scientific and Technical Information of China (English)

    潘图佳

    2009-01-01

    通过举例对比分析,在解题过程中要充分利用隐含条件,注意各象限内相应的三角函数的符号,使学生正确地解决问题.%Through a comparative analysis of examples, the concealed conditions must be made use of in working out the problems, and the symbols of trigonometric function within the quadrant should be paid attention to, in order to help the students to solve the problems they have en-countered.

  11. 阴茎脱套矫治术治疗隐匿阴茎的临床观察%Clinical observation of foreskin - deglove for correction of concealed penis

    Institute of Scientific and Technical Information of China (English)

    郭荣利; 疏仁义; 董平; 张启旺

    2011-01-01

    Objective To explore a simple and effective method in treatment of concealed penis. So the complications can be decreased. Methods 33 consecutive patients ( range 3 to23 years) with concealed penis were treated using foreskin - deglove, the thicken aponeurosis on the penile dorsi was separated and dissected. Fixing the skin of penis root at this level to bilateral tunica albuginea were done to the vast majority of the patients. Reposition of degloved prepuce was operated. Penis bandaged after surgery. Results After operation penis shaft retraction occurred in one patients( 3% ) who shaft- fix procedure was not performed and who was obese , and was corrected by later refixation. All patients were satisfied with the appearance of the penis after plastic surgery. Prepuce edema obvious occurred in 3 cases and recovered after 3 ~ 4 months. Conclusion Our method is easy to design and perform to correct concealed penis with satisfactory effect and less complications. It provides a good cosmetic appearance and seems to be applicable in all concealaled penis with de? cient penile shaft skin.%目的 探讨矫治隐匿阴茎简单有效并减少并发症的方法.方法 对隐匿阴茎患者33例(年龄为3~23岁),采用阴茎脱套,切除变性的肉膜组织,30例(占90%)行阴茎根部皮肤与海绵体白膜的固定.将原来脱套的阴茎皮肤矫型复位,术后加压包扎.结果 1例因肥胖儿未行固定引起术后阴茎回缩,再次手术治愈;其余所有病例疗效均满意.3例患儿术后发生较重的包皮水肿,3~4月内均恢复正常.结论 阴茎脱套矫治术对隐匿阴茎疗效满意,且操作简单、安全,并发症少;也适用于包皮不充足的隐匿阴茎.

  12. Caracterização histopatológica e imuno-histoquímica de neoplasmas mesenquimais da genitália em 43 cadelas Histopathological and immunohistochemical characterization of mesenchymal neoplasms of the genitalia in 43 bitches

    Directory of Open Access Journals (Sweden)

    Suyene O. de Souza

    2012-12-01

    Full Text Available Os arquivos de biópsia do período de 2000 a 2010 do SPV-UFRGS foram revisados e levantados os casos de neoplasias mesenquimais de genitália (útero, cérvix, vagina e vulva de cadelas. Realizou-se estudo retrospectivo de 43 casos, incluindo caracterização histológica, coloração tricrômico de Masson (TM e imuno-histoquímica (IHQ. As principais raças acometidas foram Cocker, Poodle e Pastor Alemão, porém o maior número de casos foi observado em cães sem raça definida (SRD. A idade média dessas cadelas foi de 10,6 anos (variação de 3 a 10 anos. Quanto à localização dos tumores, 44,2% estavam na vagina, 27,9% no útero, 23,3% na vulva e 4,6% na cérvix. Histologicamente, 46,5% eram leiomioma, 41,9% fibroleiomioma, 7,0% fibroma e 4,6% leiomiossarcoma. Na coloração de TM, os fibromas apresentaram todas as células neoplásicas coradas em azul (colágeno, os leiomiomas e os leiomiossarcomas apresentaram menos de 50% de colágeno em meio às células neoplásicas musculares e os fibroleiomiomas mais de 50%. Na IHQ, os fibromas apresentaram marcação positiva para vimentina e negativa para desmina. Todos os leiomiomas eram positivos para vimentina (em mais de 50% células e para desmina (75% dos casos em mais de 50% das células e 25% em menos de 50%. Em um dos casos de leiomiossarcoma houve imunomarcação para vimentina e ausente para desmina e, no outro, ocorreu o oposto. Os fibroleiomiomas apresentaram marcação para vimentina em 94,4% (em mais de 50% células e para desmina em 77,8% (64,3% em menos de 50% das células e 35,7% em mais de 50%.The biopsies archives from SPV-UFRGS (2000-2010 were retrieved, and cases of mesenchymal neoplasms of genitalia (uterus, cervix, vagina, and vulva of 43 bitches were revised. Also Masson's trichrome staining (MT and immunohistochemical characterization were evaluated. The main breeds affected were Cocker, Poodle and German Shepherd, but the greatest number of cases were observed in mixed

  13. 话语理解中汉语隐性否定动词的框架转换及诱发机制研究%Frame-shifting and Its Induced Mechanism of Chinese Concealed Negation Verbs in Discourse Interpretation

    Institute of Scientific and Technical Information of China (English)

    李美霞; 丛香

    2015-01-01

    Concealed negation refers to the negation without syntactic negative form but expressing negative meaning in an indirect and implicit way.The present article, based on Jespersen' s classification of concealed negation verbs, picks up the following four kinds of typical Chinese concealed negation verbs from the Chinese corpus: avoid, refuse, deny and doubt, and then by employing frame semantics theory, discusses the frame-shifting phenomenon activated by keywords. This study discovers that in the discourse interpretation of concealed negation, there exists the shift of frames, which is brought about by the change of perspectives caused by 4 induced mechanisms: ( 1 ) the effect of discourse game, ( 2 ) subjectivity in negating events, (3) the complexity in expressing events, and (4) the internal semantic contradiction of concealed negation verbs.This study helps us to realize that in actual language communication, the addressee has to ad-just his cognitive worlds according to the change of conditions, so as to have a better interpretation of discourse and to re-alize the communicative purpose.%隐性否定是指一种形式肯定但意义否定的否定形式,这种否定在使用时没有句法层面上的否定标记,而是通过间接或者暗示的手段表达否定含义.本研究基于Jespersen对隐性否定动词所采用的划分方式,从中文语料库中选取四组隐性否定动词"避免"、"拒绝"、"否认"以及"怀疑"类,借助框架语义学相关理论,对它们在关键词激活环境下的框架转换现象进行研究.研究发现,在隐性否定的话语理解过程中,存在框架的转变,这一转变是由4个刺激条件(或诱发机制)引起的透视域的转变而引起的:语篇博弈效果;否定事件的主观否定性;事件表述的复杂性;隐性否定动词的语义内在矛盾性.该研究使我们认识到在实际语言交际中,话语使用者需要对语篇整体性进行思考,根据条件的变化而不断调整认知

  14. 隐伏矿体立体预测的体元模型及其磁法正演模型%Voxel model and its magnetic forward model of stereoscopic prediction of concealed ore body

    Institute of Scientific and Technical Information of China (English)

    樊俊昌; 毛先成; 赵莹; 唐艳华; 单文法; 陈进

    2012-01-01

    针对隐伏矿体立体定量预测结果的可靠性问题,以及磁法正反演模型一直存在的地质依据不足和多解性问题,提出隐伏矿体立体预测体元模型与磁法正演模型在定量层面上相结合的新方法.利用体元模型的特点,结合磁荷面积分公式,推导出基于隐伏矿体立体预测体元模型的总磁场异常的数学模型,并进行算法设计和软件开发.以福建省尤溪县丁家山铅锌矿床为实例,计算得到研究区域的总磁场异常,绘制基于已知矿化体、预测矿化体及已知矿化体总体的理论总磁场异常等值线图,分别与实测等值线图进行比较分析.研究结果表明:以体元模型为纽带,可实现隐伏矿体立体定量预测结果与磁性体正演结果的耦合与互补,检验隐伏矿体立体定量预测结果的正确性,有效地降低隐伏矿体立体定量预测的风险.%Aiming at the problem of reliability in stereoscopic quantitative prediction of concealed ore body, and the problem of geological basis shortage and multi-solutions in magnetic forward and inverse models, a new method combining the voxel model of stereoscopic prediction of concealed ore body with magnetic forward model at the quantitative level was put forward. By use of the voxel model and the formula for magnetic charge surface integral, the mathematical model of the total magnetic field anomalies based on the voxel model of stereoscopic prediction of concealed ore bodies was deduced, the algorithm and software for solving the model were designed and developed. A case study was performed in Dingjiashan lead-zinc deposit in Youxi County, Fujian Province, China. The total magnetic field anomalies of the study area were achieved, the contour maps about theoretical total magnetic field anomalies were drawn on the basis of the known mineralization bodies, the amalgam of the predictive mineralization bodies and the known mineralization bodies, and the comparison analysis

  15. Promoting preschool reading

    OpenAIRE

    2013-01-01

    The thesis titled Promoting preschool reading consists of a theoretiral and an empirical part. In the theoretical part I wrote about reading, the importance of reading, types of reading, about reading motivation, promoting reading motivation, internal and external motivation, influence of reading motivation on the child's reading activity, reading and familial literacy, the role of adults in promotion reading literacy, reading to a child and promoting reading in pre-school years, where I ...

  16. How Promotions Work

    OpenAIRE

    Robert C. Blattberg; Richard Briesch; Fox, Edward J.

    1995-01-01

    By synthesizing findings across the sales promotion literature, this article helps the reader understand how promotions work. We identify and explain empirical generalizations related to sales promotion; that is, effects that have been found consistently in multiple studies involving different researchers. We also identify issues which have generated conflicting findings in the research, as well as important sales promotion topics that have not yet been studied. This overview of the research ...

  17. Perceptions of health promoters about health promotion ...

    African Journals Online (AJOL)

    2013-02-11

    Feb 11, 2013 ... formal written health promotion guidelines for families with adolescents orphaned ..... community: '…What worries me is the fact that they still become pregnant .... to learn about HIV risk factors, testing, treatment choices and.

  18. Developing a Promotional Video

    Science.gov (United States)

    Epley, Hannah K.

    2014-01-01

    There is a need for Extension professionals to show clientele the benefits of their program. This article shares how promotional videos are one way of reaching audiences online. An example is given on how a promotional video has been used and developed using iMovie software. Tips are offered for how professionals can create a promotional video and…

  19. Health Promotion Education

    DEFF Research Database (Denmark)

    Lehn-Christiansen, Sine

    The paper discusses the implications of health promotion in education. The paper is based on my PhD project entitled “Health promotion education seen through a power/knowledge and subjectification perspective” (in prep). The PhD project explores how professional health promotion skills...... are conceived in a specific educational setting; namely the Danish social and health education programme. Here, health promotion is formally conceived as a qualification aimed at citizens and patients - and not at the students themselves. However, as the paper will demonstrate, conceptions of student...... health promotion workers should ideally act as health promotion role models. This claim leads to a series of educational and morally anchored dilemmas and challenges. Inspired by Foucault and others who have developed this line of thinking (eg. Signild Vallgårde) health promotion is viewed as a heartfelt...

  20. Promoting Cultural Tourism Industry in Africa: The Place of African ...

    African Journals Online (AJOL)

    Mrs Afam

    Tourism infrastructures – transportation system, hospitality industry and .... achievement oriented people and a man's position among his kith and kin is validated ..... did not manage to conceal my feelings from my mother, and after serving the.

  1. Analysis of improved Devine’ s and Johnston’ s operation in childhood with Concealed penis%两种术式治疗儿童隐匿型阴茎效果观察

    Institute of Scientific and Technical Information of China (English)

    杨仲兴; 刘志刚; 段浩然; 刘旭; 苏小凯; 胡文晖

    2015-01-01

    目的:探讨改良Devine’ s术和Johnston’ s术治疗儿童隐匿型阴茎的效果。方法回顾2010-07—2014-11间治疗的儿童隐匿型阴茎60例,应用改良Devine’ s术、Johnston’ s术两种术式手术治疗对比两种手术后疗效。 A组30例采用改良Devine’ s术式, B组30例采用Johnston’ s术式,2组疗效比较采用有序分类变量2组独立样本秩和检验,2组手术并发症比较采用卡方检验和校正卡方检验。结果患儿均获10个月平均随访时间,切口术后均一期愈合。改良Devine’s术疗效及并发症发生率均优于Johnston’s术,差异有统计学意义( P<0.05)。结论改良Devine’ s术是治疗儿童隐匿型阴茎的理想术式。%Objective To explore effective methods of two surgical treatment of Improved Devine’ s, Johnston’ s surgery for children concealed penis.Methods Review the 60 cases of hospitalized children with concealed penis in Second People’ s Hospital of Zhengzhou City between July 2010-November 2014,by Improved Devine's and Johnston’ s surgery, comparing two surgical surgery after treatment.Group A used Improved Devine’ s surgery 30 cases,Group B used Johnston`s surgery 30 cases, The surgical effects of two groups were compared using the rank sum test in ordinal categorical variable two independent samples, and the surgical complication of two groups were compared by the chi-square test and corrected chi-square test.Results In an average of about 10 months of follow-up postoperatively and healed, the penis shape and well developed, the efficacy of Devine’s Improved Devine’s surgery was better than the Johnston’s surgery(P<0.05).Conclu-sion Improved Devine’ s surgery can be effective in treating children with concealed penis.

  2. Clinical evaluation of advancement flap surgical technique for congenital concealed penis%渐进性皮瓣转移技术治疗先天性隐匿阴茎

    Institute of Scientific and Technical Information of China (English)

    陈杰; 徐卯升; 耿红全; 徐国锋; 咸华

    2009-01-01

    目的 通过总结103例先天性隐匿阴茎的临床资料,探讨渐进性皮瓣转移技术应用于先天性隐匿阴茎的诊治经验.方法 2006年7月至2008年9月,采用渐进性皮瓣转移技术治疗先天性隐匿阴茎患儿103例,年龄为6个月至12.3岁,所有病例均符合先天性隐匿阴茎的诊断,其中3例伴有明显肥胖.结果平均随访1.5年(6个月至2.5年).所有患儿阴茎外观均较满意,阴茎显露好,无包皮臃肿现象.术后1例冈阴茎根部皮肤附着不佳仍有同缩,2例患儿在阴茎根部切口处轻度裂开.结论 渐进性皮瓣转移技术治疗先天性隐匿阴茎,术后阴茎外观接近包茎术后表现,术后再回缩等并发症少.渐进性皮瓣转移技术可以作为治疗先天性隐匿阴茎的常规术式.%Objective To summarize the clinical data of 103 children with congenital concealed penis treated with advancement flap surgical technique. Methods From July 2006 to September 2008, 103 children with congenital concealed penis underwent penial plasty using advancement flap surgical technique. The patients aged from 6 months to 12. 3 years. Three patients were extremely obese. Resuits The mean follow-up period was 1.5 years. All patients gained good postoperative cosmetic appearance with satisfactory exposure of penis and no malformation of prepuce. Only one patient underwent a reoperation for recurrent retraction caused by unstable attachment at the radix of penis. Two patients suffered slight disruption of wound at the radix of penis. Conclusions Flap surgical technique can provide immediate and excellent cosmetic results with a low incidence of complications. The advancement flap surgical technique can be adopted as a regular procedure for treating children with congenital concealed penis.

  3. What do health-promoting schools promote?

    DEFF Research Database (Denmark)

    Simovska, Venka

    2012-01-01

    Purpose – The editorial aims to provide a brief overview of the individual contributions to the special issue, and a commentary positioning the contributions within research relating to the health-promoting schools initiative in Europe. Design/methodology/approach – The members of the Schools...... for Health in Europe Research Group were invited to submit their work addressing processes and outcomes in school health promotion to this special issue of Health Education. Additionally, an open call for papers was published on the Health Education web site. Following the traditional double blind peer...... review process, nine submissions were accepted for publication. Five of these are selected to be published in this issue and the rest will be published in a future issue of the journal. Findings – The five articles in this issue take a comprehensive approach to health promotion in schools and reflect...

  4. What do health-promoting schools promote?

    DEFF Research Database (Denmark)

    Simovska, Venka

    2012-01-01

    for Health in Europe Research Group were invited to submit their work addressing processes and outcomes in school health promotion to this special issue of Health Education. Additionally, an open call for papers was published on the Health Education web site. Following the traditional double blind peer......Purpose – The editorial aims to provide a brief overview of the individual contributions to the special issue, and a commentary positioning the contributions within research relating to the health-promoting schools initiative in Europe. Design/methodology/approach – The members of the Schools...

  5. SPORT PROMOTION STRATEGIES

    Directory of Open Access Journals (Sweden)

    Alexandru Lucian MIHAI

    2013-10-01

    Full Text Available In sport marketing, the word promotion covers a range of interrelated activities. All of these activities are designed to attract attention, stimulate the interest and awareness of consumers, and of course, encourage them to purchase a sport product. Promotion is about communicating with and educating consumers. The purpose of a sport promotional strategy is to build brand loyalty and product credibility, develop image, and position the brand. A promotional strategy is similar to a marketing strategy, but the promotional strategy seeks short-term objectives, both direct and indirect. Promotional objectives usually include increased sales, stimulate impulse buying, raise customer traffic, and present and reinforce image. It also provides information about products and services, publicizes new stores or websites, and creates and enhances customer satisfaction.

  6. Is Lamb Promotion Working?

    OpenAIRE

    Capps, Oral, Jr.; Williams, Gary W.

    2007-01-01

    This objective of this study is to determine whether the advertising and promotion dollars collected and spent by the American Lamb Board on lamb promotion since the inception of the Lamb Checkoff Program have effectively increased lamb consumption in the United States. The main conclusion is that program has resulted in roughly 7.6 additional pounds of total lamb consumption per dollar spent on advertising and promotion and $41.59 in additional lamb sales per dollar spent on advertising and ...

