WorldWideScience

Sample records for identify concealed objects

  1. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    Science.gov (United States)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  2. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    Science.gov (United States)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  3. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    -to-noise parameter to determine how the frequencies contained in the echo dataset are normalised. The chosen image reconstruction algorithm is based on the back-projection method. The algorithm was implemented in MATLAB and uses a pre-calculated sensitivity matrix to increase the computation speed. The results include both 2D and 3D image datasets. The 3D datasets were obtained by scanning the dual sixteen element linear antenna array over the test object. The system has been tested on both humans and mannequin test objects. The front surface of an object placed on the human/mannequin torso is clearly visible, but its presence is also seen from a tell-tale imaging characteristic. This characteristic is caused by a reduction in the wave velocity as the electromagnetic radiation passes through the object, and manifests as an indentation in the reconstructed image that is readily identifiable. The prototype system has been shown to easily detect a 12 mm x 30 mm x70 mm plastic object concealed under clothing.

  4. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  5. Concealing with structured light.

    Science.gov (United States)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  6. Development and validation of the Body Concealment Scale for Scleroderma

    NARCIS (Netherlands)

    Jewett, L.R.; Malcarne, V.L.; Kwakkenbos, C.M.C.; Harcourt, D.; Rumsey, N.; Körner, A.; Steele, R.J.; Hudson, M.; Baron, M.; Haythornthwaite, J.A.; Heinberg, L.; Wigley, F.M.; Thombs, B.D.

    2016-01-01

    Objective: Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Methods: Initial items for the

  7. Concealed identification symbols and nondestructive determination of the identification symbols

    Science.gov (United States)

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  8. CT diagnosis of concealed rupture of intestine following abdominal trauma

    International Nuclear Information System (INIS)

    Ji Jiansong; Wei Tiemin; Wang Zufei; Zhao Zhongwei; Tu Jianfei; Fan Xiaoxi; Xu Min

    2009-01-01

    Objective: To investigate CT findings of concealed rupture of intestine following abdominal trauma. Methods: CT findings of 11 cases with concealed rupture of intestine following abdominal trauma proved by surgery were identified retrospectively. Results: The main special signs included: (1) Free air in 4 cases, mainly around injured small bowel or under the diaphragm, or in the retroperitoneal space or and in the lump. (2) High density hematoma between the intestines or in the bowel wall (4 cases). (3) Bowel wall injury sign, demonstrated as low density of the injured intestinal wall, attenuated locally but relatively enhanced in neighbor wall on enhanced CT. (4) Lump around the injured bowel wall with obvious ring-shaped enhancement (4 cases). Other signs included: (1) Free fluid in the abdominal cavity or between the intestines with blurred borders. (2) Bowel obstruction. Conclusion: CT is valuable in diagnosing concealed rupture of intestine following abdominal trauma. (authors)

  9. Self-Concealment and Suicidal Behaviors

    Science.gov (United States)

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  10. Expanded opportunities of THz passive camera for the detection of concealed objects

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  11. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  12. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  13. Induction detection of concealed bulk banknotes

    Science.gov (United States)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  14. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  15. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  16. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  17. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  18. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  19. Induction detection of concealed bulk banknotes

    International Nuclear Information System (INIS)

    Fuller, Christopher; Chen, Antao

    2011-01-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects

  20. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  1. Intra- and interpersonal consequences of experimentally induced concealment

    NARCIS (Netherlands)

    Bouman, T.K.

    2003-01-01

    Secrecy, concealment, and thought supression are assumed to be important aspects of psychopathology. However, most studies address these from an intrapersonal perspective. This study investigates both the intra- as well as the interpersonal consequences of experimentally induced concealment. Two

  2. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  3. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    Science.gov (United States)

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  5. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    Science.gov (United States)

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  6. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  8. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  9. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  10. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  11. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  13. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  14. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  15. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    Science.gov (United States)

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  16. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  17. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Organizational Concealment: An Incentive of Reducing the Responsibility

    OpenAIRE

    Tajika, Tomoya

    2017-01-01

    We studyworkers’ incentives of reporting problems within an OLG organization consisting of a subordinate and a manager. The subordinate is responsible for reporting a problem, and the manager is responsible for solving the reported problem. The subordinate has an incentive to conceal a detected problem since if he reports it but the manager is too lazy to solve the problem, the responsibility is transferred to the subordinate since he becomes a manager in the next period. We show that conceal...

  19. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  20. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  1. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  2. The association between concealing emotions at work and medical utilization in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  3. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  4. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  5. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  6. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  7. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1...

  8. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    Science.gov (United States)

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  9. A Concealed Information Test with multimodal measurement.

    Science.gov (United States)

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  10. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  11. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  12. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  13. Persistent Identifiers as Boundary Objects

    Science.gov (United States)

    Parsons, M. A.; Fox, P. A.

    2017-12-01

    In 1989, Leigh Star and Jim Griesemer defined the seminal concept of `boundary objects'. These `objects' are what Latour calls `immutable mobiles' that enable communication and collaboration across difference by helping meaning to be understood in different contexts. As Star notes, they are a sort of arrangement that allow different groups to work together without (a priori) consensus. Part of the idea is to recognize and allow for the `interpretive flexibility' that is central to much of the `constructivist' approach in the sociology of science. Persistent Identifiers (PIDs) can clearly act as boundary objects, but people do not usually assume that they enable interpretive flexibility. After all, they are meant to be unambiguous, machine-interpretable identifiers of defined artifacts. In this paper, we argue that PIDs can fill at least two roles: 1) That of the standardized form, where there is strong agreement on what is being represented and how and 2) that of the idealized type, a more conceptual concept that allows many different representations. We further argue that these seemingly abstract conceptions actually help us implement PIDs more effectively to link data, publications, various other artifacts, and especially people. Considering PIDs as boundary objects can help us address issues such as what level of granularity is necessary for PIDs, what metadata should be directly associated with PIDs, and what purpose is the PID serving (reference, provenance, credit, etc.). In short, sociological theory can improve data sharing standards and their implementation in a way that enables broad interdisciplinary data sharing and reuse. We will illustrate this with several specific examples of Earth science data.

  14. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  15. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  16. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  17. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  18. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  19. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  20. A hybrid frame concealment algorithm for H.264/AVC.

    Science.gov (United States)

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  1. Error Concealment using Neural Networks for Block-Based Image Coding

    Directory of Open Access Journals (Sweden)

    M. Mokos

    2006-06-01

    Full Text Available In this paper, a novel adaptive error concealment (EC algorithm, which lowers the requirements for channel coding, is proposed. It conceals errors in block-based image coding systems by using neural network. In this proposed algorithm, only the intra-frame information is used for reconstruction of the image with separated damaged blocks. The information of pixels surrounding a damaged block is used to recover the errors using the neural network models. Computer simulation results show that the visual quality and the MSE evaluation of a reconstructed image are significantly improved using the proposed EC algorithm. We propose also a simple non-neural approach for comparison.

  2. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  3. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  4. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    Science.gov (United States)

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  5. Having your radioactive objects identified and collected

    International Nuclear Information System (INIS)

    2012-12-01

    This brochure explains the risks linked with some ancient radioactive objects of domestic use (like radium products of medical use), how to identify them and to have them collected by the French national agency of radioactive wastes (Andra) for further processing. Some advice are given regarding the identification of the objects, their relative hazardousness and the precautions to take for their handling

  6. Geophysical techniques for exploration of concealed uranium deposits in the Gwalior basin

    International Nuclear Information System (INIS)

    Choudhary, Kalpan; Singh, R.B.

    2004-01-01

    There is no direct geophysical method for the exploration of concealed uranium ore. Scope of geophysics for this in the Gwalior basin comprises delineating the basement topography, demarcation or zones of intense fracturing intersecting the unconformities and to identify the presence of carbonaceous rocks, specially in the graben-like structures. These geophysical problems have been successfully solved in other places by employing IP, resistivity, SP and gravity techniques for basement mapping, identification of fracture zone/shear zone, delineation of electrical conductors like carbonaceous rocks and sulphides. Three such case histories are presented here that include: a). basement and shear/fracture zone mapping in the Vindhyan basin north of Son-Narmada lineament, b). delineation of conductive zone (proved to be carbon phyllite) in the Mahakoshal Group of Kanhara area of Sonbhadra district, UP and c). Identification of a conductive zone, proved to be sulphide body, within the Mahakoshal group in the Gurharpahar area of Sidhi and Sonbhadra districts of MP and UP respectively. In the context of exploration for concealed uranium in the Gwalior basin, it is suggested to employ IP, resistivity, SP, gravity and magnetic methods for delineation of conductive zones like carbonaceous rocks, basement topography, including the graben like structures, fracture zone, geological boundaries and demarcation of the basin boundary. (author)

  7. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  9. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  10. Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

    Directory of Open Access Journals (Sweden)

    Robert Hudec

    2011-01-01

    Full Text Available This paper deals with video transmission over lossy communication networks. The main idea is to develop video concealment method for information losses and errors correction. At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. Finally, the efficiency of developed algorithm is presented in experimental part of this paper.

  11. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    The study emanates from the contentions of leaders of states, who, instead of promoting the ideals and values which promote social and political-coexistence, limit and conceal their views of leadership to some tribalistic, ethnocentric and self-serving idols, and by so doing, they cause a monumental harm to the polity. This is ...

  12. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    Science.gov (United States)

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  14. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  15. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    Science.gov (United States)

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  16. IRAS colors of VLA identified objects in the galaxy

    International Nuclear Information System (INIS)

    Fich, M.; Terebey, S.

    1987-01-01

    Infrared Astronomy Satellite (IRAS) sources found within 4 degrees of l = 125 deg, b = 2 deg on the 3rd HCON 60 micron Sky Brightness Images were observed at the Very Large Array (VLA). Regions were to be identified where massive stars are forming by looking for small areas of radio continuum emissions. The IRAS sources could be divided into three groups by their IRAS 12 micron/25 micron and 60 micron/100 micron color. The group identified with star forming regions contained essentially all of the objects with extended radio emission. In all of these cases the extended radio emission showed a morphology consistent with the identification of these objects as HII regions. The conclusion drawn is that star formation regions can be distinguished from other objects by their infrared colors

  17. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  18. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  19. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  20. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  1. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  2. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  3. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  4. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...

  5. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  6. RAPTOR-scan: Identifying and Tracking Objects Through Thousands of Sky Images

    International Nuclear Information System (INIS)

    Davidoff, Sherri; Wozniak, Przemyslaw

    2004-01-01

    The RAPTOR-scan system mines data for optical transients associated with gamma-ray bursts and is used to create a catalog for the RAPTOR telescope system. RAPTOR-scan can detect and track individual astronomical objects across data sets containing millions of observed points.Accurately identifying a real object over many optical images (clustering the individual appearances) is necessary in order to analyze object light curves. To achieve this, RAPTOR telescope observations are sent in real time to a database. Each morning, a program based on the DBSCAN algorithm clusters the observations and labels each one with an object identifier. Once clustering is complete, the analysis program may be used to query the database and produce light curves, maps of the sky field, or other informative displays.Although RAPTOR-scan was designed for the RAPTOR optical telescope system, it is a general tool designed to identify objects in a collection of astronomical data and facilitate quick data analysis. RAPTOR-scan will be released as free software under the GNU General Public License

  7. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  8. Concealment tactics among HIV-positive nurses in Uganda

    OpenAIRE

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that thre...

  9. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  10. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  11. Concealed semantic and episodic autobiographical memory electrified.

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  12. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  13. Concealed semantic and episodic autobiographical memory electrified

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  14. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    Science.gov (United States)

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  15. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  16. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    Science.gov (United States)

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  17. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    Science.gov (United States)

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  18. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  19. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  20. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    Science.gov (United States)

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  1. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction.

    Science.gov (United States)

    Singh, P; Ajmera, D-H; Xiao, S-S; Yang, X-Z; Liu, X; Peng, B

    2016-11-01

    The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient's age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated ( p < or = 0.05) with extraction difficulty under regression models. In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice.

  2. Bayesian interpolation in a dynamic sinusoidal model with application to packet-loss concealment

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Christensen, Mads Græsbøll; Cemgil, Ali Taylan

    2010-01-01

    a Bayesian inference scheme for the missing observations, hidden states and model parameters of the dynamic model. The inference scheme is based on a Markov chain Monte Carlo method known as Gibbs sampler. We illustrate the performance of the inference scheme to the application of packet-loss concealment...

  3. [Effects of false memories on the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  4. Crossref an update on article level linking and digital object identifiers

    CERN Multimedia

    2002-01-01

    Description of the CrossRef initiative, "an independent non-profit membership organization that was established by the publishing community to permit article linking based on digital object identifiers (DOIs)" (1 page).

  5. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  6. Living with a concealable stigmatized identity: the impact of anticipated stigma, centrality, salience, and cultural stigma on psychological distress and health.

    Science.gov (United States)

    Quinn, Diane M; Chaudoir, Stephenie R

    2009-10-01

    The current research provides a framework for understanding how concealable stigmatized identities impact people's psychological well-being and health. The authors hypothesize that increased anticipated stigma, greater centrality of the stigmatized identity to the self, increased salience of the identity, and possession of a stigma that is more strongly culturally devalued all predict heightened psychological distress. In Study 1, the hypotheses were supported with a sample of 300 participants who possessed 13 different concealable stigmatized identities. Analyses comparing people with an associative stigma to those with a personal stigma showed that people with an associative stigma report less distress and that this difference is fully mediated by decreased anticipated stigma, centrality, and salience. Study 2 sought to replicate the findings of Study 1 with a sample of 235 participants possessing concealable stigmatized identities and to extend the model to predicting health outcomes. Structural equation modeling showed that anticipated stigma and cultural stigma were directly related to self-reported health outcomes. Discussion centers on understanding the implications of intraindividual processes (anticipated stigma, identity centrality, and identity salience) and an external process (cultural devaluation of stigmatized identities) for mental and physical health among people living with a concealable stigmatized identity. 2009 APA, all rights reserved.

  7. Concealment tactics among HIV-positive nurses in Uganda.

    Science.gov (United States)

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  8. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  9. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  10. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  11. BSDB: A New Consistent Designation Scheme for Identifying Objects in Binary and Multiple Stars

    Directory of Open Access Journals (Sweden)

    Kovaleva D. A.

    2015-06-01

    Full Text Available The new consistent scheme for designation of objects in binary and multiple systems, BSDB, is described. It was developed in the frame of the Binary star DataBase, BDB (http://www.inasan.ru, due to necessity of a unified and consistent system for designation of objects in the database, and the name of the designation scheme was derived from that of the database. The BSDB scheme covers all types of observational data. Three classes of objects introduced within the BSDB nomenclature provide correct links between objects and data, what is especially important for complex multiple stellar systems. The final stage of establishing the BSDB scheme is compilation of the Identification List of Binaries, ILB, where all known objects in binary and multiple stars are presented with their BSDB identifiers along with identifiers according to major catalogues and lists.

  12. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  13. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  14. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  15. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  16. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    Science.gov (United States)

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  17. Process Architecture for Managing Digital Object Identifiers

    Science.gov (United States)

    Wanchoo, L.; James, N.; Stolte, E.

    2014-12-01

    In 2010, NASA's Earth Science Data and Information System (ESDIS) Project implemented a process for registering Digital Object Identifiers (DOIs) for data products distributed by Earth Observing System Data and Information System (EOSDIS). For the first 3 years, ESDIS evolved the process involving the data provider community in the development of processes for creating and assigning DOIs, and guidelines for the landing page. To accomplish this, ESDIS established two DOI User Working Groups: one for reviewing the DOI process whose recommendations were submitted to ESDIS in February 2014; and the other recently tasked to review and further develop DOI landing page guidelines for ESDIS approval by end of 2014. ESDIS has recently upgraded the DOI system from a manually-driven system to one that largely automates the DOI process. The new automated feature include: a) reviewing the DOI metadata, b) assigning of opaque DOI name if data provider chooses, and c) reserving, registering, and updating the DOIs. The flexibility of reserving the DOI allows data providers to embed and test the DOI in the data product metadata before formally registering with EZID. The DOI update process allows the changing of any DOI metadata except the DOI name unless the name has not been registered. Currently, ESDIS has processed a total of 557 DOIs of which 379 DOIs are registered with EZID and 178 are reserved with ESDIS. The DOI incorporates several metadata elements that effectively identify the data product and the source of availability. Of these elements, the Uniform Resource Locator (URL) attribute has the very important function of identifying the landing page which describes the data product. ESDIS in consultation with data providers in the Earth Science community is currently developing landing page guidelines that specify the key data product descriptive elements to be included on each data product's landing page. This poster will describe in detail the unique automated process and

  18. An Objective Approach to Identify Spectral Distinctiveness for Hearing Impairment

    Directory of Open Access Journals (Sweden)

    Yeou-Jiunn Chen

    2013-01-01

    Full Text Available To facilitate the process of developing speech perception, speech-language pathologists have to teach a subject with hearing loss the differences between two syllables by manually enhancing acoustic cues of speech. However, this process is time consuming and difficult. Thus, this study proposes an objective approach to automatically identify the regions of spectral distinctiveness between two syllables, which is used for speech-perception training. To accurately represent the characteristics of speech, mel-frequency cepstrum coefficients are selected as analytical parameters. The mismatch between two syllables in time domain is handled by dynamic time warping. Further, a filter bank is adopted to estimate the components in different frequency bands, which are also represented as mel-frequency cepstrum coefficients. The spectral distinctiveness in different frequency bands is then easily estimated by using Euclidean metrics. Finally, a morphological gradient operator is applied to automatically identify the regions of spectral distinctiveness. To evaluate the proposed approach, the identified regions are manipulated and then the manipulated syllables are measured by a close-set based speech-perception test. The experimental results demonstrated that the identified regions of spectral distinctiveness are very useful in speech perception, which indeed can help speech-language pathologists in speech-perception training.

  19. 一种基于人脸对称性的差错掩盖方法%An Error Concealment Method Based on Facial Symmetry

    Institute of Scientific and Technical Information of China (English)

    赖俊; 张江鑫

    2013-01-01

    This paper presents an error concealment method based on facial symmetry .We first execute color segmentation , determine the skin color region;then judge the symmetry of this region , conceal symmetry face regions with symmetry algorithm , conceal other regions with adaptive interpolation algorithm .Using JM86 model of H.264 standard to simulate the algorithm , the experimental results show that our method achieves better conceal results when compared with traditional interpolation algorithm .%该文提出一种基于人脸对称性的差错掩盖方法。首先进行肤色分割,判断出肤色区域;然后对检测出的肤色区域进行对称性判断,选出对称的人脸区域并采用人脸对称掩盖算法进行差错掩盖,对其它区域则采用自适应插值算法。采用H.264的JM86模型对算法进行验证,实验结果表明,与传统的插值算法相比,该文算法利用了人脸的对称性,对于对称的人脸区域获得了更好的掩盖效果。

  20. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  1. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  2. Blood pressure shifts resulting from a concealed arteriovenous fistula associated with an iliac aneurysm: a case report.

    Science.gov (United States)

    Doi, Shintaro; Motoyama, Yoshiaki; Ito, Hiromi

    2016-01-01

    A solitary iliac aneurysm (SIA) is more uncommon than an abdominal aortic aneurysm. The aneurysm is located in the deep pelvis and is diagnosed when it reaches a large size with symptoms of compression around adjacent structures and organs or when it ruptures. A definite diagnosis of an arteriovenous fistula (AVF) associated with a SIA is difficult preoperatively because there might not be enough symptoms and time for diagnosis. Here, we present a patient with asymptomatic rupture of SIA into the common iliac vein with characteristic blood pressure shifts. A 41-year-old man with a huge SIA underwent aortobifemoral graft replacement. Preoperatively, his blood pressure showed characteristic shifts for one or two heartbeats out of five beats, indicating that an AVF was present and that the shunt was about to having a high flow. During surgery, an AVF associated with the SIA was found to be concealed owing to compression from the huge iliac artery aneurysm, and the shunt showed a high flow, resulting in shock during the surgery. No complications were noted after aortobifemoral graft replacement. Postoperatively, we noted an enhanced paravertebral vein on computed tomography (CT), which indicated the presence of an AVF. Definite diagnosis of an AVF offers advantages in surgical and anesthetic management. We emphasize that a large SIA can push the iliac vein and occlude an AVF laceration, concealing the enhancement of the veins in the arterial phase on CT. Blood pressure shifts might predict the existence of a concealed AVF that has a large shunt. Even if the vena cava and the iliac veins are not enhanced on CT, anesthesiologists should carefully determine whether their distal branches are enhanced.

  3. Acoustic Parametric Array for Identifying Standoff Targets

    Science.gov (United States)

    Hinders, M. K.; Rudd, K. E.

    2010-02-01

    An integrated simulation method for investigating nonlinear sound beams and 3D acoustic scattering from any combination of complicated objects is presented. A standard finite-difference simulation method is used to model pulsed nonlinear sound propagation from a source to a scattering target via the KZK equation. Then, a parallel 3D acoustic simulation method based on the finite integration technique is used to model the acoustic wave interaction with the target. Any combination of objects and material layers can be placed into the 3D simulation space to study the resulting interaction. Several example simulations are presented to demonstrate the simulation method and 3D visualization techniques. The combined simulation method is validated by comparing experimental and simulation data and a demonstration of how this combined simulation method assisted in the development of a nonlinear acoustic concealed weapons detector is also presented.

  4. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  5. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  6. Crustal concealing of small-scale core-field secular variation

    DEFF Research Database (Denmark)

    Hulot, G.; Olsen, Nils; Thebault, E.

    2009-01-01

    of internal origin happen to be detectable now in spherical harmonic degrees up to, perhaps, 16. All of these changes are usually attributed to changes in the core field itself, the secular variation, on the ground that the lithospheric magnetization cannot produce such signals. It has, however, been pointed...... out, on empirical grounds, that temporal changes in the field of internal origin produced by the induced part of the lithospheric magnetization could dominate the core field signal beyond degree 22. This short note revisits this issue by taking advantage of our improved knowledge of the small...... cause of the observed changes in the field of internal origin up to some critical degree, N-C, is indeed likely to be the secular variation of the core field, but that the signal produced by the time-varying lithospheric field is bound to dominate and conceal the time-varying core signal beyond...

  7. Sharp and blunt force trauma concealment by thermal alteration in homicides: an in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones

    OpenAIRE

    Macoveciuc, I; Marquez-Grant, N; Horsfall, I; Zioupos, P

    2017-01-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-exi...

  8. Developing Data Citations from Digital Object Identifier Metadata

    Science.gov (United States)

    Wanchoo, L.; James, N.

    2015-12-01

    NASA's Earth Science Data and Information System (ESDIS) Project has been processing information for the registration of Digital Object Identifiers (DOI) for the last five years of which an automated system has been in operation for the last two years. The ESDIS DOI registration system has registered over 2000 DOIs with over 1000 DOIs held in reserve until all required information has been collected. By working towards the goal of assigning DOIs to the 8000+ data collections under its management, ESDIS has taken the first step towards facilitating the use of data citations with those products. When registering DOIs, ESDIS requires certain DOI elements be collected for the DOI landing page as recommended by NASA's Earth Science Data System Working Group (ESDSWG). The landing page provides sufficient information to 1) identify NASA data as referenced in a science publication, 2) credit data creators and distributors, and 3) access the data itself enabling the trace-ability and reproducibility of the data. However, the required elements for this DOI landing page are also the core required elements for forming an Earth science data citation. Data citations are getting significant attention from the scientific community and data centers alike. So to encourage the citing of Earth science data products, each product DOI landing page displays a sample data citation and makes the required citation elements available to DataCite for use in its Data Citation generation tool. This paper will describe that process. ESDIS data centers are constantly developing technologies to better serve the Earth science user community such as Geospatial Interactive Online Visualization ANd aNalysis Infrastructure (GIOVANNI), Land and Atmospheric Near Real-Time Capability for EOS (LANCE), and advanced tools that support virtual data collections, and virtual data products. These all provide easier access to data and make possible the creation of data products with user specified parameters

  9. Identifying marine pelagic ecosystem management objectives and indicators

    DEFF Research Database (Denmark)

    Trenkel, Verena M.; Hintzen, Niels T.; Farnsworth, Keith D.

    2015-01-01

    . Overall 26 objectives were proposed, with 58% agreement in proposed objectives between two workshops. Based on published evidence for pressure-state links, examples of operational objectives and suitable indicators for each of the 26 objectives were then selected. It is argued that given the strong......International policy frameworks such as the Common Fisheries Policy and the European Marine Strategy Framework Directive define high-level strategic goals for marine ecosystems. Strategic goals are addressed via general and operational management objectives. To add credibility and legitimacy...... scale in some cases. In the evidence-based approach used in this study, the selection of species or region specific operational objectives and indicators was based on demonstrated pressure-state links. Hence observed changes in indicators can reliably inform on appropriate management measures. (C) 2015...

  10. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  11. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  12. Identifying the Micro-relations Underpinning Familiarity Detection in Dynamic Displays Containing Multiple Objects

    Directory of Open Access Journals (Sweden)

    Jamie S. North

    2017-06-01

    Full Text Available We identified the important micro-relations that are perceived when attempting to recognize patterns in stimuli consisting of multiple dynamic objects. Skilled and less-skilled participants were presented with point light display sequences representing dynamic patterns in an invasion sport and were subsequently required to make familiarity based recognition judgments in three different conditions, each of which contained only a select number of features that were present at initial viewing. No differences in recognition accuracy were observed between skilled and less-skilled participants when just objects located in the periphery were presented. Yet, when presented with the relative motions of two centrally located attacking objects only, skilled participants were significantly more accurate than less-skilled participants and their recognition accuracy improved further when a target object was included against which these relative motions could be judged. Skilled participants can perceive and recognize global patterns on the basis of centrally located relational information.

  13. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  14. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  15. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  16. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  17. Identifying Accessible Near-Earth Objects For Crewed Missions With Solar Electric Propulsion

    Science.gov (United States)

    Smet, Stijn De; Parker, Jeffrey S.; Herman, Jonathan F. C.; Aziz, Jonathan; Barbee, Brent W.; Englander, Jacob A.

    2015-01-01

    This paper discusses the expansion of the Near-Earth Object Human Space Flight Accessible Targets Study (NHATS) with Solar Electric Propulsion (SEP). The research investigates the existence of new launch seasons that would have been impossible to achieve using only chemical propulsion. Furthermore, this paper shows that SEP can be used to significantly reduce the launch mass and in some cases the flight time of potential missions as compared to the current, purely chemical trajectories identified by the NHATS project.

  18. Identifying relevant feature-action associations for grasping unmodelled objects

    DEFF Research Database (Denmark)

    Thomsen, Mikkel Tang; Kraft, Dirk; Krüger, Norbert

    2015-01-01

    content. The method is provided with a large and structured set of visual features, motivated by the visual hierarchy in primates and finds relevant feature action associations automatically. We apply our method in a simulated environment on three different object sets for the case of grasp affordance...... learning. For box objects, we achieve a 0.90 success probability, 0.80 for round objects and up to 0.75 for open objects, when presented with novel objects. In this work, we in particular demonstrate the effect of choosing appropriate feature representations. We demonstrate a significant performance...

  19. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  20. Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications

    Directory of Open Access Journals (Sweden)

    Chan Wai-Yip

    2009-01-01

    Full Text Available Wireless-VoIP communications introduce perceptual degradations that are not present with traditional VoIP communications. This paper investigates the effects of such degradations on the performance of three state-of-the-art standard objective quality measurement algorithms—PESQ, P.563, and an "extended" E-model. The comparative study suggests that measurement performance is significantly affected by acoustic background noise type and level as well as speech codec and packet loss concealment strategy. On our data, PESQ attains superior overall performance and P.563 and E-model attain comparable performance figures.

  1. NEWLY IDENTIFIED EXTENDED GREEN OBJECTS (EGOs) FROM THE SPITZER GLIMPSE II SURVEY. II. MOLECULAR CLOUD ENVIRONMENTS

    Energy Technology Data Exchange (ETDEWEB)

    Chen Xi; Gan Conggui; Shen Zhiqiang [Key Laboratory for Research in Galaxies and Cosmology, Shanghai Astronomical Observatory, Chinese Academy of Sciences, Shanghai 200030 (China); Ellingsen, Simon P.; Titmarsh, Anita [School of Mathematics and Physics, University of Tasmania, Hobart, Tasmania (Australia); He Jinhua, E-mail: chenxi@shao.ac.cn [Key Laboratory for the Structure and Evolution of Celestial Objects, Yunnan Astronomical Observatory/National Astronomical Observatory, Chinese Academy of Sciences, P.O. Box 110, Kunming 650011, Yunnan Province (China)

    2013-06-01

    We have undertaken a survey of molecular lines in the 3 mm band toward 57 young stellar objects using the Australia Telescope National Facility Mopra 22 m radio telescope. The target sources were young stellar objects with active outflows (extended green objects (EGOs)) newly identified from the GLIMPSE II survey. We observe a high detection rate (50%) of broad line wing emission in the HNC and CS thermal lines, which combined with the high detection rate of class I methanol masers toward these sources (reported in Paper I) further demonstrates that the GLIMPSE II EGOs are associated with outflows. The physical and kinematic characteristics derived from the 3 mm molecular lines for these newly identified EGOs are consistent with these sources being massive young stellar objects with ongoing outflow activity and rapid accretion. These findings support our previous investigations of the mid-infrared properties of these sources and their association with other star formation tracers (e.g., infrared dark clouds, methanol masers and millimeter dust sources) presented in Paper I. The high detection rate (64%) of the hot core tracer CH{sub 3}CN reveals that the majority of these new EGOs have evolved to the hot molecular core stage. Comparison of the observed molecular column densities with predictions from hot core chemistry models reveals that the newly identified EGOs from the GLIMPSE II survey are members of the youngest hot core population, with an evolutionary time scale of the order of 10{sup 3} yr.

  2. Object permanence in cats: Analysis in locomotor space.

    Science.gov (United States)

    Thinus-Blanc, C; Poucet, B; Chapuis, N

    1982-04-01

    Stages IV and V object permanence were studied with 38-40-week-old cats. A constraining apparatus preventing animals from pursuing the bowl containing meat before it was concealed was used. Either the bowl was seen moving and disappeared from view behind a screen (stage IV trials), or after this sequence, it reappeared from behind the first screen and disappeared behind a second screen (stage V trials). In both situations cats performed significantly above chance but the paths taken to reach the food were different according to the stage. In stage V trials, cats expressed a preference for the path leading to the end of the second screen where the food was last seen disappearing. Copyright © 1982. Published by Elsevier B.V.

  3. Identifying online user reputation of user-object bipartite networks

    Science.gov (United States)

    Liu, Xiao-Lu; Liu, Jian-Guo; Yang, Kai; Guo, Qiang; Han, Jing-Ti

    2017-02-01

    Identifying online user reputation based on the rating information of the user-object bipartite networks is important for understanding online user collective behaviors. Based on the Bayesian analysis, we present a parameter-free algorithm for ranking online user reputation, where the user reputation is calculated based on the probability that their ratings are consistent with the main part of all user opinions. The experimental results show that the AUC values of the presented algorithm could reach 0.8929 and 0.8483 for the MovieLens and Netflix data sets, respectively, which is better than the results generated by the CR and IARR methods. Furthermore, the experimental results for different user groups indicate that the presented algorithm outperforms the iterative ranking methods in both ranking accuracy and computation complexity. Moreover, the results for the synthetic networks show that the computation complexity of the presented algorithm is a linear function of the network size, which suggests that the presented algorithm is very effective and efficient for the large scale dynamic online systems.

  4. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...who worked at an abortion clinic that had recently been bombed and whose life had been threatened was denied a license to carry because he was not...populace. The new law laid out new prohibitions and penalties enforceable statewide. Additionally, the Preemption Act was necessary to set the legal

  5. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  6. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  7. Identifying objective criterion to determine a complicated task – A comparative study

    International Nuclear Information System (INIS)

    Park, Jinkyun; Jung, Wondea

    2015-01-01

    Highlights: • Reliable estimation on the likelihood of human error is very critical. • Still there is no clear and objective criterion on a complicated task. • Subjective difficulty scores rated by 75 high speed train drivers are collected. • Collected difficulty scores are compared with the associated TACOM scores. • Criteria for task complexity level seem to be determined by the TACOM measure. - Abstract: A reliable estimation on the likelihood of human error is very critical for evaluating the safety of a large process control system such as NPPs (Nuclear Power Plants). In this regard, one of the determinants is to decide the level of an important PSF (Performance Shaping Factor) through a clear and objective manner along with the context of a given task. Unfortunately, it seems that there are no such decision criteria for certain PSFs including the complexity of a task. Therefore, the feasibility of the TACOM (Task Complexity) measure in providing objective criteria that are helpful for distinguishing the level of a task complexity is investigated in this study. To this end, subjective difficulty scores rated by 75 high-speed train drivers are collected for 38 tasks. After that, subjective difficulty scores are compared with the associated TACOM scores being quantified based on these tasks. As a result, it is observed that there is a significant correlation between subjective difficulty scores rated by high-speed train drivers and the associated TACOM scores. Accordingly, it is promising to expect that the TACOM measure can be used as an objective tool to identify the level of a task complexity in terms of an HRA (Human Reliability Analysis)

  8. Influence of allocation concealment and intention-to-treat analysis on treatment effects of physical therapy interventions in low back pain randomised controlled trials: a protocol of a meta-epidemiological study.