  7. Health promotion in Brazil.

    Science.gov (United States)

    Buss, Paulo Marchiori; de Carvalho, Antonio Ivo

    2007-01-01

    The evolution of health promotion within the Brazilian health system is examined, including an assessment of the intersectoral and development policies that have influenced the process. Particular attention is paid to the legal characteristics of the Unified Health System. Human resources formation and research initiatives in health promotion are outlined, with a summary of the obstacles that need to be overcome in order to ensure the effective implementation of health promotion in the future. Up to the end of the 20th Century health promotion was not used as a term in the Brazilian public heath context. Health promoting activities were concentrated in the area of health education, although targeting the social determinants of health and the principle of intersectoral action were part of the rhetoric. The situation has changed during the last decade, with the publication of a national policy of health promotion, issued by the Ministry of Health and jointly implemented with the States and Municipals Health Secretaries. More recently there has been a re-emergence of the discourse on the social determinants of health and the formation of intersectoral public policies as the basis of a comprehensive health promotion. Health promotion infrastructure, particularly around human resources and financing, requires strengthening in order to ensure capacity and sustainability in health promotion practice.

  8. Analysis of promotions

    Directory of Open Access Journals (Sweden)

    V.V. Bozhkova

    2011-03-01

    Full Text Available Article describes the classification of promotions and determining the effectiveness of specific measures to stimulate sales (which isnt possible practically in most advertising companies.

  9. 改良阴茎脱套固定术治疗先天性隐匿阴茎疗效观察%Modified foreskin-deglove and shaft-fix procedure in treatment of congenital concealed penis

    Institute of Scientific and Technical Information of China (English)

    严向明; 周云

    2012-01-01

    Objective:To explore the efficacy of modified foreskin-deglove and shaft-fix procedure in the treatment of congenital concealed penis. Methods: 215 patients (aged from 5.0 to 15.3 years old) diagnosed as congenital concealed penis were included in the study, and the modified foreskin-deglove and shaft-fix procedure were performed. After the penis has been dressing for 3 days,and the urethra catheterized for 4 days,the patients were discharged. Results; Average operation time was 50 minutes,mean hospitalized day was 4. 5 days,and the postoperative edema of prepuce only lasted for 7 to 10 days. With 6 months to 36 months follow-up,4 cases of penis shaft retraction occurred,and 2 cases of dissatisfied appearance caused by obesity,other cases were all satisfied with the appearance of the penis after plastic surgery, without erection or voiding disorder. Conclusions; The modified foreskin-deglove and shaft-fix procedure is an ideal choice for congenital concealed penis correction,which was easy to expose the penile shaft and to excise the fabric tissue,at the same time penile skin was reserved. So this procedure can resolve basic pathologic problems of congenital concealed penis and has good clinical effect.%探讨改良包皮脱套阴茎根部固定术治疗隐匿阴茎的疗效.方法:对215例年龄5.0~15.3岁的先天性隐匿阴茎患儿行改良阴茎脱套固定术,术后阴茎加压包扎3天,保留导尿4天后拔除导尿管出院.结果:平均手术时间50 min,所有病例术后平均住院4.5d,包皮水肿时间7~10 d,随访6个月~3年,4例发生回缩,系根部固定不良所致,还有2例由于肥胖外观欠佳,但术后阴茎体发育好.其他所有病例外观佳,阴茎体发育好无勃起和排尿障碍,阴茎阴囊交界处无蹼状结构.总成功率97.67%).结论:改良阴茎脱套固定术能充分暴露并切除阴茎体根部牵拉组织至阴茎体完全暴露并可靠固定,同时最大可能保持阴茎皮肤的完整性,所以

  10. Detection technique of transmission in-seam wave for concealed fault in working face of underground coal mine%煤矿井下工作面内隐伏断层透射槽波探测技术

    Institute of Scientific and Technical Information of China (English)

    李刚

    2016-01-01

    The concealed fault influences not only the highly efficient extraction of coal resources, but also brings potential threat for safe production in coal mine. The paper conducted in-seam seismic numeric simulation for the concealed fault in a working face, verified the feasibility of the detection of the consealed fault by transmission method. Then the holographic observation was used to conduct transmission in-seam wave detection in working face 45301, through analysis of frequence dispersion and CT imaging, the distribution of the conceraled faults in working face was found out. The comparison of the detection and the mining show that the transmission in-seam detection tehnique can efficiently detect the consealed faults in working face, provide efficient technical support for safe mining in coal mine.%工作面内隐伏断层不仅严重影响煤炭资源的高效回采,而且给煤矿安全生产带来了潜在威胁。通过对工作面内隐伏断层的槽波地震数值模拟,证实了槽波透射法探测隐伏断层的可行性。采用全息观测方式对45301工作面进行了透射槽波探测,通过频散分析及 CT 成像,查明了工作面隐伏断层分布情况。探采对比表明,透射槽波探测技术能够有效探查工作面内部的隐伏断层,为煤矿安全开采提供有效技术支撑。

  11. Erratum: Error-Resilient 3-D Wavelet Video Coding with Duplicated Lowest Sub-Band Coefficients and Two-Step Error Concealment Method [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93.A (2010) , No. 11 pp.2173-2183

    Science.gov (United States)

    Kim, Sunmi; Tanaka, Hirokazu; Ogawa, Takahiro; Haseyama, Miki

    Erratum: Error-Resilient 3-D Wavelet Video Coding with Duplicated Lowest Sub-Band Coefficients and Two-Step Error Concealment Method [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93.A (2010) , No. 11 pp.2173-2183

  12. Promoter reuse in prokaryotes

    NARCIS (Netherlands)

    Nijveen, H.; Matus-Garcia, M.; Passel, van M.W.J.

    2012-01-01

    Anecdotal evidence shows promoters being reused separate from their downstream gene, thus providing a mechanism for the efficient and rapid rewiring of a gene’s transcriptional regulation. We have identified over 4000 groups of highly similar promoters using a conservative sequence similarity search

  13. Health-promoting schools

    DEFF Research Database (Denmark)

    Kwan, Stella Y L; Petersen, Poul Erik; Pine, Cynthia M

    2005-01-01

    Schools provide an important setting for promoting health, as they reach over 1 billion children worldwide and, through them, the school staff, families and the community as a whole. Health promotion messages can be reinforced throughout the most influential stages of children's lives, enabling...... them to develop lifelong sustainable attitudes and skills. Poor oral health can have a detrimental effect on children's quality of life, their performance at school and their success in later life. This paper examines the global need for promoting oral health through schools. The WHO Global School...... Health Initiative and the potential for setting up oral health programmes in schools using the health-promoting school framework are discussed. The challenges faced in promoting oral health in schools in both developed and developing countries are highlighted. The importance of using a validated...

  14. De novo disruption of promoter and exon 1 of STAR gene reveals essential role for gonadal development

    Directory of Open Access Journals (Sweden)

    Anil Piya

    2017-03-01

    Full Text Available Cholesterol transport into the mitochondria is required for synthesis of the first steroid, pregnenolone. Cholesterol is transported by the steroidogenic acute regulatory protein (STAR, which acts at the outer mitochondrial membrane prior to its import. Mutations in the STAR protein result in lipoid congenital adrenal hyperplasia (CAH. Although the STAR protein consists of seven exons, biochemical analysis in nonsteroidogenic COS-1 cells showed that the first two were not essential for pregnenolone synthesis. Here, we present a patient with ambiguous genitalia, salt-lossing crisis within two weeks after birth and low cortisol levels. Sequence analysis of the STAR, including the exon–intron boundaries, showed the complete deletion of exon 1 as well as more than 50 nucleotides upstream of STAR promoter. Mitochondrial protein import with the translated protein through synthesis cassette of the mutant STAR lacking exon 1 showed protein translation, but it is less likely to have synthesized without a promoter in our patient. Thus, a full-length STAR gene is necessary for physiological mitochondrial cholesterol transport in vivo.

  15. 77 FR 47820 - Invention Promoters/Promotion Firms Complaints

    Science.gov (United States)

    2012-08-10

    ... United States Patent and Trademark Office Invention Promoters/Promotion Firms Complaints ACTION: Proposed... concerning invention promoters and responses from the invention promoters to these complaints. An individual may submit a complaint concerning an invention promoter to the USPTO, which will forward the complaint...

  16. Promoting Renewable Energy Technologies

    DEFF Research Database (Denmark)

    Olsen, Ole Jess; Skytte, Klaus

    % of its annual electricity production. In this paper, we present and discuss the Danish experience as a case of promoting renewable energy technologies. The development path of the two technologies has been very different. Wind power is considered an outright success with fast deployment to decreasing...... technology and its particular context, it is possible to formulate some general principles that can help to create an effective and efficient policy for promoting new renewable energy technologies....

  17. Promoting Renewable Energy Technologies

    DEFF Research Database (Denmark)

    Olsen, Ole Jess; Skytte, Klaus

    % of its annual electricity production. In this paper, we present and discuss the Danish experience as a case of promoting renewable energy technologies. The development path of the two technologies has been very different. Wind power is considered an outright success with fast deployment to decreasing...... technology and its particular context, it is possible to formulate some general principles that can help to create an effective and efficient policy for promoting new renewable energy technologies....

  18. The Promoted Sibling

    DEFF Research Database (Denmark)

    Visholm, Steen

    PRESENTATION No 72 Steen Visholm Associate professor, M.Psych., Ph. D., Roskilde University Private adress: Krystalgade 6 II DK-1172 København K Denmark svisholm@ruc.dk THE PROMOTED SIBLING By their writings about sibling relations Mitchell and Coles has added fruitful complexity to the psychodyn......PRESENTATION No 72 Steen Visholm Associate professor, M.Psych., Ph. D., Roskilde University Private adress: Krystalgade 6 II DK-1172 København K Denmark svisholm@ruc.dk THE PROMOTED SIBLING By their writings about sibling relations Mitchell and Coles has added fruitful complexity...... to the psychodynamic understanding of families, groups and organisations. With a point of departure in a study of self-governing groups in a factory the paper introduces the concept: ‘the promoted sibling’ which provide quite some understanding of the middle managers challenges in his or her role and the challenges...... in democracy in general. The middle manager can be seen as ‘a sibling promoted from above’ and democracy can be seen as siblings promoting a sibling to be ‘a temporary parent’ (Winnicott) or ‘a sibling promoted from below’. The extension of the family dynamics with the sibling relations provides a way...

  19. 红透山铜矿外围隐伏矿体三维定量预测%3D quantitative prediction of concealed ore-body in surrounding areas of Hongtoushan copper deposit

    Institute of Scientific and Technical Information of China (English)

    张宝一; 吴湘滨; 王丽芳; 刘文玉; 杜方

    2012-01-01

    The systematic techniques and methods of concealed ore-body 3D quantitative prediction in the surrounding areas of Hongtoushan copper deposit of Liaoning province were introduced. Firstly, the 3D geological entity model of Hongtoushan copper deposit, including the terrain surface, ore-body, strata, and fault surface, was built in the 3D visualization circumstance. Secondly, through the integration of fields of mineralization information, strata's morphology, fault influence and geophysical attributes in the framework of 3D geological space, the comprehensive analysis of multiple disciplinary of geosciences was achieved. Thirdly, based on 3D geological correlation field analysis, a set of geological ore-controlling quantitative factors and the 3D quantitative prediction model were proposed. Finally, the 3D location and distribution of concealed ore-body in the surrounding areas of Hongtoushan copper deposit were predicted to delineate the target regions. The technology of 3D geological modeling, visualization, correlation field supports the 3D quantitative prediction of concealed ore-body.%介绍红透山铜矿外围隐伏矿体三维定量预测的技术组合和方法体系.首先,借助三维可视化仿真环境,实现红透山铜矿的地表面、矿体、断层、地层实体模型的三维可视化.其次,将成矿信息场、地层形态场、断裂影响场、地球物理场等多元地学空间数据在统一的三维空间数据场构架下有效集成,实现了三维空间信息的综合研究和地学多专业的有机结合.其次,基于三维地质空间相关场分析,为三维定量预测提取定量指标集和建立预测模型.最后,使用三维定量预测模型对红透山矿外围的矿化位置与分布规律进行预测和评价,圈定找矿靶区.三维地质建模与可视化及三维地质空间相关场等技术的使用,为进行红透山矿外围隐伏矿体在三维空间中的分布及形态的定量预测提供支撑.

  20. 采用地震勘探法超前探测矿区隐伏导水构造%Advance Detection of Mine Concealed Water Flowing Structure by Seismic Prospecting Method

    Institute of Scientific and Technical Information of China (English)

    黄晓容

    2016-01-01

    Fengfeng Coal Mining Area has complicated hydro-geological conditions and is threatened by water flood, so an urgent problem to be solved is to investigate and handle the concealed structures in the working face and their hydraulic conductivity. Advance detection was carried out on the concealed structures such as the small faults in front of 182311 working face in a mine in Fengfeng Mining Area, it was found out through investigations that there was an obvious wave-resistance abnormally at the place about 49 m in front of the working face, the exploratory boring proved that there was an abnormal water flowing zone at the place 50 m in front of the face, the actual revelation was a small fault with the throw of 0. 8 m, and the advance detection results were basically consistent with actual situation. This detection can provide technical support for the grouting reconstruction and reinforcement and the elimination of water inrush hazard in the water flowing structural zone.%峰峰矿区矿井水文地质条件复杂,受水害威胁大,对工作面底板隐伏构造及导水性的排查和处理是其亟待解决的问题。采用地震勘探法,对峰峰矿区某矿182311工作面前方小断层等隐伏导水构造进行了超前探测,查明在工作面前方约49 m位置存在明显波阻抗异常,通过钻探验证,其前方50 m见一导水异常区,实际揭露为落差0.8 m的小断层,超前探测结果与实际情况基本相符。可为导水构造地段进行注浆改造、加固处理,消除突水隐患提供技术保障。

  1. From Kin Concealment to Relative Crime Commitment—— A Probe into Household-Ethics Care in Chinese Criminal Laws%从亲亲相隐到关系人犯罪——中国刑事法制的亲伦关怀考察

    Institute of Scientific and Technical Information of China (English)

    董秀红

    2011-01-01

    刑事法制的亲伦关怀是一个国家法治文明和社会进步的体现。对中国亲亲相隐制度的历史考察和中外亲亲相隐制度的比较分析表明,中国本土的亲亲相隐制度以巩固家国秩序为宗旨,以维护亲伦礼教为目标,以规定个人义务为特征,但它毕竟契合人性,体现了对人情的尊重和对事理的顺应。中国现行刑事法制中的关系人犯罪立法非但无视亲伦关怀,甚至混淆了道德与法律、强加了法律义务。我国刑事法制应当承认容隐权,在刑法和刑事诉讼法中重构亲亲相隐制度。%A household-ethics care in criminal laws displays the civilization of laws and rules in a country and the progress of a society.A probe into the history of Chinese kin concealment system and a comparative analysis of Chinese and Western kin concealment systems demonstrates the principle of Chinese native kin concealment system is to consolidate the order of the family and the country and that its aim is to maintain household-ethics rituals and that it is characterized by the stipulation of personal commitments.Despite these,Chinese kin concealment system accords with the human nature and displays a respect for the human relation and an adaptation to reasons.However,the legislation of the relative crime commitment in the present Chinese criminal law not only ignores the household-ethics care but also confuses morality and laws and imposes law commitments.Thus,the criminal law in our country is supposed to admit the rights of concealment and to reconstruct kin concealment system in criminal law and criminal procedure law.

  2. Volcano collapse promoted by hydrothermal alteration and edifice shape, Mount Rainier, Washington

    Science.gov (United States)

    Reid, M.E.; Sisson, T.W.; Brien, D.L.

    2001-01-01

    Catastrophic collapses of steep volcano flanks threaten many populated regions, and understanding factors that promote collapse could save lives and property. Large collapses of hydrothermally altered parts of Mount Rainier have generated far-traveled debris flows; future flows would threaten densely populated parts of the Puget Sound region. We evaluate edifice collapse hazards at Mount Rainier using a new three-dimensional slope stability method incorporating detailed geologic mapping and subsurface geophysical imaging to determine distributions of strong (fresh) and weak (altered) rock. Quantitative three-dimensional slope stability calculations reveal that sizeable flank collapse (>0.1 km3) is promoted by voluminous, weak, hydrothermally altered rock situated high on steep slopes. These conditions exist only on Mount Rainier's upper west slope, consistent with the Holocene debris-flow history. Widespread alteration on lower flanks or concealed in regions of gentle slope high on the edifice does not greatly facilitate collapse. Our quantitative stability assessment method can also provide useful hazard predictions using reconnaissance geologic information and is a potentially rapid and inexpensive new tool for aiding volcano hazard assessments.

  3. Volcano collapse promoted by hydrothermal alteration and edifice shape, Mount Rainier, Washington

    Science.gov (United States)

    Reid, Mark E.; Sisson, Thomas W.; Brien, Dianne L.

    2001-09-01

    Catastrophic collapses of steep volcano flanks threaten many populated regions, and understanding factors that promote collapse could save lives and property. Large collapses of hydrothermally altered parts of Mount Rainier have generated far-traveled debris flows; future flows would threaten densely populated parts of the Puget Sound region. We evaluate edifice collapse hazards at Mount Rainier using a new three-dimensional slope stability method incorporating detailed geologic mapping and subsurface geophysical imaging to determine distributions of strong (fresh) and weak (altered) rock. Quantitative three-dimensional slope stability calculations reveal that sizeable flank collapse (>0.1 km3) is promoted by voluminous, weak, hydrothermally altered rock situated high on steep slopes. These conditions exist only on Mount Rainier's upper west slope, consistent with the Holocene debris-flow history. Widespread alteration on lower flanks or concealed in regions of gentle slope high on the edifice does not greatly facilitate collapse. Our quantitative stability assessment method can also provide useful hazard predictions using reconnaissance geologic information and is a potentially rapid and inexpensive new tool for aiding volcano hazard assessments.

  4. Guarded Type Promotion

    DEFF Research Database (Denmark)

    Winther, Johnni

    2011-01-01

    conditional using the instanceof operator and thus the cast type is redundantly mentioned twice. We propose a new typing rule for Java called Guarded Type Promotion aimed at eliminating the need for the explicit casts when guarded. This new typing rule is backward compatible and has been fully implemented...... in a Java 6 compiler. Through our extensive testing of real-life code we show that guarded casts account for approximately one fourth of all casts and that Guarded Type Promotion can eliminate the need for 95 percent of these guarded casts....

  5. Integration of new geologic mapping and satellite-derived quartz mapping yields insights into the structure of the Roberts Mountains allochthon applicable to assessments for concealed Carlin-type gold deposits

    Science.gov (United States)

    Holm-Denoma, Christopher S.; Hofstra, Albert H.; Rockwell, Barnaby W.; Noble, Paula J.

    2012-01-01

    Geologic mapping and remote sensing across north-central Nevada enable recognition of a thick sheet of Middle and Upper Ordovician Valmy Formation quartzite that structurally overlies folded and faulted Ordovician through Devonian stratigraphic units of the Roberts Mountains allochthon. In the northern Independence Mountains and nearby Double Mountain area, the Valmy Formation is in fault contact with Ordovician through Silurian, predominantly clastic, sedimentary rocks of the Roberts Mountains allochthon that were deformed prior to, or during, emplacement of the Valmy thrust sheet. Similar structural relations are recognized discontinuously for 200 kilometers along the strike of the Roberts Mountains allochthon in mapping guided by regional remote-sensing-based (ASTER) quartz maps. Overall thicknesses of deformed Roberts Mountains allochthon units between the base of the Valmy and the top of underlying carbonate rocks that host large Carlin-type gold deposits varies on the order of hundreds of meters but is not known to exceed 700 meters. The base of the Valmy thrust sheet is a complimentary datum in natural resource exploration and mineral resource assessment for concealed Carlin-type gold deposits.

  6. Analysis of UWB Radar based UAV Systems for Detection of Targets Concealed in Jungle%基于超宽带雷达的丛林目标探测无人机系统分析

    Institute of Scientific and Technical Information of China (English)

    曹秋生; 刘贺军; 马建超; 王勇

    2012-01-01

    探测和识别丛林目标并对其准确定位是复杂的技术问题,解决这一问题的需求十分迫切。首先对具备叶簇穿透能力的超宽带(UWB)雷达的技术构成和性能特点进行描述,然后对适合加装超宽带SAR的无人机提出要求。在此基础上对叶簇穿透超宽带SAR无人机的系统实现进行分析,分解需关注和解决的技术问题,探讨工作方向和重点。%To detect,identify and accurately locate targets concealed in jungle is a complicated technical issue,although to solve such an issue has been in urgent demand.Firstly,The description of the technical composition and characteristics of the ultra-wide band(UWB)radar with foliage penetration capabilities have been given.Then the requirements for UAVs that are suitable to install such UWB SAR have been raised,followed by an analysis of foliage penetration UWB SAR-UAV systems with concerned technical issues to be solved in system integration extracted.And key points for future developments is proposed.

  7. 食管癌及贲门癌术后隐匿胸腔瘘的诊断与治疗%Diagnosis and management of concealed thoracic cavity fistula in postoperative patients with esophageal or cardia carcinoma

    Institute of Scientific and Technical Information of China (English)

    徐启良

    2014-01-01

    目的 探讨食管癌及贲门癌术后隐匿胸腔瘘的诊断、治疗方法.方法 回顾性分析2010年1月至2013年9月40例行胸内胃食管吻合术的食管癌、贲门癌患者资料.40例患者出现高热、白细胞升高等脓毒血症表现,早期均无造影剂渗漏,但CT显示吻合口或胃残端周围出现散在小气泡、少量包裹性积液,存在吻合口或胃残端早期微小瘘口的可能,定义为隐匿胸腔瘘.20例按隐匿胸腔瘘处理,给予禁食、抗感染治疗、保持胃肠减压通畅、鼻肠管肠内营养等治疗;另20例按术后未出现胸腔瘘进行常规治疗,给予降温及抗生素治疗.比较两组胸腔瘘发生情况,总结泛影葡胺食管造影及胸部CT扫描隐匿胸腔瘘的特点.结果 按吻合口瘘处理的20例患者泛影葡胺食管造影及胸部CT扫描显示,有2例(10%)发展为较小的吻合口瘘,未按胸腔瘘处理的20例患者中有17例(85%)发展为胸腔瘘,6例并发多器官衰竭死亡.结论 食管癌、贲门癌术后出现脓毒血症表现,泛影葡胺食管造影及胸部CT扫描显示吻合口或胃残端周围有小气泡、不规则包裹性积液为隐匿胸腔瘘的特异性征象,应按胸腔瘘处理.%Objective To investigate diagnosis and treatment of concealed thoracic cavity fistula in the postoperative patients of esophagus or cardia carcinoma.Methods The clinical data of 40 patients were analyzed who presented with unexplained sepsis (elevated white blood cell count and temperature>38 ℃) after esophagectomy and intrathoracic anastomosis from January 2010 to September 2013.All patients underwent oral meglumine diatrizoate esophageal imaging and computerized tomography scan of the chest.None of the patients had any sign of contrast leak in the early in these diagnostic examinations,but their chest CT scan all showed peri-anastomotic or the gastric remnant diffuse bubble and bit encapsulated effusion.Twenty patients were treated as concealed

  8. Promoting Linguistic Diversity

    DEFF Research Database (Denmark)

    Daryai-Hansen, Petra Gilliyard

    2005-01-01

    To face up to the omnipresence of ‘Anglo-American’, conferences on language policy today address the issue of promoting linguistic diversity. This especially applies to contemporary Europe. Nevertheless, these conferences, which can be regarded as a kind of laboratories or academic microcosm, do...

  9. Promoting La Cultura Hispana

    Science.gov (United States)

    Pluviose, David

    2007-01-01

    Launched in 1985 at Arizona State University, the Hispanic Research Center's (HRC) efforts to promote Latino and Chicano art and issues have flourished in recent years. In 2004, the HRC hosted the Arizona International Latina/o Arts Festival in collaboration with the Mesa Southwest Museum. The HRC has also founded a mentoring institute for…

  10. Promoting La Cultura Hispana

    Science.gov (United States)

    Pluviose, David

    2007-01-01

    Launched in 1985 at Arizona State University, the Hispanic Research Center's (HRC) efforts to promote Latino and Chicano art and issues have flourished in recent years. In 2004, the HRC hosted the Arizona International Latina/o Arts Festival in collaboration with the Mesa Southwest Museum. The HRC has also founded a mentoring institute for…

  11. Promoting Continuing Education Programs.

    Science.gov (United States)

    Hendrickson, Gayle A.

    This handbook is intended for use by institutions in marketing their continuing education programs. A section on "Devising Your Strategy" looks at identifying a target audience, determining the marketing approach, and developing a marketing plan and promotional techniques. A discussion of media options looks at the advantages and…

  12. Insertion/deletion polymorphisms in the ΔNp63 promoter are a risk factor for bladder exstrophy epispadias complex.

    Directory of Open Access Journals (Sweden)

    Simon Wilkins

    Full Text Available Bladder exstrophy epispadias complex (BEEC is a severe congenital anomaly; however, the genetic and molecular mechanisms underlying the formation of BEEC remain unclear. TP63, a member of TP53 tumor suppressor gene family, is expressed in bladder urothelium and skin over the external genitalia during mammalian development. It plays a role in bladder development. We have previously shown that p63(-/- mouse embryos developed a bladder exstrophy phenotype identical to human BEEC. We hypothesised that TP63 is involved in human BEEC pathogenesis. RNA was extracted from BEEC foreskin specimens and, as in mice, ΔNp63 was the predominant p63 isoform. ΔNp63 expression in the foreskin and bladder epithelium of BEEC patients was reduced. DNA was sequenced from 163 BEEC patients and 285 ethnicity-matched controls. No exon mutations were detected. Sequencing of the ΔNp63 promoter showed 7 single nucleotide polymorphisms and 4 insertion/deletion (indel polymorphisms. Indel polymorphisms were associated with an increased risk of BEEC. Significantly the sites of indel polymorphisms differed between Caucasian and non-Caucasian populations. A 12-base-pair deletion was associated with an increased risk with only Caucasian patients (p = 0.0052 Odds Ratio (OR = 18.33, whereas a 4-base-pair insertion was only associated with non-Caucasian patients (p = 0.0259 OR = 4.583. We found a consistent and statistically significant reduction in transcriptional efficiencies of the promoter sequences containing indel polymorphisms in luciferase assays. These findings suggest that indel polymorphisms of the ΔNp63 promoter lead to a reduction in p63 expression, which could lead to BEEC.

  13. Advancement & Promotion Review: 2003

    CERN Multimedia

    2003-01-01

    Advancement, exceptional advancement and promotion decisions were made at the end of June, following the procedures published in Weekly Bulletin No. 13/2003. These decisions were included, where applicable, in the salaries for the month of July 2003. The award of the periodic step was communicated to staff by the salary shown on the July salary slip. All other decisions are communicated by separate notification. The names of staff receiving exceptional advancements or promotions are now published on the HR Division website and are accessible for consultation only at the following address: http://cern.ch/hr-div/internal/personnel/advlist_2003.asp It is recalled that change of career path proposals submitted to the Technical Engineers and Administrative Careers Committee (TEACC) or to Human Resources Division are being examined with a view to preparing the latters' recommendations by the end of September 2003. Final decisions will be applied retroactively to 1 July 2003. Human Resources Division Tel:...

  14. ADVANCEMENT & PROMOTION REVIEW: 2002

    CERN Multimedia

    2002-01-01

    Advancement, exceptional advancement and promotion decisions were made at the beginning of July, under the new career structure scheme and following the procedures published in Weekly Bulletin No. 11/2002. These decisions were included, where applicable, in the salaries for the month of July 2002. The award of the periodic step was communicated to staff by the salary shown on the July salary slip. All other decisions are communicated by separate notification. The names of staff receiving exceptional advancements or promotions will be published this year on the HR Division website and are accessible for consultation only at the following address : http://cern.ch/hr-div/internal/personnel/advlist.asp It is recalled that change of career path proposals submitted to the Technical Engineers and Administrative Careers Committee (TEACC) or to Human Resources Division are being examined with a view to preparing the latters' recommendations by the end of September 2002. Final decisions will be applied retroactivel...

  15. Promoting Health, Producing Moralisms?

    DEFF Research Database (Denmark)

    Brogaard Kristensen, Dorthe; Askegaard, Søren; Hauge Jeppesen, Lene

    2010-01-01

    Based on an ethnographic study of 25 Danish consumers, the aim of this paper is threefold. Firstly, based on a critique of traditional approaches to consumer health campaigning, it argues for a more socially diversified approach for understanding consumer construction and pursuit of healthy behav...... behaviour. Secondly, it presents a typology of discourses that are employed by consumers in constructing their (health oriented) food consumption. Thirdly, it addresses certain social and moral dilemmas inherent in consumer health promotional campaigns....

  16. Bicycle Promotion Plan

    Energy Technology Data Exchange (ETDEWEB)

    Simone, G. A.

    1981-03-09

    The objective of this Bicycle Promotion Plan is to outline a set of recommendations and supporting strategies for implementation by the US DOE toward increased use of the bicycle for energy conservation. The recommendations are designed in such a way as to function in concert with: (1) bicycle programs administered by other Federal government agencies; and (2) related programs and activities already sponsored by DOE. The approach to preparation of the Plan involved a review of all current and planned bicycle promotion programs at the Federal level as well as a review of the array of lierature on the subject. The UniWorld project staff also interacted with several DOE program offices, in order to determine the extent to which they might appropriately contribute to the implementation of bicycle promotional efforts. A synthesis of all the information gathered was published in January of 1981 as a part of the project (The Bicycle Program Review). Based upon this information and an examination of the barriers to bicycle use identified by bicycle transportation specialists in the field, UniWorld developed a series of the most potentially effective recommendations and program strategies for implementation by DOE. The recommendations address activities that could be undertaken in conjunction with existing DOE programs, new developments that might be considered to fulfill critical needs in the field, and interagency efforts that DOE could play a role in.

  17. The dynamics of mobile promoters: Enhanced stability in promoter regions.

    Science.gov (United States)

    Rabbani, Mahnaz; Wahl, Lindi M

    2016-10-21

    Mobile promoters are emerging as a new class of mobile genetic elements, first identified by examining prokaryote genome sequences, and more recently confirmed by experimental observations in bacteria. Recent datasets have identified over 40,000 putative mobile promoters in sequenced prokaryote genomes, however only one-third of these are in regions of the genome directly upstream from coding sequences, that is, in promoter regions. The presence of many promoter sequences in non-promoter regions is unexplained. Here we develop a general mathematical model for the dynamics of mobile promoters, extending previous work to capture the dynamics both within and outside promoter regions. From this general model, we apply rigorous model selection techniques to identify which parameters are statistically justified in describing the available mobile promoter data, and find best-fit values of these parameters. Our results suggest that high rates of horizontal gene transfer maintain the population of mobile promoters in promoter regions, and that once established at these sites, mobile promoters are rarely lost, but are commonly copied to other genomic regions. In contrast, mobile promoter copies in non-promoter regions are more numerous and more volatile, experiencing substantially higher rates of duplication, loss and diversification.

  18. [Drug-promoting advertisements in the Dutch Journal of Medicine and Pharmaceutical Weekly: not always evidence based].

    Science.gov (United States)

    van Eeden, Annelies E; Roach, Rachel E J; Halbesma, Nynke; Dekker, Friedo W

    2012-01-01

    To determine and compare the foundation of claims in drug-promoting advertisements in a Dutch journal for physicians and a Dutch journal for pharmacists. A cross-sectional study. We included all the drug-promoting advertisements referring to a randomized controlled trial (RCT) we could find on Medline from 2 volumes of the Dutch Journal of Medicine (Nederlands Tijdschrift voor Geneeskunde; NTvG) and the (also Dutch) Pharmaceutical Weekly (Pharmaceutisch Weekblad; PW). The validity of the advertisements (n = 54) and the methodological quality of the referenced RCTs (n = 150) were independently scored by 250 medical students using 2 standardised questionnaires. The advertisements' sources were concealed from the students. Per journal, the percentage of drug-promoting advertisements having a valid claim and the percentage of high-quality RCT references were determined. Average scores on quality and validity were compared between the 2 journals. On a scale of 0-18 points, the mean quality scores of the RCTs differed 0.3 (95% CI: -0.1-0.7) between the NTvG (score: 14.8; SD: 2.2) and the PW (score: 14.5; SD: 2.6). The difference between the validity scores of drug-promoting advertisements in the NTvG (score: 5.8; SD: 3.3) and the PW (score: 5.6; SD: 3.6) was 0.3 (95% CI: -0.3-0.9) on a scale of 0-10 points. For both journals, an average of 15% of drug-promoting advertisements was valid (defined as a validity score of > 8 points); 35% of the RCTs referred to was of good methodological quality (defined as a quality score of > 16 points). The substantiation of many claims in drug-promoting advertisements in the NTvG and the PW was mediocre. There was no difference between the 2 journals.

  19. 隐伏矿床上方纳米铜颗粒存在形式与成因%Occurrences and formation of copper nanoparticles over the concealed oredeposits

    Institute of Scientific and Technical Information of China (English)

    叶荣; 张必敏; 姚文生; 王勇

    2012-01-01

    Nanoscale particles of copper or copper alloy were widely discovered in soils and gases over concealed ore deposits,such as Cu-Ni ore deposit,Au ore deposit and Cu-Au deposit.The particles in size diameters,shapes and compositions are similar to those in ore rocks.The facts show that copper minerals widely occur in native copper in various types of mineral deposits.The nanoscale particles of copper or alloy from the ore body could migrate upward to the surface,arriving at the surface,part of particles are persisting in the soil gases and the other part of particles may be trapped by soil geochemical barriers such as iron and manganese oxide coatings,clay minerals,colloids,soluble salts and secondary carbonates.The discovery of nanoscale particles of copper provides direct observation evidence for deep-penetrating geochemistry using soil and geogases as sampling media to search for deeply concealed ore deposits.%在铜镍矿床覆盖层土壤颗粒中和其下伏原生矿石中同时采集到金属纳米颗粒,颗粒在其粒径大小、形貌、连接和簇聚形式、微粒元素组合等性质上相似,表明两者为同成因物质,是内生成矿作用元素存在形式,土壤颗粒中金属纳米颗粒来自深部矿体。在金矿上方土壤颗粒中采集的纳米金属颗粒,与在铜镍矿床覆盖层土壤颗粒中采集观测到的微粒,在微粒性质可以对比,表明元素的纳米微粒是稳定形式,在其源区形成后可借助多种营力,穿越后期地质作用覆盖层,在近地表被土壤地球化学障捕获滞留,是深部矿化的有效传递物质。深穿透地球化学技术可从土壤中分离富集采集到此纳米微粒,并通过其微粒性质,追踪其源区性质。此研究结果在实用意义上,可为以土壤作为采样介质的深穿透地球化学勘查探测覆盖区隐伏矿方法提供理论依据。

  20. Morte materna mascarada: um caminho para sua identificação Muerte materna enmascarada: un camino para su identificación Identification of concealed or presumable maternal deaths

    Directory of Open Access Journals (Sweden)

    Flávia Azevedo Gomes

    2006-12-01

    maternas no informadas.OBJECTIVE: to identify unreported concealed or presumable maternal deaths which occurred in the states of São Paulo, Paraná, Pará, Ceará, and Mato Grosso Brazil. METHODS: Data were collected from the CD-ROM Hospital Admission Authorization Database of the Hospital Information System of the Unified Health System (SIH-SUS regarding records of obstetric procedures and secondary diagnoses between the years of 1999 to 2000. RESULTS: There were 651 maternal deaths registered. From those, 55 were registered as concealed or presumable maternal deaths according to Chapter XV of the International Classification of Diseases (DID-10 - Pregnancy, Delivery and Postpartum. CONCLUSION: This study showed that this information system can be used as a complementary measure for the identification of unreported maternal deaths.