    Science.gov (United States)

    Almeida, Matheus Oliveira; Saragiotto, Bruno T; Maher, Chris G; Pena Costa, Leonardo Oliveira

    2017-09-27

    Meta-epidemiological studies examining the influence of methodological characteristics, such as allocation concealment and intention-to-treat analysis have been performed in a large number of healthcare areas. However, there are no studies investigating these characteristics in physical therapy interventions for patients with low back pain. The aim of this study is to investigate the influence of allocation concealment and the use of intention-to-treat analysis on estimates of treatment effects of physical therapy interventions in low back pain clinical trials. Searches on PubMed, Embase, Cochrane Database of Systematic Reviews, Physiotherapy Evidence Database (PEDro) and CINAHL databases will be performed. We will search for systematic reviews that include a meta-analysis of randomised controlled trials that compared physical therapy interventions in patients with low back pain with placebo or no intervention, and have pain intensity or disability as the primary outcomes. Information about selection (allocation concealment) and attrition bias (intention-to-treat analysis) will be extracted from the PEDro database for each included trial. Information about bibliographic data, study characteristics, participants' characteristics and study results will be extracted. A random-effects model will be used to provide separate estimates of treatment effects for trials with and without allocation concealment and with and without intention-to-treat analysis (eg, four estimates). A meta-regression will be performed to measure the association between methodological features and treatment effects from each trial. The dependent variable will be the treatment effect (the mean between-group differences) for the primary outcomes (pain or disability), while the independent variables will be the methodological features of interest (allocation concealment and intention-to-treat analysis). Other covariates will include sample size and sequence generation. No ethical approval will be

  9. A Model for Data Citation in Astronomical Research Using Digital Object Identifiers (DOIs)

    Science.gov (United States)

    Novacescu, Jenny; Peek, Joshua E. G.; Weissman, Sarah; Fleming, Scott W.; Levay, Karen; Fraser, Elizabeth

    2018-05-01

    Standardizing and incentivizing the use of digital object identifiers (DOIs) to aggregate and identify both data analyzed and data generated by a research project will advance the field of astronomy to match best practices in other research fields like geoscience and medicine. An increase in the use of DOIs will prepare the discipline for changing expectations among funding agencies and publishers, who increasingly expect accurate and thorough data citation to accompany scientific outputs. The use of DOIs ensures a robust, sustainable, and interoperable approach to data citation in which due credit is given to the researchers and institutions who produce and maintain the primary data. We describe in this work the advantages of DOIs for data citation and best practices for integrating a DOI service in an astronomical archive. We report on a pilot project carried out in collaboration with AAS journals. During the course of the 1.5-year long pilot, over 75% of submitting authors opted to use the integrated DOI service to clearly identify data analyzed during their research project when prompted at the time of paper submission.

  10. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    Science.gov (United States)

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  11. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  12. Objective Model Selection for Identifying the Human Feedforward Response in Manual Control.

    Science.gov (United States)

    Drop, Frank M; Pool, Daan M; van Paassen, Marinus Rene M; Mulder, Max; Bulthoff, Heinrich H

    2018-01-01

    Realistic manual control tasks typically involve predictable target signals and random disturbances. The human controller (HC) is hypothesized to use a feedforward control strategy for target-following, in addition to feedback control for disturbance-rejection. Little is known about human feedforward control, partly because common system identification methods have difficulty in identifying whether, and (if so) how, the HC applies a feedforward strategy. In this paper, an identification procedure is presented that aims at an objective model selection for identifying the human feedforward response, using linear time-invariant autoregressive with exogenous input models. A new model selection criterion is proposed to decide on the model order (number of parameters) and the presence of feedforward in addition to feedback. For a range of typical control tasks, it is shown by means of Monte Carlo computer simulations that the classical Bayesian information criterion (BIC) leads to selecting models that contain a feedforward path from data generated by a pure feedback model: "false-positive" feedforward detection. To eliminate these false-positives, the modified BIC includes an additional penalty on model complexity. The appropriate weighting is found through computer simulations with a hypothesized HC model prior to performing a tracking experiment. Experimental human-in-the-loop data will be considered in future work. With appropriate weighting, the method correctly identifies the HC dynamics in a wide range of control tasks, without false-positive results.

  13. Mapping Fearscapes of a Mammalian Herbivore using Terrestrial LiDAR and UAV Imagery

    Science.gov (United States)

    Olsoy, P.; Nobler, J. D.; Forbey, J.; Rachlow, J. L.; Burgess, M. A.; Glenn, N. F.; Shipley, L. A.

    2013-12-01

    Concealment allows prey animals to remain hidden from a predator and can influence both real and perceived risks of predation. The heterogeneous nature of vegetative structure can create a variable landscape of concealment - a 'fearscape' - that may influence habitat quality and use by prey. Traditional measurements of concealment rely on a limited number of distances, heights, and vantage points, resulting in small snapshots of concealment available to a prey animal. Our objective was to demonstrate the benefits of emerging remote sensing techniques to map fearscapes for pygmy rabbits (Brachylagus idahoensis) in sagebrush steppe habitat across a continuous range of scales. Specifically, we used vegetation height rasters derived from terrestrial laser scanning (TLS) to create viewsheds from multiple vantage points, representing predator visibility. The sum of all the viewsheds modeled horizontal concealment of prey at both the shrub and patch scales. We also used a small, unmanned aerial vehicle (UAV) to determine vertical concealment at a habitat scale. Terrestrial laser scanning provided similar estimates of horizontal concealment at the shrub scale when compared to photographic methods (R2 = 0.85). Both TLS and UAV provide the potential to quantify concealment of prey from multiple distances, heights, or vantage points, allowing the creation of a manipulable fearscape map that can be correlated with habitat use by prey animals. The predictive power of such a map also could identify shrubs or patches for fine scale nutritional and concealment analysis for future investigation and conservation efforts. Fearscape map at the mound-scale. Viewsheds were calculated from 100 equally spaced observer points located 4 m from the closest on-mound sagebrush of interest. Red areas offer low concealment, while green areas provide high concealment.

  14. Training Objectives for Tank Platoon Leaders Covering Tasks Performed during Four Armor Operations

    Science.gov (United States)

    1983-01-01

    screens to conceal their movement to covered and concealed positions. The M250 grenade launcher consists of two six-barreled dischargers wired for two...generates smoke by the injestion of fuel onto the hot engine exhaust system. The smoke screen generated by VEESS is used to compli- ment the M250 smoke...grenade system by reinforcing and sustaining the screen created by the M250 system. The purpose of the smoke producing systems is to make it more

  15. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  16. Can methodological requirements be fulfilled when studying concealed or unethical research objects? The case of astroturfing

    Directory of Open Access Journals (Sweden)

    Sophie BOULAY

    2013-12-01

    Full Text Available Scientific soundness is key in the development of research designs. Methodological choices bear the responsibility to demonstrate its obtainment. However, it is challenging to abide by these standards while dealing with hidden, masked or unethical objects. In this article, we share the various strategies employed to aim at a sound scientific process in spite of astroturfing’s characteristics and of the methodological orientations it dictates. Facing the dilemma between the importance of scientific value and the richness of inductive and exploratory approaches, we question the influence of positivist research standards in communication studies. We fear these requirements may limit their development.

  17. The image of the butcher (13th-20th): In search of respectability between corporate pride and blood concealment.

    OpenAIRE

    Leteux , Sylvain

    2015-01-01

    International audience; In most images that represent butchers in France since the Middle Ages, the animal’s blood and death are often eclipsed or softened, except for the realistic photographs of slaughterhouses in the 20th century. The will to conceal blood shows the butchers’ will to build an honourable image of themselves. This quest for respectability is obvious if you look at the ceremony clothes worn by butchers during civil and religious celebrations. In the 19th century, as the trade...

  18. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  19. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    Science.gov (United States)

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome.

  20. African land degradation in a world of global atmospheric change: fertilization conceals degradation?

    Science.gov (United States)

    Le, Lulseged Tamene, Paul L. G. Vlek, Quang Bao

    2009-04-01

    Land degradation is one of the most widespread environmental problems worldwide. The sub-Saharan Africa (SSA) is one of the most seriously affected regions with huge implications on food security and economic development. To plan plausible management measures, understanding the magnitude of the problem and identification of hotspot areas are necessary. Analysis of remote sensing and climate data observed from space for the period 1982 - 2003 showed significant improvement in vegetation productivity across 30% of SSA with decline on 5% of the subcontinent. Global change in atmospheric chemistry is likely responsible for the observed increasing trend in vegetation productivity. Such widespread greening observed from space could mask anthropogenic land degradation processes such as land conversion, selective logging, and soil nutrient mining. To assess this possible masking effect, a re-analysis of the vegetation productivity dynamics, taking into account atmospheric fertilization, was conducted. This was performed by analyzing the long-term trend in vegetation productivity of pristine lands (areas with minimum human- and climate- related impacts) identified across different biomes in SSA. The baseline slope values of biomass accrual calculated for those pristine lands were estimated and used to re-calculate the long-term trend of green biomass with and without the impact of atmospheric fertilization. This ultimately enabled to delineate the areas that would have experienced significant loss in vegetation productivity had the atmospheric chemistry not changed. The result suggests that seven times more than the area of actual productivity decline in SSA is affected by land degradation processes that are concealed by atmospheric fertilization. With this rate of surreptitious loss of vital land attributes and with the current rate of population growth (3%), the SSA subcontinent may soon lack the land resources necessary to foster economic development. Spatially

  1. The digital object identifier (DOI in electronic scientific journals of communication and information

    Directory of Open Access Journals (Sweden)

    Erik André de Nazaré Pires

    2017-06-01

    Full Text Available The present study seeks to investigate the use of the Digital Object Identifier (DOI in the scientific journals of Communication and Information and, providing new integration utilities with the Lattes Platform. In this sense, it aims to inform the existing titles in Communication Information in electronic format, demonstrate the importance of DOI in the integration with the Lattes Platform in order to guarantee author credibility and analyze the characteristics of publications that have DOI. The methodology used for the development of this study is bibliographic, research with descriptive-descriptive characteristics. From the development of the research, it is inferred that of all the analyzed journals (33 journals, 10 titles in the evaluation of 2013 and 06 titles of the evaluation of 2014 present DOI in their publications, all have WebQualis classification, Qualis A1 in the area Communication and Information. Most publications are international and only 3 titles are national. It is necessary that journals, principally national ones, accompany new technologies such as DOI for objects and ORCID for the identification of people, bringing more mechanisms that guarantee authors 'credibility and to bring the researchers' connection, and both can already be adopted in the Platform Lattes.

  2. Evolution of NASA's Earth Science Digital Object Identifier Registration System

    Science.gov (United States)

    Wanchoo, Lalit; James, Nathan

    2017-01-01

    NASA's Earth Science Data and Information System (ESDIS) Project has implemented a fully automated system for assigning Digital Object Identifiers (DOIs) to Earth Science data products being managed by its network of 12 distributed active archive centers (DAACs). A key factor in the successful evolution of the DOI registration system over last 7 years has been the incorporation of community input from three focus groups under the NASA's Earth Science Data System Working Group (ESDSWG). These groups were largely composed of DOI submitters and data curators from the 12 data centers serving the user communities of various science disciplines. The suggestions from these groups were formulated into recommendations for ESDIS consideration and implementation. The ESDIS DOI registration system has evolved to be fully functional with over 5,000 publicly accessible DOIs and over 200 DOIs being held in reserve status until the information required for registration is obtained. The goal is to assign DOIs to the entire 8000+ data collections under ESDIS management via its network of discipline-oriented data centers. DOIs make it easier for researchers to discover and use earth science data and they enable users to provide valid citations for the data they use in research. Also for the researcher wishing to reproduce the results presented in science publications, the DOI can be used to locate the exact data or data products being cited.

  3. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  4. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  5. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  6. Concealed concern: fathers' experiences of having a child with juvenile idiopathic arthritis.

    Science.gov (United States)

    Waite-Jones, J M; Madill, A

    2008-01-01

    Despite increased research into families of chronically ill children, more needs to be known about the father's experience. We address this issue through asking: 'What is it like to be the father of a child with Juvenile Idiopathic Arthritis?' (JIA). Four members of eight families with an adolescent diagnosed with JIA, including seven fathers, were interviewed and transcripts analysed using grounded theory. This study suggests that fathers of children with JIA experience several severe losses which are exacerbated through comparisons they make between their own situation and that of fathers of healthy children. In addition, the fathers faced several constraints which reduced their opportunities to communicate with their ill child through shared activities. Fathers appeared to conceal their distress by adopting strategies of denial and distraction however their adjustment was facilitated, to some extent, by social support. They could also develop greater acceptance of their situation over time as the care of their ill child became assimilated into family life and constraints upon their life gradually reduced through the increased maturity of their son or daughter with JIA. These findings have implications for healthcare professionals and voluntary organisations.

  7. Camouflage, Concealment, and Decoys

    Science.gov (United States)

    2010-11-26

    otherwise dull Note. Use canned milk or powdered eggs to increase the binding properties of field-expedient paints. RADAR-ABSORBING MATERIAL 3-72. RAM... falsification of evidence, inducing him to react in a manner prejudicial to his interests. decoy An imitation in any sense of a person, an object

  8. Identifying Anomalous Citations for Objective Evaluation of Scholarly Article Impact.

    Directory of Open Access Journals (Sweden)

    Xiaomei Bai

    Full Text Available Evaluating the impact of a scholarly article is of great significance and has attracted great attentions. Although citation-based evaluation approaches have been widely used, these approaches face limitations e.g. in identifying anomalous citations patterns. This negligence would inevitably cause unfairness and inaccuracy to the article impact evaluation. In this study, in order to discover the anomalous citations and ensure the fairness and accuracy of research outcome evaluation, we investigate the citation relationships between articles using the following factors: collaboration times, the time span of collaboration, citing times and the time span of citing to weaken the relationship of Conflict of Interest (COI in the citation network. Meanwhile, we study a special kind of COI, namely suspected COI relationship. Based on the COI relationship, we further bring forward the COIRank algorithm, an innovative scheme for accurately assessing the impact of an article. Our method distinguishes the citation strength, and utilizes PageRank and HITS algorithms to rank scholarly articles comprehensively. The experiments are conducted on the American Physical Society (APS dataset. We find that about 80.88% articles contain contributed citations by co-authors in 26,366 articles and 75.55% articles among these articles are cited by the authors belonging to the same affiliation, indicating COI and suspected COI should not be ignored for evaluating impact of scientific papers objectively. Moreover, our experimental results demonstrate COIRank algorithm significantly outperforms the state-of-art solutions. The validity of our approach is verified by using the probability of Recommendation Intensity.

  9. Identifying Anomalous Citations for Objective Evaluation of Scholarly Article Impact.

    Science.gov (United States)

    Bai, Xiaomei; Xia, Feng; Lee, Ivan; Zhang, Jun; Ning, Zhaolong

    2016-01-01

    Evaluating the impact of a scholarly article is of great significance and has attracted great attentions. Although citation-based evaluation approaches have been widely used, these approaches face limitations e.g. in identifying anomalous citations patterns. This negligence would inevitably cause unfairness and inaccuracy to the article impact evaluation. In this study, in order to discover the anomalous citations and ensure the fairness and accuracy of research outcome evaluation, we investigate the citation relationships between articles using the following factors: collaboration times, the time span of collaboration, citing times and the time span of citing to weaken the relationship of Conflict of Interest (COI) in the citation network. Meanwhile, we study a special kind of COI, namely suspected COI relationship. Based on the COI relationship, we further bring forward the COIRank algorithm, an innovative scheme for accurately assessing the impact of an article. Our method distinguishes the citation strength, and utilizes PageRank and HITS algorithms to rank scholarly articles comprehensively. The experiments are conducted on the American Physical Society (APS) dataset. We find that about 80.88% articles contain contributed citations by co-authors in 26,366 articles and 75.55% articles among these articles are cited by the authors belonging to the same affiliation, indicating COI and suspected COI should not be ignored for evaluating impact of scientific papers objectively. Moreover, our experimental results demonstrate COIRank algorithm significantly outperforms the state-of-art solutions. The validity of our approach is verified by using the probability of Recommendation Intensity.

  10. The Problem of Informational Object Identification in Case of the Considerable Quantity of Identifying Features

    Directory of Open Access Journals (Sweden)

    S. D. Kulik

    2010-03-01

    Full Text Available The modification of the algorithm of identification of the informational object, used for identification of the hand-written texts performer in an automated workplace of the forensic expert, is presented. As modification, it is offered to use a method of association rules discovery for definition of statistically dependent sets of feature of hand-written capital letters of the Russian language. The algorithm is approved on set of 691 samples of hand-written documents for which about 2000 identifying feature are defined. The modification of the identification algorithm allows to lower level of errors and to raise quality of accepted decisions for information security.

  11. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  12. Deconstructing Concealed Gayness Text in The Film Negeri van Oranje: Critical Discourse Analysis

    Directory of Open Access Journals (Sweden)

    Heri Setiawan

    2018-02-01

    Full Text Available As one of the most popular creative cultural products, film sometimes speaks beyond what it presents. It is not always produced merely for entertainment purposes, but also to spread a certain ideology and represent a particular culture. Anchored in queer theory, this research looks at the Indonesian film, Negeri Van Oranje, which was chosen purposely to be analyzed using Fairclough’s critical discourse analysis model with an aim to deconstruct the concealed gayness text in the film. From the analysis, it was found that the gay scenes in the film try to tell its audience about the positions, feelings, challenges, and rejections that Indonesian gay people experience living amongst heteronormative surroundings. Some new notions about gay people’s life in Indonesia are extracted based on the analysis of the gay scenes in the film. The strategy of inserting gay content into a film nationally released in Indonesia is also revealed. The results of the analysis could be used to create a picture of what gay life looks like in Indonesia, a multicultural country that is well-known as the place in which the world’s largest Muslim population dwells.

  13. Visual object recognition and tracking

    Science.gov (United States)

    Chang, Chu-Yin (Inventor); English, James D. (Inventor); Tardella, Neil M. (Inventor)

    2010-01-01

    This invention describes a method for identifying and tracking an object from two-dimensional data pictorially representing said object by an object-tracking system through processing said two-dimensional data using at least one tracker-identifier belonging to the object-tracking system for providing an output signal containing: a) a type of the object, and/or b) a position or an orientation of the object in three-dimensions, and/or c) an articulation or a shape change of said object in said three dimensions.

  14. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  15. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  16. Object-Based Classification as an Alternative Approach to the Traditional Pixel-Based Classification to Identify Potential Habitat of the Grasshopper Sparrow

    Science.gov (United States)

    Jobin, Benoît; Labrecque, Sandra; Grenier, Marcelle; Falardeau, Gilles

    2008-01-01

    The traditional method of identifying wildlife habitat distribution over large regions consists of pixel-based classification of satellite images into a suite of habitat classes used to select suitable habitat patches. Object-based classification is a new method that can achieve the same objective based on the segmentation of spectral bands of the image creating homogeneous polygons with regard to spatial or spectral characteristics. The segmentation algorithm does not solely rely on the single pixel value, but also on shape, texture, and pixel spatial continuity. The object-based classification is a knowledge base process where an interpretation key is developed using ground control points and objects are assigned to specific classes according to threshold values of determined spectral and/or spatial attributes. We developed a model using the eCognition software to identify suitable habitats for the Grasshopper Sparrow, a rare and declining species found in southwestern Québec. The model was developed in a region with known breeding sites and applied on other images covering adjacent regions where potential breeding habitats may be present. We were successful in locating potential habitats in areas where dairy farming prevailed but failed in an adjacent region covered by a distinct Landsat scene and dominated by annual crops. We discuss the added value of this method, such as the possibility to use the contextual information associated to objects and the ability to eliminate unsuitable areas in the segmentation and land cover classification processes, as well as technical and logistical constraints. A series of recommendations on the use of this method and on conservation issues of Grasshopper Sparrow habitat is also provided.

  17. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Morte materna mascarada: um caminho para sua identificação Muerte materna enmascarada: un camino para su identificación Identification of concealed or presumable maternal deaths

    Directory of Open Access Journals (Sweden)

    Flávia Azevedo Gomes

    2006-12-01

    maternas no informadas.OBJECTIVE: to identify unreported concealed or presumable maternal deaths which occurred in the states of São Paulo, Paraná, Pará, Ceará, and Mato Grosso Brazil. METHODS: Data were collected from the CD-ROM Hospital Admission Authorization Database of the Hospital Information System of the Unified Health System (SIH-SUS regarding records of obstetric procedures and secondary diagnoses between the years of 1999 to 2000. RESULTS: There were 651 maternal deaths registered. From those, 55 were registered as concealed or presumable maternal deaths according to Chapter XV of the International Classification of Diseases (DID-10 - Pregnancy, Delivery and Postpartum. CONCLUSION: This study showed that this information system can be used as a complementary measure for the identification of unreported maternal deaths.

  19. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. The visual extent of an object: suppose we know the object locations

    NARCIS (Netherlands)

    Uijlings, J.R.R.; Smeulders, A.W.M.; Scha, R.J.H.

    2012-01-01

    The visual extent of an object reaches beyond the object itself. This is a long standing fact in psychology and is reflected in image retrieval techniques which aggregate statistics from the whole image in order to identify the object within. However, it is unclear to what degree and how the visual

  1. Adobe Boxes: Locating Object Proposals Using Object Adobes.

    Science.gov (United States)

    Fang, Zhiwen; Cao, Zhiguo; Xiao, Yang; Zhu, Lei; Yuan, Junsong

    2016-09-01

    Despite the previous efforts of object proposals, the detection rates of the existing approaches are still not satisfactory enough. To address this, we propose Adobe Boxes to efficiently locate the potential objects with fewer proposals, in terms of searching the object adobes that are the salient object parts easy to be perceived. Because of the visual difference between the object and its surroundings, an object adobe obtained from the local region has a high probability to be a part of an object, which is capable of depicting the locative information of the proto-object. Our approach comprises of three main procedures. First, the coarse object proposals are acquired by employing randomly sampled windows. Then, based on local-contrast analysis, the object adobes are identified within the enlarged bounding boxes that correspond to the coarse proposals. The final object proposals are obtained by converging the bounding boxes to tightly surround the object adobes. Meanwhile, our object adobes can also refine the detection rate of most state-of-the-art methods as a refinement approach. The extensive experiments on four challenging datasets (PASCAL VOC2007, VOC2010, VOC2012, and ILSVRC2014) demonstrate that the detection rate of our approach generally outperforms the state-of-the-art methods, especially with relatively small number of proposals. The average time consumed on one image is about 48 ms, which nearly meets the real-time requirement.

  2. Is Seeing Believing? Identifying Aspects of Informative Videos that Indicate Objectivity

    NARCIS (Netherlands)

    H.M. Boots-Blankers (Helen)

    2017-01-01

    textabstractInformation in online videos can be misleading and unreliable. Video users tend to select videos with misleading information (Butler, 2013). To facilitate video users in their selection of videos they need an objectivity measure (Palumbo, 2012). We propose thirteen aspects of video that

  3. Studies on the detection of concealed objects using the neutron reflection method

    International Nuclear Information System (INIS)

    Papp, A.

    2013-01-01

    The increment of reflected thermal and 1.45 eV resonance neutrons vs. the thickness of the reflector has been measured and described by an analytical expression. Macroscopic, Σ β , and microscopic, σ β , reflection cross sections averaged over the bulk reflector substances were deduced for some elements and compounds. It was found that the σ β values are additive even for bulk samples and so the σ βmol could be given for some illicit drugs, explosives and hiding materials. - Highlights: ► The effect of reflector materials on the increment of neutrons were determined. ► Macroscopic and microscopic reflection cross sections averaged over bulk samples were determined. ► Simple analytical expression was given to describe the yield of reflected neutrons. ► The observed additive behavior in reflected neutrons rendered to characterize other materials

  4. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    Science.gov (United States)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  5. Identification of uncommon objects in containers

    Science.gov (United States)

    Bremer, Peer-Timo; Kim, Hyojin; Thiagarajan, Jayaraman J.

    2017-09-12

    A system for identifying in an image an object that is commonly found in a collection of images and for identifying a portion of an image that represents an object based on a consensus analysis of segmentations of the image. The system collects images of containers that contain objects for generating a collection of common objects within the containers. To process the images, the system generates a segmentation of each image. The image analysis system may also generate multiple segmentations for each image by introducing variations in the selection of voxels to be merged into a segment. The system then generates clusters of the segments based on similarity among the segments. Each cluster represents a common object found in the containers. Once the clustering is complete, the system may be used to identify common objects in images of new containers based on similarity between segments of images and the clusters.

  6. The Delphi Technique in Identifying Learning Objectives for the Development of Science, Technology and Society Modules for Palestinian Ninth Grade Science Curriculum

    Science.gov (United States)

    Abualrob, Marwan M. A.; Daniel, Esther Gnanamalar Sarojini

    2013-01-01

    This article outlines how learning objectives based upon science, technology and society (STS) elements for Palestinian ninth grade science textbooks were identified, which was part of a bigger study to establish an STS foundation in the ninth grade science curriculum in Palestine. First, an initial list of STS elements was determined. Second,…

  7. Application of Digital Object Identifiers to data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC)

    Science.gov (United States)

    Vollmer, B.; Ostrenga, D.; Johnson, J. E.; Savtchenko, A. K.; Shen, S.; Teng, W. L.; Wei, J. C.

    2013-12-01

    Digital Object Identifiers (DOIs) are applied to selected data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC). The DOI system provides an Internet resolution service for unique and persistent identifiers of digital objects. Products assigned DOIs include data from the NASA MEaSUREs Program, the Earth Observing System (EOS) Aqua Atmospheric Infrared Sounder (AIRS) and EOS Aura High Resolution Dynamics Limb Sounder (HIRDLS). DOIs are acquired and registered through EZID, California Digital Library and DataCite. GES DISC hosts a data set landing page associated with each DOI containing information on and access to the data including a recommended data citation when using the product in research or applications. This work includes participation with the earth science community (e.g., Earth Science Information Partners (ESIP) Federation) and the NASA Earth Science Data and Information System (ESDIS) Project to identify, establish and implement best practices for assigning DOIs and managing supporting information, including metadata, for earth science data sets. Future work includes (1) coordination with NASA mission Science Teams and other data providers on the assignment of DOIs for other GES DISC data holdings, particularly for future missions such as Orbiting Carbon Observatory -2 and -3 (OCO-2, OCO-3) and projects (MEaSUREs 2012), (2) construction of landing pages that are both human and machine readable, and (3) pursuing the linking of data and publications with tools such as the Thomson Reuters Data Citation Index.

  8. Sex difference in choice of concealed or exposed refuge sites by preschool children viewing a model leopard in a playground simulation of antipredator behavior

    Directory of Open Access Journals (Sweden)

    Richard G. Coss

    2016-07-01

    Full Text Available The current study of preschool children characterizes a semi-natural extension of experimental questions on how human ancestors evaded predation when encountering dangerous felids. In a pretend game on a playground, we presented full-size leopard and deer models to children (N = 39 in a repeatedmeasures experimental design. Prior to viewing the model presented 15-m away, each child was instructed by the experimenter to go where she or he would feel safe. The rationale for this study was based on the anthropological construct of “sexual dinichism,” positing that, during the Pliocene, smaller-bodied hominin females engaged in more arboreal behavior than larger-bodied males. Consistent with this construct, our previous simulation research using images of an African rock outcrop showed that, after viewing a lion, girls preferred a tree as refuge rather than a crevice or large boulder whereas boys did not differentiate these refuge sites. In this follow-up study, we predicted that, after viewing the model leopard, the preschool girls would differ from the boys by not choosing enclosed refuge sites analogous to the crevice. Analyses of a contingency table for the leopard model supported this hypothesis by yielding a significant interaction of sex and refuge location (p = .031, d = .76, the source of which was a reliably larger percentage of girls not choosing concealed refuge (p = .005, d = 2.3. The interaction of sex and refuge location for the model deer was not significant (p > .5. Our findings suggest that, in contrast to the deer, the girls selected exposed playground refuge sites rather than concealing ones to maintain visual contact with the leopard as a contingency for future action

  9. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-11

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  10. Visual Priming of Inverted and Rotated Objects

    Science.gov (United States)

    Knowlton, Barbara J.; McAuliffe, Sean P.; Coelho, Chase J.; Hummel, John E.

    2009-01-01

    Object images are identified more efficiently after prior exposure. Here, the authors investigated shape representations supporting object priming. The dependent measure in all experiments was the minimum exposure duration required to correctly identify an object image in a rapid serial visual presentation stream. Priming was defined as the change…

  11. Motivation and Strategies for Implementing Digital Object Identifiers (DOIs at NCAR’s Earth Observing Laboratory – Past Progress and Future Collaborations

    Directory of Open Access Journals (Sweden)

    Janine Aquino

    2017-03-01

    Full Text Available In an effort to lead our community in following modern data citation practices by formally citing data used in published research and implementing standards to facilitate reproducible research results and data, while also producing meaningful metrics that help assess the impact of our services, the National Center for Atmospheric Research (NCAR Earth Observing Laboratory (EOL has implemented the use of Digital Object Identifiers (DOIs (DataCite 2017 for both physical objects (e.g., research platforms and instruments and datasets. We discuss why this work is important and timely, and review the development of guidelines for the use of DOIs at EOL by focusing on how decisions were made. We discuss progress in assigning DOIs to physical objects and datasets, summarize plans to cite software, describe a current collaboration to develop community tools to display citations on websites, and touch on future plans to cite workflows that document dataset processing and quality control. Finally, we will review the status of efforts to engage our scientific community in the process of using DOIs in their research publications.

  12. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    Science.gov (United States)

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  13. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  14. DOI - Digital Object Identifier : A revolution in the management and trading of copyrighted information over the Internet in the third millenium

    Directory of Open Access Journals (Sweden)

    Martin Žnideršič

    1997-01-01

    Full Text Available Rapid development of information technology in recent years has brought over also the problem of the protection of author's rights related to copyrighted works on electronic media. Information and law specialists were intensively working on this problem for several years and the result has been a new system of labelling copyrighted works on the Internet, called DOI (Digitial Object Identifier. The system was developed in the United States. At the time of the presenta tion of DOI at the Bookfair in Frankfurt, 250.000 author works were labelled with DOI. The system is universal and enables the inclusion of the present standard identifiers (ISBN, ISSN, SICI. The fact that DOI identifier stays "glued on" forever, makes the identification of the carrier of copyright possible at any moment. The DOI system presents the infrastructure system for trading in and use of copyrighted works over the Internet in the third millenium.

  15. A Temporal Same-Object Advantage in the Tunnel Effect: Facilitated Change Detection for Persisting Objects

    Science.gov (United States)

    Flombaum, Jonathan I.; Scholl, Brian J.

    2006-01-01

    Meaningful visual experience requires computations that identify objects as the same persisting individuals over time, motion, occlusion, and featural change. This article explores these computations in the tunnel effect: When an object moves behind an occluder, and then an object later emerges following a consistent trajectory, observers…

  16. Temperature resolution enhancing of commercially available THz passive cameras due to computer processing of images

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2014-06-01

    As it is well-known, application of the passive THz camera for the security problems is very promising way. It allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Efficiency of using the passive THz camera depends on its temperature resolution. This characteristic specifies possibilities of the detection of concealed object: minimal size of the object, maximal distance of the detection, image detail. One of probable ways for a quality image enhancing consists in computer processing of image. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts. We demonstrate new possibilities for seeing the clothes details, which raw images, produced by the THz cameras, do not allow to see. We achieve good quality of the image due to applying various spatial filters with the aim to demonstrate independence of processed images on math operations. This result demonstrates a feasibility of objects seeing. We consider images produced by THz passive cameras manufactured by Microsemi Corp., and ThruVision Corp., and Capital Normal University (Beijing, China).

  17. Breaking object correspondence across saccadic eye movements deteriorates object recognition

    Directory of Open Access Journals (Sweden)

    Christian H. Poth

    2015-12-01

    Full Text Available Visual perception is based on information processing during periods of eye fixations that are interrupted by fast saccadic eye movements. The ability to sample and relate information on task-relevant objects across fixations implies that correspondence between presaccadic and postsaccadic objects is established. Postsaccadic object information usually updates and overwrites information on the corresponding presaccadic object. The presaccadic object representation is then lost. In contrast, the presaccadic object is conserved when object correspondence is broken. This helps transsaccadic memory but it may impose attentional costs on object recognition. Therefore, we investigated how breaking object correspondence across the saccade affects postsaccadic object recognition. In Experiment 1, object correspondence was broken by a brief postsaccadic blank screen. Observers made a saccade to a peripheral object which was displaced during the saccade. This object reappeared either immediately after the saccade or after the blank screen. Within the postsaccadic object, a letter was briefly presented (terminated by a mask. Observers reported displacement direction and letter identity in different blocks. Breaking object correspondence by blanking improved displacement identification but deteriorated postsaccadic letter recognition. In Experiment 2, object correspondence was broken by changing the object’s contrast-polarity. There were no object displacements and observers only reported letter identity. Again, breaking object correspondence deteriorated postsaccadic letter recognition. These findings identify transsaccadic object correspondence as a key determinant of object recognition across the saccade. This is in line with the recent hypothesis that breaking object correspondence results in separate representations of presaccadic and postsaccadic objects which then compete for limited attentional processing resources (Schneider, 2013. Postsaccadic

  18. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  19. Tracking target objects orbiting earth using satellite-based telescopes

    Science.gov (United States)

    De Vries, Willem H; Olivier, Scot S; Pertica, Alexander J

    2014-10-14

    A system for tracking objects that are in earth orbit via a constellation or network of satellites having imaging devices is provided. An object tracking system includes a ground controller and, for each satellite in the constellation, an onboard controller. The ground controller receives ephemeris information for a target object and directs that ephemeris information be transmitted to the satellites. Each onboard controller receives ephemeris information for a target object, collects images of the target object based on the expected location of the target object at an expected time, identifies actual locations of the target object from the collected images, and identifies a next expected location at a next expected time based on the identified actual locations of the target object. The onboard controller processes the collected image to identify the actual location of the target object and transmits the actual location information to the ground controller.