  1. 湖南魏家隐伏型钨-萤石矿床控矿因素及成矿规律分析%Ore controlling factors and metallogenic regularity of concealed tungsten-fluorite deposits in Weijia of Hunan

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    魏家钨矿区位于南岭成矿带中段,为2010年国土资源大调查中新发现的矿产地。通过近年的工程控制,在钨矿体内新发现了萤石矿。本文在对矿床地质特征进行了进一步研究基础上,对矿床的控矿因素及成矿规律进行了总结分析,认为本矿区矿床类型为矽卡岩型钨、萤石矿床,矿体的空间展布主要受矿区内隐伏型层间破碎带和层间破碎带内充填的花岗斑岩脉共同控制。%Weijia tungsten mining area,a newly discovered mineral site in"The Grand Survey of Land and Re-sources of 2010",is located in the middle part of Nanling metallogenic belt.In recent years,fluorite ores were discovered in tungsten orebodies by ore-controlling projects.Based on further study on geological char-acteristics of the deposits,this paper summarizes and analyzes the ore-controlling factors and the metallogen-ic regularity of the deposits,and it shows that the deposits in this area are skarn-type tungsten-fluorite de-posits and the spatial distribution of the orebodies are primarily controlled by concealed interlayer fracture zone and granite porphyry veins filled with in the interlayer fracture zone.

  2. PROMOTIONS: PROper MOTION Software

    Science.gov (United States)

    Caleb Wherry, John; Sahai, R.

    2009-05-01

    We report on the development of a software tool (PROMOTIONS) to streamline the process of measuring proper motions of material in expanding nebulae. Our tool makes use of IDL's widget programming capabilities to design a unique GUI that is used to compare images of the objects from two epochs. The software allows us to first orient and register the images to a common frame of reference and pixel scale, using field stars in each of the images. We then cross-correlate specific morphological features in order to determine their proper motions, which consist of the proper motion of the nebula as a whole (PM-neb), and expansion motions of the features relative to the center. If the central star is not visible (quite common in bipolar nebulae with dense dusty waists), point-symmetric expansion is assumed and we use the average motion of high-quality symmetric pairs of features on opposite sides of the nebular center to compute PM-neb. This is then subtracted out to determine the individual movements of these and additional features relative to the nebular center. PROMOTIONS should find wide applicability in measuring proper motions in astrophysical objects such as the expanding outflows/jets commonly seen around young and dying stars. We present first results from using PROMOTIONS to successfully measure proper motions in several pre-planetary nebulae (transition objects between the red giant and planetary nebula phases), using images taken 7-10 years apart with the WFPC2 and ACS instruments on board HST. The authors are grateful to NASA's Undergradute Scholars Research Program (USRP) for supporting this research.

  3. Leadership Styles Promote Teamwork

    Directory of Open Access Journals (Sweden)

    Khater Aldoshan

    2015-08-01

    Full Text Available This paper will evaluate the importance of learning leadership styles and the explanation of when and how each one is used in the workforce. In this paper many experts have been cited that are well-known in the field of leadership. Also this paper will concentrate on the importance of teamwork in the workforce and there are many examples of how teamwork is effective for creating the best possible outcomes for creativity and productivity. In the television industry creativity is an essential component of the job description and inspirational leadership that promotes teamwork is essential.

  4. Promoting good practice.

    Science.gov (United States)

    2004-04-01

    Meanwhile, the Scottish Executive's Centre for Change and Innovation, which was set up to identify and promote good practice and increase the pace of change to benefit patients, has an informative website at www.cci.scot.nhs.uk which provides details of a range of innovative projects currently underway. The site has main sections focusing on, among other things, national and local programmes, best practice examples, feedback, advice on managing teams, and developing organisations. It also provides a link to the NHS Education for Scotland electronic library.

  5. THE PROMOTION OF INNOVATIVE PRODUCTS

    OpenAIRE

    Alyabedeva, I.

    2012-01-01

    The article aims to consider the issues of the innovative products promotion. Peculiarities of innovative market and its future progress, key factors connected with the promotion of innovative products success are analyzed. Here are also suggested the successful marketing strategies variants of the innovative products promotion.

  6. The promotion of innovative products

    OpenAIRE

    Alyabedeva, I.

    2012-01-01

    The article aims to consider the issues of the innovative products promotion. Peculiarities of innovative market and its future progress, key factors connected with the promotion of innovative products success are analyzed. Here are also suggested the successful marketing strategies variants of the innovative products promotion.

  7. ITALY: WEB TOURISM PROMOTION

    Directory of Open Access Journals (Sweden)

    Katarína Klimová

    2017-03-01

    Full Text Available Tourism, an important industry with a significant social and cultural dimensions, provides interesting stimuli for the study of communication, particularly in the search for adequate tools for persuading potential clients. Since the internet is an essential tool for self-promotion nowadays, specialists examine how tourist destinations are presented in different types of digital texts such as official tourism websites, which combine the informative function of guidebooks with the promotional function of brochures and leaflets. The purpose of this study is to analyse the rhetorical strategies used on the official homepages of nine Italian regions to catch the eye of potential clients and create an identity for a particular region as a tourist destination.   Il turismo, industria importante che ha una significativa dimensione sociale e culturale, costituisce un’area che fornisce stimoli interessanti per lo studio della comunicazione, in particolare nella ricerca di strumenti adeguati a persuadere potenziali clienti. Dal momento che oggi Internet è uno strumento essenziale per l’auto-promozione, molti specialisti si sono dedicati allo studio di come le destinazioni turistiche sono presentate in diversi tipi di testi digitali quali, ad esempio, i siti turistici ufficiali, che combinano la funzione informativa delle guide con quella promozionale di opuscoli e volantini. Scopo di questo studio è analizzare le strategie retoriche utilizzate nelle homepage ufficiali di nove regioni italiane per catturare l’attenzione dei potenziali clienti e per caratterizzare la regione come destinazione turistica.

  8. TWEAK Promotes Peritoneal Inflammation

    Science.gov (United States)

    Sanz, Ana Belen; Aroeira, Luiz Stark; Bellon, Teresa; del Peso, Gloria; Jimenez-Heffernan, Jose; Santamaria, Beatriz; Sanchez-Niño, Maria Dolores; Blanco-Colio, Luis Miguel; Lopez-Cabrera, Manuel; Ruiz-Ortega, Marta; Egido, Jesus; Selgas, Rafael; Ortiz, Alberto

    2014-01-01

    Peritoneal dialysis (PD) is complicated by peritonitis episodes that cause loss of mesothelium and eventually sclerosing peritonitis. An improved understanding of the molecular contributors to peritoneal injury and defense may increase the therapeutic armamentarium to optimize peritoneal defenses while minimizing peritoneal injury. There is no information on the expression and function of the cytokine TWEAK and its receptor Fn14 during peritoneal injury. Fn14 expression and soluble TWEAK levels were measured in human PD peritoneal effluent cells or fluids with or without peritonitis. Fn14 expression was also analyzed in peritoneal biopsies from PD patients. Actions of intraperitoneal TWEAK were studied in mice in vivo. sTWEAK levels were increased in peritoneal effluent in PD peritonitis. Effluent sTWEAK levels correlated with the number of peritoneal macrophages (r = 0.491, p = 0.002). Potential TWEAK targets that express the receptor Fn14 include mesothelial cells and macrophages, as demonstrated by flow cytometry of peritoneal effluents and by analysis of peritoneal biopsies. Peritoneal biopsy Fn14 correlated with mesothelial injury, fibrosis and inflammation, suggesting a potential deleterious effect of TWEAK/Fn14. In this regard, intraperitoneal TWEAK administration to mice promoted peritoneal inflammation characterized by increased peritoneal effluent MCP-1, Fn14 and Gr1+ macrophages, increased mesothelial Fn14, MCP-1 and CCL21 expression and submesothelial tissue macrophage recruitment. Taken together these data suggest that the TWEAK/Fn14 system may promote inflammation and tissue injury during peritonitis and PD. PMID:24599047

  9. Aspergillus Cell Wall Melanin Blocks LC3-Associated Phagocytosis to Promote Pathogenicity.

    Science.gov (United States)

    Akoumianaki, Tonia; Kyrmizi, Irene; Valsecchi, Isabel; Gresnigt, Mark S; Samonis, George; Drakos, Elias; Boumpas, Dimitrios; Muszkieta, Laetitia; Prevost, Marie-Christine; Kontoyiannis, Dimitrios P; Chavakis, Triantafyllos; Netea, Mihai G; van de Veerdonk, Frank L; Brakhage, Axel A; El-Benna, Jamel; Beauvais, Anne; Latge, Jean-Paul; Chamilos, Georgios

    2016-01-13

    Concealing pathogen-associated molecular patterns (PAMPs) is a principal strategy used by fungi to avoid immune recognition. Surface exposure of PAMPs during germination can leave the pathogen vulnerable. Accordingly, β-glucan surface exposure during Aspergillus fumigatus germination activates an Atg5-dependent autophagy pathway termed LC3-associated phagocytosis (LAP), which promotes fungal killing. We found that LAP activation also requires the genetic, biochemical or biological (germination) removal of A. fumigatus cell wall melanin. The attenuated virulence of melanin-deficient A. fumigatus is restored in Atg5-deficient macrophages and in mice upon conditional inactivation of Atg5 in hematopoietic cells. Mechanistically, Aspergillus melanin inhibits NADPH oxidase-dependent activation of LAP by excluding the p22phox subunit from the phagosome. Thus, two events that occur concomitantly during germination of airborne fungi, surface exposure of PAMPs and melanin removal, are necessary for LAP activation and fungal killing. LAP blockade is a general property of melanin pigments, a finding with broad physiological implications.

  10. Health promotion and prevention strategies.

    Science.gov (United States)

    Bradbury-Golas, Kathleen

    2013-09-01

    Opiate dependency is a medical disorder that requires treatment intervention. Primary health care not only entails treatment of illness but also involves disease prevention and health promotion. Based on Pender's revised Health Promotion Model, a descriptive study comparing the health promoting behaviors/practices in abusing and recovering opiate-dependent drug users is analyzed. Using the Health Promoting Lifestyle Profile II, a comparative descriptive, exploratory, nonexperimental design study was conducted to identify key health-promoting behaviors in recovering opiate-dependent drug users. Prevention strategy recommendations are discussed, along with future research recommendations.

  11. Ambiguous genitalia in rural Africa and the complexities of ...

    African Journals Online (AJOL)

    jen

    Human society has historically organized itself around the distinction .... further important determinants – gender of rearing, and brain sex. Correct diagnosis .... The size of the phallus only ... controversy-ridden evolution of sound management ...

  12. Sex beyond the genitalia: The human brain mosaic.

    Science.gov (United States)

    Joel, Daphna; Berman, Zohar; Tavor, Ido; Wexler, Nadav; Gaber, Olga; Stein, Yaniv; Shefi, Nisan; Pool, Jared; Urchs, Sebastian; Margulies, Daniel S; Liem, Franziskus; Hänggi, Jürgen; Jäncke, Lutz; Assaf, Yaniv

    2015-12-15

    Whereas a categorical difference in the genitals has always been acknowledged, the question of how far these categories extend into human biology is still not resolved. Documented sex/gender differences in the brain are often taken as support of a sexually dimorphic view of human brains ("female brain" or "male brain"). However, such a distinction would be possible only if sex/gender differences in brain features were highly dimorphic (i.e., little overlap between the forms of these features in males and females) and internally consistent (i.e., a brain has only "male" or only "female" features). Here, analysis of MRIs of more than 1,400 human brains from four datasets reveals extensive overlap between the distributions of females and males for all gray matter, white matter, and connections assessed. Moreover, analyses of internal consistency reveal that brains with features that are consistently at one end of the "maleness-femaleness" continuum are rare. Rather, most brains are comprised of unique "mosaics" of features, some more common in females compared with males, some more common in males compared with females, and some common in both females and males. Our findings are robust across sample, age, type of MRI, and method of analysis. These findings are corroborated by a similar analysis of personality traits, attitudes, interests, and behaviors of more than 5,500 individuals, which reveals that internal consistency is extremely rare. Our study demonstrates that, although there are sex/gender differences in the brain, human brains do not belong to one of two distinct categories: male brain/female brain.

  13. Genetics Home Reference: X-linked lissencephaly with abnormal genitalia

    Science.gov (United States)

    ... a lack of development (agenesis) of the tissue connecting the left and right halves of the brain ( ... Criteria for Links Data Files & API Site Map Customer Support USA.gov Copyright Privacy Accessibility FOIA Viewers & ...

  14. Genitalia burn: accident or violence? Concerns that transcend injury treatment

    Directory of Open Access Journals (Sweden)

    Ana Lúcia Ferreira

    2014-06-01

    Full Text Available OBJECTIVE: To describe a case of genital burn which raised the suspicion of maltreatment (sexual abuse and neglect by lack of supervision.CASE DESCRIPTION: An infant was taken to the Emergency Room of a pediatric hospital with an extensive burn in the vulva and perineum. The mother claimed the burn had been caused by a sodium-hydroxide-based product. However, the injury severity led to the suspicion of sexual abuse, which was then ruled out by a multidisciplinary team, based on the consistent report by the mother. Besides, the lesion type matched those caused by the chemical agent involved in the accident and the family context was evaluated and considered adequate. The patient had a favorable outcome and was discharged after four days of hospitalization. Outpatient follow-up during six months after the accident enabled the team to rule out neglect by lack of supervision.COMMENTS: Accidents and violence are frequent causes of physical injuries in children, and the differential diagnosis between them can be a challenge for healthcare workers, especially in rare clinical conditions involving patients who cannot speak for themselves. The involvement of a multidisciplinary trained team helps to have an adequate approach, ensuring child protection and developing a bond with the family; the latter is essential for a continued patient follow-up.

  15. Dog bite injuries of genitalia in male infant and children

    Directory of Open Access Journals (Sweden)

    Robin Bothra

    2011-01-01

    Full Text Available The aim of the study is to highlight genital dog bites in male infant and children in developing countries and their management. We managed three cases (9 months, 5 years, and 8 years of genital dog bite between January 1997 and July 2008. Two had unprovoked stray dog bites and the third was bitten by his pet dog when disturbed during eating. Extent of injury varied from small-lacerated wound to near emasculation. Primary repair was done after thorough washing and debridement under antibiotic cover. In the 9-month-old male infant who was near emasculated, scrotum was closed with the available skin and a small penile stump was reconstructed after meatoplasty. Immunization against tetanus and rabies was done for all cases.Postoperative recovery was uneventful, and the wound healed primarily in all cases. Parents of the infant were asked for feminizing genitoplasty but they refused so they were advised for hormonal replacement and penile reconstruction at adolescence. Male children are the most common victims of genital dog bites. These injuries can be repaired primarily with good outcome provided strict cleaning, debridement, wound repair, antibiotic cover, and immunization is applied.

  16. Buying time promotes happiness.

    Science.gov (United States)

    Whillans, Ashley V; Dunn, Elizabeth W; Smeets, Paul; Bekkers, Rene; Norton, Michael I

    2017-08-08

    Around the world, increases in wealth have produced an unintended consequence: a rising sense of time scarcity. We provide evidence that using money to buy time can provide a buffer against this time famine, thereby promoting happiness. Using large, diverse samples from the United States, Canada, Denmark, and The Netherlands (n = 6,271), we show that individuals who spend money on time-saving services report greater life satisfaction. A field experiment provides causal evidence that working adults report greater happiness after spending money on a time-saving purchase than on a material purchase. Together, these results suggest that using money to buy time can protect people from the detrimental effects of time pressure on life satisfaction.

  17. TRYPTOPHAN PROMOTES CHARITABLE DONATING

    Directory of Open Access Journals (Sweden)

    Laura eSteenbergen

    2014-12-01

    Full Text Available The link between serotonin (5-HT and one of the most important elements of prosocial behavior, charity, has remained largely uninvestigated. In the present study, we tested whether charitable donating can be promoted by administering the food supplement L-Tryptophan (TRP, the biochemical precursor of 5-HT. Participants were compared with respect to the amount of money they donated when given the opportunity to make a charitable donation. As expected, compared to a neutral placebo, TRP appears to increase the participants’ willingness to donate money to a charity. This result supports the idea that the food we eat may act as a cognitive enhancer modulating the way we think and perceive the world and others.

  18. Surface Protonics Promotes Catalysis

    Science.gov (United States)

    Manabe, R.; Okada, S.; Inagaki, R.; Oshima, K.; Ogo, S.; Sekine, Y.

    2016-12-01

    Catalytic steam reforming of methane for hydrogen production proceeds even at 473 K over 1 wt% Pd/CeO2 catalyst in an electric field, thanks to the surface protonics. Kinetic analyses demonstrated the synergetic effect between catalytic reaction and electric field, revealing strengthened water pressure dependence of the reaction rate when applying an electric field, with one-third the apparent activation energy at the lower reaction temperature range. Operando-IR measurements revealed that proton conduction via adsorbed water on the catalyst surface occurred during electric field application. Methane was activated by proton collision at the Pd-CeO2 interface, based on the inverse kinetic isotope effect. Proton conduction on the catalyst surface plays an important role in methane activation at low temperature. This report is the first describing promotion of the catalytic reaction by surface protonics.

  19. Ambient oxygen promotes tumorigenesis.

    Directory of Open Access Journals (Sweden)

    Ho Joong Sung

    Full Text Available Oxygen serves as an essential factor for oxidative stress, and it has been shown to be a mutagen in bacteria. While it is well established that ambient oxygen can also cause genomic instability in cultured mammalian cells, its effect on de novo tumorigenesis at the organismal level is unclear. Herein, by decreasing ambient oxygen exposure, we report a ∼50% increase in the median tumor-free survival time of p53-/- mice. In the thymus, reducing oxygen exposure decreased the levels of oxidative DNA damage and RAG recombinase, both of which are known to promote lymphomagenesis in p53-/- mice. Oxygen is further shown to be associated with genomic instability in two additional cancer models involving the APC tumor suppressor gene and chemical carcinogenesis. Together, these observations represent the first report directly testing the effect of ambient oxygen on de novo tumorigenesis and provide important physiologic evidence demonstrating its critical role in increasing genomic instability in vivo.

  20. Revealing digital documents. Concealed structures in data

    CERN Document Server

    Voß, Jakob

    2011-01-01

    This short paper gives an introduction to a research project to analyze how digital documents are structured and described. Using a phenomenological approach, this research will reveal common patterns that are used in data, independent from the particular technology in which the data is available. The ability to identify these patterns, on different levels of description, is important for several applications in digital libraries. A better understanding of data structuring will not only help to better capture singular characteristics of data by metadata, but will also recover intended structures of digital objects, beyond long term preservation.