  20. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials.

    Science.gov (United States)

    Devine, Eric G; Peebles, Kristina R; Martini, Valeria

    2017-03-01

    Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  1. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (pvisual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Object-based attention: strength of object representation and attentional guidance.

    Science.gov (United States)

    Shomstein, Sarah; Behrmann, Marlene

    2008-01-01

    Two or more features belonging to a single object are identified more quickly and more accurately than are features belonging to different objects--a finding attributed to sensory enhancement of all features belonging to an attended or selected object. However, several recent studies have suggested that this "single-object advantage" may be a product of probabilistic and configural strategic prioritizations rather than of object-based perceptual enhancement per se, challenging the underlying mechanism that is thought to give rise to object-based attention. In the present article, we further explore constraints on the mechanisms of object-based selection by examining the contribution of the strength of object representations to the single-object advantage. We manipulated factors such as exposure duration (i.e., preview time) and salience of configuration (i.e., objects). Varying preview time changes the magnitude of the object-based effect, so that if there is ample time to establish an object representation (i.e., preview time of 1,000 msec), then both probability and configuration (i.e., objects) guide attentional selection. If, however, insufficient time is provided to establish a robust object-based representation, then only probabilities guide attentional selection. Interestingly, at a short preview time of 200 msec, when the two objects were sufficiently different from each other (i.e., different colors), both configuration and probability guided attention selection. These results suggest that object-based effects can be explained both in terms of strength of object representations (established at longer exposure durations and by pictorial cues) and probabilistic contingencies in the visual environment.

  3. A concealed observational study of infection control and safe injection practices in Jordanian governmental hospitals.

    Science.gov (United States)

    Al-Rawajfah, Omar M; Tubaishat, Ahmad

    2017-10-01

    The recognized international organizations on infection prevention recommend using an observational method as the gold standard procedure for assessing health care professional's compliance with standard infection control practices. However, observational studies are rarely used in Jordanian infection control studies. This study aimed to evaluate injection practices among nurses working in Jordanian governmental hospitals. A cross-sectional concealed observational design is used for this study. A convenience sampling technique was used to recruit a sample of nurses working in governmental hospitals in Jordan. Participants were unaware of the time and observer during the observation episode. A total of 384 nurses from 9 different hospitals participated in the study. A total of 835 injections events were observed, of which 73.9% were performed without handwashing, 64.5% without gloving, and 27.5% were followed by needle recapping. Handwashing rate was the lowest (18.9%) when injections were performed by beginner nurses. Subcutaneous injections were associated with the lowest rate (26.7%) of postinjection handwashing compared with other routes. This study demonstrates the need for focused and effective infection control educational programs in Jordanian hospitals. Future studies should consider exploring the whole infection control practices related to waste disposal and the roles of the infection control nurse in this process in Jordanian hospitals. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  4. Digital Object Identifier (DOI) – a must know for every author of ...

    African Journals Online (AJOL)

    It is a unique code preferred by publishers in the identification and exchange of the content of a digital object such as journal articles, web documents, or other intellectual property. This article is an eye opener to the features and benefits of DOI, anatomy of a DOI name, citing DOI in references and locating DOI of references.

  5. Clinical and Genetic Associations of Objectively Identified Interstitial Changes in Smokers.

    Science.gov (United States)

    Ash, Samuel Y; Harmouche, Rola; Putman, Rachel K; Ross, James C; Diaz, Alejandro A; Hunninghake, Gary M; Onieva Onieva, Jorge; Martinez, Fernando J; Choi, Augustine M; Lynch, David A; Hatabu, Hiroto; Rosas, Ivan O; San Jose Estepar, Raul; Washko, George R

    2017-10-01

    Smoking-related lung injury may manifest on CT scans as both emphysema and interstitial changes. We have developed an automated method to quantify interstitial changes and hypothesized that this measurement would be associated with lung function, quality of life, mortality, and a mucin 5B (MUC5B) polymorphism. Using CT scans from the Genetic Epidemiology of COPD Study, we objectively labeled lung parenchyma as a tissue subtype. We calculated the percentage of the lung occupied by interstitial subtypes. A total of 8,345 participants had clinical and CT scanning data available. A 5% absolute increase in interstitial changes was associated with an absolute decrease in FVC % predicted of 2.47% (P percentage of lung with interstitial changes. Objective interstitial changes on CT scans were associated with impaired lung function, worse quality of life, increased mortality, and more copies of a MUC5B promoter polymorphism, suggesting that these changes may be a marker of susceptibility to smoking-related lung injury, detectable even in those who are healthy by other measures. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  6. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  7. Using raster and vector data to identify objects for classify in flood risk. A case study: Raciborz

    Science.gov (United States)

    Porczek, Mariusz; Rucińska, Dorota; Lewiński, Stanisław

    2018-01-01

    The severe flood of 1997, which seriously affected Polish, Czech and German territories, gave impetus to research into the management of flood-prone areas. The material losses caused by the "Flood of the Millennium" totalled billions of Polish zloty. The extent of the disaster and of infrastructure repair costs changed the attitude of many branches of the economy, and of science. This is the direct result of consideration of the introduction of changes into spatial management and crisis management. At the same time, it focused the interest of many who were trained in analysing the vulnerability of land-use features to natural disasters such as floods. Research into the spatial distribution of geographic environmental features susceptible to flood in the Odra valley was conducted at the Faculty of Geography and Regional Studies of the University of Warsaw using Geographic Information Systems (GIS). This study seeks to examine the possibility of adapting vector and raster data and using them for land-use classification in the context of risk of flood and inundation damage. The analysed area of the city and surrounding area of Raciborz, on the upper Odra River, is a case study for identifying objects and lands susceptible to natural hazards based on publicly available satellite databases of the highest resolution, which is a very important factor in the quality of further risk analyses for applied use. The objective of the research was to create a 10×10-m-pixel raster network using raster data made available by ESA (Copernicus Land Monitoring Service) and vector data from Open Street Map.

  8. Multi-objective compared to single-objective optimization with application to model validation and uncertainty quantification

    Energy Technology Data Exchange (ETDEWEB)

    Schulze-Riegert, R.; Krosche, M.; Stekolschikov, K. [Scandpower Petroleum Technology GmbH, Hamburg (Germany); Fahimuddin, A. [Technische Univ. Braunschweig (Germany)

    2007-09-13

    History Matching in Reservoir Simulation, well location and production optimization etc. is generally a multi-objective optimization problem. The problem statement of history matching for a realistic field case includes many field and well measurements in time and type, e.g. pressure measurements, fluid rates, events such as water and gas break-throughs, etc. Uncertainty parameters modified as part of the history matching process have varying impact on the improvement of the match criteria. Competing match criteria often reduce the likelihood of finding an acceptable history match. It is an engineering challenge in manual history matching processes to identify competing objectives and to implement the changes required in the simulation model. In production optimization or scenario optimization the focus on one key optimization criterion such as NPV limits the identification of alternatives and potential opportunities, since multiple objectives are summarized in a predefined global objective formulation. Previous works primarily focus on a specific optimization method. Few works actually concentrate on the objective formulation and multi-objective optimization schemes have not yet been applied to reservoir simulations. This paper presents a multi-objective optimization approach applicable to reservoir simulation. It addresses the problem of multi-objective criteria in a history matching study and presents analysis techniques identifying competing match criteria. A Pareto-Optimizer is discussed and the implementation of that multi-objective optimization scheme is applied to a case study. Results are compared to a single-objective optimization method. (orig.)

  9. To Be or Not to Be Out in the Classroom: Exploring Communication Privacy Management Strategies of Lesbian, Gay, and Queer College Teachers

    Science.gov (United States)

    McKenna-Buchanan, Tim; Munz, Stevie; Rudnick, Justin

    2015-01-01

    Lesbian, gay, and queer (LGQ) teachers often deal with the tension between disclosing and concealing their sexual orientations in the college classroom. This article presents the results of a qualitative interview study with 29 self-identified LGQ college teachers about their choices to disclose or conceal their sexual identities. Using…

  10. Factors that influence disclosure of hearing loss in the workplace.

    Science.gov (United States)

    Southall, Kenneth; Jennings, Mary Beth; Gagné, Jean-Pierre

    2011-10-01

    The objective of the study was to identify factors that lead individuals to conceal or disclose their hearing loss in the workplace. A qualitative research paradigm called qualitative description was selected to address this issue. Twelve people who had an adult onset hearing loss, and were gainfully employed, participated in audio-recorded semi-structured interviews designed to probe issues related to disclosure of hearing loss. A photo elicitation interview technique was employed during the interviews. Content analyses were used to extract pertinent information from verbatim transcripts. Five recurring themes emerged as important considerations in relation to this topic: (1) perceived importance of the situation; (2) perceived sense of control; (3) community affiliation; (4) burden of communication; and (5) coexisting issues related to hearing loss. The findings are discussed in relation to other concealable stigmatizing traits, stigma-theory, and social-cognitive theory. The clinical implications of these findings are discussed, with particular emphasis placed on worker self-efficacy.

  11. An Achievement Degree Analysis Approach to Identifying Learning Problems in Object-Oriented Programming

    Science.gov (United States)

    Allinjawi, Arwa A.; Al-Nuaim, Hana A.; Krause, Paul

    2014-01-01

    Students often face difficulties while learning object-oriented programming (OOP) concepts. Many papers have presented various assessment methods for diagnosing learning problems to improve the teaching of programming in computer science (CS) higher education. The research presented in this article illustrates that although max-min composition is…

  12. Testing a potential alternative to traditional identification procedures: Reaction time-based concealed information test does not work for lineups with cooperative witnesses.

    Science.gov (United States)

    Sauerland, Melanie; Wolfs, Andrea C F; Crans, Samantha; Verschuere, Bruno

    2017-11-27

    Direct eyewitness identification is widely used, but prone to error. We tested the validity of indirect eyewitness identification decisions using the reaction time-based concealed information test (CIT) for assessing cooperative eyewitnesses' face memory as an alternative to traditional lineup procedures. In a series of five experiments, a total of 401 mock eyewitnesses watched one of 11 different stimulus events that depicted a breach of law. Eyewitness identifications in the CIT were derived from longer reaction times as compared to well-matched foil faces not encountered before. Across the five experiments, the weighted mean effect size d was 0.14 (95% CI 0.08-0.19). The reaction time-based CIT seems unsuited for testing cooperative eyewitnesses' memory for faces. The careful matching of the faces required for a fair lineup or the lack of intent to deceive may have hampered the diagnosticity of the reaction time-based CIT.

  13. Method for Statically Checking an Object-oriented Computer Program Module

    Science.gov (United States)

    Bierhoff, Kevin M. (Inventor); Aldrich, Jonathan (Inventor)

    2012-01-01

    A method for statically checking an object-oriented computer program module includes the step of identifying objects within a computer program module, at least one of the objects having a plurality of references thereto, possibly from multiple clients. A discipline of permissions is imposed on the objects identified within the computer program module. The permissions enable tracking, from among a discrete set of changeable states, a subset of states each object might be in. A determination is made regarding whether the imposed permissions are violated by a potential reference to any of the identified objects. The results of the determination are output to a user.

  14. Underwater Object Segmentation Based on Optical Features

    Directory of Open Access Journals (Sweden)

    Zhe Chen

    2018-01-01

    Full Text Available Underwater optical environments are seriously affected by various optical inputs, such as artificial light, sky light, and ambient scattered light. The latter two can block underwater object segmentation tasks, since they inhibit the emergence of objects of interest and distort image information, while artificial light can contribute to segmentation. Artificial light often focuses on the object of interest, and, therefore, we can initially identify the region of target objects if the collimation of artificial light is recognized. Based on this concept, we propose an optical feature extraction, calculation, and decision method to identify the collimated region of artificial light as a candidate object region. Then, the second phase employs a level set method to segment the objects of interest within the candidate region. This two-phase structure largely removes background noise and highlights the outline of underwater objects. We test the performance of the method with diverse underwater datasets, demonstrating that it outperforms previous methods.

  15. Objective interpretation as conforming interpretation

    OpenAIRE

    Lidka Rodak

    2011-01-01

    The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and ...

  16. Bottlenose dolphins perceive object features through echolocation.

    Science.gov (United States)

    Harley, Heidi E; Putman, Erika A; Roitblat, Herbert L

    2003-08-07

    How organisms (including people) recognize distant objects is a fundamental question. The correspondence between object characteristics (distal stimuli), like visual shape, and sensory characteristics (proximal stimuli), like retinal projection, is ambiguous. The view that sensory systems are 'designed' to 'pick up' ecologically useful information is vague about how such mechanisms might work. In echolocating dolphins, which are studied as models for object recognition sonar systems, the correspondence between echo characteristics and object characteristics is less clear. Many cognitive scientists assume that object characteristics are extracted from proximal stimuli, but evidence for this remains ambiguous. For example, a dolphin may store 'sound templates' in its brain and identify whole objects by listening for a particular sound. Alternatively, a dolphin's brain may contain algorithms, derived through natural endowments or experience or both, which allow it to identify object characteristics based on sounds. The standard method used to address this question in many species is indirect and has led to equivocal results with dolphins. Here we outline an appropriate method and test it to show that dolphins extract object characteristics directly from echoes.

  17. Quantum objects non-local correlation, causality and objective indefiniteness in the quantum world

    CERN Document Server

    Jaeger, Gregg

    2013-01-01

    This monograph identifies the essential characteristics of the objects described by current quantum theory and considers their relationship to space-time. In the process, it explicates the senses in which quantum objects may be consistently considered to have parts of which they may be composed or into which they may be decomposed. The book also demonstrates the degree to which reduction is possible in quantum mechanics, showing it to be related to the objective indefiniteness of quantum properties and the strong non-local correlations that can occur between the physical quantities of quantum

  18. Internally readable identifying tag

    International Nuclear Information System (INIS)

    Jefferts, K.B.; Jefferts, E.R.

    1980-01-01

    A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

  19. Setting priorities for ambient air quality objectives

    International Nuclear Information System (INIS)

    2004-10-01

    Alberta has ambient air quality objectives in place for several pollutants, toxic substances and other air quality parameters. A process is in place to determine if additional air quality objectives are required or if existing objectives should be changed. In order to identify the highest priority substances that may require an ambient air quality objective to protect ecosystems and public health, a rigorous, transparent and cost effective priority setting methodology is required. This study reviewed, analyzed and assessed successful priority setting techniques used by other jurisdictions. It proposed an approach for setting ambient air quality objective priorities that integrates the concerns of stakeholders with Alberta Environment requirements. A literature and expert review were used to examine existing priority-setting techniques used by other jurisdictions. An analysis process was developed to identify the strengths and weaknesses of various techniques and their ability to take into account the complete pathway between chemical emissions and damage to human health or the environment. The key strengths and weaknesses of each technique were identified. Based on the analysis, the most promising technique was the tool for the reduction and assessment of chemical and other environmental impacts (TRACI). Several considerations for using TRACI to help set priorities for ambient air quality objectives were also presented. 26 refs, 8 tabs., 4 appendices

  20. Thoughts on identifiers

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    As business processes and information transactions have become an inextricably intertwined with the Web, the importance of assignment, registration, discovery, and maintenance of identifiers has increased. In spite of this, integrated frameworks for managing identifiers have been slow to emerge. Instead, identification systems arise (quite naturally) from immediate business needs without consideration for how they fit into larger information architectures. In addition, many legacy identifier systems further complicate the landscape, making it difficult for content managers to select and deploy identifier systems that meet both the business case and long term information management objectives. This presentation will outline a model for evaluating identifier applications and the functional requirements of the systems necessary to support them. The model is based on a layered analysis of the characteristics of identifier systems, including: * Functional characteristics * Technology * Policy * Business * Social T...

  1. Hamiltonian dynamics of extended objects

    Science.gov (United States)

    Capovilla, R.; Guven, J.; Rojas, E.

    2004-12-01

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler Lagrange equations.

  2. Hamiltonian dynamics of extended objects

    International Nuclear Information System (INIS)

    Capovilla, R; Guven, J; Rojas, E

    2004-01-01

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler-Lagrange equations

  3. A 3D tunable and multi-frequency graphene plasmonic cloak

    KAUST Repository

    Farhat, Mohamed; Rockstuhl, Carsten; Bagci, Hakan

    2013-01-01

    We demonstrate the possibility of cloaking three-dimensional objects at multi-frequencies in the far-infrared part of the spectrum. The proposed cloaking mechanism exploits graphene layers wrapped around the object to be concealed. Graphene layers

  4. Instructions to suppress semantic memory enhances or has no effect on P300 in a concealed information test (CIT).

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Drapekin, Jesse; Labkovsky, Elena; Tullman, Samuel

    2017-03-01

    The present study investigated the extent to which people can suppress semantic memory as indexed with the P300 ERP and the autobiographical implicit association test (aIAT). In EXP 1, participants (22) were run in a counterbalanced repeated measures study in both simply knowledgeable (SK) and knowledgeable with suppression (SP) conditions. A P300-based, concealed information test ("Complex Trial Protocol"; CTP) with a 50/50 Target/Nontarget (T/NT) ratio was given both with and without instructions to suppress semantic memories. The results showed increased P300s to probe name stimuli, reduced (but still high positive) aIAT d-scores, and increased simple reaction times to all stimuli used in ERP tests in the SP condition. EXP 2 was similar, but with SP and SK in two separate groups, and a 20/80 T/NT ratio. Again, ERP and aIAT results failed to show a suppression effect for semantic memory. The behavioral data suggest some task demand effects under suppression instructions, and that EXP 1 was more demanding than EXP 2. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Generalising human demonstration data by identifying affordance symmetries in object interaction trajectories

    CSIR Research Space (South Africa)

    Claassens, J

    2011-09-01

    Full Text Available presents a formal description of a set of these symmetries, which are termed affordance symmetries, and a method to identify them in multiple demonstration recordings. The approach is robust to arbitrary motion before and after the symmetry artifact...

  6. Object Knowledge Modulates Colour Appearance

    Directory of Open Access Journals (Sweden)

    Christoph Witzel

    2011-01-01

    Full Text Available We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis.

  7. Object knowledge modulates colour appearance

    Science.gov (United States)

    Witzel, Christoph; Valkova, Hanna; Hansen, Thorsten; Gegenfurtner, Karl R

    2011-01-01

    We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective) colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis. PMID:23145224

  8. Hamiltonian dynamics of extended objects

    Energy Technology Data Exchange (ETDEWEB)

    Capovilla, R [Departamento de FIsica, Centro de Investigacion y de Estudios Avanzados del IPN, Apdo Postal 14-740, 07000 Mexico, DF (Mexico); Guven, J [School of Theoretical Physics, Dublin Institute for Advanced Studies, 10 Burlington Road, Dublin 4 (Ireland); Rojas, E [Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apdo Postal 70-543, 04510 Mexico, DF (Mexico)

    2004-12-07

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler-Lagrange equations.

  9. Systematic reviews identify important methodological flaws in stroke rehabilitation therapy primary studies: review of reviews.

    Science.gov (United States)

    Santaguida, Pasqualina; Oremus, Mark; Walker, Kathryn; Wishart, Laurie R; Siegel, Karen Lohmann; Raina, Parminder

    2012-04-01

    A "review of reviews" was undertaken to assess methodological issues in studies evaluating nondrug rehabilitation interventions in stroke patients. MEDLINE, CINAHL, PsycINFO, and the Cochrane Database of Systematic Reviews were searched from January 2000 to January 2008 within the stroke rehabilitation setting. Electronic searches were supplemented by reviews of reference lists and citations identified by experts. Eligible studies were systematic reviews; excluded citations were narrative reviews or reviews of reviews. Review characteristics and criteria for assessing methodological quality of primary studies within them were extracted. The search yielded 949 English-language citations. We included a final set of 38 systematic reviews. Cochrane reviews, which have a standardized methodology, were generally of higher methodological quality than non-Cochrane reviews. Most systematic reviews used standardized quality assessment criteria for primary studies, but not all were comprehensive. Reviews showed that primary studies had problems with randomization, allocation concealment, and blinding. Baseline comparability, adverse events, and co-intervention or contamination were not consistently assessed. Blinding of patients and providers was often not feasible and was not evaluated as a source of bias. The eligible systematic reviews identified important methodological flaws in the evaluated primary studies, suggesting the need for improvement of research methods and reporting. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Administrative Management by Objectives. Policy 2100.

    Science.gov (United States)

    East Allen County Schools, New Haven, IN.

    Management-by-objectives (MBO) focuses attention on objectives stated as end accomplishments rather than the activities which bring about those accomplishments. MBO identifies eight major areas of management which become involved in the process: (1) planning, (2) performance appraisal, (3) individual motivation, (4) coordination, (5) control, (6)…

  11. Utilizing Provenance in Reusable Research Objects

    Directory of Open Access Journals (Sweden)

    Zhihao Yuan

    2018-03-01

    Full Text Available Science is conducted collaboratively, often requiring the sharing of knowledge about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs or Digital Object Identifiers (DOIs. An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research Object has recently emerged as a comprehensive and systematic method for aggregation and identification of diverse elements of computational experiments. While a necessary method, mere aggregation is not sufficient for the sharing of computational experiments. Other users must be able to easily recompute on these shared research objects. Computational provenance is often the key to enable such reuse. In this paper, we show how reusable research objects can utilize provenance to correctly repeat a previous reference execution, to construct a subset of a research object for partial reuse, and to reuse existing contents of a research object for modified reuse. We describe two methods to summarize provenance that aid in understanding the contents and past executions of a research object. The first method obtains a process-view by collapsing low-level system information, and the second method obtains a summary graph by grouping related nodes and edges with the goal to obtain a graph view similar to application workflow. Through detailed experiments, we show the efficacy and efficiency of our algorithms.

  12. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  13. Imaging of Phase Objects using Partially Coherent Illumination

    Energy Technology Data Exchange (ETDEWEB)

    Ravizza, F. L. [Univ. of Arizona, Tucson, AZ (United States)

    2013-01-01

    Screening high-power laser optics for light intensifying phase objects that cause laserinduced damage on downstream optics is critical to sustaining laser operation. Identifying such flaws on large-apertures is quite challenging since they are relatively small and invisible to conventional inspection methods. A Linescan Phase Differential Imaging (LPDI) system was developed to rapidly identify these flaws on large-aperture optics within a single full-aperture dark-field image. We describe a two-step production phase object screening process consisting of LPDI mapping and image analysis, followed by high-resolution interferometry and propagation based evaluation of the downstream damage potential of identified flaws. An image simulation code capable of modeling the LPDI partially coherent illumination was used to optimize its phase object sensitivity.

  14. Sexual Health Curricula in U.S. Medical Schools: Current Educational Objectives

    Science.gov (United States)

    Galletly, Carol; Lechuga, Julia; Layde, Joseph B.; Pinkerton, Steven

    2010-01-01

    Objective: The authors identify the explicit and implicit objectives that shape decisions about what medical schools teach regarding human sexuality. Methods: The authors reviewed relevant articles in journals, physician licensing examinations, and publications by professional organizations to identify learning objectives for human sexuality in…

  15. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  16. Quasi-objects, Cult Objects and Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2011-01-01

    This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics. T...... as a unique opportunity for studying the interchange between these two forms of fetishism and their respective phenomenologies. Finally, returning to Serres, I briefly consider the theoretical consequences of introducing the fashion object as a quasi-object.......This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics....... These two phenomenologies are, so I argue, essential to quasi-object theory, yet largely ignored by Serres’ sociological interpreters. They correspond with the two different theories of fetishism found in Marx and Durkheim, respectively. In the second half of the article, I introduce the fashion object...

  17. Moving object detection using background subtraction

    CERN Document Server

    Shaikh, Soharab Hossain; Chaki, Nabendu

    2014-01-01

    This Springer Brief presents a comprehensive survey of the existing methodologies of background subtraction methods. It presents a framework for quantitative performance evaluation of different approaches and summarizes the public databases available for research purposes. This well-known methodology has applications in moving object detection from video captured with a stationery camera, separating foreground and background objects and object classification and recognition. The authors identify common challenges faced by researchers including gradual or sudden illumination change, dynamic bac

  18. Drug-related problems identified in medication reviews by Australian pharmacists

    DEFF Research Database (Denmark)

    Stafford, Andrew C; Tenni, Peter C; Peterson, Gregory M

    2009-01-01

    OBJECTIVE: In Australia, accredited pharmacists perform medication reviews for patients to identify and resolve drug-related problems. We analysed the drug-related problems identified in reviews for both home-dwelling and residential care-facility patients. The objective of this study was to exam......OBJECTIVE: In Australia, accredited pharmacists perform medication reviews for patients to identify and resolve drug-related problems. We analysed the drug-related problems identified in reviews for both home-dwelling and residential care-facility patients. The objective of this study....... These reviews had been self-selected by pharmacists and submitted as part of the reaccreditation process to the primary body responsible for accrediting Australian pharmacists to perform medication reviews. The drug-related problems identified in each review were classified by type and drugs involved. MAIN...... OUTCOME MEASURE: The number and nature of drug-related problems identified in pharmacist-conducted medication reviews. RESULTS: There were 1,038 drug-related problems identified in 234 medication reviews (mean 4.6 (+/-2.2) problems per review). The number of problems was higher (4.9 +/- 2.0 vs. 3.9 +/- 2...

  19. NGC1448 and IC 3639: Two Concealed Black Holes Lurking in our Cosmic Backyard Unveiled by NuSTAR

    Science.gov (United States)

    Stern, Daniel; Boorman, Peter; Annuar, Ady; Gandhi, Poshak; Alexander, D. M.; Lansbury, George B.; Asmus, Daniel; Ballantyne, David R.; Bauer, Franz E.; Boggs, Steven E.; Brandt, W. Niel; Brightman, Murray; Christensen, Finn; Craig, William W.; Farrah, Duncan; Goulding, Andy D.; Hailey, Charles James; Harrison, Fiona; Hoenig, Sebastian; Koss, Michael; LaMassa, Stephanie M.; Masini, Alberto; Murray, Stephen S.; Ricci, Claudio; Risaliti, Guido; Rosario, David J.; Stanley, Flora; Zhang, William

    2017-01-01

    We present NuSTAR observations of two nearby Active Galactic Nuclei (AGN), NGC 1448 and IC 3639, located at distances of 12 Mpc and 54 Mpc, respectively. NuSTAR high-energy X-ray (> 10 keV) observations, combined with archival lower energy X-ray observations from Chandra and Suzaku, reveal both sources to contain heavily obscured, accreting super-massive black holes. NGC 1448 is one of the nearest luminous galaxies to the Milky Way, yet the AGN at its centre was only discovered in 2009. Using state-of-the-art models, we constrain the obscuring column density (NH) of gas concealing both AGN, finding them to be extreme, with NH values well into the Compton-thick (CT) regime with N(H) > 3e24 /cm2. NGC 1448 has an intrinsic X-ray luminosity of L(24 keV) ˜ 5e40 erg/s, making it one of the lowest luminosity CT AGN known. IC 3639, on the other hand, has one of the strongest iron fluorescence emission lines known. We also discuss multi-wavelength diagnostics at optical and mid-infrared energies as indirect indicators to penetrate through the obscuring veils and probe the intrinsic properties of the AGN. Through detailed studies such as we present here, NuSTAR is showing that there are still plenty of interesting discoveries awaiting to be made, even in the nearby Universe.

  20. Can children identify and achieve goals for intervention? A randomized trial comparing two goal-setting approaches.

    Science.gov (United States)

    Vroland-Nordstrand, Kristina; Eliasson, Ann-Christin; Jacobsson, Helén; Johansson, Ulla; Krumlinde-Sundholm, Lena

    2016-06-01

    The efficacy of two different goal-setting approaches (children's self-identified goals and goals identified by parents) were compared on a goal-directed, task-oriented intervention. In this assessor-blinded parallel randomized trial, 34 children with disabilities (13 males, 21 females; mean age 9y, SD 1y 4mo) were randomized using concealed allocation to one of two 8-week, goal-directed, task-oriented intervention groups with different goal-setting approaches: (1) children's self-identified goals (n=18) using the Perceived Efficacy and Goal-Setting System, or (2) goals identified by parents (n=16) using the Canadian Occupational Performance Measure (COPM). Participants were recruited through eight paediatric rehabilitation centres and randomized between October 2011 and May 2013. The primary outcome measure was the Goal Attainment Scaling and the secondary measure, the COPM performance scale (COPM-P). Data were collected pre- and post-intervention and at the 5-month follow-up. There was no evidence of a difference in mean characteristics at baseline between groups. There was evidence of an increase in mean goal attainment (mean T score) in both groups after intervention (child-goal group: estimated mean difference [EMD] 27.84, 95% CI 22.93-32.76; parent-goal group: EMD 21.42, 95% CI 16.16-26.67). There was no evidence of a difference in the mean T scores post-intervention between the two groups (EMD 6.42, 95% CI -0.80 to 13.65). These results were sustained at the 5-month follow-up. Children's self-identified goals are achievable to the same extent as parent-identified goals and remain stable over time. Thus children can be trusted to identify their own goals for intervention, thereby influencing their involvement in their intervention programmes. © 2015 Mac Keith Press.

  1. The probability of object-scene co-occurrence influences object identification processes.

    Science.gov (United States)

    Sauvé, Geneviève; Harmand, Mariane; Vanni, Léa; Brodeur, Mathieu B

    2017-07-01

    Contextual information allows the human brain to make predictions about the identity of objects that might be seen and irregularities between an object and its background slow down perception and identification processes. Bar and colleagues modeled the mechanisms underlying this beneficial effect suggesting that the brain stocks information about the statistical regularities of object and scene co-occurrence. Their model suggests that these recurring regularities could be conceptualized along a continuum in which the probability of seeing an object within a given scene can be high (probable condition), moderate (improbable condition) or null (impossible condition). In the present experiment, we propose to disentangle the electrophysiological correlates of these context effects by directly comparing object-scene pairs found along this continuum. We recorded the event-related potentials of 30 healthy participants (18-34 years old) and analyzed their brain activity in three time windows associated with context effects. We observed anterior negativities between 250 and 500 ms after object onset for the improbable and impossible conditions (improbable more negative than impossible) compared to the probable condition as well as a parieto-occipital positivity (improbable more positive than impossible). The brain may use different processing pathways to identify objects depending on whether the probability of co-occurrence with the scene is moderate (rely more on top-down effects) or null (rely more on bottom-up influences). The posterior positivity could index error monitoring aimed to ensure that no false information is integrated into mental representations of the world.

  2. Objective Model Selection for Identifying the Human Feedforward Response in Manual Control

    OpenAIRE

    Drop, F.M.; Pool, D.M.; van Paassen, M.M.; Mulder, M.; Bülthoff, Heinrich H.

    2017-01-01

    Realistic manual control tasks typically involve predictable target signals and random disturbances. The human controller (HC) is hypothesized to use a feedforward control strategy for target-following, in addition to feedback control for disturbance-rejection. Little is known about human feedforward control, partly because common system identification methods have difficulty in identifying whether, and (if so) how, the HC applies a feedforward strategy. In this paper, an identification proce...

  3. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  4. Modulation of the Object/Background Interaction by Spatial Frequency

    Directory of Open Access Journals (Sweden)

    Yanju Ren

    2011-05-01

    Full Text Available With regard to the relationship between object and background perception in the natural scene images, functional isolation hypothesis and interactive hypothesis were proposed. Based on previous studies, the present study investigated the role of spatial frequency in the relationship between object and background perception in the natural scene images. In three experiments, participants reported the object, background, or both after seeing each picture for 500 ms followed by a mask. The authors found that (a backgrounds were identified more accurately when they contained a consistent rather than an inconsistent object, independently of spatial frequency; (b objects were identified more accurately in a consistent than an inconsistent background under the condition of low spatial frequencies but not high spatial frequencies; (c spatial frequency modulation remained when both objects and backgrounds were reported simultaneously. The authors conclude that object/background interaction is partially dependent on spatial frequency.

  5. The Burden of Stigma on Health and Well-Being: A Taxonomy of Concealment, Course, Disruptiveness, Aesthetics, Origin, and Peril Across 93 Stigmas.

    Science.gov (United States)

    Pachankis, John E; Hatzenbuehler, Mark L; Wang, Katie; Burton, Charles L; Crawford, Forrest W; Phelan, Jo C; Link, Bruce G

    2018-04-01

    Most individuals are stigmatized at some point. However, research often examines stigmas separately, thus underestimating the overall impact of stigma and precluding comparisons across stigmatized identities and conditions. In their classic text, Social Stigma: The Psychology of Marked Relationships, Edward Jones and colleagues laid the groundwork for unifying the study of different stigmas by considering the shared dimensional features of stigmas: aesthetics, concealability, course, disruptiveness, origin, peril. Despite the prominence of this framework, no study has documented the extent to which stigmas differ along these dimensions, and the implications of this variation for health and well-being. We reinvigorated this framework to spur a comprehensive account of stigma's impact by classifying 93 stigmas along these dimensions. With the input of expert and general public raters, we then located these stigmas in a six-dimensional space and created discrete clusters organized around these dimensions. Next, we linked this taxonomy to health and stigma-related mechanisms. This quantitative taxonomy offers parsimonious insights into the relationship among the numerous qualities of numerous stigmas and health.

  6. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  7. Wearable Vibrotactile Biofeedback Device Allowing Identification of Different Floor Conditions for Lower-Limb Amputees.

    Science.gov (United States)

    Wan, Anson H; Wong, Duo W; Ma, Christina Z; Zhang, Ming; Lee, Winson C

    2016-07-01

    To evaluate a newly developed biofeedback device enabling lower-limb amputees to identify various floor conditions. Self-control with repeated measures (with and without the biofeedback device) within the amputee group, and group control comparing between amputee and nonamputee groups. University locomotion laboratory. Five lower-limb amputees and 8 nonamputees (N=13). A wearable biofeedback device, which identified different floor conditions by analyzing the force patterns under the prosthetic feet and provided vibration cues in response to different floor conditions, was provided to the amputees. The subjects stepped on a foam platform concealing a small object or no object at 1 of the 4 locations of the foot sole. Subjects were asked whether there was a small object under their feet and the location of the object if it existed. The test was repeated with 4 different object types and 4 object locations. The success rate of floor identification was evaluated. Without the biofeedback device, nonamputee subjects (76.56%) identified floor conditions better than amputees (22.5%) significantly (Pdevice, the amputees significantly improved (Pdevice, amputees significantly improved their abilities in identifying different floor conditions. Future attempts could configure the device to allow it to provide warning signals in response to fall-inducing conditions. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  8. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Cognitive object recognition system (CORS)

    Science.gov (United States)

    Raju, Chaitanya; Varadarajan, Karthik Mahesh; Krishnamurthi, Niyant; Xu, Shuli; Biederman, Irving; Kelley, Troy

    2010-04-01

    We have developed a framework, Cognitive Object Recognition System (CORS), inspired by current neurocomputational models and psychophysical research in which multiple recognition algorithms (shape based geometric primitives, 'geons,' and non-geometric feature-based algorithms) are integrated to provide a comprehensive solution to object recognition and landmarking. Objects are defined as a combination of geons, corresponding to their simple parts, and the relations among the parts. However, those objects that are not easily decomposable into geons, such as bushes and trees, are recognized by CORS using "feature-based" algorithms. The unique interaction between these algorithms is a novel approach that combines the effectiveness of both algorithms and takes us closer to a generalized approach to object recognition. CORS allows recognition of objects through a larger range of poses using geometric primitives and performs well under heavy occlusion - about 35% of object surface is sufficient. Furthermore, geon composition of an object allows image understanding and reasoning even with novel objects. With reliable landmarking capability, the system improves vision-based robot navigation in GPS-denied environments. Feasibility of the CORS system was demonstrated with real stereo images captured from a Pioneer robot. The system can currently identify doors, door handles, staircases, trashcans and other relevant landmarks in the indoor environment.

  10. Identification of computer graphics objects

    Directory of Open Access Journals (Sweden)

    Rossinskyi Yu.M.

    2016-04-01

    Full Text Available The article is devoted to the use of computer graphics methods in problems of creating drawings, charts, drafting, etc. The widespread use of these methods requires the development of efficient algorithms for the identification of objects of drawings. The article analyzes the model-making algorithms for this problem and considered the possibility of reducing the time using graphics editing operations. Editing results in such operations as copying, moving and deleting objects specified images. These operations allow the use of a reliable identification of images of objects methods. For information on the composition of the image of the object along with information about the identity and the color should include information about the spatial location and other characteristics of the object (the thickness and style of contour lines, fill style, and so on. In order to enable the pixel image analysis to structure the information it is necessary to enable the initial code image objects color. The article shows the results of the implementation of the algorithm of encoding object identifiers. To simplify the process of building drawings of any kind, and reduce time-consuming, method of drawing objects identification is proposed based on the use as the ID information of the object color.

  11. Novel inversion method for land mine imaging and detection

    Science.gov (United States)

    Sindoni, Orazio I.; Cohoon, David K.

    2000-08-01

    We have developed, using both partial differential equation approaches and integral equation formulations, a precise method to invert acoustic or electromagnetic scattering data from macroscopic concealed objects. Our approach makes use of the ideas associated with our exact solution of partial differential equations as described in our paper where we were able to collapse the number of equations by elimination of transcendentals therefore preserving the absolute mathematical precision inherent in the partial differential equation formulation. Our mathematical method, as a consequence, has not encountered the traditional loss of precision when inverting the scattered data. The unrestricted wavelength range allows us to penetrate any material which may surround the object and differentiate between the object and the media. For this reason we have applied our inversion scheme to landmine detection as we can penetrate and differentiate under both wet and dry conditions. Also, we are able to account, under certain conditions, for dielectric nonlinearities of material in the concealed object. Therefore, we are able to build in density dependent false colors a 3D grid representative of both the media and of the embedded object including the internal structure of the object. We have surveyed the literature on the subject of recovery of physical location of concealed objects and we have found that most of the present applications such as land mine detection, and we have found that most of the present applications have shortcomings due to the physical changes that are present in the surrounding media or the discontinuities of physical properties of the media. For all the above reasons we believe that we may have the most versatile and mathematically precise approach to the solution of this problem.

  12. Characteristics and identification of sites of chagasic ventricular tachycardia by endocardial mapping

    Directory of Open Access Journals (Sweden)

    Távora Maria Zildany P.

    1999-01-01

    Full Text Available OBJECTIVE: To study electrophysiological characteristics that enable the identification and ablation of sites of chagasic tachycardia. METHODS: Thirty-one patients with chronic Chagas' heart disease and sustained ventricular tachycardia (SVT underwent electrophysiological study to map and ablate that arrhythmia. Fifteen patients had hemodinamically stable SVT reproducible by programmed ventricular stimulation, 9 men and 6 women with ages ranging from 37 to 67 years and ejection fraction varying from 0.17 to 0.64. Endocardial mapping was performed during SVT in all patients. Radiofrequency (RF current was applied to sites of presystolic activity of at least 30 ms. Entrainment was used to identify reentrant circuits. In both successful and unsuccessful sites of RF current application, electrogram and entrainment were analyzed. RESULTS: Entrainment was obtained during all mapped SVT. In 70.5% of the sites we observed concealed entrainment and ventricular tachycardia termination in the first 15 seconds of RF current application. In the unsuccessful sites, significantly earlier electrical activity was seen than in the successful ones. Concealed entrainment was significantly associated with ventricular tachycardia termination. Bystander areas were not observed. CONCLUSION: The reentrant mechanism was responsible for the genesis of all tachycardias. In 70.5% of the studied sites, the endocardial participation of the slow conducting zone of reentrant circuits was shown. Concealed entrainment was the main electrophysiological parameter associated with successful RF current application. There was no electrophysiological evidence of bystander regions in the mapped circuits of SVT.

  13. Photographs of manipulable objects are named more quickly than the same objects depicted as line-drawings: Evidence that photographs engage embodiment more than line-drawings.

    Science.gov (United States)

    Salmon, Joshua P; Matheson, Heath E; McMullen, Patricia A

    2014-01-01

    Previous research has shown that photographs of manipulable objects (i.e., those that can be grasped for use with one hand) are named more quickly than non-manipulable objects when they have been matched for object familiarity and age of acquisition. The current study tested the hypothesis that the amount of visual detail present in object depictions moderates these "manipulability" effects on object naming. The same objects were presented as photographs and line-drawings during a speeded naming task. Forty-six participants named 222 objects depicted in both formats. A significant object depiction (photographs versus line drawing) by manipulability interaction confirmed our hypothesis that manipulable objects are identified more quickly when shown as photographs; whereas, non-manipulable objects are identified equally quickly when shown as photographs versus line-drawings. These results indicate that factors such as surface detail and texture moderate the role of "action" and/or "manipulability" effects during object identification tasks, and suggest that photographs of manipulable objects are associated with more embodied representations of those objects than when they are depicted as line-drawings.

  14. Searching for the Pareto frontier in multi-objective protein design.

    Science.gov (United States)

    Nanda, Vikas; Belure, Sandeep V; Shir, Ofer M

    2017-08-01

    The goal of protein engineering and design is to identify sequences that adopt three-dimensional structures of desired function. Often, this is treated as a single-objective optimization problem, identifying the sequence-structure solution with the lowest computed free energy of folding. However, many design problems are multi-state, multi-specificity, or otherwise require concurrent optimization of multiple objectives. There may be tradeoffs among objectives, where improving one feature requires compromising another. The challenge lies in determining solutions that are part of the Pareto optimal set-designs where no further improvement can be achieved in any of the objectives without degrading one of the others. Pareto optimality problems are found in all areas of study, from economics to engineering to biology, and computational methods have been developed specifically to identify the Pareto frontier. We review progress in multi-objective protein design, the development of Pareto optimization methods, and present a specific case study using multi-objective optimization methods to model the tradeoff between three parameters, stability, specificity, and complexity, of a set of interacting synthetic collagen peptides.

  15. Auditory memory can be object based.

    Science.gov (United States)

    Dyson, Benjamin J; Ishfaq, Feraz

    2008-04-01

    Identifying how memories are organized remains a fundamental issue in psychology. Previous work has shown that visual short-term memory is organized according to the object of origin, with participants being better at retrieving multiple pieces of information from the same object than from different objects. However, it is not yet clear whether similar memory structures are employed for other modalities, such as audition. Under analogous conditions in the auditory domain, we found that short-term memories for sound can also be organized according to object, with a same-object advantage being demonstrated for the retrieval of information in an auditory scene defined by two complex sounds overlapping in both space and time. Our results provide support for the notion of an auditory object, in addition to the continued identification of similar processing constraints across visual and auditory domains. The identification of modality-independent organizational principles of memory, such as object-based coding, suggests possible mechanisms by which the human processing system remembers multimodal experiences.

  16. The foundations of object permanence: does perceived cohesion determine infants' appreciation of the continuous existence of material objects?

    Science.gov (United States)

    Cacchione, Trix

    2013-09-01

    One of the most fundamental achievements in infants' cognitive development is their appreciation that material objects exist permanently in space and time. Recent findings suggest that infants fail to identify fragmented material objects as continuously existing items. Four experiments assessed 8-12-month-old infants' ability to further represent an object that was fragmented into two or more parts. Results suggest that infants successfully trace the spatiotemporal displacement of fragmented objects, but that their processing of size/quantity-related property information may be affected. This suggests that, contrary to recent claims, 8- to 12-month-old infants can and do appreciate the continuity of fragmented objects. Copyright © 2013 Elsevier B.V. All rights reserved.

  17. Does long-term object priming depend on the explicit detection of object identity at encoding?

    Directory of Open Access Journals (Sweden)

    Carlos Alexandre Gomes

    2015-03-01

    Full Text Available It is currently unclear whether objects have to be explicitly identified at encoding for reliable behavioural long-term object priming to occur. We conducted two experiments that investigated long-term object and non-object priming using a selective-attention encoding manipulation that reduces explicit object identification. In Experiment 1, participants either counted dots flashed within an object picture (shallow encoding or engaged in an animacy task (deep encoding at study, whereas, at test, they performed an object-decision task. Priming, as measured by reaction times, was observed for both types of encoding, and was of equivalent magnitude. In Experiment 2, non-object priming (faster reaction times for studied relative to unstudied non-objects was also obtained under the same selective-attention encoding manipulation as in Experiment 1, and the magnitude of the priming effect was equivalent between experiments. In contrast, we observed a linear decrement in recognition memory accuracy across conditions (deep encoding of Experiment 1 > shallow encoding Experiment 1 > shallow encoding of Experiment 2, suggesting that priming was not contaminated by explicit memory strategies. We argue that our results are more consistent with the identification/production framework than the perceptual/conceptual distinction, and we conclude that priming of pictures largely ignored at encoding can be subserved by the automatic retrieval of two types of instances: one at the motor-level and another at an object-decision level.

  18. The visual system supports online translation invariance for object identification.

    Science.gov (United States)

    Bowers, Jeffrey S; Vankov, Ivan I; Ludwig, Casimir J H

    2016-04-01

    The ability to recognize the same image projected to different retinal locations is critical for visual object recognition in natural contexts. According to many theories, the translation invariance for objects extends only to trained retinal locations, so that a familiar object projected to a nontrained location should not be identified. In another approach, invariance is achieved "online," such that learning to identify an object in one location immediately affords generalization to other locations. We trained participants to name novel objects at one retinal location using eyetracking technology and then tested their ability to name the same images presented at novel retinal locations. Across three experiments, we found robust generalization. These findings provide a strong constraint for theories of vision.

  19. Uncovering the multiple objectives behind national energy efficiency planning

    International Nuclear Information System (INIS)

    Haydt, Gustavo; Leal, Vítor; Dias, Luís

    2013-01-01

    This work seeks to identify the fundamental objectives behind the development of energy efficiency (EE) plans for countries. It also presents a method to quantify the degree of achievement of each objective, through the identification and operationalization of attributes. This was achieved by applying Keeney's value-focused thinking approach. For that purpose, three key decision makers in EE planning were interviewed along with a bibliographic review on the subject. From this process six fundamental objectives were identified formalizing the problem as a multi-objective one: (i) to minimize the influence of energy use on climate change; (ii) to minimize the financial risk from the investment; (iii) to maximize the security of energy supply; (iv) to minimize investment costs; (v) to minimize the impacts of building new power plants and transmission infrastructures and (vi) to maximize the local air quality. The respective attributes were: (i) CO 2 emissions savings; (ii) payback; (iii) imported energy savings; (iv) investment cost; (v) electricity savings; and (vi) total suspended particles savings. To show the usefulness of the work, the objectives and attributes identified were used to show the possible outcomes from five hypothetical EE plans for Portugal

  20. Adaptive Colour Feature Identification in Image for Object Tracking

    Directory of Open Access Journals (Sweden)

    Feng Su

    2012-01-01

    Full Text Available Identification and tracking of a moving object using computer vision techniques is important in robotic surveillance. In this paper, an adaptive colour filtering method is introduced for identifying and tracking a moving object appearing in image sequences. This filter is capable of automatically identifying the most salient colour feature of the moving object in the image and using this for a robot to track the object. The method enables the selected colour feature to adapt to surrounding condition when it is changed. A method of determining the region of interest of the moving target is also developed for the adaptive colour filter to extract colour information. Experimental results show that by using a camera mounted on a robot, the proposed methods can perform robustly in tracking a randomly moving object using adaptively selected colour features in a crowded environment.

  1. Automated analysis of objective-prism spectra

    International Nuclear Information System (INIS)

    Hewett, P.C.; Irwin, M.J.; Bunclark, P.; Bridgeland, M.T.; Kibblewhite, E.J.; Smith, M.G.

    1985-01-01

    A fully automated system for the location, measurement and analysis of large numbers of low-resolution objective-prism spectra is described. The system is based on the APM facility at the University of Cambridge, and allows processing of objective-prism, grens or grism data. Particular emphasis is placed on techniques to obtain the maximum signal-to-noise ratio from the data, both in the initial spectral estimation procedure and for subsequent feature identification. Comparison of a high-quality visual catalogue of faint quasar candidates with an equivalent automated sample demonstrates the ability of the APM system to identify all the visually selected quasar candidates. In addition, a large population of new, faint (msub(J)approx. 20) candidates is identified. (author)

  2. Object color affects identification and repetition priming.

    Science.gov (United States)

    Uttl, Bob; Graf, Peter; Santacruz, Pilar

    2006-10-01

    We investigated the influence of color on the identification of both non-studied and studied objects. Participants studied black and white and color photos of common objects and memory was assessed with an identification test. Consistent with our meta-analysis of prior research, we found that objects were easier to identify from color than from black and white photos. We also found substantial priming in all conditions, and study-to-test changes in an object's color reduced the magnitude of priming. Color-specific priming effects were large for color-complex objects, but minimal for color-simple objects. The pattern and magnitude of priming effects was not influenced either by the extent to which an object always appears in the same color (i.e., whether a color is symptomatic of an object) or by the object's origin (natural versus fabricated). We discuss the implications of our findings for theoretical accounts of object perception and repetition priming.

  3. Connection-based and object-based grouping in multiple-object tracking: A developmental study.

    Science.gov (United States)

    Van der Hallen, Ruth; Reusens, Julie; Evers, Kris; de-Wit, Lee; Wagemans, Johan

    2018-03-30

    Developmental research on Gestalt laws has previously revealed that, even as young as infancy, we are bound to group visual elements into unitary structures in accordance with a variety of organizational principles. Here, we focus on the developmental trajectory of both connection-based and object-based grouping, and investigate their impact on object formation in participants, aged 9-21 years old (N = 113), using a multiple-object tracking paradigm. Results reveal a main effect of both age and grouping type, indicating that 9- to 21-year-olds are sensitive to both connection-based and object-based grouping interference, and tracking ability increases with age. In addition to its importance for typical development, these results provide an informative baseline to understand clinical aberrations in this regard. Statement of contribution What is already known on this subject? The origin of the Gestalt principles is still an ongoing debate: Are they innate, learned over time, or both? Developmental research has revealed how each Gestalt principle has its own trajectory and unique relationship to visual experience. Both connectedness and object-based grouping play an important role in object formation during childhood. What does this study add? The study identifies how sensitivity to connectedness and object-based grouping evolves in individuals, aged 9-21 years old. Using multiple-object tracking, results reveal that the ability to track multiple objects increases with age. These results provide an informative baseline to understand clinical aberrations in different types of grouping. © 2018 The Authors. British Journal of Developmental Psychology published by John Wiley & Sons Ltd on behalf of British Psychological Society.

  4. About the Distribution of Metal Objects in Prepalatial Crete

    Directory of Open Access Journals (Sweden)

    Borja Legarra Herrero

    2004-11-01

    Full Text Available Although metal objects have been used as evidence in different interpretations of the socioeconomic changes identified in Prepalatial Crete (c.3100-1900 BC, they constitute an understudied category of material. This paper argues that metal objects on Crete were subject to complex processes regarding the creation of meaning; a more comprehensive appraisal of metal objects on the island may cast new light on these issues. Copper-based, gold, lead and silver objects are investigated from their ore extraction locations outside Crete to their final deposition, linking the different steps of the process of creating an artefact with different layers of meanings for the metal and, subsequently, for the finished objects. This study evaluates differences in the use of metals, with a particular focus on their intra-island depositional patterns. It seeks to identify differences in the roles of metals within Cretan communities as well as regional fashions in the use of metal objects. It is suggested that metals had different characters since their depositional patterns vary, and that people consciously chose certain metals to make specific objects and also used metal objects in different ways, reflecting the socio-economic context for each region.

  5. Three new BL Lacertae objects in the Palomar-Green survey

    Science.gov (United States)

    Fleming, Thomas A.; Green, Richard F.; Jannuzi, Buell T.; Liebert, James; Smith, Paul S.; Fink, Henner

    1993-01-01

    We have identified three BL Lacertae objects in the Palomar-Green Survey which were previously misclassified as DC white dwarfs, namely PG 1246+586, PG 1424+240, and PG 1437+398. Our reclassification is based on the detection of these objects as x-ray sources in the ROSAT all-sky survey and upon our subsequent detection of intrinsic linearly polarized and variable optical emission from these sources. As a result of the ROSAT survey, the number of identified BL Lac objects in the Palomar-Green catalog of UV excess objects has been doubled. Corrected optical positions are presented for PG 1246+586 and PG 1437+398.

  6. Identifying Typical Movements Among Indoor Objects

    DEFF Research Database (Denmark)

    Radaelli, Laura; Sabonis, Dovydas; Lu, Hua

    2013-01-01

    With the proliferation of mobile computing, positioning systems are becoming available that enable indoor location-based services. As a result, indoor tracking data is also becoming available. This paper puts focus on one use of such data, namely the identification of typical movement patterns...

  7. Objective voice parameters in Colombian school workers with healthy voices

    NARCIS (Netherlands)

    L.C. Cantor Cutiva (Lady Catherine); A. Burdorf (Alex)

    2015-01-01

    textabstractObjectives: To characterize the objective voice parameters among school workers, and to identify associated factors of three objective voice parameters, namely fundamental frequency, sound pressure level and maximum phonation time. Materials and methods: We conducted a cross-sectional

  8. Evolution of poor reporting and inadequate methods over time in 20 920 randomised controlled trials included in Cochrane reviews: research on research study.

    Science.gov (United States)

    Dechartres, Agnes; Trinquart, Ludovic; Atal, Ignacio; Moher, David; Dickersin, Kay; Boutron, Isabelle; Perrodeau, Elodie; Altman, Douglas G; Ravaud, Philippe

    2017-06-08

    Objective  To examine how poor reporting and inadequate methods for key methodological features in randomised controlled trials (RCTs) have changed over the past three decades. Design  Mapping of trials included in Cochrane reviews. Data sources  Data from RCTs included in all Cochrane reviews published between March 2011 and September 2014 reporting an evaluation of the Cochrane risk of bias items: sequence generation, allocation concealment, blinding, and incomplete outcome data. Data extraction  For each RCT, we extracted consensus on risk of bias made by the review authors and identified the primary reference to extract publication year and journal. We matched journal names with Journal Citation Reports to get 2014 impact factors. Main outcomes measures  We considered the proportions of trials rated by review authors at unclear and high risk of bias as surrogates for poor reporting and inadequate methods, respectively. Results  We analysed 20 920 RCTs (from 2001 reviews) published in 3136 journals. The proportion of trials with unclear risk of bias was 48.7% for sequence generation and 57.5% for allocation concealment; the proportion of those with high risk of bias was 4.0% and 7.2%, respectively. For blinding and incomplete outcome data, 30.6% and 24.7% of trials were at unclear risk and 33.1% and 17.1% were at high risk, respectively. Higher journal impact factor was associated with a lower proportion of trials at unclear or high risk of bias. The proportion of trials at unclear risk of bias decreased over time, especially for sequence generation, which fell from 69.1% in 1986-1990 to 31.2% in 2011-14 and for allocation concealment (70.1% to 44.6%). After excluding trials at unclear risk of bias, use of inadequate methods also decreased over time: from 14.8% to 4.6% for sequence generation and from 32.7% to 11.6% for allocation concealment. Conclusions  Poor reporting and inadequate methods have decreased over time, especially for sequence generation

  9. Identifying Objective Physiological Markers and Modifiable Behaviors for Self-Reported Stress and Mental Health Status Using Wearable Sensors and Mobile Phones: Observational Study.

    Science.gov (United States)

    Sano, Akane; Taylor, Sara; McHill, Andrew W; Phillips, Andrew Jk; Barger, Laura K; Klerman, Elizabeth; Picard, Rosalind

    2018-06-08

    Wearable and mobile devices that capture multimodal data have the potential to identify risk factors for high stress and poor mental health and to provide information to improve health and well-being. We developed new tools that provide objective physiological and behavioral measures using wearable sensors and mobile phones, together with methods that improve their data integrity. The aim of this study was to examine, using machine learning, how accurately these measures could identify conditions of self-reported high stress and poor mental health and which of the underlying modalities and measures were most accurate in identifying those conditions. We designed and conducted the 1-month SNAPSHOT study that investigated how daily behaviors and social networks influence self-reported stress, mood, and other health or well-being-related factors. We collected over 145,000 hours of data from 201 college students (age: 18-25 years, male:female=1.8:1) at one university, all recruited within self-identified social groups. Each student filled out standardized pre- and postquestionnaires on stress and mental health; during the month, each student completed twice-daily electronic diaries (e-diaries), wore two wrist-based sensors that recorded continuous physical activity and autonomic physiology, and installed an app on their mobile phone that recorded phone usage and geolocation patterns. We developed tools to make data collection more efficient, including data-check systems for sensor and mobile phone data and an e-diary administrative module for study investigators to locate possible errors in the e-diaries and communicate with participants to correct their entries promptly, which reduced the time taken to clean e-diary data by 69%. We constructed features and applied machine learning to the multimodal data to identify factors associated with self-reported poststudy stress and mental health, including behaviors that can be possibly modified by the individual to improve

  10. Object detection and tracking system

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Tian J.

    2017-05-30

    Methods and apparatuses for analyzing a sequence of images for an object are disclosed herein. In a general embodiment, the method identifies a region of interest in the sequence of images. The object is likely to move within the region of interest. The method divides the region of interest in the sequence of images into sections and calculates signal-to-noise ratios for a section in the sections. A signal-to-noise ratio for the section is calculated using the section in the image, a prior section in a prior image to the image, and a subsequent section in a subsequent image to the image. The signal-to-noise ratios are for potential velocities of the object in the section. The method also selects a velocity from the potential velocities for the object in the section using a potential velocity in the potential velocities having a highest signal-to-noise ratio in the signal-to-noise ratios.

  11. Multi-element analysis of unidentified fallen objects from Tatale in ...

    African Journals Online (AJOL)

    A multi-element analysis has been carried out on two fallen objects, # 01 and # 02, using instrumental neutron activation analysis technique. A total of 17 elements were identified in object # 01 while 21 elements were found in object # 02. The two major elements in object # 01 were Fe and Mg, which together constitute ...

  12. The OKS persistent in-memory object manager

    International Nuclear Information System (INIS)

    Jones, R.; Mapelli, L.; Soloviev, I.

    1998-01-01

    The OKS (Object Kernel Support) is a library to support a simple, active persistent in-memory object manager. It is suitable for applications which need to create persistent structured information with fast access but do not require full database functionality. It can be used as the frame of configuration databases and real-time object managers for Data Acquisition and Detector Control Systems in such fields as setup, diagnostics and general configuration description. OKS is based on an object model that supports objects, classes, associations, methods, inheritance, polymorphism, object identifiers, composite objects, integrity constraints, schema evolution, data migration and active notification. OKS stores the class definitions and their instances in portable ASCII files. It provides query facilities, including indices support. The OKS has a C++ API (Application Program Interface) and includes Motif based GUI applications to design class schema and to manipulate objects. OKS has been developed on top of the Rogue Wave Tools h++ C++ class library

  13. Object-Oriented Programming When Developing Software in Geology and Geophysics

    Science.gov (United States)

    Ahmadulin, R. K.; Bakanovskaya, L. N.

    2017-01-01

    The paper reviews the role of object-oriented programming when developing software in geology and geophysics. Main stages have been identified at which it is worthwhile to apply principles of object-oriented programming when developing software in geology and geophysics. The research was based on a number of problems solved in Geology and Petroleum Production Institute. Distinctive features of these problems are given and areas of application of the object-oriented approach are identified. Developing applications in the sphere of geology and geophysics has shown that the process of creating such products is simplified due to the use of object-oriented programming, firstly when designing structures for data storage and graphical user interfaces.

  14. Parallel object-oriented data mining system

    Science.gov (United States)

    Kamath, Chandrika; Cantu-Paz, Erick

    2004-01-06

    A data mining system uncovers patterns, associations, anomalies and other statistically significant structures in data. Data files are read and displayed. Objects in the data files are identified. Relevant features for the objects are extracted. Patterns among the objects are recognized based upon the features. Data from the Faint Images of the Radio Sky at Twenty Centimeters (FIRST) sky survey was used to search for bent doubles. This test was conducted on data from the Very Large Array in New Mexico which seeks to locate a special type of quasar (radio-emitting stellar object) called bent doubles. The FIRST survey has generated more than 32,000 images of the sky to date. Each image is 7.1 megabytes, yielding more than 100 gigabytes of image data in the entire data set.

  15. The BL Lac objects PKS 1144-379

    International Nuclear Information System (INIS)

    Nicolson, G.D.; Glass, I.S.; Feast, M.W.; Andrews, P.J.

    1979-01-01

    The highly variable radio source PKS 1144-379 has been monitored at 13 cm and 6 cm over a period of 3 years. It has been identified with an object whose photographic image is star-like. From infrared photometry, UBVRsub(KC)Isub(KC) photometry and spectroscopy, it is concluded that PKS 1144-379 is a BL Lac object with msub(v) approximately = 16.2. (author)

  16. Objective interpretation as conforming interpretation

    Directory of Open Access Journals (Sweden)

    Lidka Rodak

    2011-12-01

    Full Text Available The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and should be rather linked with conforming interpretation. And what this actually implies is that it is not the virtue of certainty and predictability – which are usually associated with objectivity- but coherence that makes the foundation of applicability of objectivity in law.What could be observed from the analyses, is that both the phenomenon of conforming interpretation and objective interpretation play the role of arguments in the interpretive discourse, arguments that provide justification that interpretation is not arbitrary or subjective. With regards to the important part of the ideology of legal application which is the conviction that decisions should be taken on the basis of law in order to exclude arbitrariness, objective interpretation could be read as a question “what kind of authority “supports” certain interpretation”? that is almost never free of judicial creativity and judicial activism.One can say that, objective and conforming interpretation are just another arguments used in legal discourse.

  17. Balance between calibration objectives in a conceptual hydrological model

    NARCIS (Netherlands)

    Booij, Martijn J.; Krol, Martinus S.

    2010-01-01

    Three different measures to determine the optimum balance between calibration objectives are compared: the combined rank method, parameter identifiability and model validation. Four objectives (water balance, hydrograph shape, high flows, low flows) are included in each measure. The contributions of

  18. A metadata schema for data objects in clinical research.

    Science.gov (United States)

    Canham, Steve; Ohmann, Christian

    2016-11-24

    A large number of stakeholders have accepted the need for greater transparency in clinical research and, in the context of various initiatives and systems, have developed a diverse and expanding number of repositories for storing the data and documents created by clinical studies (collectively known as data objects). To make the best use of such resources, we assert that it is also necessary for stakeholders to agree and deploy a simple, consistent metadata scheme. The relevant data objects and their likely storage are described, and the requirements for metadata to support data sharing in clinical research are identified. Issues concerning persistent identifiers, for both studies and data objects, are explored. A scheme is proposed that is based on the DataCite standard, with extensions to cover the needs of clinical researchers, specifically to provide (a) study identification data, including links to clinical trial registries; (b) data object characteristics and identifiers; and (c) data covering location, ownership and access to the data object. The components of the metadata scheme are described. The metadata schema is proposed as a natural extension of a widely agreed standard to fill a gap not tackled by other standards related to clinical research (e.g., Clinical Data Interchange Standards Consortium, Biomedical Research Integrated Domain Group). The proposal could be integrated with, but is not dependent on, other moves to better structure data in clinical research.

  19. RTDB: A memory resident real-time object database

    International Nuclear Information System (INIS)

    Nogiec, Jerzy M.; Desavouret, Eugene

    2003-01-01

    RTDB is a fast, memory-resident object database with built-in support for distribution. It constitutes an attractive alternative for architecting real-time solutions with multiple, possibly distributed, processes or agents sharing data. RTDB offers both direct and navigational access to stored objects, with local and remote random access by object identifiers, and immediate direct access via object indices. The database supports transparent access to objects stored in multiple collaborating dispersed databases and includes a built-in cache mechanism that allows for keeping local copies of remote objects, with specifiable invalidation deadlines. Additional features of RTDB include a trigger mechanism on objects that allows for issuing events or activating handlers when objects are accessed or modified and a very fast, attribute based search/query mechanism. The overall architecture and application of RTDB in a control and monitoring system is presented

  20. Removing defocused objects from single focal plane scans of cytological slides

    Directory of Open Access Journals (Sweden)

    David Friedrich

    2016-01-01

    Full Text Available Background: Virtual microscopy and automated processing of cytological slides are more challenging compared to histological slides. Since cytological slides exhibit a three-dimensional surface and the required microscope objectives with high resolution have a low depth of field, these cannot capture all objects of a single field of view in focus. One solution would be to scan multiple focal planes; however, the increase in processing time and storage requirements are often prohibitive for clinical routine. Materials and Methods: In this paper, we show that it is a reasonable trade-off to scan a single focal plane and automatically reject defocused objects from the analysis. To this end, we have developed machine learning solutions for the automated identification of defocused objects. Our approach includes creating novel features, systematically optimizing their parameters, selecting adequate classifier algorithms, and identifying the correct decision boundary between focused and defocused objects. We validated our approach for computer-assisted DNA image cytometry. Results and Conclusions: We reach an overall sensitivity of 96.08% and a specificity of 99.63% for identifying defocused objects. Applied on ninety cytological slides, the developed classifiers automatically removed 2.50% of the objects acquired during scanning, which otherwise would have interfered the examination. Even if not all objects are acquired in focus, computer-assisted DNA image cytometry still identified more diagnostically or prognostically relevant objects compared to manual DNA image cytometry. At the same time, the workload for the expert is reduced dramatically.

  1. Inventory of water objects for purposes of development objectives and design of natural frame of Kazan (Russia)

    Science.gov (United States)

    Mingazova, N. M.

    2018-01-01

    The article is devoted to the results of the inventory and certification of water objects in the city of Kazan in 2007-2017. Inventory of water objects contributes to the formation of the natural framework of the city, improvement of the quality of the environment, preservation of the local gene pool of flora and fauna in urban conditions. During the research, 236 small lakes, rivers and their tributaries, as well as wetlands, were identified. The environmental passports were developed for each of them. Registries of water bodies were developed for administrative regions. The inventory and certification of water objects are an effective measure in the conservation of lakes and rivers in urban conditions.

  2. Revealing/Concealing

    DEFF Research Database (Denmark)

    Isar, Nicoletta

    2017-01-01

    and potential to disrupt the dualism of Platonism challenged by Nietzsche. Yet the substance of this contribution, intended to express the symptom of perception of premodern image, must greatly differ from the grounds of phenomenology. This paper aims to bring however some arguments in support...... to disrupt the Platonic dualism, but also to provide the arguments to challenge the misunderstood dualism of Platonism itself as it was incorporated into the Western thinking. The subject of this paper will provide the means for this demonstration, and hopefully shed new lights on the nature of the premodern...... image. My argument is based on the third Platonic term – χώρα – a concept with a long tradition since Antiquity until the Byzantine era. I will take further her argument and explore the paradigmatic dimension of this syntagm which could be viewed as “an integrated part of the ancient and premodern image...