  1. Telescopic Partial Dentures-Concealed Technology

    Science.gov (United States)

    Bhagat, Tushar Vitthalrao; Walke, Ashwini Nareshchandra

    2015-01-01

    The ideal goal of good dentist is to restore the missing part of oral structure, phonetics, his look and the most important is restored the normal health of the patient, which is hampered due to less or insufficient intake of food. Removable partial denture (RPD) treatment option is considered as a notion, which precludes the inevitability of “floating plastic” in edentulous mouth, that many times fail to fulfill the above essential of the patients. In modern dentistry, though the dental implants or fixed partial denture is the better options, but they have certain limitations. However, overdentures and particularly telescopic denture is the overlooked technology in dentistry that would be a boon for such needy patients. Telescopic denture is especially indicated in the distal edentulous area with minimum two teeth bilaterally present with a good amount of periodontal support. This treatment modality is sort of preventive prosthodontics remedy, which in a conservative manner preserve the remaining teeth and helps in conservation of alveolar bone ultimately. There are two tenets related to this option, one is constant conservation edentulous ridge around the retained tooth and the most important is the endless existence of periodontal sensory action that directs and monitor gnathodynamic task. In this option the primary coping or inner coping are cemented on the prepared tooth, and a similar removable outer or inner telescopic crown placed tightly by using a mechanism of tenso-friction, this is firmly attached to a removable RPD in place without moving or rocking of the prosthesis, which is the common compliant of almost all patients of RPD. Copings are also protecting the abutment from tooth decay and also offers stabilization and maintaining of the outer crown. The outer crown engages the inner coping and gives as an anchor for the remainder of the dentition. This work is the review of telescopic prosthesis which is well supported by the case discussion, and designates the utilization of favorable retained tooth/teeth as abutment that drastically minimized alveolar bone resorption beneath the prosthesis and give the maximum tactile sensation of natural teeth to the patient, which is not possible with other type of RPD. PMID:26435635

  2. Non-Linear Acoustic Concealed Weapons Detector

    Science.gov (United States)

    2006-05-01

    below in Figure 8. 11 The cloth is stretched over the objects. The objects were loosely draped with cloth. The specimen was placed on a tissue...clock to control 2 AD9959 4 channel direct digital synthesizer chips to produce an 8 channel phased array system. The programming on the AD9959 shows...clock is used to clock both output synthesizer chips and also used to gate each of the synthesizers, then all 8 outputs will be coherent. This

  3. Concealed malfunction of the temporary pacemaker

    Directory of Open Access Journals (Sweden)

    Mohammad Alasti

    2006-04-01

    Full Text Available The 12-lead ECG shows sequential atrial and ventricular pacing (Figure 1A. A tracing, obtained simultaneously during pacemaker interrogation, disclosed pacemaker functioning as VDD mode (Figure 1B. The careful examination of this pacemaker tracing showed that there is a pacing stimulus before each P wave (compatible with DDD mode. This paradox can only be explained by displacement of the temporary pacing lead to right atrium and right atrial stimulation by temporary pacemaker. In this setting, each temporary pacemaker-induced atrial depolarization is tracked by the right atrial lead of the permanent pacemaker as intrinsic P wave. Fluoroscopic study confirmed this explanation (Figure 2. The displaced temporary pacing lead was seen near the lateral right atrial wall. Temporary pacemaker lead had been inserted before replacement of permanent pacemaker.

  4. H.264 Motion Recovery-Error Concealment Algorithm Based on Block Motion Trajectory Similarity%基于块运动轨迹相似性的H.264运动修复-错误隐藏算法

    Institute of Scientific and Technical Information of China (English)

    南哲万; 阮秋琦; 安高云

    2013-01-01

    H. 264 video, when being transmitted over error-prone wireless channels, may suffer from losses or errors. The lost data may result in unacceptable quality degradation. In this paper, we proposed a low complexity and effective motion recovery algorithm for temporal error concealment in H. 264, which was based on block motion trajectory similarity and statistical correlation of spatial domain. The block motion trajectory similarity was estimated by using the Sum of Absolute Difference for Motion Vector (SAD-MV), and then accordingly the available blocks for Lost Block (LB) were searched for in the lost Macro-block (MB) neighbors. The MVs of LBs in the current frame were predicted on the basis of the statisticat spatial correlation between the available blocks and LBs extracted from previous frames. The MVs of the MB blockettes were merged and recovered from the MVs of blocks subject to MB segmenting information. The lost pixels were recovered with the neighbourhood interpolation method. Experiments prove that the proposed method is characterized by quick execution velocity and good hidden eqqed as compared with the zero MV method, MB boundary match algorithm and polynomial interpolation method.%H.264视频在通过无线网络传递时,对传输错误非常敏感,由此会引起视频质量的严重下降.本文提出1种基于块运动轨迹相似性及空域统计相关性的受损块运动修复-错误隐藏算法.采用绝对运动差值总和(Sum of Absolute Difference for Motion Vector)估计运动轨迹相似性,并据此在受损宏块周围搜索可靠块;在过去帧中抽取可靠块和受损块的空域相互关系统计特征,并据此在当前帧预测受损块运动矢量;采用基于宏块分割信息的块合并来修复宏块内子块运动矢量,采用邻域插值方法恢复丢失的像素.实验结果表明,与零运动算法、宏块边界匹配算法和多项式内插法相比较,本算法执行速度较快,隐藏效果较好.

  5. Re-Os and U-Pb geochronology of the Laochang Pb-Zn-Ag and concealed porphyry Mo mineralization along the Changning-Menglian suture, SW China: implications for ore genesis and porphyry Cu-Mo exploration

    Science.gov (United States)

    Deng, Xiao-Dong; Li, Jian-Wei; Zhao, Xin-Fu; Wang, Hong-Qiang; Qi, Liang

    2016-02-01

    Numerous polymetallic volcanogenic massive sulfide (VMS), vein, and replacement deposits are distributed along the Changning-Menglian suture zone in Sanjiang Tethyan metallogenic province, SW China. Laochang is the largest Pb-Zn-Ag vein and replacement deposit in this area, with a proven reserve of 0.51 Mt Pb, 0.34 Mt Zn, and 1,737 t Ag. Its age and relationship to magmatic events and VMS deposits in the region, however, have long been debated. In this paper, we present pyrite Re-Os and titanite U-Pb ages aiming to provide significant insights into the timing and genesis of the Pb-Zn-Ag mineralization. Pyrite grains in textural equilibrium with galena, sphalerite, and chalcopyrite from stratabound Pb-Zn-Ag and Cu-bearing Pb-Zn-Ag orebodies have a Re-Os isochron age of 45.7 ± 3.1 Ma (2 σ, mean square weighted deviation (MSWD) = 0.45), whereas titanite grains intergrown with sulfide minerals yield a weighted mean 206Pb/238U age of 43.4 ± 1.2 Ma (2 σ, n = 8). A Mo-mineralized granitic porphyry intersected by recent drilling below the Laochang Pb-Zn-Ag ores yields a zircon U-Pb age of 44.4 ± 0.4 Ma (2 σ, n = 12). Within analytical uncertainties, the ages of the Pb-Zn-Ag deposit and the concealed Mo-mineralized porphyry are indistinguishable, indicating that they are products of a single magmatic hydrothermal system. The results show that Laochang Pb-Zn-Ag deposit is significantly younger than the host mafic volcanic rock (zircon U-Pb age of 320.8 ± 2.7 Ma; 2 σ, n = 12) and Silurian VMS deposits along the Changning-Menglian suture zone, arguing against its origin as a Carboniferous VMS deposit as many researchers claimed. The initial 187Os/188Os ratio (0.540 ± 0.012) obtained from the pyrite Re-Os isochron suggests that metals were likely derived from the granitic porphyry that formed from a hybrid magma due to mixing of crustal- and mantle-derived melts, rather than from the mafic volcanic host rocks as previously thought. Our results favor that the Laochang

  6. 阴囊纵隔翼型皮瓣修复包皮环切术后隐匿型阴茎皮肤短缺%THE WING-LIKED SKIN FLAP WITH SCROTAL SEPTAL VASCULAR PEDICLE IN THE TREATMENT OF CONCEALED PENIS AFTER CIRCUMCISION

    Institute of Scientific and Technical Information of China (English)

    陈辉; 刘凡

    2001-01-01

    目的:用阴囊纵隔翼型皮瓣修复包皮环切术后患者的隐匿型阴茎皮肤短缺。方法:对3例包皮环切术后隐匿型阴茎皮肤不足的病人,用阴囊纵隔翼型皮瓣修复。结果:3例均荻成功,术后即获得立竿见影的良好效果。随访6个月~12个月,阴茎外形满意,发育良好。结论:用该皮瓣修复包皮环切术后隐匿型阴茎皮肤短缺具有血供良好,取材方便、结构相似,外形良好的优点。%Objective: To develop a method for repairing of skin defect of concealed penis after circumcision. Methods:The wing-liked skin flap with scrotal septal vascular pedicle was designed and applied to 3 patients with skin defect of concealed penis after circumcision. Results: All operations were successful. During a follow-up period of 6~12 months, both the shape and development of phalluses were satisfactory. Conclusion: The repair of skin defect of concealed penis after circumcision by this way is one of the best choices. This method had some merits such as the tissue flap has good blood supply,it is easy to elevate, and penis has good appearance following correction.

  7. Oxytocin promotes human ethnocentrism.

    Science.gov (United States)

    De Dreu, Carsten K W; Greer, Lindred L; Van Kleef, Gerben A; Shalvi, Shaul; Handgraaf, Michel J J

    2011-01-25

    Human ethnocentrism--the tendency to view one's group as centrally important and superior to other groups--creates intergroup bias that fuels prejudice, xenophobia, and intergroup violence. Grounded in the idea that ethnocentrism also facilitates within-group trust, cooperation, and coordination, we conjecture that ethnocentrism may be modulated by brain oxytocin, a peptide shown to promote cooperation among in-group members. In double-blind, placebo-controlled designs, males self-administered oxytocin or placebo and privately performed computer-guided tasks to gauge different manifestations of ethnocentric in-group favoritism as well as out-group derogation. Experiments 1 and 2 used the Implicit Association Test to assess in-group favoritism and out-group derogation. Experiment 3 used the infrahumanization task to assess the extent to which humans ascribe secondary, uniquely human emotions to their in-group and to an out-group. Experiments 4 and 5 confronted participants with the option to save the life of a larger collective by sacrificing one individual, nominated as in-group or as out-group. Results show that oxytocin creates intergroup bias because oxytocin motivates in-group favoritism and, to a lesser extent, out-group derogation. These findings call into question the view of oxytocin as an indiscriminate "love drug" or "cuddle chemical" and suggest that oxytocin has a role in the emergence of intergroup conflict and violence.

  8. Ethnopoly promotes tolerance

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    On Friday 23 April, 225 primary school children from the eight schools in Meyrin-Cointrin and their accompanying adults took part in a big game of Ethnopoly. Private individuals, associations, administrations, shopkeepers and CERN all opened their doors to them to talk about their countries, their customs and what they are doing to promote tolerance and integration.   The CERN stand set up at ForumMeyrin for the Ethnopoly game. Scurrying from one place to another, the 10 and 11 year olds were made aware of the rich cultural diversity of their commune, which is home to 130 different nationalities. Physicists and engineers from CERN took up residence in the Forum Meyrin for the day in order to talk to the children about the advantages of international collaboration, a subject dear to the Organization's heart. They welcomed around fifty children in the course of the day, conveying to them a message of tolerance: despite their differences, the 10,000 scientists and other members of the CERN...

  9. Network modularity promotes cooperation.

    Science.gov (United States)

    Marcoux, Marianne; Lusseau, David

    2013-05-01

    Cooperation in animals and humans is widely observed even if evolutionary biology theories predict the evolution of selfish individuals. Previous game theory models have shown that cooperation can evolve when the game takes place in a structured population such as a social network because it limits interactions between individuals. Modularity, the natural division of a network into groups, is a key characteristic of all social networks but the influence of this crucial social feature on the evolution of cooperation has never been investigated. Here, we provide novel pieces of evidence that network modularity promotes the evolution of cooperation in 2-person prisoner's dilemma games. By simulating games on social networks of different structures, we show that modularity shapes interactions between individuals favouring the evolution of cooperation. Modularity provides a simple mechanism for the evolution of cooperation without having to invoke complicated mechanisms such as reputation or punishment, or requiring genetic similarity among individuals. Thus, cooperation can evolve over wider social contexts than previously reported.

  10. Artificial Promoters for Metabolic Optimization

    DEFF Research Database (Denmark)

    Jensen, Peter Ruhdal; Hammer, Karin

    1998-01-01

    In this article, we review some of the expression systems that are available for Metabolic Control Analysis and Metabolic Engineering, and examine their advantages and disadvantages in different contexts. In a recent approach, artificial promoters for modulating gene expression in micro-organisms......In this article, we review some of the expression systems that are available for Metabolic Control Analysis and Metabolic Engineering, and examine their advantages and disadvantages in different contexts. In a recent approach, artificial promoters for modulating gene expression in micro......-organisms were constructed using synthetic degenerated oligonucleotides. From this work, a promoter library was obtained for Lactococcus lactis, containing numerous individual promoters and covering a wide range of promoter activities. Importantly, the range of promoter activities was covered in small steps...... of activity change. Promoter libraries generated by this approach allow for optimization of gene expression and for experimental control analysis in a wide range of biological systems by choosing from the promoter library promoters giving, e.g., 25%, 50%, 200%, and 400% of the normal expression level...

  11. Finding Signals for Plant Promoters

    Institute of Scientific and Technical Information of China (English)

    Weimou Zheng

    2003-01-01

    The strongest signal of plant promoter is searched with the model of single motif with two types. It turns out that the dominant type is the TATA-box. The other type may be called TATA-less signal, and may be used in gene finders for promoter recognition. While the TATA signals are very close for the monocot and the dicot, their TATA-less signals are significantly different. A general and flexible multi-motif model is also proposed for promoter analysis based on dynamic programming. By extending the Gibbs sampler to the dynamic programming and introducing temperature, an efficient algorithm is developed for searching signals in plant promoters.

  12. Sales promotions and food consumption.

    Science.gov (United States)

    Hawkes, Corinna

    2009-06-01

    Sales promotions are widely used to market food to adults, children, and youth. Yet, in contrast to advertising, practically no attention has been paid to their impacts on dietary behaviors, or to how they may be used more effectively to promote healthy eating. This review explores the available literature on the subject. The objective is to identify if and what literature exists, examine the nature of this literature, and analyze what can be learned from it about the effects of sales promotions on food consumption. The review finds that while sales promotions lead to significant sales increases over the short-term, this does not necessarily lead to changes in food-consumption patterns. Nevertheless, there is evidence from econometric modeling studies indicating that sales promotions can influence consumption patterns by influencing the purchasing choices of consumers and encouraging them to eat more. These effects depend on the characteristics of the food product, sales promotion, and consumer. The complexity of the effects means that sales promotions aiming to encourage consumption of nutritious foods need to be carefully designed. These conclusions are based on studies that use mainly sales data as a proxy for dietary intake. The nutrition (and economics) research communities should add to this existing body of research to provide evidence on the impact of sales promotions on dietary intake and related behaviors. This would help support the development of a sales promotion environment conducive to healthy eating.

  13. 隐匿性束室纤维介导的心动过速(附一例报告)%Concealed fasciculoventricular fiber in the genesis of paroxysmal tachycardias (with one case report)

    Institute of Scientific and Technical Information of China (English)

    陈明龙; 曹克将; 邹建刚; 朱莉; 李文奇; 杨荣; 丁志坚; 邹瑞秀

    2001-01-01

    目的阐明隐匿性束室纤维介导的心动过速的电生理机制及其导管消融方法。方法研究病例为男性、29岁,心动过速病史7年余。心动过速不能被腺苷三磷酸和维拉帕米终止,但可被普罗帕酮终止。曾在院外拟诊房室结折返性心动过速,两次行慢径改良术,但心动过速仍反复发作。在我院行电生理检查一次并在非接触球囊导管标测系统(即EnSite 3000)指导下标测和消融。结果电生理检查示窦性心律时AH为75 ms,HV 44 ms,心房增频刺激及程序刺激未见心室预激现象。心室600 ms起搏示室房分离,RS2程序刺激无逆传A波,提示室房逆传功能较弱。心房与心室均能诱发心动过速,但心室更易诱发。心动过速时室房分离。心动过速可呈窄QRS图形、左束支传导阻滞(LBBB)图形及右束支传导阻滞(RBBB)图形。LBBB和RBBB心动过速可自行转为窄QRS心动过速。窄QRS心动过速及RBBB图形时,心动周期为300 ms;LBBB图形时,心动周期为316 ms,明显长于前者。三种心动过速时,希氏束激动均领先于右束支激动。维拉帕米和腺苷三磷酸不能终止心动过速。心房程序刺激及超速抑制不能终止心动过速,但可被心室程序刺激终止。EnSite 3000标测系统分析发现三种心动过速的最先激动点均位于右室间隔上部,此处行环状消融后心动过速不再诱发。随访4个月,临床无心动过速发作。结论该患者的心动过速由隐匿性束室纤维介导,其折返环路包括正常的希-浦传导系统、心室和束室纤维,其消融方法与室性心动过速相似;EnSite 3000标测系统指导此类心动过速的消融有极大的优越性。%Objective To illustrate the electrophysiologic mechanisms of tachycardia mediated by concealed fasciculoventricular fiber and its proper catheter ablation method. Methods The studied case, male, 29 years old, had

  14. Promotion mix and industrial marketing

    Directory of Open Access Journals (Sweden)

    Jovičić Dragoljub

    2007-01-01

    Full Text Available Promotion activities are very important and irreplaceable marketing instrument in placement of production goods. In contrast to final consumption goods, where advertising has an absolute priority compared to another promotion activities, personal sale and development of sale dominate during placement of production goods.