  3. System and method for detecting a faulty object in a system

    Science.gov (United States)

    Gunnels, John A.; Gustavson, Fred Gehrung; Engle, Robert Daniel

    2010-12-14

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  4. Sexual and gender minority identity disclosure during undergraduate medical education: "in the closet" in medical school.

    Science.gov (United States)

    Mansh, Matthew; White, William; Gee-Tong, Lea; Lunn, Mitchell R; Obedin-Maliver, Juno; Stewart, Leslie; Goldsmith, Elizabeth; Brenman, Stephanie; Tran, Eric; Wells, Maggie; Fetterman, David; Garcia, Gabriel

    2015-05-01

    To assess identity disclosure among sexual and gender minority (SGM) students pursuing undergraduate medical training in the United States and Canada. From 2009 to 2010, a survey was made available to all medical students enrolled in the 176 MD- and DO-granting medical schools in the United States and Canada. Respondents were asked about their sexual and gender identity, whether they were "out" (i.e., had publicly disclosed their identity), and, if they were not, their reasons for concealing their identity. The authors used a mixed-methods approach and analyzed quantitative and qualitative survey data. Of 5,812 completed responses (of 101,473 eligible respondents; response rate 5.7%), 920 (15.8%) students from 152 (of 176; 86.4%) institutions identified as SGMs. Of the 912 sexual minorities, 269 (29.5%) concealed their sexual identity in medical school. Factors associated with sexual identity concealment included sexual minority identity other than lesbian or gay, male gender, East Asian race, and medical school enrollment in the South or Central regions of North America. The most common reasons for concealing one's sexual identity were "nobody's business" (165/269; 61.3%), fear of discrimination in medical school (117/269; 43.5%), and social or cultural norms (110/269; 40.9%). Of the 35 gender minorities, 21 (60.0%) concealed their gender identity, citing fear of discrimination in medical school (9/21; 42.9%) and lack of support (9/21; 42.9%). SGM students continue to conceal their identity during undergraduate medical training. Medical institutions should adopt targeted policies and programs to better support these individuals.

  5. Birth of the Object: Detection of Objectness and Extraction of Object Shape through Object Action Complexes

    DEFF Research Database (Denmark)

    Kraft, Dirk; Pugeault, Nicolas; Baseski, Emre

    2008-01-01

    We describe a process in which the segmentation of objects as well as the extraction of the object shape becomes realized through active exploration of a robot vision system. In the exploration process, two behavioral modules that link robot actions to the visual and haptic perception of objects...... interact. First, by making use of an object independent grasping mechanism, physical control over potential objects can be gained. Having evaluated the initial grasping mechanism as being successful, a second behavior extracts the object shape by making use of prediction based on the motion induced...... system, knowledge about its own embodiment as well as knowledge about geometric relationships such as rigid body motion. This prior knowledge allows the extraction of representations that are semantically richer compared to many other approaches....

  6. Inferring Groups of Objects, Preferred Routes, and Facility Locations from Trajectories

    DEFF Research Database (Denmark)

    Ceikute, Vaida

    (i) infer groups of objects traveling together, (ii) determine routes preferred by local drivers, and (iii) identify attractive facility locations. First, we present framework that efficiently supports online discovery of groups of moving objects that travel together. We adopt a sampling......-independent approach that makes no assumptions about when object positions are sampled and that supports the use of approximate trajectories. The framework’s algorithms exploit density-based clustering to identify groups. Such identified groups are scored based on cardinality and duration. With the use of domination...... and similarity notions, groups of low interest are pruned, and a variety of different, interesting groups are returned. Results from empirical studies with real and synthetic data offer insight into the effectiveness and efficiency of the proposed framework. Next, we view GPS trajectories as trips that represent...

  7. Object-Based Benefits without Object-Based Representations

    OpenAIRE

    Alvarez, George Angelo; Fougnie, Daryl; Cormiea, Sarah M

    2012-01-01

    The organization of visual information into objects strongly influences visual memory: Displays with objects defined by two features (e.g. color, orientation) are easier to remember than displays with twice as many objects defined by one feature (Olson & Jiang, 2002). Existing theories suggest that this ‘object-benefit’ is based on object-based limitations in working memory: because a limited number of objects can be stored, packaging features together so that fewer objects have to be remembe...

  8. Identification of everyday objects on the basis of Gaborized outline versions.

    Science.gov (United States)

    Sassi, Michaël; Vancleef, Kathleen; Machilsen, Bart; Panis, Sven; Wagemans, Johan

    2010-01-01

    Using outlines derived from a widely used set of line drawings, we created stimuli geared towards the investigation of contour integration and texture segmentation using shapes of everyday objects. Each stimulus consisted of Gabor elements positioned and oriented curvilinearly along the outline of an object, embedded within a larger Gabor array of homogeneous density. We created six versions of the resulting Gaborized outline stimuli by varying the orientations of elements inside and outside the outline. Data from two experiments, in which participants attempted to identify the objects in the stimuli, provide norms for identifiability and name agreement, and show differences in identifiability between stimulus versions. While there was substantial variability between the individual objects in our stimulus set, further analyses suggest a number of stimulus properties which are generally predictive of identification performance. The stimuli and the accompanying normative data, both available on our website (http://www.gestaltrevision.be/sources/gaboroutlines), provide a useful tool to further investigate contour integration and texture segmentation in both normal and clinical populations, especially when top-down influences on these processes, such as the role of prior knowledge of familiar objects, are of main interest.

  9. Eye-tracking study of inanimate objects

    Directory of Open Access Journals (Sweden)

    Ković Vanja

    2009-01-01

    Full Text Available Unlike the animate objects, where participants were consistent in their looking patterns, for inanimates it was difficult to identify both consistent areas of fixations and a consistent order of fixations. Furthermore, in comparison to animate objects, in animates received significantly shorter total looking time, shorter longest looks and a smaller number of overall fixations. However, as with animates, looking patterns did not systematically differ between the naming and non-naming conditions. These results suggested that animacy, but not labelling, impacts on looking behavior in this paradigm. In the light of feature-based accounts of semantic memory organization, one could interpret these findings as suggesting that processing of the animate objects is based on the saliency/diagnosticity of their visual features (which is then reflected through participants eye-movements towards those features, whereas processing of the inanimate objects is based more on functional features (which cannot be easily captured by looking behavior in such a paradigm.

  10. Swing damped movement of suspended objects

    International Nuclear Information System (INIS)

    Jones, J.F.; Petterson, B.J.; Werner, J.C.

    1990-01-01

    Transportation of large objects such as nuclear waste shipping casks using overhead cranes can induce pendular motion of the object. Residual oscillation from transportation typically must be damped or allowed to decay before the next process can take place. By properly programming the acceleration of the transporting device (e.g., crane) an oscillation damped transport and swing free stop are obtainable. This report reviews the theory associated with formulating such oscillation damped trajectories for a simply suspended object (e.g., simple pendulum). In addition, the use of force servo damping to eliminate initial oscillation of simply suspended objects is discussed. This is often needed to provide a well defined initial state for the system prior to executing an oscillation damped move. Also included are descriptions of experiments using a CIMCORP XR6100 gantry robot and results from these experiments. Finally, sources of error resulting in small residual oscillations are identified and possible solutions presented

  11. Multi-Label Object Categorization Using Histograms of Global Relations

    DEFF Research Database (Denmark)

    Mustafa, Wail; Xiong, Hanchen; Kraft, Dirk

    2015-01-01

    In this paper, we present an object categorization system capable of assigning multiple and related categories for novel objects using multi-label learning. In this system, objects are described using global geometric relations of 3D features. We propose using the Joint SVM method for learning......). The experiments are carried out on a dataset of 100 objects belonging to 13 visual and action-related categories. The results indicate that multi-label methods are able to identify the relation between the dependent categories and hence perform categorization accordingly. It is also found that extracting...

  12. Object width modulates object-based attentional selection.

    Science.gov (United States)

    Nah, Joseph C; Neppi-Modona, Marco; Strother, Lars; Behrmann, Marlene; Shomstein, Sarah

    2018-04-24

    Visual input typically includes a myriad of objects, some of which are selected for further processing. While these objects vary in shape and size, most evidence supporting object-based guidance of attention is drawn from paradigms employing two identical objects. Importantly, object size is a readily perceived stimulus dimension, and whether it modulates the distribution of attention remains an open question. Across four experiments, the size of the objects in the display was manipulated in a modified version of the two-rectangle paradigm. In Experiment 1, two identical parallel rectangles of two sizes (thin or thick) were presented. Experiments 2-4 employed identical trapezoids (each having a thin and thick end), inverted in orientation. In the experiments, one end of an object was cued and participants performed either a T/L discrimination or a simple target-detection task. Combined results show that, in addition to the standard object-based attentional advantage, there was a further attentional benefit for processing information contained in the thick versus thin end of objects. Additionally, eye-tracking measures demonstrated increased saccade precision towards thick object ends, suggesting that Fitts's Law may play a role in object-based attentional shifts. Taken together, these results suggest that object-based attentional selection is modulated by object width.

  13. Integrating ergonomics into engineering design: the role of objects.

    Science.gov (United States)

    Hall-Andersen, Lene Bjerg; Broberg, Ole

    2014-05-01

    The objective of this study was to explore the role of objects in integrating ergonomic knowledge in engineering design processes. An engineering design case was analyzed using the theoretical concepts of boundary objects and intermediary objects: Boundary objects facilitate collaboration between different knowledge domains, while the aim of an intermediary object is to circulate knowledge and thus produce a distant effect. Adjustable layout drawings served as boundary objects and had a positive impact on the dialog between an ergonomist and designers. An ergonomic guideline document was identified as an intermediary object. However, when the ergonomic guidelines were circulated in the design process, only some of the guidelines were transferred to the design of the sterile processing plant. Based on these findings, recommendations for working with objects in design processes are included. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  14. Identifying Relevant Studies in Software Engineering

    DEFF Research Database (Denmark)

    Zhang, He; Ali Babar, Muhammad; Tell, Paolo

    2011-01-01

    Context: Systematic literature review (SLR) has become an important research methodology in software engineering since the introduction of evidence-based software engineering (EBSE) in 2004. One critical step in applying this methodology is to design and execute appropriate and effective search....... Objective: The main objective of the research reported in this paper is to improve the search step of undertaking SLRs in software engineering (SE) by devising and evaluating systematic and practical approaches to identifying relevant studies in SE. Method: We have systematically selected and analytically...

  15. Variability of Massive Young Stellar Objects in Cygnus-X

    Science.gov (United States)

    Thomas, Nancy H.; Hora, J. L.; Smith, H. A.

    2013-01-01

    Young stellar objects (YSOs) are stars in the process of formation. Several recent investigations have shown a high rate of photometric variability in YSOs at near- and mid-infrared wavelengths. Theoretical models for the formation of massive stars (1-10 solar masses) remain highly idealized, and little is known about the mechanisms that produce the variability. An ongoing Spitzer Space Telescope program is studying massive star formation in the Cygnus-X region. In conjunction with the Spitzer observations, we have conducted a ground-based near-infrared observing program of the Cygnus-X DR21 field using PAIRITEL, the automated infrared telescope at Whipple Observatory. Using the Stetson index for variability, we identified variable objects and a number of variable YSOs in our time-series PAIRITEL data of DR21. We have searched for periodicity among our variable objects using the Lomb-Scargle algorithm, and identified periodic variable objects with an average period of 8.07 days. Characterization of these variable and periodic objects will help constrain models of star formation present. This work is supported in part by the NSF REU and DOD ASSURE programs under NSF grant no. 0754568 and by the Smithsonian Institution.

  16. Improved Side Information Generation for Distributed Video Coding by Exploiting Spatial and Temporal Correlations

    Directory of Open Access Journals (Sweden)

    Ye Shuiming

    2009-01-01

    Full Text Available Distributed video coding (DVC is a video coding paradigm allowing low complexity encoding for emerging applications such as wireless video surveillance. Side information (SI generation is a key function in the DVC decoder, and plays a key-role in determining the performance of the codec. This paper proposes an improved SI generation for DVC, which exploits both spatial and temporal correlations in the sequences. Partially decoded Wyner-Ziv (WZ frames, based on initial SI by motion compensated temporal interpolation, are exploited to improve the performance of the whole SI generation. More specifically, an enhanced temporal frame interpolation is proposed, including motion vector refinement and smoothing, optimal compensation mode selection, and a new matching criterion for motion estimation. The improved SI technique is also applied to a new hybrid spatial and temporal error concealment scheme to conceal errors in WZ frames. Simulation results show that the proposed scheme can achieve up to 1.0 dB improvement in rate distortion performance in WZ frames for video with high motion, when compared to state-of-the-art DVC. In addition, both the objective and perceptual qualities of the corrupted sequences are significantly improved by the proposed hybrid error concealment scheme, outperforming both spatial and temporal concealments alone.

  17. Validity of Qualis database as a predictor of evidence hierarchy and risk of bias in randomized controlled trials: a case study in dentistry

    Directory of Open Access Journals (Sweden)

    Christiane Alves Ferreira

    2011-01-01

    Full Text Available OBJECTIVE: To evaluate the validity of the Qualis database in identifying the levels of scientific evidence and the quality of randomized controlled trials indexed in the Lilacs database. METHODS: We selected 40 open-access journals and performed a page-by-page hand search, to identify published articles according to the type of study during a period of six years. Classification of studies was performed by independent reviewers assessed for their reliability. Randomized controlled trials were identified for separate evaluation of risk of bias using four dimensions: generation of allocation sequence, allocation concealment, blinding, and incomplete outcome data. The Qualis classification was considered to be the outcome variable. The statistical tests used included Kappa, Spearman's correlation, Kendall-tau and ordinal regressions. RESULTS: Studies with low levels of scientific evidence received similar Qualis classifications when compared to studies with high levels of evidence. In addition, randomized controlled trials with a high risk of bias for the generation of allocation sequences and allocation concealment were more likely to be published in journals with higher Qualis levels. DISCUSSION: The hierarchy level of the scientific evidence as classified by type of research design, as well as by the validity of studies according to the bias control level, was not correlated or associated with Qualis stratification. CONCLUSION: Qualis classifications for journals are not an approximate or indirect predictor of the validity of randomized controlled trials published in these journals and are therefore not a legitimate or appropriate indicator of the validity of randomized controlled trials.

  18. Distributed Persistent Identifiers System Design

    Directory of Open Access Journals (Sweden)

    Pavel Golodoniuc

    2017-06-01

    Full Text Available The need to identify both digital and physical objects is ubiquitous in our society. Past and present persistent identifier (PID systems, of which there is a great variety in terms of technical and social implementation, have evolved with the advent of the Internet, which has allowed for globally unique and globally resolvable identifiers. PID systems have, by in large, catered for identifier uniqueness, integrity, and persistence, regardless of the identifier’s application domain. Trustworthiness of these systems has been measured by the criteria first defined by Bütikofer (2009 and further elaborated by Golodoniuc 'et al'. (2016 and Car 'et al'. (2017. Since many PID systems have been largely conceived and developed by a single organisation they faced challenges for widespread adoption and, most importantly, the ability to survive change of technology. We believe that a cause of PID systems that were once successful fading away is the centralisation of support infrastructure – both organisational and computing and data storage systems. In this paper, we propose a PID system design that implements the pillars of a trustworthy system – ensuring identifiers’ independence of any particular technology or organisation, implementation of core PID system functions, separation from data delivery, and enabling the system to adapt for future change. We propose decentralisation at all levels — persistent identifiers and information objects registration, resolution, and data delivery — using Distributed Hash Tables and traditional peer-to-peer networks with information replication and caching mechanisms, thus eliminating the need for a central PID data store. This will increase overall system fault tolerance thus ensuring its trustworthiness. We also discuss important aspects of the distributed system’s governance, such as the notion of the authoritative source and data integrity

  19. Quantum objects. Non-local correlation, causality and objective indefiniteness in the quantum world

    International Nuclear Information System (INIS)

    Jaeger, Gregg

    2014-01-01

    Presents interpretation of quantum mechanics, advances in quantum foundations and philosophy of quantum mechanics. Explains non-locality and its relationship to causality and probability in quantum theory. Displays foundational characteristics of quantum physic to understand conceptual origins of the unusual nature of quantum phenomena. Describes relationship of subsystems and space-time. Gives a careful review of existing views. Confronts the old approaches with recent results and approaches from quantum information theory. Delivers a clear and thorough analysis of the quantum events in the context of relativistic space-time, which impacts the problem of creating a theory of quantum gravity. Supplies a detailed discussion of non-local correlation within and beyond the bounds set by standard quantum mechanics, which impacts the foundations of information theory. Gives a detailed discussion of probabilistic causation (central to contemporary accounts of causation) in quantum mechanics and relativity. Leads a thorough discussion of the nature of ''quantum potentiality,'' the novel form of existence arising for the first time in quantum mechanics. This monograph identifies the essential characteristics of the objects described by current quantum theory and considers their relationship to space-time. In the process, it explicates the senses in which quantum objects may be consistently considered to have parts of which they may be composed or into which they may be decomposed. The book also demonstrates the degree to which reduction is possible in quantum mechanics, showing it to be related to the objective indefiniteness of quantum properties and the strong non-local correlations that can occur between the physical quantities of quantum subsystems. Careful attention is paid to the relationships among such property correlations, physical causation, probability, and symmetry in quantum theory. In this way, the text identifies and clarifies the conceptual grounds

  20. Quantum objects. Non-local correlation, causality and objective indefiniteness in the quantum world

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Gregg [Boston Univ., MA (United States). Natural Sciences and Mathematics

    2014-07-01

    Presents interpretation of quantum mechanics, advances in quantum foundations and philosophy of quantum mechanics. Explains non-locality and its relationship to causality and probability in quantum theory. Displays foundational characteristics of quantum physic to understand conceptual origins of the unusual nature of quantum phenomena. Describes relationship of subsystems and space-time. Gives a careful review of existing views. Confronts the old approaches with recent results and approaches from quantum information theory. Delivers a clear and thorough analysis of the quantum events in the context of relativistic space-time, which impacts the problem of creating a theory of quantum gravity. Supplies a detailed discussion of non-local correlation within and beyond the bounds set by standard quantum mechanics, which impacts the foundations of information theory. Gives a detailed discussion of probabilistic causation (central to contemporary accounts of causation) in quantum mechanics and relativity. Leads a thorough discussion of the nature of ''quantum potentiality,'' the novel form of existence arising for the first time in quantum mechanics. This monograph identifies the essential characteristics of the objects described by current quantum theory and considers their relationship to space-time. In the process, it explicates the senses in which quantum objects may be consistently considered to have parts of which they may be composed or into which they may be decomposed. The book also demonstrates the degree to which reduction is possible in quantum mechanics, showing it to be related to the objective indefiniteness of quantum properties and the strong non-local correlations that can occur between the physical quantities of quantum subsystems. Careful attention is paid to the relationships among such property correlations, physical causation, probability, and symmetry in quantum theory. In this way, the text identifies and clarifies the

  1. Identifying optimal regional solid waste management strategies through an inexact integer programming model containing infinite objectives and constraints.

    Science.gov (United States)

    He, Li; Huang, Guo-He; Zeng, Guang-Ming; Lu, Hong-Wei

    2009-01-01

    The previous inexact mixed-integer linear programming (IMILP) method can only tackle problems with coefficients of the objective function and constraints being crisp intervals, while the existing inexact mixed-integer semi-infinite programming (IMISIP) method can only deal with single-objective programming problems as it merely allows the number of constraints to be infinite. This study proposes, an inexact mixed-integer bi-infinite programming (IMIBIP) method by incorporating the concept of functional intervals into the programming framework. Different from the existing methods, the IMIBIP can tackle the inexact programming problems that contain both infinite objectives and constraints. The developed method is applied to capacity planning of waste management systems under a variety of uncertainties. Four scenarios are considered for comparing the solutions of IMIBIP with those of IMILP. The results indicate that reasonable solutions can be generated by the IMIBIP method. Compared with IMILP, the system cost from IMIBIP would be relatively high since the fluctuating market factors are considered; however, the IMILP solutions are associated with a raised system reliability level and a reduced constraint violation risk level.

  2. Mechanisms underlying selecting objects for action

    Directory of Open Access Journals (Sweden)

    Melanie eWulff

    2015-04-01

    Full Text Available We assessed the factors which affect the selection of objects for action, focusing on the role of action knowledge and its modulation by distracters. 14 neuropsychological patients and 10 healthy aged-matched controls selected pairs of objects commonly used together among distracters in two contexts: with real objects and with pictures of the same objects presented sequentially on a computer screen. Across both tasks, semantically related distracters led to slower responses and more errors than unrelated distracters and the object actively used for action was selected prior to the object that would be passively held during the action. We identified a sub-group of patients (N=6 whose accuracy was 2SD below the controls performances in the real object task. Interestingly, these impaired patients were more affected by the presence of unrelated distracters during both tasks than intact patients and healthy controls. Note the impaired had lesions to left parietal, right anterior temporal and bilateral pre-motor regions. We conclude that: (1 motor procedures guide object selection for action, (2 semantic knowledge affects action-based selection, (3 impaired action decision is associated with the inability to ignore distracting information and (4 lesions to either the dorsal or ventral visual stream can lead to deficits in making action decisions. Overall, the data indicate that impairments in everyday tasks can be evaluated using a simulated computer task. The implications for rehabilitation are discussed.

  3. Haptic identification of objects and their depictions.

    Science.gov (United States)

    Klatzky, R L; Loomis, J M; Lederman, S J; Wake, H; Fujita, N

    1993-08-01

    Haptic identification of real objects is superior to that of raised two-dimensional (2-D) depictions. Three explanations of real-object superiority were investigated: contribution of material information, contribution of 3-D shape and size, and greater potential for integration across the fingers. In Experiment 1, subjects, while wearing gloves that gently attenuated material information, haptically identified real objects that provided reduced cues to compliance, mass, and part motion. The gloves permitted exploration with free hand movement, a single outstretched finger, or five outstretched fingers. Performance decreased over these three conditions but was superior to identification of pictures of the same objects in all cases, indicating the contribution of 3-D structure and integration across the fingers. Picture performance was also better with five fingers than with one. In Experiment 2, the subjects wore open-fingered gloves, which provided them with material information. Consequently, the effect of type of exploration was substantially reduced but not eliminated. Material compensates somewhat for limited access to object structure but is not the primary basis for haptic object identification.

  4. A multi-objective approach for developing national energy efficiency plans

    International Nuclear Information System (INIS)

    Haydt, Gustavo; Leal, Vítor; Dias, Luís

    2014-01-01

    This paper proposes a new approach to deal with the problem of building national energy efficiency (EE) plans, considering multiple objectives instead of only energy savings. The objectives considered are minimizing the influence of energy use on climate change, minimizing the financial risk from the investment, maximizing the security of energy supply, minimizing investment costs, minimizing the impacts of building new power plants and transmission infrastructures, and maximizing the local air quality. These were identified through literature review and interaction with real decision makers. A database of measures is established, from which millions of potential EE plans can be built by combining measures and their respective degree of implementation. Finally, a hybrid multi-objective and multi-criteria decision analysis (MCDA) model is proposed to search and select the EE plans that best match the decision makers’ preferences. An illustration of the working mode and the type of results obtained from this novel hybrid model is provided through an application to Portugal. For each of five decision perspectives a wide range of potential best plans were identified. These wide ranges show the relevance of introducing multi-objective analysis in a comprehensive search space as a tool to inform decisions about national EE plans. - Highlights: • A multiple objective approach to aid the choice of national energy efficiency plans. • A hybrid multi-objective MCDA model is proposed to search among the possible plans. • The model identified relevant plans according to five different idealized DMs. • The approach is tested with Portugal

  5. AN OBJECTIVE CLIMATOLOGY OF CAROLINA COASTAL FRONTS

    Science.gov (United States)

    This study describes a simple objective method to identify cases of coastal frontogenesis offshore of the Carolinas and to characterize the sensible weather associated with frontal passage at measurement sites near the coast. The identification method, based on surface hourly d...

  6. Learning Objects, Repositories, Sharing and Reusability

    Science.gov (United States)

    Koppi, Tony; Bogle, Lisa; Bogle, Mike

    2005-01-01

    The online Learning Resource Catalogue (LRC) Project has been part of an international consortium for several years and currently includes 25 institutions worldwide. The LRC Project has evolved for several pragmatic reasons into an academic network whereby members can identify and share reusable learning objects as well as collaborate in a number…

  7. Scientific review of psychophysiological detection of deceit

    Directory of Open Access Journals (Sweden)

    Igor Areh

    2016-10-01

    Full Text Available Psychophysiological detection of deceit has been in the centre of attention in the recent decade, which correlates with heightened security challenges of a modern world. The article provides scientific discussion about polygraph that is used in criminal investigation. Two most employed polygraph techniques are critically presented, examined and compared: the Comparison Question Test (CQT and the Concealed Information Test (CIT. Theoretical foundations, objectivity and standardization of testing procedures, ethical and practical issues are analysed. Proponents of the Comparison Question Test have not been successful in their efforts to resolve fundamental problems and limitations with which the technique is challenged. It remains unstandardized and unscientific, separated from science and mainly without attempts to escape from the dead-end. The most influential theoretical backgrounds of CQT technique are examined; however, none of them represents a satisfactory scientific foundation of the technique. Without being scientifically grounded in a verifiable theory, it remains controversial and caught into self-sufficiency, mostly supported by methodologically questionable research findings gained by proponents. To the contrary, the Concealed Information Test is associated with fast development, particularly in the field of neurology, and is considered to be less disputed and to be partly supported by a sound scientific ground. Applying the Concealed Question Test, somewhat naïve and disputable detection of lies typical of the Comparison Question Test is replaced by a search for information that lies concealed in the suspects’ memory. However, the Concealed Information Test also has been challenged by serious deficiencies, which bring forward a question about justification of the use of the polygraph.

  8. Salient Object Detection via Structured Matrix Decomposition.

    Science.gov (United States)

    Peng, Houwen; Li, Bing; Ling, Haibin; Hu, Weiming; Xiong, Weihua; Maybank, Stephen J

    2016-05-04

    Low-rank recovery models have shown potential for salient object detection, where a matrix is decomposed into a low-rank matrix representing image background and a sparse matrix identifying salient objects. Two deficiencies, however, still exist. First, previous work typically assumes the elements in the sparse matrix are mutually independent, ignoring the spatial and pattern relations of image regions. Second, when the low-rank and sparse matrices are relatively coherent, e.g., when there are similarities between the salient objects and background or when the background is complicated, it is difficult for previous models to disentangle them. To address these problems, we propose a novel structured matrix decomposition model with two structural regularizations: (1) a tree-structured sparsity-inducing regularization that captures the image structure and enforces patches from the same object to have similar saliency values, and (2) a Laplacian regularization that enlarges the gaps between salient objects and the background in feature space. Furthermore, high-level priors are integrated to guide the matrix decomposition and boost the detection. We evaluate our model for salient object detection on five challenging datasets including single object, multiple objects and complex scene images, and show competitive results as compared with 24 state-of-the-art methods in terms of seven performance metrics.

  9. Buried object detection in GPR images

    Science.gov (United States)

    Paglieroni, David W; Chambers, David H; Bond, Steven W; Beer, W. Reginald

    2014-04-29

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  10. Designing personal grief rituals: An analysis of symbolic objects and actions.

    Science.gov (United States)

    Sas, Corina; Coman, Alina

    2016-10-01

    Personal grief rituals are beneficial in dealing with complicated grief, but challenging to design, as they require symbolic objects and actions meeting clients' emotional needs. The authors reported interviews with 10 therapists with expertise in both grief therapy and grief rituals. Findings indicate three types of rituals supporting honoring, letting go, and self transformation, with the latter being particularly complex. Outcomes also point to a taxonomy of ritual objects for framing and remembering ritual experience, and for capturing and processing grief. Besides symbolic possessions, the authors identified other types of ritual objects including transformational and future-oriented ones. Symbolic actions include creative craft of ritual objects, respectful handling, disposal, and symbolic play. They conclude with theoretical implications of these findings, and a reflection on their value for tailored, creative co-design of grief rituals. In particular, several implications for designing grief rituals were identified that include accounting for the client's need, selecting (or creating) the most appropriate objects and actions from the identified types, integrating principles of both grief and art/drama therapy, exploring clients' affinity for the ancient elements as medium of disposal in letting go rituals, and the value of technology for recording and reflecting on ritual experience.

  11. MOVING OBJECTS IN THE HUBBLE ULTRA DEEP FIELD

    Energy Technology Data Exchange (ETDEWEB)

    Kilic, Mukremin; Gianninas, Alexandros [Homer L. Dodge Department of Physics and Astronomy, University of Oklahoma, 440 W. Brooks St., Norman, OK 73019 (United States); Von Hippel, Ted, E-mail: kilic@ou.edu, E-mail: alexg@nhn.ou.edu, E-mail: ted.vonhippel@erau.edu [Embry-Riddle Aeronautical University, 600 S. Clyde Morris Blvd., Daytona Beach, FL 32114 (United States)

    2013-09-01

    We identify proper motion objects in the Hubble Ultra Deep Field (UDF) using the optical data from the original UDF program in 2004 and the near-infrared data from the 128 orbit UDF 2012 campaign. There are 12 sources brighter than I = 27 mag that display >3{sigma} significant proper motions. We do not find any proper motion objects fainter than this magnitude limit. Combining optical and near-infrared photometry, we model the spectral energy distribution of each point-source using stellar templates and state-of-the-art white dwarf models. For I {<=} 27 mag, we identify 23 stars with K0-M6 spectral types and two faint blue objects that are clearly old, thick disk white dwarfs. We measure a thick disk white dwarf space density of 0.1-1.7 Multiplication-Sign 10{sup -3} pc{sup -3} from these two objects. There are no halo white dwarfs in the UDF down to I = 27 mag. Combining the Hubble Deep Field North, South, and the UDF data, we do not see any evidence for dark matter in the form of faint halo white dwarfs, and the observed population of white dwarfs can be explained with the standard Galactic models.

  12. Empirical evidence of bias in treatment effect estimates in controlled trials with different interventions and outcomes: meta-epidemiological study

    DEFF Research Database (Denmark)

    Wood, L.; Egger, M.; Gluud, L.L.

    2008-01-01

    OBJECTIVE: To examine whether the association of inadequate or unclear allocation concealment and lack of blinding with biased estimates of intervention effects varies with the nature of the intervention or outcome. DESIGN: Combined analysis of data from three meta-epidemiological studies based o...

  13. Ego-Motion and Tracking for Continuous Object Learning: A Brief Survey

    Science.gov (United States)

    2017-09-01

    past research related to the tasks of ego-motion estimation and object tracking from the viewpoint of their role in continuous object learning...in visual object tracking, competitions are held each year to identify the most accurate and robust tracking implementations. Over recent competitions...information should they share) or vice versa? These are just some of the questions that must be addressed in future research toward continuous object

  14. Object Extraction in Cluttered Environments via a P300-Based IFCE

    Directory of Open Access Journals (Sweden)

    Xiaoqian Mao

    2017-01-01

    Full Text Available One of the fundamental issues for robot navigation is to extract an object of interest from an image. The biggest challenges for extracting objects of interest are how to use a machine to model the objects in which a human is interested and extract them quickly and reliably under varying illumination conditions. This article develops a novel method for segmenting an object of interest in a cluttered environment by combining a P300-based brain computer interface (BCI and an improved fuzzy color extractor (IFCE. The induced P300 potential identifies the corresponding region of interest and obtains the target of interest for the IFCE. The classification results not only represent the human mind but also deliver the associated seed pixel and fuzzy parameters to extract the specific objects in which the human is interested. Then, the IFCE is used to extract the corresponding objects. The results show that the IFCE delivers better performance than the BP network or the traditional FCE. The use of a P300-based IFCE provides a reliable solution for assisting a computer in identifying an object of interest within images taken under varying illumination intensities.

  15. Kyiv Small Rivers in Metropolis Water Objects System

    Science.gov (United States)

    Krelshteyn, P.; Dubnytska, M.

    2017-12-01

    The article answers the question, what really are the small underground rivers with artificial watercourses: water bodies or city engineering infrastructure objects? The place of such rivers in metropolis water objects system is identified. The ecological state and the degree of urbanization of small rivers, as well as the dynamics of change in these indicators are analysed on the Kiev city example with the help of water objects cadastre. It was found that the registration of small rivers in Kyiv city is not conducted, and the summary information on such water objects is absent and is not taken into account when making managerial decisions at the urban level. To solve this problem, we propose to create some water bodies accounting system (water cadastre).

  16. To trade or not to trade: The moderating role of vividness when exchanging gambles

    Directory of Open Access Journals (Sweden)

    Michal Maimaran

    2011-02-01

    Full Text Available Individuals are generally reluctant to trade goods---a phenomenon identified as the endowment effect. This paper focuses on consumers' puzzling reluctance to exchange gambles, and in particular lottery tickets with identical distribution (i.e., same odds of winning, and identifies the ticket's vividness as an important moderator. Three studies demonstrate that individuals are more willing to exchange less vivid lottery tickets (e.g., tickets concealed in envelopes, or tickets with an unknown number compared to more vivid tickets (e.g., tickets not concealed in envelopes, or tickets with a known number when offered an incentive to exchange. Moreover, this effect is mediated by anticipated regret, such that less regret is anticipated when exchanging less vivid tickets, thus increasing individuals' willingness to exchange tickets.

  17. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  18. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  19. Object tracking using multiple camera video streams

    Science.gov (United States)

    Mehrubeoglu, Mehrube; Rojas, Diego; McLauchlan, Lifford

    2010-05-01

    Two synchronized cameras are utilized to obtain independent video streams to detect moving objects from two different viewing angles. The video frames are directly correlated in time. Moving objects in image frames from the two cameras are identified and tagged for tracking. One advantage of such a system involves overcoming effects of occlusions that could result in an object in partial or full view in one camera, when the same object is fully visible in another camera. Object registration is achieved by determining the location of common features in the moving object across simultaneous frames. Perspective differences are adjusted. Combining information from images from multiple cameras increases robustness of the tracking process. Motion tracking is achieved by determining anomalies caused by the objects' movement across frames in time in each and the combined video information. The path of each object is determined heuristically. Accuracy of detection is dependent on the speed of the object as well as variations in direction of motion. Fast cameras increase accuracy but limit the speed and complexity of the algorithm. Such an imaging system has applications in traffic analysis, surveillance and security, as well as object modeling from multi-view images. The system can easily be expanded by increasing the number of cameras such that there is an overlap between the scenes from at least two cameras in proximity. An object can then be tracked long distances or across multiple cameras continuously, applicable, for example, in wireless sensor networks for surveillance or navigation.

  20. Faint H-alpha emission objects near the equatorial selected areas

    International Nuclear Information System (INIS)

    Robertson, T.H.; Jordan, T.M.

    1989-01-01

    An objective-prism survey of fields centered on the 24 Kapteyn Selected Areas along the celestial equator has resulted in the detection of 120 faint H-alpha emission-line objects. Diffuse objects and stars having molecular bands in their spectra are not included. Only 18 of these stars were identified in previous lists of emission-line objects. Identifications were found for an additional three stars. Images of these objects appear to be stellar on direct plates. The magnitude range for these stars is V = 10.1-19.00. Positions and V magnitudes of these objects are provided, as are identifications of objects which have been reported in other lists. Frequency distributions of the apparent magnitudes and Galactic latitudes of these emission-line objects are discussed, and finding charts are provided. 14 refs

  1. How does Iran negotiate? Diplomatic bazaar or the Iranian art of negotiation

    International Nuclear Information System (INIS)

    Bordes, Marjorie

    2014-01-01

    As Iran is using a speech building designed to save time while making the evolutions of its nuclear programme less unacceptable, the author proposes an analysis of the Iranian approach and practice of negotiations, its rhetoric and its staging. She first outlines some cultural, religious, political and ideological backgrounds. Then, she highlights the main objectives of Iran: to face sanctions and restrictions on the short term, while keeping technological gains and know-how on the long term. In the last part, the author identifies some methods and subterfuges used by Iran like a toolbox: principle of 'argumentum ad nauseam', disinformation, manipulation and concealment, use of various problematics to digress, and use of multiple channels of discussion

  2. Multi-Objective Optimization of Hybrid Renewable Energy System Using an Enhanced Multi-Objective Evolutionary Algorithm

    Directory of Open Access Journals (Sweden)

    Mengjun Ming

    2017-05-01

    Full Text Available Due to the scarcity of conventional energy resources and the greenhouse effect, renewable energies have gained more attention. This paper proposes methods for multi-objective optimal design of hybrid renewable energy system (HRES in both isolated-island and grid-connected modes. In each mode, the optimal design aims to find suitable configurations of photovoltaic (PV panels, wind turbines, batteries and diesel generators in HRES such that the system cost and the fuel emission are minimized, and the system reliability/renewable ability (corresponding to different modes is maximized. To effectively solve this multi-objective problem (MOP, the multi-objective evolutionary algorithm based on decomposition (MOEA/D using localized penalty-based boundary intersection (LPBI method is proposed. The algorithm denoted as MOEA/D-LPBI is demonstrated to outperform its competitors on the HRES model as well as a set of benchmarks. Moreover, it effectively obtains a good approximation of Pareto optimal HRES configurations. By further considering a decision maker’s preference, the most satisfied configuration of the HRES can be identified.

  3. Participatory ergonomics in design processes: The role of boundary objects

    DEFF Research Database (Denmark)

    Broberg, Ole; Andersen, Vibeke; Seim, Rikke

    2011-01-01

    The aim of this paper is to introduce the concept of boundary objects in order to better understand the role of objects in participatory ergonomics (PE) design processes. The research question is: What characterizes boundary objects in PE processes? Based on two case studies, we identify eight...... enable workers’ participation and collaborative design in different ways. The framework developed may serve to provide criteria to guide practitioners and intervention researchers in the selection of objects to facilitate a PE process. The paper concludes with a list of recommendations for ergonomic...

  4. Neural basis for dynamic updating of object representation in visual working memory.

    Science.gov (United States)

    Takahama, Sachiko; Miyauchi, Satoru; Saiki, Jun

    2010-02-15

    In real world, objects have multiple features and change dynamically. Thus, object representations must satisfy dynamic updating and feature binding. Previous studies have investigated the neural activity of dynamic updating or feature binding alone, but not both simultaneously. We investigated the neural basis of feature-bound object representation in a dynamically updating situation by conducting a multiple object permanence tracking task, which required observers to simultaneously process both the maintenance and dynamic updating of feature-bound objects. Using an event-related design, we separated activities during memory maintenance and change detection. In the search for regions showing selective activation in dynamic updating of feature-bound objects, we identified a network during memory maintenance that was comprised of the inferior precentral sulcus, superior parietal lobule, and middle frontal gyrus. In the change detection period, various prefrontal regions, including the anterior prefrontal cortex, were activated. In updating object representation of dynamically moving objects, the inferior precentral sulcus closely cooperates with a so-called "frontoparietal network", and subregions of the frontoparietal network can be decomposed into those sensitive to spatial updating and feature binding. The anterior prefrontal cortex identifies changes in object representation by comparing memory and perceptual representations rather than maintaining object representations per se, as previously suggested. Copyright 2009 Elsevier Inc. All rights reserved.

  5. Abstract Representations of Object-Directed Action in the Left Inferior Parietal Lobule.

    Science.gov (United States)

    Chen, Quanjing; Garcea, Frank E; Jacobs, Robert A; Mahon, Bradford Z

    2018-06-01

    Prior neuroimaging and neuropsychological research indicates that the left inferior parietal lobule in the human brain is a critical substrate for representing object manipulation knowledge. In the present functional MRI study we used multivoxel pattern analyses to test whether action similarity among objects can be decoded in the inferior parietal lobule independent of the task applied to objects (identification or pantomime) and stimulus format in which stimuli are presented (pictures or printed words). Participants pantomimed the use of objects, cued by printed words, or identified pictures of objects. Classifiers were trained and tested across task (e.g., training data: pantomime; testing data: identification), stimulus format (e.g., training data: word format; testing format: picture) and specific objects (e.g., training data: scissors vs. corkscrew; testing data: pliers vs. screwdriver). The only brain region in which action relations among objects could be decoded across task, stimulus format and objects was the inferior parietal lobule. By contrast, medial aspects of the ventral surface of the left temporal lobe represented object function, albeit not at the same level of abstractness as actions in the inferior parietal lobule. These results suggest compulsory access to abstract action information in the inferior parietal lobe even when simply identifying objects.

  6. Environmental Management System Objectives & Targets Results Summary - FY 2015.

    Energy Technology Data Exchange (ETDEWEB)

    Vetter, Douglas W

    2016-02-01

    Sandia National Laboratories (SNL) Environmental Management System is the integrated approach for members of the workforce to identify and manage environmental risks. Each Fiscal Year (FY) SNL performs an analysis to identify environmental aspects, and the environmental programs associated with them are charged with the task of routinely monitoring and measuring the objectives and targets that are established to mitigate potential impacts of SNL's operations on the environment. An annual summary of the results achieved towards meeting established Sandia Corporation and SNL Site-specific objectives and targets provides a connection to, and rational for, annually revised environmental aspects. The purpose of this document is to summarize the results achieved and documented in FY 2015.

  7. Trustworthy persistent identifier systems of the future

    Science.gov (United States)

    Golodoniuc, Pavel; Klump, Jens; Car, Nicholas

    2016-04-01

    Over the last two decades, persistent identifier (PID) systems have seen some significant changes in their governance policies, system capabilities, and technology. The development of most systems was driven by two main application areas, namely archives and libraries. Guidelines and criteria for trustworthy PID systems have been clearly devised (Bütikofer, 2009) and many PID system implementations for the identification of static digital objects have been built (e.g., PURL). However systems delivering persistent identifiers for dynamic datasets are not yet mature. There has been a rapid proliferation of different PID systems caused by the specific technical or organisational requirements of various communities that could not be met by existing systems such as DOI, ISBN, and EAN. Many of these different systems were limited by their inability to provide native means of persistent identifier resolution. This has prompted a decoupling of PID-associated data from the resolution service and this is where the Handle system has played a significant role. The Handle allowed to build a distributed system of independently managed resolver services. A trustworthy PID system must be designed to outlive the objects it provides persistent identifiers for, which may cease to exist or otherwise be deprecated, and the technology used to implement it, which will certainly need to change with time. We propose that such a system should rest on four pillars of agreements - (i) definitions, (ii) policies, (iii) services, and (iv) data services, to ensure longevity. While we believe all four pillars are equally important, we intentionally leave regulating aspects of issuing of identifiers and their registration out of the scope of this paper and focus on the agreements that have to be established between PID resolver services and the data sources indicated by the persistent identifiers. We propose an approach to development of PID systems that combines the use of (a) the Handle system

  8. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  9. Preserving urban objects of historicaland architectural heritage

    Directory of Open Access Journals (Sweden)

    Bal'zannikova Ekaterina Mikhailovna

    2014-01-01

    Full Text Available Large cities of central Russia were built under the influence of the factors that played an important role in protecting their population; natural resources and opportunities for trading were also essential. The industrial development and construction of large industrial facilities were significant for the formation of urban environment. As a result architectural monuments of great historical value that have a significant influence on the formation of the modern city image were preserved.Nowadays, a great number of buildings of historical and architectural heritage turned out to be in poor condition. Funding and its efficient use are rational means of saving the most valuable objects of historical and cultural heritage. In order to do this it is necessary to solve the problems of developing complex and effective measures for preserving these objectsThe existing method of preserving urban objects does not focus on urban architectural objects of historical and architectural value. It does not cover the study of urban development features in architectural and town-planning environment surrounding this object, it does not determine the historical and architectural value of the object and it does not identify the relationship of the object and the surrounding objects as well as architectural frame of the total area. That is why the existing method cannot be considered an appropriate system for preserving the objects of historical and architectural heritage.In order to avoid the disadvantages mentioned above and to increase tourist interest to the architecturally valuable buildings in urban areas, the author has proposed a complex approach to improve the method of reconstructing urban objects of great historical and architectural significance.The existing method of preserving historical objects includes the preparatory period of studying the degree of historical and architectural heritage wear and decay, developing the techniques for strengthening

  10. Robust multi-objective calibration strategies – possibilities for improving flood forecasting

    Directory of Open Access Journals (Sweden)

    G. H. Schmitz

    2012-10-01

    Full Text Available Process-oriented rainfall-runoff models are designed to approximate the complex hydrologic processes within a specific catchment and in particular to simulate the discharge at the catchment outlet. Most of these models exhibit a high degree of complexity and require the determination of various parameters by calibration. Recently, automatic calibration methods became popular in order to identify parameter vectors with high corresponding model performance. The model performance is often assessed by a purpose-oriented objective function. Practical experience suggests that in many situations one single objective function cannot adequately describe the model's ability to represent any aspect of the catchment's behaviour. This is regardless of whether the objective is aggregated of several criteria that measure different (possibly opposite aspects of the system behaviour. One strategy to circumvent this problem is to define multiple objective functions and to apply a multi-objective optimisation algorithm to identify the set of Pareto optimal or non-dominated solutions. Nonetheless, there is a major disadvantage of automatic calibration procedures that understand the problem of model calibration just as the solution of an optimisation problem: due to the complex-shaped response surface, the estimated solution of the optimisation problem can result in different near-optimum parameter vectors that can lead to a very different performance on the validation data. Bárdossy and Singh (2008 studied this problem for single-objective calibration problems using the example of hydrological models and proposed a geometrical sampling approach called Robust Parameter Estimation (ROPE. This approach applies the concept of data depth in order to overcome the shortcomings of automatic calibration procedures and find a set of robust parameter vectors. Recent studies confirmed the effectivity of this method. However, all ROPE approaches published so far just identify

  11. Towards an Artificial Space Object Taxonomy

    Science.gov (United States)

    Wilkins, M.; Schumacher, P.; Jah, M.; Pfeffer, A.

    2013-09-01

    Object recognition is the first step in positively identifying a resident space object (RSO), i.e. assigning an RSO to a category such as GPS satellite or space debris. Object identification is the process of deciding that two RSOs are in fact one and the same. Provided we have appropriately defined a satellite taxonomy that allows us to place a given RSO into a particular class of object without any ambiguity, one can assess the probability of assignment to a particular class by determining how well the object satisfies the unique criteria of belonging to that class. Ultimately, tree-based taxonomies delineate unique signatures by defining the minimum amount of information required to positively identify a RSO. Therefore, taxonomic trees can be used to depict hypotheses in a Bayesian object recognition and identification process. This work describes a new RSO taxonomy along with specific reasoning behind the choice of groupings. An alternative taxonomy was recently presented at the Sixth Conference on Space Debris in Darmstadt, Germany. [1] The best example of a taxonomy that enjoys almost universal scientific acceptance is the classical Linnaean biological taxonomy. A strength of Linnaean taxonomy is that it can be used to organize the different kinds of living organisms, simply and practically. Every species can be given a unique name. This uniqueness and stability are a result of the acceptance by biologists specializing in taxonomy, not merely of the binomial names themselves. Fundamentally, the taxonomy is governed by rules for the use of these names, and these are laid down in formal Nomenclature Codes. We seek to provide a similar formal nomenclature system for RSOs through a defined tree-based taxonomy structure. Each categorization, beginning with the most general or inclusive, at any level is called a taxon. Taxon names are defined by a type, which can be a specimen or a taxon of lower rank, and a diagnosis, a statement intended to supply characters that

  12. Scout: orbit analysis and hazard assessment for NEOCP objects

    Science.gov (United States)

    Farnocchia, Davide; Chesley, Steven R.; Chamberlin, Alan B.

    2016-10-01

    It typically takes a few days for a newly discovered asteroid to be officially recognized as a real object. During this time, the tentative discovery is published on the Minor Planet Center's Near-Earth Object Confirmation Page (NEOCP) until additional observations confirm that the object is a real asteroid rather than an observational artifact or an artificial object. Also, NEOCP objects could have a limited observability window and yet be scientifically interesting, e.g., radar and lightcurve targets, mini-moons (temporary Earth captures), mission accessible targets, close approachers or even impactors. For instance, the only two asteroids discovered before an impact, 2008 TC3 and 2014 AA, both reached the Earth less than a day after discovery. For these reasons we developed Scout, an automated system that provides an orbital and hazard assessment for NEOCP objects within minutes after the observations are available. Scout's rapid analysis increases the chances of securing the trajectory of interesting NEOCP objects before the ephemeris uncertainty grows too large or the observing geometry becomes unfavorable. The generally short observation arcs, perhaps only a few hours or even less, lead severe degeneracies in the orbit estimation process. To overcome these degeneracies Scout relies on systematic ranging, a technique that derives possible orbits by scanning a grid in the poorly constrained space of topocentric range and range rate, while the plane-of-sky position and motion are directly tied to the recorded observations. This scan allows us to derive a distribution of the possible orbits and in turn identify the NEOCP objects of most interest to prioritize followup efforts. In particular, Scout ranks objects according to the likelihood of an impact, estimates the close approach distance, the Earth-relative minimum orbit intersection distance and v-infinity, and computes scores to identify objects more likely to be an NEO, a km-sized NEO, a Potentially

  13. Identification of Object Dynamics Using Hand Worn Motion and Force Sensors

    Directory of Open Access Journals (Sweden)

    Henk G. Kortier

    2016-11-01

    Full Text Available Emerging microelectromechanical system (MEMS-based sensors become much more applicable for on-body measurement purposes lately. Especially, the development of a finger tip-sized tri-axial force sensor gives the opportunity to measure interaction forces between the human hand and environmental objects. We have developed a new prototype device that allows simultaneous 3D force and movement measurements at the finger and thumb tips. The combination of interaction forces and movements makes it possible to identify the dynamical characteristics of the object being handled by the hand. With this device attached to the hand, a subject manipulated mass and spring objects under varying conditions. We were able to identify and estimate the weight of two physical mass objects (0.44 kg: 29 . 3 % ± 18 . 9 % and 0.28 kg: 19 . 7 % ± 10 . 6 % and the spring constant of a physical spring object ( 16 . 3 % ± 12 . 6 % . The system is a first attempt to quantify the interactions of the hand with the environment and has many potential applications in rehabilitation, ergonomics and sports.

  14. Radiodisinfestation of cultural and religious objects

    International Nuclear Information System (INIS)

    Ritacco, Miguel A.

    2003-01-01

    The ionizing radiation treatment of cultural and religious objects to control the arthropod fauna seems to be a non toxic, non contaminant process that, at the radiation dose needed to control the insects and other arthropods, is not detrimental to the objects. Since 1999 CNEA has been working on the radiodisinfestation of cultural and religious objects. The Laboratory of Radiodisinfestation of the Ezeiza Atomic Center has studied musical instruments, books, religious imagery, oil paintings, embalmed animals, bones, tapestry, clothes and sculptures, to identify the contaminant arthropods and to treat them by ionizing radiation at doses between 3 and 5 kGy in the Semi-Industrial Irradiation Plant of the Center. At present, in addition to these activities, the effects of the radiation on paintings are being studied with the Pratt Institute of New York as well as the radiation effects on different types of fabrics with the University of Buenos Aires. (author)

  15. What is the Value Proposition of Persistent Identifiers?

    Science.gov (United States)

    Klump, Jens; Huber, Robert

    2017-04-01

    Persistent identifiers (PID) are widely used today in scientific communication and documentation. Global unique identification plus persistent resolution of links to referenced digital research objects have been strong selling points for PID Systems as enabling technical infrastructures. Novel applications of PID Systems in research now go beyond the identification of file based objects such as literature or data sets and include the identification of dynamically changing datasets accessed through web services, physical objects, persons and organisations. But not only do we see more use cases but also a proliferation of identifier systems. An analysis of PID Systems used by 1381 repositories listed in the Registry of Research Data Repositories (re3data.org, status of 14 Dec 2015) showed that many disciplinary data repositories make use of PID that are not among the systems promoted by the libraries and publishers (DOI, PURL, ARK). This indicates that a number of communities have developed their own PID Systems. This begs the question, do we need more identifier systems? What makes their value proposition more appealing than those of already existing systems? On the other hand, some of these new use cases deal with entities outside the digital domain, the original scope of application for PIDs. It is therefore necessary to critically appraise the value propositions of available PID Systems and compare these against the requirements of new use cases for PID. Undoubtedly, DOI are the most used persistent identifier in scholarly communication. It was originally designed "to link customers with publishers, facilitate electronic commerce, and enable copyright management systems." Today, the DOI system is described as providing "a technical and social infrastructure for the registration and use of persistent interoperable identifiers for use on digital networks". This example shows how value propositions can change over time. Additional value can be gained by cross

  16. Automatic Recognition of Object Names in Literature

    Science.gov (United States)

    Bonnin, C.; Lesteven, S.; Derriere, S.; Oberto, A.

    2008-08-01

    SIMBAD is a database of astronomical objects that provides (among other things) their bibliographic references in a large number of journals. Currently, these references have to be entered manually by librarians who read each paper. To cope with the increasing number of papers, CDS develops a tool to assist the librarians in their work, taking advantage of the Dictionary of Nomenclature of Celestial Objects, which keeps track of object acronyms and of their origin. The program searches for object names directly in PDF documents by comparing the words with all the formats stored in the Dictionary of Nomenclature. It also searches for variable star names based on constellation names and for a large list of usual names such as Aldebaran or the Crab. Object names found in the documents often correspond to several astronomical objects. The system retrieves all possible matches, displays them with their object type given by SIMBAD, and lets the librarian make the final choice. The bibliographic reference can then be automatically added to the object identifiers in the database. Besides, the systematic usage of the Dictionary of Nomenclature, which is updated manually, permitted to automatically check it and to detect errors and inconsistencies. Last but not least, the program collects some additional information such as the position of the object names in the document (in the title, subtitle, abstract, table, figure caption...) and their number of occurrences. In the future, this will permit to calculate the 'weight' of an object in a reference and to provide SIMBAD users with an important new information, which will help them to find the most relevant papers in the object reference list.

  17. The Role of Knowledge Objects in Participatory Ergonomics Simulation

    DEFF Research Database (Denmark)

    Andersen, Simone Nyholm

    2015-01-01

    Participatory ergonomics simulations, taking place in simulation labs, have the tendency to get detached from the surrounding design process, resulting in a knowledge gap. Few studies in the human factors and ergonomics field have applied knowledge management based object concepts in the study...... of knowledge generation and transfer over such gaps. This paper introduces the concept of knowledge object to identify the roles of objects in an exploratory case study of five participatory simulation activities. The simulations had the purpose of contributing to room design of a new Danish hospital....... The analysis showed sequences and transitions of the knowledge objects revealing the process behind the knowledge interpretations and development of the future hospital rooms. Practitioner Summary: When planning participatory simulation in a lab context, the ergonomist should consider the role of objects...

  18. Identification of a putative man-made object from an underwater crash site using CAD model superimposition.

    Science.gov (United States)

    Vincelli, Jay; Calakli, Fatih; Stone, Michael; Forrester, Graham; Mellon, Timothy; Jarrell, John

    2018-04-01

    In order to identify an object in video, a comparison with an exemplar object is typically needed. In this paper, we discuss the methodology used to identify an object detected in underwater video that was recorded during an investigation into Amelia Earhart's purported crash site. A computer aided design (CAD) model of the suspected aircraft component was created based on measurements made from orthogonally rectified images of a reference aircraft, and validated against historical photographs of the subject aircraft prior to the crash. The CAD model was then superimposed on the underwater video, and specific features on the object were geometrically compared between the CAD model and the video. This geometrical comparison was used to assess the goodness of fit between the purported object and the object identified in the underwater video. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. Scientists' Prioritization of Communication Objectives for Public Engagement.

    Directory of Open Access Journals (Sweden)

    Anthony Dudo

    Full Text Available Amid calls from scientific leaders for their colleagues to become more effective public communicators, this study examines the objectives that scientists' report drive their public engagement behaviors. We explore how scientists evaluate five specific communication objectives, which include informing the public about science, exciting the public about science, strengthening the public's trust in science, tailoring messages about science, and defending science from misinformation. We use insights from extant research, the theory of planned behavior, and procedural justice theory to identify likely predictors of scientists' views about these communication objectives. Results show that scientists most prioritize communication designed to defend science from misinformation and educate the public about science, and least prioritize communication that seeks to build trust and establish resonance with the public. Regression analyses reveal factors associated with scientists who prioritize each of the five specific communication objectives. Our findings highlight the need for communication trainers to help scientists select specific communication objectives for particular contexts and audiences.

  20. Scientists’ Prioritization of Communication Objectives for Public Engagement

    Science.gov (United States)

    2016-01-01

    Amid calls from scientific leaders for their colleagues to become more effective public communicators, this study examines the objectives that scientists’ report drive their public engagement behaviors. We explore how scientists evaluate five specific communication objectives, which include informing the public about science, exciting the public about science, strengthening the public’s trust in science, tailoring messages about science, and defending science from misinformation. We use insights from extant research, the theory of planned behavior, and procedural justice theory to identify likely predictors of scientists' views about these communication objectives. Results show that scientists most prioritize communication designed to defend science from misinformation and educate the public about science, and least prioritize communication that seeks to build trust and establish resonance with the public. Regression analyses reveal factors associated with scientists who prioritize each of the five specific communication objectives. Our findings highlight the need for communication trainers to help scientists select specific communication objectives for particular contexts and audiences. PMID:26913869

  1. Object-graphs for context-aware visual category discovery.

    Science.gov (United States)

    Lee, Yong Jae; Grauman, Kristen

    2012-02-01

    How can knowing about some categories help us to discover new ones in unlabeled images? Unsupervised visual category discovery is useful to mine for recurring objects without human supervision, but existing methods assume no prior information and thus tend to perform poorly for cluttered scenes with multiple objects. We propose to leverage knowledge about previously learned categories to enable more accurate discovery, and address challenges in estimating their familiarity in unsegmented, unlabeled images. We introduce two variants of a novel object-graph descriptor to encode the 2D and 3D spatial layout of object-level co-occurrence patterns relative to an unfamiliar region and show that by using them to model the interaction between an image’s known and unknown objects, we can better detect new visual categories. Rather than mine for all categories from scratch, our method identifies new objects while drawing on useful cues from familiar ones. We evaluate our approach on several benchmark data sets and demonstrate clear improvements in discovery over conventional purely appearance-based baselines.

  2. Data quality objectives for PUREX deactivation flushing

    International Nuclear Information System (INIS)

    Bhatia, R.K.

    1995-01-01

    This Data Quality Objection (DQO) defines the sampling and analysis requirements necessary to support the deactivation of the Plutonium-Uranium Extraction (PUREX) facility vessels that are regulated by WAC 173-303. Specifically, sampling and analysis requirements are identified for the flushing operations that are a major element of PUREX deactivation

  3. 32 CFR 552.127 - Prohibitions.

    Science.gov (United States)

    2010-07-01

    ... than 3 inches. Swords, sabers, and machetes with sharpened blades. (8) Any object which carries an... handles which convert into a sword type instrument. (b) Carrying a concealed weapon. A person commits the..., carrying, transporting, or storing decorative, ornamental, and ceremonial swords and sabers within the...

  4. Magnetic imager and method

    Science.gov (United States)

    Powell, James; Reich, Morris; Danby, Gordon

    1997-07-22

    A magnetic imager 10 includes a generator 18 for practicing a method of applying a background magnetic field over a concealed object, with the object being effective to locally perturb the background field. The imager 10 also includes a sensor 20 for measuring perturbations of the background field to detect the object. In one embodiment, the background field is applied quasi-statically. And, the magnitude or rate of change of the perturbations may be measured for determining location, size, and/or condition of the object.

  5. Radio continuum emission from young stellar objects in L1641

    International Nuclear Information System (INIS)

    Morgan, J.A.; Snell, R.L.; Strom, K.M.

    1990-01-01

    The results of a 6 and 20 cm radio continuum survey of young stellar objects in the L1641 region located south of the Orion Nebula are presented. Four are identified as low-luminosity young stellar objects in L1641 and three more as Herbig-Haro or Herbig-Haro-like objects. These objects have bolometric luminosities between 80 and 300 solar, and their 6-20 cm spectral index suggests optically thick, free-free emission. They are characterized by a rising spectrum between 2.2 and 25 microns, have no optical counterparts, and are associated with stellar wind activity. Thus, detectable radio continuum emission may be produced only by the youngest and most luminous objects in L1641. 34 refs

  6. Numerical Analysis Objects

    Science.gov (United States)

    Henderson, Michael

    1997-08-01

    The Numerical Analysis Objects project (NAO) is a project in the Mathematics Department of IBM's TJ Watson Research Center. While there are plenty of numerical tools available today, it is not an easy task to combine them into a custom application. NAO is directed at the dual problems of building applications from a set of tools, and creating those tools. There are several "reuse" projects, which focus on the problems of identifying and cataloging tools. NAO is directed at the specific context of scientific computing. Because the type of tools is restricted, problems such as tools with incompatible data structures for input and output, and dissimilar interfaces to tools which solve similar problems can be addressed. The approach we've taken is to define interfaces to those objects used in numerical analysis, such as geometries, functions and operators, and to start collecting (and building) a set of tools which use these interfaces. We have written a class library (a set of abstract classes and implementations) in C++ which demonstrates the approach. Besides the classes, the class library includes "stub" routines which allow the library to be used from C or Fortran, and an interface to a Visual Programming Language. The library has been used to build a simulator for petroleum reservoirs, using a set of tools for discretizing nonlinear differential equations that we have written, and includes "wrapped" versions of packages from the Netlib repository. Documentation can be found on the Web at "http://www.research.ibm.com/nao". I will describe the objects and their interfaces, and give examples ranging from mesh generation to solving differential equations.

  7. Identifying Foods causing Allergies/ Intolerances among Diabetic ...

    African Journals Online (AJOL)

    Objective: This study was designed to identify the foods that caused allergies / intolerances and symptoms of reaction experienced by diabetic patients attending State Specialist Hospital, Akure. Materials and Methods: Ninety-eight diabetics aged 30-80 years (30 males and 68 females) were included in the study.

  8. 3-D OBJECT RECOGNITION FROM POINT CLOUD DATA

    Directory of Open Access Journals (Sweden)

    W. Smith

    2012-09-01

    Full Text Available The market for real-time 3-D mapping includes not only traditional geospatial applications but also navigation of unmanned autonomous vehicles (UAVs. Massively parallel processes such as graphics processing unit (GPU computing make real-time 3-D object recognition and mapping achievable. Geospatial technologies such as digital photogrammetry and GIS offer advanced capabilities to produce 2-D and 3-D static maps using UAV data. The goal is to develop real-time UAV navigation through increased automation. It is challenging for a computer to identify a 3-D object such as a car, a tree or a house, yet automatic 3-D object recognition is essential to increasing the productivity of geospatial data such as 3-D city site models. In the past three decades, researchers have used radiometric properties to identify objects in digital imagery with limited success, because these properties vary considerably from image to image. Consequently, our team has developed software that recognizes certain types of 3-D objects within 3-D point clouds. Although our software is developed for modeling, simulation and visualization, it has the potential to be valuable in robotics and UAV applications. The locations and shapes of 3-D objects such as buildings and trees are easily recognizable by a human from a brief glance at a representation of a point cloud such as terrain-shaded relief. The algorithms to extract these objects have been developed and require only the point cloud and minimal human inputs such as a set of limits on building size and a request to turn on a squaring option. The algorithms use both digital surface model (DSM and digital elevation model (DEM, so software has also been developed to derive the latter from the former. The process continues through the following steps: identify and group 3-D object points into regions; separate buildings and houses from trees; trace region boundaries; regularize and simplify boundary polygons; construct complex

  9. 3-D Object Recognition from Point Cloud Data

    Science.gov (United States)

    Smith, W.; Walker, A. S.; Zhang, B.

    2011-09-01

    The market for real-time 3-D mapping includes not only traditional geospatial applications but also navigation of unmanned autonomous vehicles (UAVs). Massively parallel processes such as graphics processing unit (GPU) computing make real-time 3-D object recognition and mapping achievable. Geospatial technologies such as digital photogrammetry and GIS offer advanced capabilities to produce 2-D and 3-D static maps using UAV data. The goal is to develop real-time UAV navigation through increased automation. It is challenging for a computer to identify a 3-D object such as a car, a tree or a house, yet automatic 3-D object recognition is essential to increasing the productivity of geospatial data such as 3-D city site models. In the past three decades, researchers have used radiometric properties to identify objects in digital imagery with limited success, because these properties vary considerably from image to image. Consequently, our team has developed software that recognizes certain types of 3-D objects within 3-D point clouds. Although our software is developed for modeling, simulation and visualization, it has the potential to be valuable in robotics and UAV applications. The locations and shapes of 3-D objects such as buildings and trees are easily recognizable by a human from a brief glance at a representation of a point cloud such as terrain-shaded relief. The algorithms to extract these objects have been developed and require only the point cloud and minimal human inputs such as a set of limits on building size and a request to turn on a squaring option. The algorithms use both digital surface model (DSM) and digital elevation model (DEM), so software has also been developed to derive the latter from the former. The process continues through the following steps: identify and group 3-D object points into regions; separate buildings and houses from trees; trace region boundaries; regularize and simplify boundary polygons; construct complex roofs. Several case

  10. System and method for automated object detection in an image

    Science.gov (United States)

    Kenyon, Garrett T.; Brumby, Steven P.; George, John S.; Paiton, Dylan M.; Schultz, Peter F.

    2015-10-06

    A contour/shape detection model may use relatively simple and efficient kernels to detect target edges in an object within an image or video. A co-occurrence probability may be calculated for two or more edge features in an image or video using an object definition. Edge features may be differentiated between in response to measured contextual support, and prominent edge features may be extracted based on the measured contextual support. The object may then be identified based on the extracted prominent edge features.

  11. The subjective experience of object recognition: comparing metacognition for object detection and object categorization.

    Science.gov (United States)

    Meuwese, Julia D I; van Loon, Anouk M; Lamme, Victor A F; Fahrenfort, Johannes J

    2014-05-01

    Perceptual decisions seem to be made automatically and almost instantly. Constructing a unitary subjective conscious experience takes more time. For example, when trying to avoid a collision with a car on a foggy road you brake or steer away in a reflex, before realizing you were in a near accident. This subjective aspect of object recognition has been given little attention. We used metacognition (assessed with confidence ratings) to measure subjective experience during object detection and object categorization for degraded and masked objects, while objective performance was matched. Metacognition was equal for degraded and masked objects, but categorization led to higher metacognition than did detection. This effect turned out to be driven by a difference in metacognition for correct rejection trials, which seemed to be caused by an asymmetry of the distractor stimulus: It does not contain object-related information in the detection task, whereas it does contain such information in the categorization task. Strikingly, this asymmetry selectively impacted metacognitive ability when objective performance was matched. This finding reveals a fundamental difference in how humans reflect versus act on information: When matching the amount of information required to perform two tasks at some objective level of accuracy (acting), metacognitive ability (reflecting) is still better in tasks that rely on positive evidence (categorization) than in tasks that rely more strongly on an absence of evidence (detection).