  15. Health Education and Health Promotion

    NARCIS (Netherlands)

    Koelen, M.A.; Ban, van den A.W.

    2004-01-01

    This book is a comprehensive resource for theory, research and action in health education and health promotion. The authors describe strategies and actions for health education and health promotion based on theories for understanding, predicting and changing behavioural, social and environmental det

  16. Promoting Leadership in Australian Universities

    Science.gov (United States)

    Bradley, Andrew P.; Grice, Tim; Paulsen, Neil

    2017-01-01

    In this paper we review current practices for developing and promoting academic leadership in universities. We consider the forms of leadership that are appropriate for academic organisations, while exploring the types of leadership favoured by recruitment and promotion committees. Using the Australian higher education context as a case study, we…

  17. Insurance Incentives for Health Promotion.

    Science.gov (United States)

    Hosokawa, Michael C.

    1984-01-01

    To reduce the cost of reimbursements, many insurance companies have begun to use insurance incentives as a way to motivate individuals to participate in health promotion activities. Traditional health education, research and demonstration, and policy-premium incentives are methods of health promotion used by life and health insurance companies.…

  18. Literature promotion in Public Libraries

    DEFF Research Database (Denmark)

    Kann-Christensen, Nanna; Balling, Gitte

    2011-01-01

    This article discusses a model that can be used in order to analyse notions on literature promotion in public libraries. The model integrates different issues which interact with how literature promotion is understood and thought of in public libraries. Besides cultural policy we regard the logics...... of new public management (NPM) and professional logics in the field of public libraries. Cultural policy along with the identification of underlying logics present among politicians, government officials, managers and librarians/promoters of literature, play an important part in creating an understanding...... of literature promotion in Danish libraries. Thus the basic premise for the development of the model is that cultural policy (Policy) has an important influence on notions on literature promotion and other activities in public libraries, but that cultural policy must be seen in some kind of interaction...

  19. PROMOTION STRATEGIES IN WINE MARKETING

    Directory of Open Access Journals (Sweden)

    Ştefan MATEI

    2014-06-01

    Full Text Available Marketing has proven to be very useful instrument in the wine industry, in fostering comprehensive, cohesive and effective strategies which wineries require to effectively compete in today’s almost saturated wine market. But within wine marketing, the promotion strategy, from our point of view, is the most important component of the winery that can ensure the success in the market or can shorten the life cycle of the product. This being said, the aim of the paper is twofold. Firstly, to determine and analyze the steps that are required to create a promotion strategy in the wine industry, by comparing different approaches. Secondly, to identify the instruments of the promotional mix that helps a winery to implement its promotional strategy. Bearing that in mind, the paper starts with some theoretical aspects regarding the promotion strategy and ends by providing a brief overview of the main findings.

  20. Literature promotion in Public Libraries

    DEFF Research Database (Denmark)

    Kann-Christensen, Nanna; Balling, Gitte

    2011-01-01

    This article discusses a model that can be used in order to analyse notions on literature promotion in public libraries. The model integrates different issues which interact with how literature promotion is understood and thought of in public libraries. Besides cultural policy we regard the logics...... of new public management (NPM) and professional logics in the field of public libraries. Cultural policy along with the identification of underlying logics present among politicians, government officials, managers and librarians/promoters of literature, play an important part in creating an understanding...... of literature promotion in Danish libraries. Thus the basic premise for the development of the model is that cultural policy (Policy) has an important influence on notions on literature promotion and other activities in public libraries, but that cultural policy must be seen in some kind of interaction...

  1. PROMOTION STRATEGIES IN WINE MARKETING

    Directory of Open Access Journals (Sweden)

    Ştefan MATEI

    2014-06-01

    Full Text Available Marketing has proven to be very useful instrument in the wine industry, in fostering comprehensive, cohesive and effective strategies which wineries require to effectively compete in today’s almost saturated wine market. But within wine marketing, the promotion strategy, from our point of view, is the most important component of the winery that can ensure the success in the market or can shorten the life cycle of the product. This being said, the aim of the paper is twofold. Firstly, to determine and analyze the steps that are required to create a promotion strategy in the wine industry, by comparing different approaches. Secondly, to identify the instruments of the promotional mix that helps a winery to implement its promotional strategy. Bearing that in mind, the paper starts with some theoretical aspects regarding the promotion strategy and ends by providing a brief overview of the main findings.

  2. Design of Homomorphic Label Association Code Based on Error Stream Concealment Compensation%基于码流误差掩盖补偿的同态标签关联编码设计

    Institute of Scientific and Technical Information of China (English)

    陈虹

    2015-01-01

    物联网环境下采用GPU多处理器集群进行数据加密和存储,同态标签关联编码是保证存储系统容错过程中数据的安全性的关键。提出一种基于码流误差掩盖补偿的物联网下GPU多处理器集群的同态标签关联编码方法,构建物联网下的GPU多处理器集群通信系统模型,把物联网下GPU多处理器集群通信系统的同态标签关联编码方案分为节点集合、规则、支持度和置信度4个元素,采用特征关联对参量模型进行系统描述,把生存时间最大化问题变成了一个线性规划问题。采用基于码流误差掩盖补偿进行同态标签关联编码改进。实验结果表明,采用该算法,物联网通信系网络生存时间增益提高,编码性能较好,收敛性好,迭代次数较少,生存时间性能增益和计算开销都较传统方法优越,展示了算法的优越性能,有效保证了物联网通信安全。%Data encryption and storage uses GPU multi processor cluster in networking environment, homomorphic tag fault-tolerant coding is the key to guarantee the data storage system fault tolerant process safety. The homomorphism label coding a cover up stream error compensation based on the Internet of things GPU multi processor cluster, multi processor cluster communication system model of Internet of things of GPU is constructed, the homomorphism tag fault-tolerant cod⁃ing GPU multiprocessor cluster communication system network case is divided into 4 elements as node set, rules, support degree and confidence, the system description of the parametric model feature correlation is obtained, the maximum surviv⁃al time is converted into a linear programming problem. The stream error concealment compensation homomorphic label coding is improved. The experimental results show that this algorithm is applied in network communication system network, the survival time gain is improved, it has better coding performance and good

  3. Information technology in health promotion.

    Science.gov (United States)

    Lintonen, T P; Konu, A I; Seedhouse, D

    2008-06-01

    eHealth, the use of information technology to improve or enable health and health care, has recently been high on the health care development agenda. Given the vivid interest in eHealth, little reference has been made to the use of these technologies in the promotion of health. The aim of this present study was to conduct a review on recent uses of information technology in health promotion through looking at research articles published in peer-reviewed journals. Fifteen relevant journals with issues published between 2003 and June 2005 yielded altogether 1352 articles, 56 of which contained content related to the use of information technology in the context of health promotion. As reflected by this rather small proportion, research on the role of information technology is only starting to emerge. Four broad thematic application areas within health promotion were identified: use of information technology as an intervention medium, use of information technology as a research focus, use of information technology as a research instrument and use of information technology for professional development. In line with this rather instrumental focus, the concepts 'ePromotion of Health' or 'Health ePromotion' would come close to describing the role of information technology in health promotion.

  4. Promoter-mediated transcriptional dynamics.

    Science.gov (United States)

    Zhang, Jiajun; Zhou, Tianshou

    2014-01-21

    Genes in eukaryotic cells are typically regulated by complex promoters containing multiple binding sites for a variety of transcription factors, but how promoter dynamics affect transcriptional dynamics has remained poorly understood. In this study, we analyze gene models at the transcriptional regulation level, which incorporate the complexity of promoter structure (PS) defined as transcriptional exits (i.e., ON states of the promoter) and the transition pattern (described by a matrix consisting of transition rates among promoter activity states). We show that multiple exits of transcription are the essential origin of generating multimodal distributions of mRNA, but promoters with the same transition pattern can lead to multimodality of different modes, depending on the regulation of transcriptional factors. In turn, for similar mRNA distributions in the models, the mean ON or OFF time distributions may exhibit different characteristics, thus providing the supplemental information on PS. In addition, we demonstrate that the transcriptional noise can be characterized by a nonlinear function of mean ON and OFF times. These results not only reveal essential characteristics of promoter-mediated transcriptional dynamics but also provide signatures useful for inferring PS based on characteristics of transcriptional outputs. Copyright © 2014 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  5. Health promotion: an ethical analysis.

    Science.gov (United States)

    Carter, Stacy M

    2014-04-01

    Thinking and practising ethically requires reasoning systematically about the right thing to do. Health promotion ethics - a form of applied ethics - includes analysis of health promotion practice and how this can be ethically justified. Existing frameworks can assist in such evaluation. These acknowledge the moral value of delivering benefits. But benefits need to be weighed against burdens, harms or wrongs, and these should be minimised: they include invading privacy, breaking confidentiality, restraining liberty, undermining self-determination or people's own values, or perpetuating injustice. Thinking about the ethics of health promotion also means recognising health promotion as a normative ideal: a vision of the good society. This ideal society values health, sees citizens as active and includes them in decisions that affect them, and makes the state responsible for providing all of its citizens, no matter how advantaged or disadvantaged, with the conditions and resources they need to be healthy. Ethicists writing about health promotion have focused on this relationship between the citizen and the state. Comparing existing frameworks, theories and the expressed values of practitioners themselves, we can see common patterns. All oppose pursuing an instrumental, individualistic, health-at-all-costs vision of health promotion. And all defend the moral significance of just processes: those that engage with citizens in a transparent, inclusive and open way. In recent years, some Australian governments have sought to delegitimise health promotion, defining it as extraneous to the role of the state. Good evidence is not enough to counter this trend, because it is founded in competing visions of a good society. For this reason, the most pressing agenda for health promotion ethics is to engage with communities, in a procedurally just way, about the role and responsibilities of the citizen and the state in promoting and maintaining good health.

  6. Zoning should promote public health.

    Science.gov (United States)

    Hirschhorn, Joel S

    2004-01-01

    Legally, governments use their police powers to protect public health, safety, and welfare through zoning. This paper presents a case for revisiting zoning on the basis of increasing evidence that certain types of community design promote public health, as opposed to the dominant pattern of sprawl development, which does not. Zoning, and the land use planning linked to it, that prohibits or disfavors health-promoting community designs contradicts the inherent public policy goal on which it is based. If there is a paradigm shift underway, from traditional sprawl to health-promoting community designs, then health professionals and others should understand why zoning must be reassessed.

  7. Photovoltaic module with adhesion promoter

    Science.gov (United States)

    Xavier, Grace

    2013-10-08

    Photovoltaic modules with adhesion promoters and methods for fabricating photovoltaic modules with adhesion promoters are described. A photovoltaic module includes a solar cell including a first surface and a second surface, the second surface including a plurality of interspaced back-side contacts. A first glass layer is coupled to the first surface by a first encapsulating layer. A second glass layer is coupled to the second surface by a second encapsulating layer. At least a portion of the second encapsulating layer is bonded directly to the plurality of interspaced back-side contacts by an adhesion promoter.

  8. Tunable promoters in systems biology

    DEFF Research Database (Denmark)

    Mijakovic, Ivan; Petranovic, Dina; Jensen, Peter Ruhdal

    2005-01-01

    does one choose the correct promoter and what are the appropriate methods for reading promoter strength? Furthermore, how fine should the tuning of gene expression be for some specific applications and how can the simultaneous and individual tuning of multiple genes be achieved? Some recent studies......The construction of synthetic promoter libraries has represented a major breakthrough in systems biology, enabling the subtle tuning of enzyme activities. A number of tools are now available that allow the modulation of gene expression and the detection of changes in expression patterns. But, how...

  9. Fining Signals for Plant Promoters

    Institute of Scientific and Technical Information of China (English)

    WeimouZheng

    2003-01-01

    The strongest signal of plant promoter is searched with the model of single motif with two types.It turns out that the dominant type is the TATA-box.The other type may be called TATA-less signal,and may be used in gene finders for promoter recognition.While the TATA signals are very close for the monocot and the dicot,their TATA-less signals are significantly different.A general and flexible multi-motif model is also proposed for promoter analysis based on dynamic programming.By extending the Gibbs sampler to the dynamic programming and introducing temperature,an efficient algorithm is developed for searching signals in plant promoters.

  10. Local wisdom and health promotion

    DEFF Research Database (Denmark)

    Demaio, Alessandro Rhyll

    2011-01-01

    The respectful, appropriate use of local wisdom (LW) in health promotion increases penetration and longevity of positive behavior change. Collaborations based on mutual respect, flexibility and trust between health program organizers, traditional and local practitioners, and the communities being...... served are the goal for public health physicians in our modern, globalized world. This meta-analysis reviewed literature from the past 18 years drawn from a wide range of sources. This investigations proposes a grassroots, material shift toward regarding health promotion interventions as partnerships...... when planning, executing, and evaluating health promotion projects. This holistic approach would be based on the premise that LW is equal to expert opinion. This article endorses the integration of LW at every stage of the health promotion process concluding that it is through empowerment...

  11. Does Labor Diversity Promote Entrepreneurship?

    DEFF Research Database (Denmark)

    Marino, Marianna; Parrotta, Pierpaolo; Pozzoli, Dario

    We find evidence that workforce educational diversity promotes entrepreneurial behavior of employees as well as the formation of new firms, whereas diversity in demographics hinders transitions to selfemployment. Ethnic diversity favors entrepreneurship in financial and business services....

  12. PARTICULARITIES OF MODERN PHARMACEUTICAL PROMOTION

    Directory of Open Access Journals (Sweden)

    Юрий Владимирович Тарасов

    2014-02-01

    Full Text Available Pharmaceutical products market is one of the most saturated consumers’ markets. Characteristic features of it are: high competition, fierce struggle for the customer, specific technologies of promotion. In conditions of globalization and increase in competition both in world pharmaceutical market and in the market of medicines and goods of medical purpose in Russia modern marketing techniques of promotion of the products to the end consumers are the key tools for strengthening market positions – both of producers of pharmaceutical goods and their suppliers, distributors, big whole-sale companies. Among main tools of promotion are: advertising, public relations, stimulation of sales on the market of medicines, personal sales, computer technologies. The article describes different technologies of promotion of medicines: indoor-advertising, hot lines, pharmaceutical exhibitions, packing. DOI: http://dx.doi.org/10.12731/2218-7405-2013-12-1

  13. Sport promotion and sales management

    National Research Council Canada - National Science Library

    Aminiroshan, Zahra; Sharifian, Esmaiel; Siyadat, Seyed Mostafa

    2014-01-01

    .... The purpose of this study was to compare advertising and sales promotion strategies, the effects of different strategies in sport production companies to retain or to gain market share among selected...

  14. Does Labor Diversity Promote Entrepreneurship?

    OpenAIRE

    Marino, Marianna; Parrotta, Pierpaolo; Pozzoli, Dario

    2012-01-01

    We find evidence that workforce educational diversity promotes entrepreneurial behavior of employees as well as the formation of new firms, whereas diversity in demographics hinders transitions to selfemployment. Ethnic diversity favors entrepreneurship in financial and business services.

  15. Oral health promotion at worksites

    DEFF Research Database (Denmark)

    Schou, L

    1989-01-01

    Many workplace-based health promotion programmes have been reported but only a few include or focus specifically on oral health. Although certain obstacles to oral health promotion in the workplace exist from the management side, from the dental profession and from the employees, these seem...... is at present sparse and there are few guidelines to actual strategies for effective oral health promotion. However, elements of strategies that have been successful in various geographical and economic environments include: active involvement of the work force, the use of dental auxiliaries, voluntary daily...... mouthrinsing, screening activities, use of mass media, oral hygiene instruction and prophylaxis and paraprofessional training. It is recommended that future research concentrates on these elements to build up a meaningful and relevant data base upon which effective oral health promotion programmes can...

  16. The Promotion of Banking Services

    OpenAIRE

    IVAN Rica

    2012-01-01

    The purpose of the scientific approach is to demonstrate the usefulness of the adoption of modern promotion techniques in the actual financialbanking sector, in addition to the classical techniques. To achieve this end, the investigation of the Romanianfinancial-banking sector has been deeply conducted, by evaluating the market relations existing between the financial and banking institutions and individuals, as well as promotional techniques adopted by banks, during the communication process...

  17. PARTICULARITIES OF MODERN PHARMACEUTICAL PROMOTION

    OpenAIRE

    Юрий Владимирович Тарасов

    2014-01-01

    Pharmaceutical products market is one of the most saturated consumers’ markets. Characteristic features of it are: high competition, fierce struggle for the customer, specific technologies of promotion. In conditions of globalization and increase in competition both in world pharmaceutical market and in the market of medicines and goods of medical purpose in Russia modern marketing techniques of promotion of the products to the end consumers are the key tools for strengthening market position...

  18. Sport Tourism: Regional Promotion Strategies

    OpenAIRE

    Pereira, Nuno; Ribeiro, J. Cadima; Viseu, José

    2004-01-01

    The main purposes of this paper are (i) to analyze the regional promotion strategies of the UEFA Euro 2004 and (ii) to contribute for the improvement of planning and implementation strategies of tourism marketing at regional level. Data regarding these strategies were collected and synthesided. We verified if these match some of the theoretical issues of promotion and tourism marketing. Despite the fact that already many studies have been made, internationally, on the impact of ...

  19. Epididymis-specific lipocalin promoters

    Institute of Scientific and Technical Information of China (English)

    Kichiya Suzuki; Xiuping Yu; Pierre Chaurand; Yoshihiko Araki; Jean-Jacques Lareyre; Richard M. Caprioli; Marie-Claire Orgebin-Crist; Robert J. Matusik

    2007-01-01

    Our goal is to decipher which DNA sequences are required for tissue-specific expression of epididymal genes. At least 6 epididymis-specific lipocalin genes are known. These are differently regulated and regionalized in the epididymis.Lipocalin 5 (Lcn5 or mE-RABP) and Lipocalin 8 (Lcn8 or mEP17) are homologous genes belonging to the epididymis-specific lipocalin gene cluster. Both the 5 kb promoter fragment of the Lcn5 gene and the 5.3 kb promoter fragment of the Lcn8 gene can direct transgene expression in the epididymis (Lcn5 to the distal caput and Lcn8 to the initial segment), indicating that these promoter fragments contain important cis-regulatory element(s) for epididymisspecific gene expression. To define further the fragments regulating gene expression, the Lcn5 promoter was examined in transgenic mice and immortalized epididymal cell lines. After serial deletion, the 1.8 kb promoter fragment of the Lcn5 gene was sufficient for tissue-specific and region-specific gene expression in transgenic mice. Transient transfection analysis revealed that a transcription factor forkhead box A2 (Foxa2) interacts with androgen receptor and binds to the 100 bp fragment of the Lcn5 promoter between 1.2 kb and 1.3 kb and that Foxa2 expression inhibitsandrogen-dependent induction of the Lcn5 promoter activity. Immunohistochemistry indicated a restricted expression of Foxa2 in the epididymis where endogenous Lcn5 gene expression is suppressed and that the Foxa2 inhibition of the Lcn5 promoter is consistent with the lack of expression of Lcn5 in the corpus and cauda. Our approach provides a basic strategy for further analysis of the epididymal lipocalin gene regulation and flexible control of epididymal function.

  20. 7 CFR 1210.312 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1210.312 Section 1210.312 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE WATERMELON RESEARCH AND PROMOTION PLAN Watermelon Research and Promotion Plan Definitions § 1210.312 Promotion. Promotion means...

  1. 7 CFR 1206.17 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1206.17 Section 1206.17 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE MANGO PROMOTION, RESEARCH, AND INFORMATION Mango Promotion, Research, and Information Order Definitions § 1206.17 Promotion. Promotion...

  2. 7 CFR 1260.122 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1260.122 Section 1260.122 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE BEEF PROMOTION AND RESEARCH Beef Promotion and Research Order Definitions § 1260.122 Promotion. Promotion means any action, including...

  3. 7 CFR 1250.310 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1250.310 Section 1250.310 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE EGG RESEARCH AND PROMOTION Egg Research and Promotion Order Definitions § 1250.310 Promotion. Promotion means any action, including...

  4. 7 CFR 1150.114 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Promotion. 1150.114 Section 1150.114 Agriculture... and Orders; Milk), DEPARTMENT OF AGRICULTURE DAIRY PROMOTION PROGRAM Dairy Promotion and Research Order Definitions § 1150.114 Promotion. Promotion means actions such as paid advertising,...

  5. 7 CFR 1160.111 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Promotion. 1160.111 Section 1160.111 Agriculture... and Orders; Milk), DEPARTMENT OF AGRICULTURE FLUID MILK PROMOTION PROGRAM Fluid Milk Promotion Order Definitions § 1160.111 Promotion. Promotion means the following activities: (a) Consumer Education,...

  6. 29 CFR 541.503 - Promotion work.

    Science.gov (United States)

    2010-07-01

    ... Outside Sales Employees § 541.503 Promotion work. (a) Promotion work is one type of activity often.... Promotion activities directed toward consummation of the employee's own sales are exempt. Promotional... 29 Labor 3 2010-07-01 2010-07-01 false Promotion work. 541.503 Section 541.503 Labor...

  7. [Five paradoxes in health promotion].

    Science.gov (United States)

    López-Dicastillo, Olga; Canga-Armayor, Navidad; Mujika, Agurtzane; Pardavila-Belio, Miren Idoia; Belintxon, Maider; Serrano-Monzó, Inmaculada; Pumar-Méndez, María J

    2017-02-17

    The World Health Organization states that health promotion is a key strategy to improve health, and it is conceived as a global process of enabling people to increase control over, and to improve, their health. Health promotion does not focus solely on empowering individuals dealing with their knowledge, attitudes and skills, but it also takes political, social, economic and environmental aspects influencing health and wellbeing into account. The complexity of applying these concepts is reflected in the five paradoxes in health promotion; these arise in between the rhetoric in health promotion and implementation. The detected paradoxes which are described herein involve the patient versus the person, the individual versus the group, disease professionals versus health professionals, disease indicators versus health indicators, and health as an expense versus health as an investment. Making these contradictions explicit can help determine why it is so complex to put the concepts related to health promotion into practice. It can also help to put forward aspects that need further work if health promotion is to put into practice.

  8. Regulation of Rad51 promoter

    Science.gov (United States)

    Hine, Christopher M; Li, Hongjie; Xie, Li; Mao, Zhiyong; Seluanov, Andrei; Gorbunova, Vera

    2014-01-01

    The DNA double-strand break repair and homologous recombination protein Rad51 is overexpressed in the majority of human cancers. This correlates with therapy resistance and decreased patient survival. We previously showed that constructs containing Rad51 promoter fused to a reporter gene are, on average, 850-fold more active in cancer cells than in normal cells. It is not well understood what factors and sequences regulate the Rad51 promoter and cause its high activity in cancerous cells. Here we characterized regulatory regions and examined genetic requirements for oncogenic stimulation of the Rad51 promoter. We identified specific regions responsible for up- and downregulation of the Rad51 promoter in cancerous cells. Furthermore, we show that Rad51 expression is positively regulated by EGR1 transcription factor. We then modeled the malignant transformation process by expressing a set of oncoproteins in normal human fibroblasts. Expression of different combinations of SV40 large T antigen, oncogenic Ras and SV40 small T antigen resulted in step-wise increase in Rad51 promoter activity, with all the 3 oncoproteins together leading to a 47-fold increase in expression. Cumulatively, these results suggest that Rad51 promoter is regulated by multiple factors, and that its expression is gradually activated as cells progress toward malignancy. PMID:24781030

  9. Promotion of development and introduction

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    In order to promote effectively and smoothly development and introduction of oil substituting energies, comprehensive investigations for improving the energy demand and supply structures and investigations on development infrastructures will be conducted. Investigations will also be given on promoting improvements in overseas coal import base infrastructures, and demand/supply improvement, development and utilization of overseas energies. Investigations and guidance will be given on forming visions to improve demand/supply structures and to introduce and promote technologies thereof. In order to deepen further the understanding and recognition by the nation on oil substituting energies, such publicity activities will be carried out as provision of information, and promotion on popularization and education of energy demand/supply improving systems. For the purpose of promoting international exchanges, information exchange will be promoted on improving the energy demand/supply structures, so is on international information exchange. International cooperative operations on coal utilization, international cooperation on alcohol utilization technologies, and assistance to holding the world energy conferences will be carried out, and an Asia-Pacific Coal Demand and Supply Seminar will be held. In addition, training operations for coal engineers will be performed.

  10. Application of slit lamp microscopy combined with fluorescein staining in diagnosis and treatment of concealed foreign body on ocular surface%裂隙灯显微镜联合荧光素染色检查法在眼表隐匿性异物诊治中的应用

    Institute of Scientific and Technical Information of China (English)

    汤伟民; 陈德钦; 王涛; 凌士奇

    2013-01-01

    目的 介绍一种眼表隐匿性异物诊治的方法.方法 回顾分析了27例眼袁隐匿性异物的眼部临床特点及检查、治疗方法.结果 27例患者均为单眼患病,其中男14例,女13例,年龄的中位数为29岁,四分位间距为25岁、39岁,症状持续时间的中位数为2.0d,四分位数间距为0.5d、4.0d.各类异物中,角膜异物9例,结膜异物18例.在异物取出之前,所有患眼用裂隙灯显微镜检查时均未见明显的眼表损害.裂隙灯显微镜联合荧光素染色检查时发现,眼表隐匿性异物具有特征性改变,包括“荧光素着色”和“荧光素边集”,其中表现为“荧光素着色”的比例为44.4%,表现为“荧光素边集”的比例为92.6%.15例异物可直接用湿棉签抹除,4例用显微镊夹出,其余8例采用联合异物取出法.在异物取出之后,裂隙灯显微镜联合荧光素染色结果显示,4眼未见明显着色,2眼呈片状着色,21眼为点状或线状着色.所有患者均未见因异物导致的眼部感染.结论 通过查找特征性改变,裂隙灯显微镜联合角膜荧光素染色检查法有助于眼表隐匿性异物的诊治.%Objective To introduce a method for the diagnosis and treatment of concealed ocular surface foreign body on ocular surface. Methods A retrospective a-nalysis of the ocular clinical features, examination and therapeutic method of 27 cases with concealed ocular surface foreign body was conducted. Results All 27 patients suffered monocular condition,among which male were 14,female were 13. The median age was 29 years,with a range interquartile 5 years and 39 years;The median duration of symptoms was 2.0 days, with a range interquartile 0.5 day ,4.0 days. The type of foreign body in 9 cases were corneal, 18 cases were conjunctival. No obvious ocular trauma was observed by slit lamp microscopy before the foreign body was removed. When examined by slit lamp microscopy combined with fluorescein staining the concealed

  11. Promoter-associated RNAs and promoter-targeted RNAs.

    Science.gov (United States)

    Yan, Bing-Xue; Ma, Jin-Xia

    2012-09-01

    The world of RNAs is much more complex than previously thought, and has rapidly emerged as one of the most actively researched topics in the life sciences. Recently, two findings in this field were reported and given special attention: promoter-associated RNAs (paRNAs), a novel class of RNAs with numerous potential functions; and promoter-targeted RNA-induced transcriptional gene regulation, a new regulatory mechanism to control transcription. In this review, we summarize the studies in these two areas, and outline the current understanding with respect to the potential biological functions of paRNAs, and the molecular mechanisms of promoter-targeted RNA-induced transcriptional gene silencing and activation. Additionally, we seek to integrate these two areas, as paRNAs may have potential biological links with promoter-targeted RNA-induced transcriptional gene regulation. Finally, we will discuss the significance of identifying paRNAs and the possible use of promoter-targeted RNAs in gene regulation and therapy.

  12. Office of Disease Prevention and Health Promotion

    Science.gov (United States)

    ... Patient Safety Healthy People healthfinder The Office of Disease Prevention and Health Promotion Our Work The Office of Disease Prevention and Health Promotion (ODPHP) leads efforts to improve ...

  13. EXPERIENCES WITH IDEA PROMOTING INITIATIVES

    DEFF Research Database (Denmark)

    Gish, Liv

    2011-01-01

    In new product development a central activity is to provide new ideas. Over the last decades experiences with stimulating employee creativity and establishing idea promoting initiatives have been made in industrial practice. Such initiatives are often labeled Idea Management – a research field...... with a growing interest. In this paper I examine three different idea promoting initiatives carried out in Grundfos, a leading pump manufacturer. In the analysis I address what understandings of idea work are inscribed in the initiatives and what role these initiatives play in the organization with respect...... understandings of idea work are inscribed in the idea promoting initiatives as they to some degree have to fit with the understandings embedded in practice in order to work....

  14. EXPERIENCES WITH IDEA PROMOTING INITIATIVES

    DEFF Research Database (Denmark)

    Gish, Liv

    2011-01-01

    In new product development a central activity is to provide new ideas. Over the last decades experiences with stimulating employee creativity and establishing idea promoting initiatives have been made in industrial practice. Such initiatives are often labeled Idea Management – a research field...... with a growing interest. In this paper I examine three different idea promoting initiatives carried out in Grundfos, a leading pump manufacturer. In the analysis I address what understandings of idea work are inscribed in the initiatives and what role these initiatives play in the organization with respect...... understandings of idea work are inscribed in the idea promoting initiatives as they to some degree have to fit with the understandings embedded in practice in order to work....

  15. Introduction to Global Health Promotion.

    Science.gov (United States)

    Torres, Jennifer

    2017-03-01

    Global health education is becoming increasingly prominent in universities throughout the country especially in programs focused on health and behavioral sciences, law, economics, and political science. Introduction to Global Health Promotion is a book that can be used by both instructors and students in the field of global health. The book provides theories and models, human rights, and technology relevant to the field. In addition the book is designed to share best evidence for promoting health and reducing morbidity and mortality in a variety of areas. The book can be used by health educators, public health practitioners, professors, and students as a resource for research and practice in the field of health promotion and disease prevention.

  16. Promoter trapping in Magnaporthe grisea

    Institute of Scientific and Technical Information of China (English)

    LIU Xiao-hong; LU Jian-ping; WANG Jiao-yu; MIN Hang; LIN Fu-cheng

    2006-01-01

    Application of promoter trapping based on transformation in Magnaporthe grisea is reported in this paper. Two promoter-trapping vectors, designated as pCBGFP and pEGFPHPH, were constructed and transformed into protoplasts of M.grisea. A library of 1077 transformants resistant to hygromycin B was generated. Of which, 448 transformants were found to express eGFP gene in different structures ofM. grisea. Three transformants grew slowly, 5 transformants decreased in conidiafion and 7 transformants reduced in pathogenicity greatly among these 448 transformants. Eleven transformants were checked by genomic southern blot randomly, and 9 of which were single-copy insertions. The promoter trapping technique has been applied successfully in M. grisea and can be used as a tool for functional genomic analysis.

  17. AAHD's Health Promotion and Wellness, Part 2: Health Promotion Programs

    Science.gov (United States)

    Exceptional Parent, 2011

    2011-01-01

    This article is part 2 of a 4-part series on "Health Promotion and Wellness" from the American Association on Health and Disability (AAHD). According to the U.S. Census Bureau, more than 54 million people--one in five Americans--have a disability, and these Americans are more likely to report: (1) Being in poorer overall health; (2) Having less…

  18. Promoter analysis by saturation mutagenesis

    Directory of Open Access Journals (Sweden)

    Baliga Nitin

    2001-01-01

    Full Text Available Gene expression and regulation are mediated by DNA sequences, in most instances, directly upstream to the coding sequences by recruiting transcription factors, regulators, and a RNA polymerase in a spatially defined fashion. Few nucleotides within a promoter make contact with the bound proteins. The minimal set of nucleotides that can recruit a protein factor is called a cis-acting element. This article addresses a powerful mutagenesis strategy that can be employed to define cis-acting elements at a molecular level. Technical details including primer design, saturation mutagenesis, construction of promoter libraries, phenotypic analysis, data analysis, and interpretation are discussed.

  19. 腺苷试验对阵发性室上性心动过速患者诱发隐匿性预激综合征的研究%Study on concealed pre-excitation syndrome induced by adenosine test in patients with paroxysmal supravent-riclar tachycardia

    Institute of Scientific and Technical Information of China (English)

    杜国伟; 郭敏; 冉亮; 潘楠; 黄佐贵; 李厚荣; 殷波; 李倩; 李潇华; 余华; 金海燕; 向娟

    2014-01-01

    Objective To study the detection rate of concealed pre-excitation syndrome induced by intrave-nous injection of adenosine in patients with paroxysmal supraventriclar tachycardia .Methods The intravenous injec-tion of adenosine were performed in 45 patients with paroxysmal supraventriclar tachycardia and 45 healthy people (healthy control group) to investigate the Delta(δ) wave.Results During Intravenous injectiion of adenosine (Del-ta,δ) wave was detection in 43 patients(95.55%) in 45 patients with paroxysmal supraventriclar tachycardia ,and this wave was found in 2 patients(4.44%) in healthy group,which showed significant differences (P<0.01).Con-clusion The adenosine test for patients with paroxysmal supraventriclar tachycardia can induce Delta (δ) wave,and can be helpful to diagnosis of concealed pre-excitation syndrome .%目的:探讨静脉注射腺苷试验对阵发性室上性心动过速( PSVT )患者诱发隐匿性预激综合征的检出率。方法静脉注射腺苷试验对45例PSVT患者和45名无PSVT者(对照组)能否诱发出预激(δ)波进行分析。结果45例患者在静脉注射腺苷试验中诱发出预激(δ)波43例(95.55%),对照组45名诱发出预激(δ)波2例(4.44%),P<0.01。结论腺苷试验对PSVT患者可诱发出预激(δ)波,可诊断隐匿性预激综合征。

  20. Tunable promoters in systems biology

    DEFF Research Database (Denmark)

    Mijakovic, Ivan; Petranovic, Dina; Jensen, Peter Ruhdal

    2005-01-01

    The construction of synthetic promoter libraries has represented a major breakthrough in systems biology, enabling the subtle tuning of enzyme activities. A number of tools are now available that allow the modulation of gene expression and the detection of changes in expression patterns. But, how...

  1. Promoting university interaction with industry

    DEFF Research Database (Denmark)

    Vestergaard, Jakob

    The present working paper reports the results of a study of experiences with the agenda of promoting science-based economic growth in Finland. With the objective of gathering information on best practices, the overall research question of this study was dual: (1) Which institutions, rules...

  2. Professional Preparation in Health Promotion.

    Science.gov (United States)

    Hill, Charles E.; Fisher, Shirley P.

    1992-01-01

    Colleges and universities must develop curricula to prepare health promotion specialists to work with persons of all ages. Program core should include self-care, consumer awareness, nutrition, weight control, stress management, and substance abuse. Health and physical educators should learn to facilitate change of negative health behaviors into…

  3. Promoting Inclusive Education in Ghana

    Science.gov (United States)

    Djietror, Beauty B. K.; Okai, Edward; Kwapong, Olivia A. T. Frimpong

    2011-01-01

    Inclusive education is critical for nation building. The government of Ghana has put in measures for promoting inclusion from basic through to tertiary level of education. Some of these measures include expansion of school facilities, implementation of the Free Compulsory Universal Basic Education (FCUBE); the change of policy on girls who drop…

  4. Promoting Intellectual Growth in Adulthood.

    Science.gov (United States)

    Kehle, Thomas J.; Bray, Melissa A.; Chafouleas, Sandra M; McLoughlin, Caven S.

    2002-01-01

    Article discusses problems associated with promoting intellectual growth in adulthood. Defines characteristics of intelligent behavior as incorporating individual attainment of Resources, Intimacy, Competence, and Health (RICH). Presents the RICH theory as a way to define and address the goals of intelligent enhancement. (JDM)

  5. Promoting local management in groundwater

    Science.gov (United States)

    van Steenbergen, Frank

    2006-03-01

    There is a strong case for making greater effort to promote local groundwater management—in addition to other measures that regulate groundwater use. Though scattered, there are several examples—from India, Pakistan, Yemen and Egypt—where groundwater users effectively self-imposed restrictions on the use of groundwater. There are a number of recurrent themes in such spontaneously-developed examples of local regulation: the importance of not excluding potential users; the importance of simple, low transaction cost rules; the power of correct and accessible hydrogeological information; the possibility of making more use of demand and supply management strategies; and the important supportive role of local governments. The case is made, using examples, for actively promoting local groundwater management as an important element in balancing groundwater uses. Two programmes for promoting local groundwater management in South India are described—one focussing on participatory hydrological monitoring, and one focussing on micro-resource planning and training. In both cases the response was very positive and the conclusion is that promoting local groundwater regulation is not difficult, costly or sensitive and can reach the necessary scale quickly.