  12. Tagging partially reconstructed objects with jet substructure

    Energy Technology Data Exchange (ETDEWEB)

    Freytsis, Marat, E-mail: freytsis@uoregon.edu [Department of Physics, Harvard University, Cambridge, MA, 02138 (United States); Volansky, Tomer [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel); Walsh, Jonathan R. [Ernest Orlando Lawrence Berkeley National Laboratory, University of California, Berkeley, CA 94720 (United States); Berkeley Center for Theoretical Physics, University of California, Berkeley, CA 94720 (United States)

    2017-06-10

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  13. Tagging partially reconstructed objects with jet substructure

    International Nuclear Information System (INIS)

    Freytsis, Marat; Volansky, Tomer; Walsh, Jonathan R.

    2017-01-01

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  14. Tagging partially reconstructed objects with jet substructure

    Science.gov (United States)

    Freytsis, Marat; Volansky, Tomer; Walsh, Jonathan R.

    2017-06-01

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  15. Tracking Non-stellar Objects on Ground and in Space

    DEFF Research Database (Denmark)

    Riis, Troels; Jørgensen, John Leif

    1999-01-01

    Many space exploration missions require a fast, early and accurate detection of a specific target. E.g. missions to asteroids, x-ray source missions or interplanetary missions.A second generation star tracker may be used for accurate detection of non-stellar objects of interest for such missions......, simply by listing all objects detected in an image not being identified as a star. Of course a lot of deep space objects will be listed too, especially if the detection threshold is set to let faint object pass through. Assuming a detection threshold of, say mv 7 (the Hipparcos catalogue is complete...... objects that do not move. For stationary objects no straightforward procedure exists to reduce the size of the list, but in the case the user has an approximate knowledge of which area to search the amount of data may be reduced substantially. In the case of a mission to an asteroid, the above described...

  16. Occlusion Handling in Videos Object Tracking: A Survey

    International Nuclear Information System (INIS)

    Lee, B Y; Liew, L H; Cheah, W S; Wang, Y C

    2014-01-01

    Object tracking in video has been an active research since for decades. This interest is motivated by numerous applications, such as surveillance, human-computer interaction, and sports event monitoring. Many challenges related to tracking objects still remain, this can arise due to abrupt object motion, changing appearance patterns of objects and the scene, non-rigid object structures and most significant are occlusion of tracked object be it object-to-object or object-to-scene occlusions. Generally, occlusion in object tracking occur under three situations: self-occlusion, inter-object occlusion by background scene structure. Self-occlusion occurs most frequently while tracking articulated objects when one part of the object occludes another. Inter-object occlusion occurs when two objects being tracked occlude each other whereas occlusion by the background occurs when a structure in the background occludes the tracked objects. Typically, tracking methods handle occlusion by modelling the object motion using linear and non-linear dynamic models. The derived models will be used to continuously predicting the object location when a tracked object is occluded until the object reappears. Example of these method are Kalman filtering and Particle filtering trackers. Researchers have also utilised other features to resolved occlusion, for example, silhouette projections, colour histogram and optical flow. We will present some result from a previously conducted experiment when tracking single object using Kalman filter, Particle filter and Mean Shift trackers under various occlusion situation in this paper. We will also review various other occlusion handling methods that involved using multiple cameras. In a nutshell, the goal of this paper is to discuss in detail the problem of occlusion in object tracking and review the state of the art occlusion handling methods, classify them into different categories, and identify new trends. Moreover, we discuss the important

  17. Occlusion Handling in Videos Object Tracking: A Survey

    Science.gov (United States)

    Lee, B. Y.; Liew, L. H.; Cheah, W. S.; Wang, Y. C.

    2014-02-01

    Object tracking in video has been an active research since for decades. This interest is motivated by numerous applications, such as surveillance, human-computer interaction, and sports event monitoring. Many challenges related to tracking objects still remain, this can arise due to abrupt object motion, changing appearance patterns of objects and the scene, non-rigid object structures and most significant are occlusion of tracked object be it object-to-object or object-to-scene occlusions. Generally, occlusion in object tracking occur under three situations: self-occlusion, inter-object occlusion by background scene structure. Self-occlusion occurs most frequently while tracking articulated objects when one part of the object occludes another. Inter-object occlusion occurs when two objects being tracked occlude each other whereas occlusion by the background occurs when a structure in the background occludes the tracked objects. Typically, tracking methods handle occlusion by modelling the object motion using linear and non-linear dynamic models. The derived models will be used to continuously predicting the object location when a tracked object is occluded until the object reappears. Example of these method are Kalman filtering and Particle filtering trackers. Researchers have also utilised other features to resolved occlusion, for example, silhouette projections, colour histogram and optical flow. We will present some result from a previously conducted experiment when tracking single object using Kalman filter, Particle filter and Mean Shift trackers under various occlusion situation in this paper. We will also review various other occlusion handling methods that involved using multiple cameras. In a nutshell, the goal of this paper is to discuss in detail the problem of occlusion in object tracking and review the state of the art occlusion handling methods, classify them into different categories, and identify new trends. Moreover, we discuss the important

  18. Disposition and Health Outcomes among Infants Born to Mothers with No Prenatal Care

    Science.gov (United States)

    Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam

    2009-01-01

    Objective: This study assessed infant disposition and health outcomes among offspring born to mothers without prenatal care, based on maternal characteristics and the reason for lack of prenatal care (i.e., denial of pregnancy, concealment of pregnancy, primary substance use, financial barriers and multiparity). Methods: A retrospective record…

  19. Social Camouflage: Interpreting Male Student Veterans' Behavior for Residence Life Professionals

    Science.gov (United States)

    Livingston, Wade G.; Scott, David A.; Havice, Pamela A.; Cawthon, Tony W.

    2012-01-01

    The term "camouflage" implies obscurity and concealment. Male student veterans who return from the military often employ a social camouflage; though some may reveal and discuss their military experience, their overriding objective is to blend in, have a "normal" college experience, and graduate. This creates challenges for housing professionals…

  20. Is it bad to have secrets? Cognitive preoccupation as a toxic element of secrecy

    NARCIS (Netherlands)

    Maas, J.; Wismeijer, A.A.J.; Assen, M.A.L.M. van; Aquarius, A.E.A.M.

    2012-01-01

    This ex post facto study examined the effect of secrecy on well-being in a sample of 287 HIV-positive individuals, using both self-report data and objective immune parameters. The effects on well-being of three components of secrecy were studied; self-concealment, possession of a secret, and

  1. The NOAA Dataset Identifier Project

    Science.gov (United States)

    de la Beaujardiere, J.; Mccullough, H.; Casey, K. S.

    2013-12-01

    The US National Oceanic and Atmospheric Administration (NOAA) initiated a project in 2013 to assign persistent identifiers to datasets archived at NOAA and to create informational landing pages about those datasets. The goals of this project are to enable the citation of datasets used in products and results in order to help provide credit to data producers, to support traceability and reproducibility, and to enable tracking of data usage and impact. A secondary goal is to encourage the submission of datasets for long-term preservation, because only archived datasets will be eligible for a NOAA-issued identifier. A team was formed with representatives from the National Geophysical, Oceanographic, and Climatic Data Centers (NGDC, NODC, NCDC) to resolve questions including which identifier scheme to use (answer: Digital Object Identifier - DOI), whether or not to embed semantics in identifiers (no), the level of granularity at which to assign identifiers (as coarsely as reasonable), how to handle ongoing time-series data (do not break into chunks), creation mechanism for the landing page (stylesheet from formal metadata record preferred), and others. Decisions made and implementation experience gained will inform the writing of a Data Citation Procedural Directive to be issued by the Environmental Data Management Committee in 2014. Several identifiers have been issued as of July 2013, with more on the way. NOAA is now reporting the number as a metric to federal Open Government initiatives. This paper will provide further details and status of the project.

  2. Objectivity

    CERN Document Server

    Daston, Lorraine

    2010-01-01

    Objectivity has a history, and it is full of surprises. In Objectivity, Lorraine Daston and Peter Galison chart the emergence of objectivity in the mid-nineteenth-century sciences--and show how the concept differs from its alternatives, truth-to-nature and trained judgment. This is a story of lofty epistemic ideals fused with workaday practices in the making of scientific images. From the eighteenth through the early twenty-first centuries, the images that reveal the deepest commitments of the empirical sciences--from anatomy to crystallography--are those featured in scientific atlases, the compendia that teach practitioners what is worth looking at and how to look at it. Galison and Daston use atlas images to uncover a hidden history of scientific objectivity and its rivals. Whether an atlas maker idealizes an image to capture the essentials in the name of truth-to-nature or refuses to erase even the most incidental detail in the name of objectivity or highlights patterns in the name of trained judgment is a...

  3. Object manipulation facilitates kind-based object individuation of shape-similar objects

    DEFF Research Database (Denmark)

    Kingo, Osman Skjold; Krøjgaard, Peter

    2011-01-01

    Five experiments investigated the importance of shape and object manipulation when 12-month-olds were given the task of individuating objects representing exemplars of kinds in an event-mapping design. In Experiments 1 and 2, results of the study from Xu, Carey, and Quint (2004, Experiment 4) wer...

  4. Object-based warping: an illusory distortion of space within objects.

    Science.gov (United States)

    Vickery, Timothy J; Chun, Marvin M

    2010-12-01

    Visual objects are high-level primitives that are fundamental to numerous perceptual functions, such as guidance of attention. We report that objects warp visual perception of space in such a way that spatial distances within objects appear to be larger than spatial distances in ground regions. When two dots were placed inside a rectangular object, they appeared farther apart from one another than two dots with identical spacing outside of the object. To investigate whether this effect was object based, we measured the distortion while manipulating the structure surrounding the dots. Object displays were constructed with a single object, multiple objects, a partially occluded object, and an illusory object. Nonobject displays were constructed to be comparable to object displays in low-level visual attributes. In all cases, the object displays resulted in a more powerful distortion of spatial perception than comparable non-object-based displays. These results suggest that perception of space within objects is warped.

  5. Vicarious Learning from Human Models in Monkeys

    OpenAIRE

    Falcone, Rossella; Brunamonti, Emiliano; Genovesio, Aldo

    2012-01-01

    We examined whether monkeys can learn by observing a human model, through vicarious learning. Two monkeys observed a human model demonstrating an object-reward association and consuming food found underneath an object. The monkeys observed human models as they solved more than 30 learning problems. For each problem, the human models made a choice between two objects, one of which concealed a piece of apple. In the test phase afterwards, the monkeys made a choice of their own. Learning was app...

  6. Mobile Techniques for Rapid Detection of Concealed Nuclear Material

    International Nuclear Information System (INIS)

    Rosenstock, W.; Koeble, T.; Risse, M.; Berky, W.

    2015-01-01

    To prevent the diversion of nuclear material as well as illicit production, transport and use of nuclear material we investigated in mobile techniques to detect and identify such material in the field as early as possible. For that purpose we use a highly sensitive gamma measurement system installed in a car. It consists of two large volume plastic scintillators, one on each side of the car, each scintillator with 12 l active volume, and two extreme sensitive high purity Germanium detectors with 57 cm 2 crystal diameter, cooled electrically. The measured data are processed immediately with integrated, appropriate analysis software for direct assessment including material identification and classification within seconds. The software for the plastic scintillators can differentiate between natural and artificial radioactivity, thus giving a clear hint for the existence of unexpected material. In addition, the system is equipped with highly sensitive neutron detectors. We have performed numerous measurements by passing different radioactive and nuclear sources in relatively large distances with this measurement car. Even shielded as well as masked material was detected and identified in most of the cases. We will report on the measurements performed in the field (on an exercise area) and in the lab and discuss the capabilities of the system, especially with respect to timeliness and identification. This system will improve the nuclear verification capabilities also. (author)

  7. New Herbig-Haro objects in star-forming regions

    Science.gov (United States)

    Reipurth, BO; Graham, J. A.

    1988-01-01

    A list of 25 new Herbig-Haro objects, HH 58 to HH 82, in the Orion molecular clouds and in southern molecular cloud complexes has been compiled. CCD images in the S II 6717, 6731 forbidden lines are presented for the objects, together with a few spectra and some IR observations. The individual objects and, when identified, their energy sources are discussed. HH 65 is located in the red lobe of the bipolar outflow associated with the highly variable reflection nebula Re 50. HH 67 is a 22-arcsec long sinusoidal jet. HH 68/69 consists of a long, linear chain of four HH knots. HH 72 emerges from a 120-solar luminosity IRAS source embedded in a Bok globule. HH 79 is the first HH object discovered in the Ophiuchus clouds. HH 80/81 in Sagittarius are among the brightest HH objects known, have complex velocities, high excitation conditions and emerge from a 6000-solar luminosity young B-star. HH 82 is associated with the bright variable star S Coronae Australis.

  8. YOUNG STELLAR OBJECTS IN THE MASSIVE STAR-FORMING REGION W49

    Energy Technology Data Exchange (ETDEWEB)

    Saral, G.; Hora, J. L.; Willis, S. E. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Koenig, X. P. [Yale University, Department of Astronomy, 208101, New Haven, CT 06520-8101 (United States); Gutermuth, R. A. [University of Massachusetts, Department of Astronomy, Amherst, MA 01003 (United States); Saygac, A. T., E-mail: gsaral@cfa.harvard.edu [Istanbul University, Faculty of Science, Astronomy and Space Sciences Department, Istanbul-Turkey (Turkey)

    2015-11-01

    We present the initial results of our investigation of the star-forming complex W49, one of the youngest and most luminous massive star-forming regions in our Galaxy. We used Spitzer/Infrared Array Camera (IRAC) data to investigate massive star formation with the primary objective of locating a representative set of protostars and the clusters of young stars that are forming around them. We present our source catalog with the mosaics from the IRAC data. In this study we used a combination of IRAC, MIPS, Two Micron All Sky Survey, and UKIRT Deep Infrared Sky Survey (UKIDSS) data to identify and classify the young stellar objects (YSOs). We identified 232 Class 0/I YSOs, 907 Class II YSOs, and 74 transition disk candidate objects using color–color and color–magnitude diagrams. In addition, to understand the evolution of star formation in W49, we analyzed the distribution of YSOs in the region to identify clusters using a minimal spanning tree method. The fraction of YSOs that belong to clusters with ≥7 members is found to be 52% for a cutoff distance of 96″, and the ratio of Class II/I objects is 2.1. We compared the W49 region to the G305 and G333 star-forming regions and concluded that W49 has the richest population, with seven subclusters of YSOs.

  9. Patterns of muscle activity underlying object-specific grasp by the macaque monkey.

    Science.gov (United States)

    Brochier, T; Spinks, R L; Umilta, M A; Lemon, R N

    2004-09-01

    During object grasp, a coordinated activation of distal muscles is required to shape the hand in relation to the physical properties of the object. Despite the fundamental importance of the grasping action, little is known of the muscular activation patterns that allow objects of different sizes and shapes to be grasped. In a study of two adult macaque monkeys, we investigated whether we could distinguish between EMG activation patterns associated with grasp of 12 differently shaped objects, chosen to evoke a wide range of grasping postures. Each object was mounted on a horizontal shuttle held by a weak spring (load force 1-2 N). Objects were located in separate sectors of a "carousel," and inter-trial rotation of the carousel allowed sequential presentation of the objects in pseudorandom order. EMG activity from 10 to 12 digit, hand, and arm muscles was recorded using chronically implanted electrodes. We show that the grasp of different objects was characterized by complex but distinctive patterns of EMG activation. Cluster analysis shows that these object-related EMG patterns were specific and consistent enough to identify the object unequivocally from the EMG recordings alone. EMG-based object identification required a minimum of six EMGs from simultaneously recorded muscles. EMG patterns were consistent across recording sessions in a given monkey but showed some differences between animals. These results identify the specific patterns of activity required to achieve distinct hand postures for grasping, and they open the way to our understanding of how these patterns are generated by the central motor network.

  10. Meeting electrification's social objectives in South Africa, and implications for developing countries

    International Nuclear Information System (INIS)

    Gaunt, C.T.

    2005-01-01

    Electrification programmes and projects are usually planned and evaluated on the basis of their economic (financial) and socio-economic performance. It is not usually recognised that electrification is often carried out for social objectives of poverty alleviation and political effect. Examination of electrification in South Africa reveals clearly that initial electrification was to meet economic objectives, later socio-economic objectives were adopted, and recently the objectives were social. Social electrification, particularly rural electrification, is not viable according to usual assessment methods, which are frequently distorted to provide the justification for a project to proceed. The technology of network electrification changed to meet the constraints, challenging usual perceptions about the relative costs of urban and rural electrification and the potential for photovoltaic electrification. Adopting a specification for social electrification allows suitable tariffs for electrification to be identified, indicates how capital investment decisions might be modified for social electrification, and identifies implications for electricity industry restructuring. A better understanding of electrification's social objectives has implications for projects and programmes in other developing countries

  11. Object extraction in photogrammetric computer vision

    Science.gov (United States)

    Mayer, Helmut

    This paper discusses state and promising directions of automated object extraction in photogrammetric computer vision considering also practical aspects arising for digital photogrammetric workstations (DPW). A review of the state of the art shows that there are only few practically successful systems on the market. Therefore, important issues for a practical success of automated object extraction are identified. A sound and most important powerful theoretical background is the basis. Here, we particularly point to statistical modeling. Testing makes clear which of the approaches are suited best and how useful they are for praxis. A key for commercial success of a practical system is efficient user interaction. As the means for data acquisition are changing, new promising application areas such as extremely detailed three-dimensional (3D) urban models for virtual television or mission rehearsal evolve.

  12. Linking objects in the process of mourning for sons disappeared in war: Croatia 2001.

    Science.gov (United States)

    Jurcević, Slavica; Urlić, Ivan

    2002-04-01

    Mothers use linking object to externalize the complex aspects of their relationship to the loss of their child. We analyzed the linking objects that mothers kept in memory of their sons who disappeared in the 1991-1995 war in Croatia or whose remains were uncovered and identified long time after they had gone missing. The case study of disturbed mourning included 26 mothers of Croatian soldiers from Croatian Osijek-Baranja County who went missing in war or whose remains were recovered and identified long after they had gone missing. The mothers were selected independently by the president of the Association of Families of Missing and Detained Croatian Soldiers and agreed to participate in the study in 2001. They were interviewed in their homes, their testimonies were recorded, and photographs of the linking objects taken. Linking objects were classified according to the Volkan's four-group classification. Out of four Volkan's groups of linking objects, we identified the objects belonging to the first three. Those were 1) objects that had been worn by the deceased (clothes, wrist-watch, ring, or glasses), (6/26); 2) objects that could be viewed in the psychoanalytic sense as an extension of the body of the disappeared or dead person, such as a camera (4/26); and 3) objects with realistic or symbolic resemblance to the deceased, usually a photograph (8/26). None of the examined objects belonged to the fourth Volkan's group (objects at hand when the news of the death came or objects present at the funeral, things that could be considered last-minute objects, ie, related to the moment when the deceased was last seen alive). However, 8/26 objects formed a new hitherto undescribed group. Mothers used such objects to create a memorial shrine to their sons. A photograph of the missing person or person whose remains were identified long after he had gone missing occupied a central place at the shrine, and was surrounded by other symbols of the Catholic iconography (Virgin

  13. Emerging Fabric of Science: Persistent Identifiers and Knowledge Networks

    Science.gov (United States)

    Hugo, W.

    2017-12-01

    There is an increasing emphasis on the use of persistent identifiers in the description of scientific activity, whether this is done to cite scholarly publications and research output, reliably identify role players such as funders and researchers, or to provide long-lasting references to controlled vocabulary. The ICSU World Data System has been promoting the establishment of a "Knowledge Network" to describe research activity, realising that parts of the network will be established as a federated `system', based on linkages between registries of persistent identifiers. In addition, there is a growing focus on not only the relationship between these major role players and associated digital objects, but also on the processes of science: provenance, reproducibility, and re-usability being significant topics of discussion. The paper will focus on description of the `Fabric of Science' from the perspectives of both structure and processes, review the state of implementation of real services and infrastructure in support of it. A case is made for inclusion of persistent identifiers into the mainstream activities of scientists and data infrastructure managers, and for the development of services, such as Scholix, to make better use of the relationships between digital objects and major role players. A proposal is made for the adoption of a federated system of services that are based on a hybrid graph-object framework similar to Scholix for recording the activity of scientific research. Finally, links to related ideas are explored: novel ways of representing of knowledge (such as Nanopublications) and the possibility that the publication paradigm currently in use may have to be amended.

  14. Modulation of neural activity during object naming: Effects of time and practice

    NARCIS (Netherlands)

    Turennout, M.I. van; Bielamowicz, L.; Martin, A.

    2003-01-01

    Repeated exposure to objects improves our ability to identify and name them, even after a long delay. Previous brain imaging studies have demonstrated that this experience-related facilitation of object naming is associated with neural changes in distinct brain regions. We used event-related

  15. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  16. DETERMINATION OF OBJECTIVES FOR URBAN FREIGHT POLICY

    Directory of Open Access Journals (Sweden)

    Daniel Kaszubowski

    2014-12-01

    Full Text Available Background: Decisions regarding strategic planning of urban freight transport very often are based on superficial assumptions inadequately reflecting the actual character of encountered challenges. The trend may be observed to adapt isolated solutions without supporting measures and verification of expected outcomes. Selected urban freight solutions have a significant potential to alleviate transport related problems, but they require unorthodox approach beyond standard traffic planning and road management. City's current planning experience must be taken into account to plan an optimized sequence of actions. Method: Due to complexity of the problem and specific decision making factors the analytic network process ANP was selected to determine relevant objective of the urban freight policy. Gdynia was selected as the subject for modeling with a review of the current freight planning practice as a first step. Then, classification of policy objective and their prerequisites were identified supported with descriptive feasibility assessment. This allowed for a development of the ANP decision-making model. Results: Considered objectives for urban freight policy were identified were optimization, reduction and transfer. After verifying relevant decision factors optimization was selected as the most feasible option for Gdynia. Other alternatives were rated around four times lower with a slight prevalence of reduction over transfer. Such ranking reflects current planning practice and availability of transferable experiences. Despite the indicative results, it must be stressed that urban freight planning should be based on the long term methodical approach not to exclude any emerging possibilities. 

  17. The Influence of Sexual Orientation and Masculinity on Young Men's Tobacco Smoking

    Science.gov (United States)

    Pachankis, John E.; Westmaas, J. Lee; Dougherty, Lea R.

    2011-01-01

    Objective: The prevalence of smoking among gay men is considerably higher than in the general population. To investigate possible causes of this health risk disparity, this study used multilevel modeling of daily diary data to examine the temporal relationship between smoking and both sexual orientation concealment and masculine gender role…

  18. Exploring Variation in Glycemic Control Across and Within Eight High-Income Countries

    DEFF Research Database (Denmark)

    Charalampopoulos, Dimitrios; Hermann, Julia M; Svensson, Jannet

    2018-01-01

    OBJECTIVE: International studies on childhood type 1 diabetes (T1D) have focused on whole-country mean HbA1c levels, thereby concealing potential variations within countries. We aimed to explore the variations in HbA1c across and within eight high-income countries to best inform international ben...

  19. A review of visual perception mechanisms that regulate rapid adaptive camouflage in cuttlefish.

    Science.gov (United States)

    Chiao, Chuan-Chin; Chubb, Charles; Hanlon, Roger T

    2015-09-01

    We review recent research on the visual mechanisms of rapid adaptive camouflage in cuttlefish. These neurophysiologically complex marine invertebrates can camouflage themselves against almost any background, yet their ability to quickly (0.5-2 s) alter their body patterns on different visual backgrounds poses a vexing challenge: how to pick the correct body pattern amongst their repertoire. The ability of cuttlefish to change appropriately requires a visual system that can rapidly assess complex visual scenes and produce the motor responses-the neurally controlled body patterns-that achieve camouflage. Using specifically designed visual backgrounds and assessing the corresponding body patterns quantitatively, we and others have uncovered several aspects of scene variation that are important in regulating cuttlefish patterning responses. These include spatial scale of background pattern, background intensity, background contrast, object edge properties, object contrast polarity, object depth, and the presence of 3D objects. Moreover, arm postures and skin papillae are also regulated visually for additional aspects of concealment. By integrating these visual cues, cuttlefish are able to rapidly select appropriate body patterns for concealment throughout diverse natural environments. This sensorimotor approach of studying cuttlefish camouflage thus provides unique insights into the mechanisms of visual perception in an invertebrate image-forming eye.

  20. Objective assessment of attention in delirium: a narrative review.

    Science.gov (United States)

    Tieges, Zoë; Brown, Laura J E; MacLullich, Alasdair M J

    2014-12-01

    Inattention is a core feature of delirium, and valid assessment of attention is central to diagnosis. Methods of measuring attention in delirium can be divided into two broad categories: (i) objective neuropsychological testing; and (ii) subjective grading of behaviour during interview and clinical examination. Here, we review and critically evaluate studies of objective neuropsychological testing of attention in delirium. We examine the implications of these studies for delirium detection and monitoring in clinical practice and research, and how these studies inform understanding of the nature of attentional deficits in delirium. Searches of MEDLINE and ISI Web of Knowledge databases were performed to identify studies in which objective tests of attention had been administered to patients with delirium, who had been diagnosed using DSM or ICD criteria. Sixteen publications were identified. The attention tests administered in these studies were grouped into the following categories: measures of attention span, vigilance tests, other pen-and-paper tests (e.g. Trail Making Test) and computerised tests of speeded reaction, vigilance and sustained attention. Patients with delirium showed deficits on all tasks, although most tasks were not considered pure measures of attention. Five papers provided data on differential diagnosis from dementia. Cancellation tests, spatial span tests and computerised tests of sustained attention discriminated delirium from dementia. Five studies presented reliability or validity statistics. The existing evidence base on objective assessment of attention in delirium is small. Objective testing of attention is underdeveloped but shows considerable promise in clinical practice and research. Copyright © 2014 John Wiley & Sons, Ltd.

  1. Dual-band infrared capabilities for imaging buried object sites

    Energy Technology Data Exchange (ETDEWEB)

    Del Grande, N.K.; Durbin, P.F.; Gorvad, M.R.; Perkins, D.E.; Clark, G.A.; Hernandez, J.E.; Sherwood, R.J.

    1993-04-02

    We discuss dual-band infrared (DBIR) capabilities for imaging buried object sizes. We identify physical features affecting thermal contrast needed to distinguish buried object sites from undisturbed sites or surface clutter. Apart from atmospheric transmission and system performance, these features include: object size, shape, and burial depth; ambient soil, disturbed soil and object site thermal diffusivity differences; surface temperature, emissivity, plant-cover, slope, albedo and roughness variations; weather conditions and measurement times. We use good instrumentation to measure the time-varying temperature differences between buried object sites and undisturbed soil sites. We compare near surface soil temperature differences with radiometric infrared (IR) surface temperature differences recorded at 4.7 {plus_minus} 0.4 {mu}m and at 10.6 {plus_minus} 1.0 {mu}m. By producing selective DBIR image ratio maps, we distinguish temperature-difference patterns from surface emissivity effects. We discuss temperature differences between buried object sites, filled hole site (without buried objects), cleared (undisturbed) soil sites, and grass-covered sites (with and without different types of surface clutter). We compare temperature, emissivity-ratio, visible and near-IR reflectance signatures of surface objects, leafy plants and sod. We discuss the physical aspects of environmental, surface and buried target features affecting interpretation of buried targets, surface objects and natural backgrounds.

  2. Los Alamos Scientific Laboratory electronic vehicle identification system

    International Nuclear Information System (INIS)

    Landt, J.A.; Bobbett, R.E.; Koelle, A.R.; Salazar, P.H.

    1980-01-01

    A three-digit electronic identification system is described. Digits may be decimal (1000 combinations) or hexidecimal (8192 combinations). Battery-powered transponders are interrogated with a lower-power (1 W) radio signal. Line-of-sight interrogations up to 33 m (100 ft) are possible. Successful interrogations up to 7 m (20 ft) are possible for concealed transponders (that is, in the engine compartment). Vehicles moving at high rates of speed can be interrogated. This system provides data in a computer-compatible RS232 format. The system can be used for other applications with little or no modification. A similar system is in present use for identification and temperature monitoring of livestock. No unforeseen problems exist for expanding the coding scheme to identify larger numbers of objects

  3. Constrain the SED Type of Unidentified Fermi Objects

    Directory of Open Access Journals (Sweden)

    An-Li Tsai

    2013-09-01

    Full Text Available 2FGL J1823.8+4312 and 2FGL J1304.1-2415 are two unidentified Fermi objects which are associated with cluster of galaxies. In order to exam the possibility of cluster of galaxies as gamma-ray emitters, we search for counterpart of these two unidentified Fermi objects in other wavebands. However, we find other candidate to be more likely the counterpart of the unidentified Fermi object for both sources. We compare their light curves and SEDs in order to identify their source types. However, data at millimeter and sub-millimeter wavebands, which is important for us to constrain the SED at synchrotron peak, is lacking of measurement. Therefore, we proposed to SMA observation for these two sources. We have got data and are doing further analysis.

  4. Board characteristics, governance objectives, and hospital performance

    DEFF Research Database (Denmark)

    Thiel, Andrea; Winter, Vera; Büchner, Vera Antonia

    2018-01-01

    membership relates to board characteristics and financial performance. METHODOLOGY: Using factor analysis, we identify latent classes of governance objectives and use hierarchical cluster analysis to detect distinct clusters with varying emphasis on the classes. We then use multinomial regression to explore...... the associations between cluster membership and board characteristics (size, gender diversity, and occupational diversity) and examine the associations between clusters and financial performance using OLS regression. RESULTS: Classes of objectives reflecting three governance theories-agency theory, stewardship...... and hospital financial performance, with two of three groups performing significantly better than the reference group. CONCLUSION: High performance in hospitals can be the result of governance logics, which, compared to simple board characteristics, are associated with better financial outcomes. PRACTICE...

  5. Early object relations into new objects.

    Science.gov (United States)

    Downey, T W

    2001-01-01

    dramatic change that has hitherto been poorly identified and conceptualized. In child analysis, play is the medium for picking the lock of both arrested maturation and stultified development. Realizing that should permit the child analyst to engage more freely with the child in their own style of play without being overly concerned about the presence or absence of relational dynamic material. Non-dynamic play may not usually be defensive play, though it has often been misinterpreted as such. It may represent activity supporting renewed maturation--practice play in the service of memory, motility, or small or large motor function rather than in the service of the playful, repetitive externalization of threatening introjects. Dynamic play highlights the stagnant or emerging functions of the ego with regard to defense and affect management, which may then be interpreted using the play as key or using words as key to unlock the troubled relationship that is being dramatized. The analyst remains in a non-defensive stance, assigned by the analysand as audience or benign participant. Similarly, in adult analyses some individuals come pre-programmed not so much for interpretation as to discover the analyst as new object. They are in search of near psychobiological maturational closure on an object, already constituted in fantasy, that is respectful, attentive, objective, interested, and sometimes enlightening in their attempts at analytic understanding and developmental homeostasis. This phenomenon is akin to love at first sight, though without the flagrant libidinal romantic element. It occurs as the analytic narrative unfolds and the patient comes to a new sense of self, often around some developmental role or mix of roles, such as spouse, lover, mother, student, sibling, or worker. The point is that playing on the black and white keys of development and maturation leads to the appreciation of a psychoanalytic instrument that is at once more complex and yet easier to get music

  6. Initial building investigations at Aberdeen Proving Ground, Maryland: Objectives and methodology

    Energy Technology Data Exchange (ETDEWEB)

    Brubaker, K.L.; Dougherty, J.M.; McGinnis, L.D.

    1994-12-01

    As part of an environmental-contamination source-definition program at Aberdeen Proving Ground, detailed internal and external inspections of 23 potentially contaminated buildings are being conducted to describe and characterize the state of each building as it currently exists and to identify areas potentially contaminated with toxic or other hazardous substances. In addition, a detailed geophysical investigation is being conducted in the vicinity of each target building to locate and identify subsurface structures, associated with former building operations, that are potential sources of contamination. This report describes the objectives of the initial building inspections, including the geophysical investigations, and discusses the methodology that has been developed to achieve these objectives.

  7. Detection of foreign objects using bobbin probe eddy current test

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Hee Sung; Kweon, Young Ho; Lee, Dong Ha; Shin, Wook Jo; Yim, Chan Ki [ECT Group, Sae-An Engineering Corporation, Seoul (Korea, Republic of)

    2016-08-15

    Residual foreign objects at the secondary side (top of the tubesheet and tube support plates) of a steam generator are likely to cause a leak by causing wear in the tube. The extent of wear is significantly affected by the material, shape, and size of the foreign object, and the corrosion properties of the tube. The presence of foreign objects at the top of the tubesheet and tube support plates has been identified using remote visual inspection methods such as the foreign object search and retrieval and eddy current test (ECT). The detection of the residual foreign object at the secondary side of a steam generator has limitations that depend on the material properties and the condition of contact with the tube. In this study, which is vertical and horizontal from the upper tubesheet, the corresponding bobbin ECT signals were collected and analyzed to measure its ability to detect foreign objects.