  6. Teachers Promoting Student Mathematical Reasoning

    Science.gov (United States)

    Mueller, Mary; Yankelewitz, Dina; Maher, Carolyn

    2014-01-01

    During an informal, after-school, math program, a group of middle school students worked collaboratively on open-ended problems. The students co-constructed arguments, provided justifications for their solutions, and engaged in mathematical reasoning. This paper describes the specific teacher moves that promoted this phenomenon. The findings of…

  7. Promoting PV in Latin America

    Energy Technology Data Exchange (ETDEWEB)

    Nogarin, Mauro

    2010-07-01

    The Euro Solar Programme is financed by the European Commission's Office of Cooperation and its main goal is to promote renewable energy in eight Latin American countries: Bolivia, Ecuador, El Salvador, Guatemala, Honduras, Nicaragua, Paraguay and Peru. (orig.)

  8. Sales promotion and channel coordination

    NARCIS (Netherlands)

    Wierenga, B.; Soethoudt, J.M.

    2010-01-01

    Consumer sales promotions are usually the result of the decisions of two marketing channel parties, the manufacturer and the retailer. In making these decisions, each party normally follows its own interest: i.e. maximizes its own profit. Unfortunately, this results in a suboptimal outcome for the c

  9. Compulsory autonomy-promoting education

    NARCIS (Netherlands)

    A. Schinkel (Anders)

    2010-01-01

    textabstractToday, many liberal philosophers of education worry that certain kinds of education may frustrate the development of personal autonomy, with negative consequences for the individuals concerned, the liberal state, or both. Autonomy liberals hold not only that we should promote the

  10. Health Promotion at the Ballpark.

    Science.gov (United States)

    Hodges, Bonni C

    2017-03-01

    The arrival of a new summer collegiate baseball league franchise to a small central New York city was seen as an opportunity for health promotion. The initiative was set up to explore two overarching questions: (1) Are summer collegiate baseball events acceptable to local public health organizations as viable places for health promotion activities addressing local health issues? (2) Are summer collegiate baseball organizations amenable to health promotion activities built in to their fan and/or player experiences? Planning and implementation were guided by precede-proceed, social cognitive theory, social marketing, and diffusion of innovations constructs. Environmental changes were implemented to support healthy eating and nontobacco use by players and fans; four health awareness nights were implemented at home games corresponding to local public health priorities and included public service announcements, between inning quizzes, information dissemination at concession and team market locations, and special guests. Sales and fan feedback support mostly healthy concession offerings and a tobacco-free ballpark; postseason evaluations from team staff and public health partners support continuing the trials of this sports event as a venue for health promotion.

  11. Promoting Metacognition in Music Classes

    Science.gov (United States)

    Benton, Carol W.

    2013-01-01

    Metacognition is a type of thinking in which learners think about their own cognitive processes. Because it transcends disciplines and grade levels, metacognition is useful in many educational settings and can be transferred from the music classroom to other subject areas. Music educators can promote metacognition by designing and implementing…

  12. Compulsory Autonomy-Promoting Education

    Science.gov (United States)

    Schinkel, Anders

    2010-01-01

    Today, many liberal philosophers of education worry that certain kinds of education may frustrate the development of personal autonomy, with negative consequences for the individuals concerned, the liberal state, or both. Autonomy liberals hold not only that we should promote the development of autonomy in children, but also that this aim should…

  13. Compulsory autonomy-promoting education

    NARCIS (Netherlands)

    A. Schinkel (Anders)

    2010-01-01

    textabstractToday, many liberal philosophers of education worry that certain kinds of education may frustrate the development of personal autonomy, with negative consequences for the individuals concerned, the liberal state, or both. Autonomy liberals hold not only that we should promote the develop

  14. Mutual Benefits in Promoting Bequests.

    Science.gov (United States)

    Patterson, Charles W., III

    1979-01-01

    Encouragement of wills and bequests is the backbone of a good planned giving program. Methods of promotion, types of will gifts, tax aspects, identification of potential donors, a simple bequest program, program evaluation, and the need for continuity and patience are discussed. (MLW)

  15. Promoting Metacognition in Music Classes

    Science.gov (United States)

    Benton, Carol W.

    2013-01-01

    Metacognition is a type of thinking in which learners think about their own cognitive processes. Because it transcends disciplines and grade levels, metacognition is useful in many educational settings and can be transferred from the music classroom to other subject areas. Music educators can promote metacognition by designing and implementing…

  16. COMMUNICATION STRATEGIES IN BUSSINES PROMOTIONS

    OpenAIRE

    DALIA PETCU; VASILE GHERHEŞ; SORIN SUCIU; IOAN DAVID

    2012-01-01

    The capacity of a company to reach its business targets is closely linked to the effectiveness of its communication strategies. Building brad value or strengthening an existing brand involves different ways of communication but all have, as a starting point, a good knowledge of the consumers’ habits. This paper aims to identify and analyze various communication strategies designed to help business promoting.

  17. Communication strategies in business promotions

    OpenAIRE

    Dalia PETCU; Vasile GHERHES; Sorin SUCIU; Ioan DAVID

    2012-01-01

    The capacity of a company to reach its business targets is closely linked to the effectiveness of its communication strategies. Building brad value or strengthening an existing brand involves different ways of communication but all have, as a starting point, a good knowledge of the consumers’ habits. This paper aims to identify and analyze various communication strategies designed to help business promoting.

  18. Sales promotions and channel coordination

    NARCIS (Netherlands)

    B. Wierenga (Berend); H. Soethoudt (Han)

    2009-01-01

    textabstractConsumer sales promotions are usually the result of the decisions of two marketing channel parties, the manufacturer and the retailer. In making these decisions, each party normally follows its own interest: i.e. maximizes its own profit. Unfortunately, this results in a suboptimal outco

  19. Advertising and Sales Promotion Guide.

    Science.gov (United States)

    North Carolina State Dept. of Public Instruction, Raleigh. Div. of Vocational Education.

    This document contains teacher materials for a 4-unit, 1-year marketing education course in advertising and sales promotion offered in grades 11 and 12 in North Carolina. The preface contains a rationale for the development of the course, a course description, course objectives, a list of the instructional units of the course, and a list of the…

  20. 7 CFR 1220.121 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1220.121 Section 1220.121 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE SOYBEAN PROMOTION, RESEARCH, AND CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.121 Promotion. The...

  1. 7 CFR 1216.23 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1216.23 Section 1216.23 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE PEANUT PROMOTION, RESEARCH, AND INFORMATION ORDER Peanut Promotion, Research, and Information Order Definitions § 1216.23 Promotion....

  2. 7 CFR 1212.20 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1212.20 Section 1212.20 Agriculture..., PROMOTION, CONSUMER EDUCATION AND INDUSTRY INFORMATION ORDER Honey Packers and Importers Research, Promotion, Consumer Education, and Industry Information Order Definitions § 1212.20 Promotion. “Promotion” means...

  3. 76 FR 34871 - Mobile Barcode Promotion

    Science.gov (United States)

    2011-06-15

    ... 111 Mobile Barcode Promotion AGENCY: Postal Service TM . ACTION: Final rule. SUMMARY: The Postal... ) 709.4 to add a temporary promotion for First-Class Mail cards, letters and flats, and Standard Mail... barcode promotion, and the new mailing standards to implement the promotion. To be eligible,...

  4. 77 FR 56552 - Holiday Mobile Shopping Promotion

    Science.gov (United States)

    2012-09-13

    ... Promotion AGENCY: Postal Service \\TM\\. ACTION: Final rule. SUMMARY: The Postal Service will revise the... new temporary promotion during November of 2012 for Presorted and automation First-Class Mail[supreg... Holiday Mobile Shopping Promotion (``Promotion''), which will take place between November 7, 2012...

  5. 5 CFR 532.407 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Promotion. 532.407 Section 532.407... Administration § 532.407 Promotion. (a) An employee who is promoted is entitled to be paid at the lowest.... (c) If the promotion is to a position in a different wage area, the agency shall determine...

  6. 7 CFR 1280.118 - Promotion.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Promotion. 1280.118 Section 1280.118 Agriculture... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE LAMB PROMOTION, RESEARCH, AND INFORMATION ORDER Lamb Promotion, Research, and Information Order Definitions § 1280.118 Promotion....

  7. 78 FR 24239 - Temporary Mailing Promotion

    Science.gov (United States)

    2013-04-24

    ... Temporary Mailing Promotion AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is... with offering a Technology Credit Promotion. This notice informs the public of the Postal Service's... changes associated with offering a Technology Credit Promotion.\\1\\ The promotion is planned to begin...

  8. ROLE OF DIGITAL MEDIA IN BRAND PROMOTION

    OpenAIRE

    Maithili R.P. Singh

    2013-01-01

    Digital media and brand promotion nowadays are like synonyms. This paper stresses to comprehend, what is Digital Media, to identify with, what is Brand Promotion and to recognize the relationship between both the phenomenon. Key words: Media, digital media, brand, promotion, brand promotion

  9. ROLE OF DIGITAL MEDIA IN BRAND PROMOTION

    OpenAIRE

    Maithili R.P. Singh

    2013-01-01

    Digital media and brand promotion nowadays are like synonyms. This paper stresses to comprehend, what is Digital Media, to identify with, what is Brand Promotion and to recognize the relationship between both the phenomenon. Key words: Media, digital media, brand, promotion, brand promotion

  10. PROFITABILITY OF INCREMENTAL EXPENDITURE ON FIBRE PROMOTION

    OpenAIRE

    Hill, Debbie J.; Piggott, Roley R.; Griffith, Garry R.

    1996-01-01

    In this paper the impact of changes in wool promotion expenditure and changes in expenditure on the promotion of competing fibres are examined using an equilibrium displacement model. The emphasis is on examining impacts on producer profits net of promotion expenditure and on benefit-cost ratios measuring changes in producer surplus relative to changes in promotion expenditure. It was found, for example, that incremental expenditure on apparel wool promotion on the domestic market is unprofit...

  11. Electrochemical promotion of catalytic reactions

    Science.gov (United States)

    Imbihl, R.

    2010-05-01

    The electrochemical promotion of heterogeneously catalyzed reactions (EPOC) became feasible through the use of porous metal electrodes interfaced to a solid electrolyte. With the O 2- conducting yttrium stabilized zirconia (YSZ), the Na + conducting β″-Al 2O 3 (β-alumina), and several other types of solid electrolytes the EPOC effect has been demonstrated for about 100 reaction systems in studies conducted mainly in the mbar range. Surface science investigations showed that the physical basis for the EPOC effect lies in the electrochemically induced spillover of oxygen and alkali metal, respectively, onto the surface of the metal electrodes. For the catalytic promotion effect general concepts and mechanistic schemes were proposed but these concepts and schemes are largely speculative. Applying surface analytical tools to EPOC systems the proposed mechanistic schemes can be verified or invalidated. This report summarizes the progress which has been achieved in the mechanistic understanding of the EPOC effect.

  12. Drugs that promote dental caries.

    Science.gov (United States)

    2015-02-01

    Dental caries result from erosion of tooth enamel or cementum by acidic substances produced by bacteria found in dental plaque. Caries can lead to pulp necrosis and tooth loss. Risk factors include certain dietary habits, poor oral hygiene, and dry mouth. Diabetes and Sjogren's syndrome can also promote dental caries. Psychotropic substances such as cocaine, methamphetamine, heroin and cannabis can promote dental caries. Many medicinal drugs facilitate the formation of dental caries, through various mechanisms; they include formulations with a high sugar content; drugs that cause dry mouth (especially antimuscarinics); drugs that lower the buccal pH (inhaled powders, etc.); and drugs that cause demineralisation (tetracyclines, etc.). In practice, patients (and parents) should be informed that some drugs can increase the risk of dental caries. They should be encouraged to adapt and reinforce dental hygiene, and advised to visit a dentist regularly.

  13. Promotion marketing activities in universities

    OpenAIRE

    Guseva I.B.; Ledentcova E.A.

    2014-01-01

    The article discusses the need for promotion of educational services through such means of marketing communications as advertising and personal selling , able to satisfy user requests. The results of market research - questioning school graduates of Perm, which was carried out in order to create an effective advertising campaign to attract entrants. Experience can be used in the advertising campaign universities in Russia , in particular , Perm State National Research University.

  14. COMMUNICATION STRATEGIES IN BUSSINES PROMOTIONS

    Directory of Open Access Journals (Sweden)

    DALIA PETCU

    2012-05-01

    Full Text Available The capacity of a company to reach its business targets is closely linked to the effectiveness of its communication strategies. Building brad value or strengthening an existing brand involves different ways of communication but all have, as a starting point, a good knowledge of the consumers’ habits. This paper aims to identify and analyze various communication strategies designed to help business promoting.

  15. Promoting Exit from Violent Extremism

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2013-01-01

    A number of Western countries are currently adding exit programs targeting militant Islamists to their counterterrorism efforts. Drawing on research into voluntary exit from violent extremism, this article identifies themes and issues that seem to cause doubt, leading to exit. It then provides...... the influence attempt as subtle as possible, use narratives and self-affirmatory strategies to reduce resistance to persuasion, and consider the possibility to promote attitudinal change via behavioral change as an alternative to seek to influence beliefs directly....

  16. Promoting mobility in older people.

    Science.gov (United States)

    Rantanen, Taina

    2013-01-01

    Out-of-home mobility is necessary for accessing commodities, making use of neighborhood facilities, and participation in meaningful social, cultural, and physical activities. Mobility also promotes healthy aging as it relates to the basic human need of physical movement. Mobility is typically assessed either with standardized performance-based tests or with self-reports of perceived difficulty in carrying out specific mobility tasks. Mobility declines with increasing age, and the most complex and demanding tasks are affected first. Sometimes people cope with declining functional capacity by making changes in their way or frequency of doing these tasks, thus avoiding facing manifest difficulties. From the physiological point of view, walking is an integrated result of the functioning of the musculoskeletal, cardio-respiratory, sensory and neural systems. Studies have shown that interventions aiming to increase muscle strength will also improve mobility. Physical activity counseling, an educational intervention aiming to increase physical activity, may also prevent mobility decline among older people. Sensory deficits, such as poor vision and hearing may increase the risk of mobility decline. Consequently, rehabilitation of sensory functions may prevent falls and decline in mobility. To promote mobility, it is not enough to target only individuals because environmental barriers to mobility may also accelerate mobility decline among older people. Communities need to promote the accessibility of physical environments while also trying to minimize negative or stereotypic attitudes toward the physical activity of older people.

  17. Sport promotion and sales management

    Directory of Open Access Journals (Sweden)

    Zahra Aminiroshan

    2014-06-01

    Full Text Available At the beginning of third millennium, the world of sport has been experiencing new marketing techniques to introduce products and services. The purpose of this study was to compare advertising and sales promotion strategies, the effects of different strategies in sport production companies to retain or to gain market share among selected firms, which were active in Iran. The method of survey was descriptive – analytical and some questionnaires were used for collecting data in Likert scale. The validity of the questionnaire were estimated by interview with professors and exports in marketing and sport marketing and the reliability was assessed by using Cronbach's alpha (α= 0.89. Statistical population of the study includes Sport Goods-Producing companies in Iran (N= 180 and 122 firms formed the study sample. For testing the hypothesis, we have used Paired Samples T-Test. The analysis of findings showed that there was a meaningful difference between using advertising and sales promotion strategies. In general, we can say, there are some limited applications of using techniques and methods of sales promotion strategies in Iranian sport industry and methods of advertising. Consequently, regarding the intense competition among companies as well as fast growth of markets and fast changes in consumer’s behavior, identifying the best methods for corresponding relationship to customer would be required.

  18. Promotion to professor: a career development resource.

    Science.gov (United States)

    Sanfey, Hilary

    2010-10-01

    By the time a faculty member is being considered for promotion to full professor, he/she will be about 10 years out of residency training and will almost certainly have prior experience with the academic promotion process. The preparation for promotion to full professor should begin soon after the promotion to associate professor. This is a time to reassess opportunities, resources, skills, and career goals. The timing of the promotion to full professor is usually less rigid than the timeframe for promotion at lower ranks, but schools vary in this regard. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. lac Up-promoter mutants with increased homology to the consensus promoter sequence.

    OpenAIRE

    Mandecki, W; Goldman, R A; Powell, B S; Caruthers, M H

    1985-01-01

    Four lac promoter mutants were constructed. The mutations increased the homology between the lac promoter and the consensus promoter sequences by introducing the consensus -10 and -35 regions and the consensus spacing of 17 residues between these two regions. The promoter mutants were cloned into a pBR322-derivatized vector upstream from the lacZ gene, and levels of beta-galactosidase were an indication of promoter activity. All mutants exhibited higher activity than did the wild-type promoter.

  20. Pender's health promotion model in medical research.

    Science.gov (United States)

    Heydari, Abbas; Khorashadizadeh, Fatemeh

    2014-09-01

    This review shows how researchers use pander's health promotion model. We included all articles in which Pender's health promotion has been used for theoretical framework. Eligible articles were selected according to review of abstracts. Search was conducted using the electronic database from 1990 to 2012. Based on our search, 74 articles with various methodologies were relevant for review. Their aims of these studies were to predict effective factors/barriers in health promotion behaviours, to detect effects of intervention programme for improving health promotion behaviours, test the model, identify quality of life and health promotion behaviour, predict stage of change in related factors that affect health promotion behaviour, prevent the events that interfere with health promotion behaviour, develop another model similar to this model, compare this model with another model, determine the relationship of variables associated to health promotion behaviours.