  8. Disclosing and Concealing

    DEFF Research Database (Denmark)

    Flyverbom, Mikkel

    2016-01-01

    The ubiquity of digital technologies and the datafication of many domains of social liferaise important questions about governance. In the emergent field of internet governancestudies, most work has explored novel governance arrangements, institutional developmentsand the effects of interactions...... of the argument is that there is anintimate relationship between seeing, knowing and governing, and that digitalisation anddatafication processes fundamentally shape how we make things visible or invisible, knowableor unknowable and governable or ungovernable. Having articulated this conceptual argument...

  9. Reveal or conceal?

    DEFF Research Database (Denmark)

    Giones, Ferran; Bjørnåli, Ekaterina; Billström, Anders

    2017-01-01

    with customers and other stakeholders. Nevertheless, we know little about how legitimacy is built and how new entrants build legitimacy in complex technology-intensive industries. In this research we explore how Norwegian cleantech firms use signaling and strategic actions to build legitimacy. We analyze five...... cases while investigating their actions in different phases of the venture’s evolution. The results suggest that, contrary to signaling theory expectations, young clean-tech firms do not always build legitimacy by conveying information on their strengths. Instead, we observe that they use signaling...... strategies to address the specific concerns of different stakeholders. This is very much contingent upon the evolutionary stage of the venture and the firm’s current weaknesses....

  10. Modeling recall memory for emotional objects in Alzheimer's disease.

    Science.gov (United States)

    Sundstrøm, Martin

    2011-07-01

    To examine whether emotional memory (EM) of objects with self-reference in Alzheimer's disease (AD) can be modeled with binomial logistic regression in a free recall and an object recognition test to predict EM enhancement. Twenty patients with AD and twenty healthy controls were studied. Six objects (three presented as gifts) were shown to each participant. Ten minutes later, a free recall and a recognition test were applied. The recognition test had target-objects mixed with six similar distracter objects. Participants were asked to name any object in the recall test and identify each object in the recognition test as known or unknown. The total of gift objects recalled in AD patients (41.6%) was larger than neutral objects (13.3%) and a significant EM recall effect for gifts was found (Wilcoxon: p recall and recognition but showed no EM enhancement due to a ceiling effect. A logistic regression showed that likelihood of emotional recall memory can be modeled as a function of MMSE score (p Recall memory was enhanced in AD patients for emotional objects indicating that EM in mild to moderate AD although impaired can be provoked with strong emotional load. The logistic regression model suggests that EM declines with the progression of AD rather than disrupts and may be a useful tool for evaluating magnitude of emotional load.

  11. Five aspects of maximizing objectivity from perceptual evaluations of loudspeakers

    DEFF Research Database (Denmark)

    Volk, Christer Peter; Bech, Søren; Pedersen, Torben H.

    2015-01-01

    of data from the listening evaluations. This paper addresses the following subset of aspects for increasing the objectivity of data from listening tests: The choice of perceptual attributes, relevance of perceptual attributes, choice of loudness equalisation strategy, optimum listening room specifications......A literature study was conducted focusing on maximizing objectivity of results from listening evaluations aimed at establishing the relationship between physical and perceptual measurements of loudspeakers. The purpose of the study was to identify and examine factors influencing the objectivity......, as well as loudspeaker listening in-situ vs. listening to recordings of loudspeakers over headphones....

  12. Detecting objects in radiographs for homeland security

    Science.gov (United States)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  13. Application of deep geophysical data to the discussion on the relationship between deep faults, concealed over thrust napped structure and uranium metallogenesis in central-southern Jiangxi

    International Nuclear Information System (INIS)

    Jiang Jinyuan; Qi Liang

    1999-01-01

    Based on the comparative analysis and study on 10 profiles of telluric electromagnetic sounding (MT) and regional gravimetric, magnetic data and Moho surface, the deep geological-tectonic pattern of the central-southern Jiangxi is discussed. It is suggested that: the studied region belongs to the Soyth-China block; in the area along Pingxiang-Guangfeng, at the border with Yangzi block an approximately EW-trending mantle concave-mantle slope zone occurs; the NNE-NE trending mantle uplift-mantle slope-mantle concave structure is developed within the South-China block; deep fault zones are represented by variation sites of Moho surface. Then, a series of deep structures is inferred including the approximately EW-striking Pingxian-Guangfeng deep fault zone, the NNE-striking Fuzhou-Anyuan deep fault zone, the NNE-trending Fengcheng-Dayu deep fault zone, as well as the NE-striking Yudu-Ningdu over thrust napped and sliding thrust structural systems, the approximately E W-trending Le'an-Nancheng over thrust napped structural systems etc. According to the distribution of known uranium mineralizations it is confirmed that close time-space relation exists between the uranium metallogenesis and variations of Moho surface, and over thrust napped structures, providing clues for locating concealed uranium deposits

  14. Channels as Objects in Concurrent Object-Oriented Programming

    Directory of Open Access Journals (Sweden)

    Joana Campos

    2011-10-01

    Full Text Available There is often a sort of a protocol associated to each class, stating when and how certain methods should be called. Given that this protocol is, if at all, described in the documentation accompanying the class, current mainstream object-oriented languages cannot provide for the verification of client code adherence against the sought class behaviour. We have defined a class-based concurrent object-oriented language that formalises such protocols in the form of usage types. Usage types are attached to class definitions, allowing for the specification of (1 the available methods, (2 the tests clients must perform on the result of methods, and (3 the object status - linear or shared - all of which depend on the object's state. Our work extends the recent approach on modular session types by eliminating channel operations, and defining the method call as the single communication primitive in both sequential and concurrent settings. In contrast to previous works, we define a single category for objects, instead of distinct categories for linear and for shared objects, and let linear objects evolve into shared ones. We introduce a standard sync qualifier to prevent thread interference in certain operations on shared objects. We formalise the language syntax, the operational semantics, and a type system that enforces by static typing that methods are called only when available, and by a single client if so specified in the usage type. We illustrate the language via a complete example.

  15. Fuzzy-Rule-Based Object Identification Methodology for NAVI System

    Directory of Open Access Journals (Sweden)

    Yaacob Sazali

    2005-01-01

    Full Text Available We present an object identification methodology applied in a navigation assistance for visually impaired (NAVI system. The NAVI has a single board processing system (SBPS, a digital video camera mounted headgear, and a pair of stereo earphones. The captured image from the camera is processed by the SBPS to generate a specially structured stereo sound suitable for vision impaired people in understanding the presence of objects/obstacles in front of them. The image processing stage is designed to identify the objects in the captured image. Edge detection and edge-linking procedures are applied in the processing of image. A concept of object preference is included in the image processing scheme and this concept is realized using a fuzzy-rule base. The blind users are trained with the stereo sound produced by NAVI for achieving a collision-free autonomous navigation.

  16. Fuzzy-Rule-Based Object Identification Methodology for NAVI System

    Science.gov (United States)

    Nagarajan, R.; Sainarayanan, G.; Yaacob, Sazali; Porle, Rosalyn R.

    2005-12-01

    We present an object identification methodology applied in a navigation assistance for visually impaired (NAVI) system. The NAVI has a single board processing system (SBPS), a digital video camera mounted headgear, and a pair of stereo earphones. The captured image from the camera is processed by the SBPS to generate a specially structured stereo sound suitable for vision impaired people in understanding the presence of objects/obstacles in front of them. The image processing stage is designed to identify the objects in the captured image. Edge detection and edge-linking procedures are applied in the processing of image. A concept of object preference is included in the image processing scheme and this concept is realized using a fuzzy-rule base. The blind users are trained with the stereo sound produced by NAVI for achieving a collision-free autonomous navigation.

  17. Learning Faster by Discovering and Exploiting Object Similarities

    Directory of Open Access Journals (Sweden)

    Tadej Janež

    2013-03-01

    Full Text Available In this paper we explore the question: “Is it possible to speed up the learning process of an autonomous agent by performing experiments in a more complex environment (i.e., an environment with a greater number of different objects?” To this end, we use a simple robotic domain, where the robot has to learn a qualitative model predicting the change in the robot's distance to an object. To quantify the environment's complexity, we defined cardinal complexity as the number of objects in the robot's world, and behavioural complexity as the number of objects' distinct behaviours. We propose Error reduction merging (ERM, a new learning method that automatically discovers similarities in the structure of the agent's environment. ERM identifies different types of objects solely from the data measured and merges the observations of objects that behave in the same or similar way in order to speed up the agent's learning. We performed a series of experiments in worlds of increasing complexity. The results in our simple domain indicate that ERM was capable of discovering structural similarities in the data which indeed made the learning faster, clearly superior to conventional learning. This observed trend occurred with various machine learning algorithms used inside the ERM method.

  18. Identification of the Area for Proper Integration of Three Current Storage Objects into One Complex Logistics Point

    Directory of Open Access Journals (Sweden)

    Li Chenguang

    2017-05-01

    Full Text Available The paper presents an option to identify the suitable area for locating the specific storage object in order to integrate three current storage objects into one complex logistics point. Initial chapters of the paper are focused on overview of theoretical terms related to the storage objects, their activities, services, parameters as well as their location and allocation. Other parts of this paper outline specific methods regarding the issue of storage objects location. Its main part describes individual steps for identifying the suitable storage object location in the certain area using the specific method.

  19. Distributed design approach in persistent identifiers systems

    Science.gov (United States)

    Golodoniuc, Pavel; Car, Nicholas; Klump, Jens

    2017-04-01

    The need to identify both digital and physical objects is ubiquitous in our society. Past and present persistent identifier (PID) systems, of which there is a great variety in terms of technical and social implementations, have evolved with the advent of the Internet, which has allowed for globally unique and globally resolvable identifiers. PID systems have catered for identifier uniqueness, integrity, persistence, and trustworthiness, regardless of the identifier's application domain, the scope of which has expanded significantly in the past two decades. Since many PID systems have been largely conceived and developed by small communities, or even a single organisation, they have faced challenges in gaining widespread adoption and, most importantly, the ability to survive change of technology. This has left a legacy of identifiers that still exist and are being used but which have lost their resolution service. We believe that one of the causes of once successful PID systems fading is their reliance on a centralised technical infrastructure or a governing authority. Golodoniuc et al. (2016) proposed an approach to the development of PID systems that combines the use of (a) the Handle system, as a distributed system for the registration and first-degree resolution of persistent identifiers, and (b) the PID Service (Golodoniuc et al., 2015), to enable fine-grained resolution to different information object representations. The proposed approach solved the problem of guaranteed first-degree resolution of identifiers, but left fine-grained resolution and information delivery under the control of a single authoritative source, posing risk to the long-term availability of information resources. Herein, we develop these approaches further and explore the potential of large-scale decentralisation at all levels: (i) persistent identifiers and information resources registration; (ii) identifier resolution; and (iii) data delivery. To achieve large-scale decentralisation

  20. Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms

    International Nuclear Information System (INIS)

    Zio, E.; Golea, L.R.; Rocco S, C.M.

    2012-01-01

    In this paper, an analysis of the vulnerability of the Italian high-voltage (380 kV) electrical transmission network (HVIET) is carried out for the identification of the groups of links (or edges, or arcs) most critical considering the network structure and flow. Betweenness centrality and network connection efficiency variations are considered as measures of the importance of the network links. The search of the most critical ones is carried out within a multi-objective optimization problem aimed at the maximization of the importance of the groups and minimization of their dimension. The problem is solved using a genetic algorithm. The analysis is based only on information on the topology of the network and leads to the identification of the most important single component, couples of components, triplets and so forth. The comparison of the results obtained with those reported by previous analyses indicates that the proposed approach provides useful complementary information.

  1. Predicting biological system objectives de novo from internal state measurements

    Directory of Open Access Journals (Sweden)

    Maranas Costas D

    2008-01-01

    Full Text Available Abstract Background Optimization theory has been applied to complex biological systems to interrogate network properties and develop and refine metabolic engineering strategies. For example, methods are emerging to engineer cells to optimally produce byproducts of commercial value, such as bioethanol, as well as molecular compounds for disease therapy. Flux balance analysis (FBA is an optimization framework that aids in this interrogation by generating predictions of optimal flux distributions in cellular networks. Critical features of FBA are the definition of a biologically relevant objective function (e.g., maximizing the rate of synthesis of biomass, a unit of measurement of cellular growth and the subsequent application of linear programming (LP to identify fluxes through a reaction network. Despite the success of FBA, a central remaining challenge is the definition of a network objective with biological meaning. Results We present a novel method called Biological Objective Solution Search (BOSS for the inference of an objective function of a biological system from its underlying network stoichiometry as well as experimentally-measured state variables. Specifically, BOSS identifies a system objective by defining a putative stoichiometric "objective reaction," adding this reaction to the existing set of stoichiometric constraints arising from known interactions within a network, and maximizing the putative objective reaction via LP, all the while minimizing the difference between the resultant in silico flux distribution and available experimental (e.g., isotopomer flux data. This new approach allows for discovery of objectives with previously unknown stoichiometry, thus extending the biological relevance from earlier methods. We verify our approach on the well-characterized central metabolic network of Saccharomyces cerevisiae. Conclusion We illustrate how BOSS offers insight into the functional organization of biochemical networks

  2. Leder und Pelz am Ende des Mittelalters und zu Beginn der Neuzeit

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    In the center of the former imperial town Kempten thousands of everyday objects had been discovered. The thesis analyzes the leather and fur finds, which had been concealed between the late 15th and the late 16th century in blind floors and between the walls of a group of late medieval citizen...

  3. Transformation & Metamorphosis

    Science.gov (United States)

    Lott, Debra

    2009-01-01

    The sculptures of Canadian artist Brian Jungen are a great inspiration for a lesson on creating new forms. Jungen transforms found objects into unique creations without fully concealing their original form or purpose. Frank Stella's sculpture series, including "K.132,2007" made of stainless steel and spray paint, is another great example of…

  4. Visual attention is required for multiple object tracking.

    Science.gov (United States)

    Tran, Annie; Hoffman, James E

    2016-12-01

    In the multiple object tracking task, participants attempt to keep track of a moving set of target objects embedded in an identical set of moving distractors. Depending on several display parameters, observers are usually only able to accurately track 3 to 4 objects. Various proposals attribute this limit to a fixed number of discrete indexes (Pylyshyn, 1989), limits in visual attention (Cavanagh & Alvarez, 2005), or "architectural limits" in visual cortical areas (Franconeri, 2013). The present set of experiments examined the specific role of visual attention in tracking using a dual-task methodology in which participants tracked objects while identifying letter probes appearing on the tracked objects and distractors. As predicted by the visual attention model, probe identification was faster and/or more accurate when probes appeared on tracked objects. This was the case even when probes were more than twice as likely to appear on distractors suggesting that some minimum amount of attention is required to maintain accurate tracking performance. When the need to protect tracking accuracy was relaxed, participants were able to allocate more attention to distractors when probes were likely to appear there but only at the expense of large reductions in tracking accuracy. A final experiment showed that people attend to tracked objects even when letters appearing on them are task-irrelevant, suggesting that allocation of attention to tracked objects is an obligatory process. These results support the claim that visual attention is required for tracking objects. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  5. Identifying web usage behavior of bank customers

    Science.gov (United States)

    Araya, Sandro; Silva, Mariano; Weber, Richard

    2002-03-01

    The bank Banco Credito e Inversiones (BCI) started its virtual bank in 1996 and its registered customers perform currently more than 10,000 Internet transactions daily, which typically cause les than 10% of traditional transaction costs. Since most of the customers are still not registered for online banking, one of the goals of the virtual bank is to increase then umber of registered customers. Objective of the presented work was to identify customers who are likely to perform online banking but still do not use this medium for their transactions. This objective has been reached by determining profiles of registered customers who perform many transactions online. Based on these profiles the bank's Data Warehouse is explored for twins of these heavy users that are still not registered for online banking. We applied clustering in order to group the registered customers into five classes. One of these classes contained almost 30% of all registered customers and could clearly be identified as class of heavy users. Next a neural network assigned online customers to the previously found five classes. Applying the network trained on online customers to all the bank customers identified twins of heavy users that, however had not performed online transactions so far. A mailing to these candidates informing about the advantages of online banking doubled the number of registrations compared to previous campaigns.

  6. Objects prompt authentic scientific activities among learners in a museum programme

    DEFF Research Database (Denmark)

    Achiam, Marianne; Simony, Leonora; Lindow, Bent Erik Kramer

    2016-01-01

    Although the scientific disciplines conduct practical work in different ways, all consider practical work as the essential way of connecting objects and phenomena with ideas and the abstract. Accordingly, practical work is regarded as central to science education as well. We investigate a practical......, object-based palaeontology programme at a natural history museum to identify how palaeontological objects prompt scientific activity among upper secondary school students. We first construct a theoretical framework based on an analysis of the programme’s palaeontological content. From this, we build our...

  7. Herbig-haro objects and mid-infrared outflows in the VELA C molecular cloud

    International Nuclear Information System (INIS)

    Zhang, Miaomiao; Wang, Hongchi; Henning, Thomas

    2014-01-01

    We have performed a deep [S II] λλ6717/6731 wide field Herbig-Haro (HH) object survey toward the Vela C molecular cloud with a sky coverage of about 2 deg 2 . In total, 18 new HH objects, HH 1090-1107, are discovered and the two previously known HH objects, HH 73-74, are also detected in our [S II] images. We also present an investigation of mid-infrared outflows in the Vela C molecular cloud using the Wide-field Infrared Survey Explorer images taken from AllWISE data release. Using the method suggested by Zhang and Wang, 11 extended green objects (EGOs) are identified to be the mid-infrared outflows, including 6 new mid-infrared outflows that have not been detected previously at other wavelengths and 5 mid-infrared counterparts of the HH objects detected in this work. Using the AllWISE Source Catalog and the source classification scheme suggested by Koenig et al., we have identified 56 young stellar object (YSO) candidates in the Vela C molecular cloud. The possible driving sources of the HH objects and EGOs are discussed based on the morphology of HH objects and EGOs and the locations of HH objects, EGOs and YSO candidates. Finally we associate 12 HH objects and 5 EGOs with 10 YSOs and YSO candidates. The median length of the outflows in Vela C is 0.35 pc and the outflows seem to be oriented randomly.

  8. Possibility of object recognition using Altera's model based design approach

    International Nuclear Information System (INIS)

    Tickle, A J; Harvey, P K; Smith, J S; Wu, F

    2009-01-01

    Object recognition is an image processing task of finding a given object in a selected image or video sequence. Object recognition can be divided into two areas: one of these is decision-theoretic and deals with patterns described by quantitative descriptors, for example such as length, area, shape and texture. With this Graphical User Interface Circuitry (GUIC) methodology employed here being relatively new for object recognition systems, the aim of this work is to identify if the developed circuitry can detect certain shapes or strings within the target image. A much smaller reference image feeds the preset data for identification, tests are conducted for both binary and greyscale and the additional mathematical morphology to highlight the area within the target image with the object(s) are located is also presented. This then provides proof that basic recognition methods are valid and would allow the progression to developing decision-theoretical and learning based approaches using GUICs for use in multidisciplinary tasks.

  9. Object recognition based on Google's reverse image search and image similarity

    Science.gov (United States)

    Horváth, András.

    2015-12-01

    Image classification is one of the most challenging tasks in computer vision and a general multiclass classifier could solve many different tasks in image processing. Classification is usually done by shallow learning for predefined objects, which is a difficult task and very different from human vision, which is based on continuous learning of object classes and one requires years to learn a large taxonomy of objects which are not disjunct nor independent. In this paper I present a system based on Google image similarity algorithm and Google image database, which can classify a large set of different objects in a human like manner, identifying related classes and taxonomies.

  10. A multi-objective decision-making approach to the journal submission problem.

    Directory of Open Access Journals (Sweden)

    Tony E Wong

    Full Text Available When researchers complete a manuscript, they need to choose a journal to which they will submit the study. This decision requires to navigate trade-offs between multiple objectives. One objective is to share the new knowledge as widely as possible. Citation counts can serve as a proxy to quantify this objective. A second objective is to minimize the time commitment put into sharing the research, which may be estimated by the total time from initial submission to final decision. A third objective is to minimize the number of rejections and resubmissions. Thus, researchers often consider the trade-offs between the objectives of (i maximizing citations, (ii minimizing time-to-decision, and (iii minimizing the number of resubmissions. To complicate matters further, this is a decision with multiple, potentially conflicting, decision-maker rationalities. Co-authors might have different preferences, for example about publishing fast versus maximizing citations. These diverging preferences can lead to conflicting trade-offs between objectives. Here, we apply a multi-objective decision analytical framework to identify the Pareto-front between these objectives and determine the set of journal submission pathways that balance these objectives for three stages of a researcher's career. We find multiple strategies that researchers might pursue, depending on how they value minimizing risk and effort relative to maximizing citations. The sequences that maximize expected citations within each strategy are generally similar, regardless of time horizon. We find that the "conditional impact factor"-impact factor times acceptance rate-is a suitable heuristic method for ranking journals, to strike a balance between minimizing effort objectives and maximizing citation count. Finally, we examine potential co-author tension resulting from differing rationalities by mapping out each researcher's preferred Pareto front and identifying compromise submission strategies

  11. Location mortgage in accounting objects

    Directory of Open Access Journals (Sweden)

    I.M. Vygiska

    2015-12-01

    Full Text Available The article analyzes the mechanism of the implementation of all kinds of mortgage (mortgage, pledge, mortgage of securities, security of property rights, the mortgage of goods in circulation or processing, tax lien defined the specificity of receipt/return of the mortgage, particularly payments between mortgagor and the mortgagee. Determine the subject property entities that can act as mortgage; identified by their place in the system of objects of accounting mortgagor and the mortgagee. The peculiarities of the balance sheet and off-balance sheet assets as a reflection of your collateral. Identified two groups of mortgage transactions: transactions with mortgage for its receipt and transmission; business transactions related to the conditions of loan agreements (loan and mortgage. The results are shown in the research paper proposals allow for further research to develop mortgage organizational and methodological support the operations accounting for the effective management of financial resources and obligations, collateralised.

  12. Tectonic Storytelling with Open Source and Digital Object Identifiers - a case study about Plate Tectonics and the Geopark Bergstraße-Odenwald

    Science.gov (United States)

    Löwe, Peter; Barmuta, Jan; Klump, Jens; Neumann, Janna; Plank, Margret

    2014-05-01

    The communication of advances in research to the common public for both education and decision making is an important aspect of scientific work. An even more crucial task is to gain recognition within the scientific community, which is judged by impact factor and citation counts. Recently, the latter concepts have been extended from textual publications to include data and software publications. This paper presents a case study for science communication and data citation. For this, tectonic models, Free and Open Source Software (FOSS), best practices for data citation and a multimedia online-portal for scientific content are combined. This approach creates mutual benefits for the stakeholders: Target audiences receive information on the latest research results, while the use of Digital Object Identifiers (DOI) increases the recognition and citation of underlying scientific data. This creates favourable conditions for every researcher as DOI names ensure citeability and long term availability of scientific research. In the developed application, the FOSS tool for tectonic modelling GPlates is used to visualise and manipulate plate-tectonic reconstructions and associated data through geological time. These capabilities are augmented by the Science on a Halfsphere project (SoaH) with a robust and intuitive visualisation hardware environment. The tectonic models used for science communication are provided by the AGH University of Science and Technology. They focus on the Silurian to Early Carboniferous evolution of Central Europe (Bohemian Massif) and were interpreted for the area of the Geopark Bergstraße Odenwald based on the GPlates/SoaH hardware- and software stack. As scientific story-telling is volatile by nature, recordings are a natural means of preservation for further use, reference and analysis. For this, the upcoming portal for audiovisual media of the German National Library of Science and Technology TIB is expected to become a critical service

  13. Objective Cognitive Impairment and Progression to Dementia in Women: The Prospective Epidemiological Risk Factor Study

    DEFF Research Database (Denmark)

    Neergaard, Jesper; Dragsbæk, K.; Christiansen, C.

    2017-01-01

    Background: Identification of subjects with a progressive disease phenotype is an urgent need in the pharmaceutical industry where most of the recent clinical trials in Alzheimer’s disease have failed. Objectives: The objective of this study was to identify subgroups of individuals with objective...

  14. Object Recognition System in Remote Controlled Weapon Station using SIFT and SURF Methods

    Directory of Open Access Journals (Sweden)

    Midriem Mirdanies

    2013-12-01

    Full Text Available Object recognition system using computer vision that is implemented on Remote Controlled Weapon Station (RCWS is discussed. This system will make it easier to identify and shoot targeted object automatically. Algorithm was created to recognize real time multiple objects using two methods i.e. Scale Invariant Feature Transform (SIFT and Speeded Up Robust Features (SURF combined with K-Nearest Neighbors (KNN and Random Sample Consensus (RANSAC for verification. The algorithm is designed to improve object detection to be more robust and to minimize the processing time required. Objects are registered on the system consisting of the armored personnel carrier, tanks, bus, sedan, big foot, and police jeep. In addition, object selection can use mouse to shoot another object that has not been registered on the system. Kinect™ is used to capture RGB images and to find the coordinates x, y, and z of the object. The programming language used is C with visual studio IDE 2010 and opencv libraries. Object recognition program is divided into three parts: 1 reading image from kinect™ and simulation results, 2 object recognition process, and 3 transfer of the object data to the ballistic computer. Communication between programs is performed using shared memory. The detected object data is sent to the ballistic computer via Local Area Network (LAN using winsock for ballistic calculation, and then the motor control system moves the direction of the weapon model to the desired object. The experimental results show that the SIFT method is more suitable because more accurate and faster than SURF with the average processing time to detect one object is 430.2 ms, two object is 618.4 ms, three objects is 682.4 ms, and four objects is 756.2 ms. Object recognition program is able to recognize multi-objects and the data of the identified object can be processed by the ballistic computer in realtime.

  15. Multisensory object perception in infancy: 4-month-olds perceive a mistuned harmonic as a separate auditory and visual object.

    Science.gov (United States)

    Smith, Nicholas A; Folland, Nicole A; Martinez, Diana M; Trainor, Laurel J

    2017-07-01

    Infants learn to use auditory and visual information to organize the sensory world into identifiable objects with particular locations. Here we use a behavioural method to examine infants' use of harmonicity cues to auditory object perception in a multisensory context. Sounds emitted by different objects sum in the air and the auditory system must figure out which parts of the complex waveform belong to different sources (auditory objects). One important cue to this source separation is that complex tones with pitch typically contain a fundamental frequency and harmonics at integer multiples of the fundamental. Consequently, adults hear a mistuned harmonic in a complex sound as a distinct auditory object (Alain, Theunissen, Chevalier, Batty, & Taylor, 2003). Previous work by our group demonstrated that 4-month-old infants are also sensitive to this cue. They behaviourally discriminate a complex tone with a mistuned harmonic from the same complex with in-tune harmonics, and show an object-related event-related potential (ERP) electrophysiological (EEG) response to the stimulus with mistuned harmonics. In the present study we use an audiovisual procedure to investigate whether infants perceive a complex tone with an 8% mistuned harmonic as emanating from two objects, rather than merely detecting the mistuned cue. We paired in-tune and mistuned complex tones with visual displays that contained either one or two bouncing balls. Four-month-old infants showed surprise at the incongruous pairings, looking longer at the display of two balls when paired with the in-tune complex and at the display of one ball when paired with the mistuned harmonic complex. We conclude that infants use harmonicity as a cue for source separation when integrating auditory and visual information in object perception. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data

    Directory of Open Access Journals (Sweden)

    Lisa Thurairasu

    2017-04-01

    The processing practices used at the organization comply with Canadian privacy laws such as the Personal Health Information Protection Act (PHIPA as well as organizational policies and Research Ethics Board approvals. The approaches used to conceal individual identities yet allow linkage to various data sources can be modelled by other health agencies, ministries, and non-health related organizations that work with sensitive data but face challenges in maintaining both privacy and research quality. Our organization strives to make processing as efficient as possible and create maximum linkability to the various data sources in house while upholding privacy and confidentiality.

  17. An unforgettable apple: memory and attention for forbidden objects.

    Science.gov (United States)

    Truong, Grace; Turk, David J; Handy, Todd C

    2013-12-01

    Are we humans drawn to the forbidden? From jumbo-sized soft drinks to illicit substances, the influence of prohibited ownership on subsequent demand has made this question a pressing one. We know that objects that we ourselves own have a heightened psychological saliency, relative to comparable objects that are owned by others, but do these kinds of effects extend from self-owned to "forbidden" objects? To address this question, we developed a modified version of the Turk shopping paradigm in which "purchased" items were assigned to various recipients. Participants sorted everyday objects labeled as "self-owned", "other-owned," and either "forbidden to oneself" (Experiment 1) or "forbidden to everyone" (Experiment 2). Subsequent surprise recognition memory tests revealed that forbidden objects with high (Experiment 1) but not with low (Experiment 2) self-relevance were recognized as well as were self-owned objects, and better than other-owned objects. In a third and final experiment, we used event-related potentials (ERPs) to determine whether self-owned and self-forbidden objects, which showed a common memory advantage, are in fact treated the same at a neurocognitive-affective level. We found that both object types were associated with enhanced cognitive analysis, relative to other-owned objects, as measured by the P300 ERP component. However, we also found that self-forbidden objects uniquely triggered an enhanced response preceding the P300, in an ERP component (the N2) that is sensitive to more rapid, affect-related processing. Our findings thus suggest that, whereas self-forbidden objects share a common cognitive signature with self-owned objects, they are unique in being identified more quickly at a neurocognitive level.

  18. On the effect of model parameters on forecast objects

    Science.gov (United States)

    Marzban, Caren; Jones, Corinne; Li, Ning; Sandgathe, Scott

    2018-04-01

    Many physics-based numerical models produce a gridded, spatial field of forecasts, e.g., a temperature map. The field for some quantities generally consists of spatially coherent and disconnected objects. Such objects arise in many problems, including precipitation forecasts in atmospheric models, eddy currents in ocean models, and models of forest fires. Certain features of these objects (e.g., location, size, intensity, and shape) are generally of interest. Here, a methodology is developed for assessing the impact of model parameters on the features of forecast objects. The main ingredients of the methodology include the use of (1) Latin hypercube sampling for varying the values of the model parameters, (2) statistical clustering algorithms for identifying objects, (3) multivariate multiple regression for assessing the impact of multiple model parameters on the distribution (across the forecast domain) of object features, and (4) methods for reducing the number of hypothesis tests and controlling the resulting errors. The final output of the methodology is a series of box plots and confidence intervals that visually display the sensitivities. The methodology is demonstrated on precipitation forecasts from a mesoscale numerical weather prediction model.

  19. Obtaining subjects' consent to publish identifying personal information: current practices and identifying potential issues.

    Science.gov (United States)

    Yoshida, Akiko; Dowa, Yuri; Murakami, Hiromi; Kosugi, Shinji

    2013-11-25

    In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information. Content analysis was carried out on instructions for authors and consent forms developed by academic journals in four fields (as classified by Journal Citation Reports): medicine general and internal, genetics and heredity, pediatrics, and psychiatry. An online questionnaire survey of editors working for journals that require the submission of consent forms was also conducted. Instructions for authors were reviewed for 491 academic journals (132 for medicine general and internal, 147 for genetics and heredity, 100 for pediatrics, and 112 for psychiatry). Approximately 40% (203: 74 for medicine general and internal, 31 for genetics and heredity, 58 for pediatrics, and 40 for psychiatry) stated that subject consent was necessary. The submission of consent forms was required by 30% (154) of the journals studied, and 10% (50) provided their own consent forms for authors to use. Two journals mentioned that the possible effects of publication on subjects should be considered. Many journal consent forms mentioned the difficulties in ensuring complete anonymity of subjects, but few addressed the study objective, the subjects' right to refuse consent and the withdrawal of consent. The main reason for requiring the submission of consent forms was to confirm that consent had been obtained. Approximately 40% of journals required subject consent to be obtained. However, differences were observed depending on the fields. Specific considerations were not always documented. There is a need to address issues around the study

  20. Obtaining subjects’ consent to publish identifying personal information: current practices and identifying potential issues

    Science.gov (United States)

    2013-01-01

    Background In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information. Methods Content analysis was carried out on instructions for authors and consent forms developed by academic journals in four fields (as classified by Journal Citation Reports): medicine general and internal, genetics and heredity, pediatrics, and psychiatry. An online questionnaire survey of editors working for journals that require the submission of consent forms was also conducted. Results Instructions for authors were reviewed for 491 academic journals (132 for medicine general and internal, 147 for genetics and heredity, 100 for pediatrics, and 112 for psychiatry). Approximately 40% (203: 74 for medicine general and internal, 31 for genetics and heredity, 58 for pediatrics, and 40 for psychiatry) stated that subject consent was necessary. The submission of consent forms was required by 30% (154) of the journals studied, and 10% (50) provided their own consent forms for authors to use. Two journals mentioned that the possible effects of publication on subjects should be considered. Many journal consent forms mentioned the difficulties in ensuring complete anonymity of subjects, but few addressed the study objective, the subjects’ right to refuse consent and the withdrawal of consent. The main reason for requiring the submission of consent forms was to confirm that consent had been obtained. Conclusion Approximately 40% of journals required subject consent to be obtained. However, differences were observed depending on the fields. Specific considerations were not always documented. There is a need

  1. Submillimetre wave imaging and security: imaging performance and prediction

    Science.gov (United States)

    Appleby, R.; Ferguson, S.

    2016-10-01

    Within the European Commission Seventh Framework Programme (FP7), CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) has designed and is fabricating a stand-off system operating at sub-millimetre wave frequencies for the detection of objects concealed on people. This system scans people as they walk by the sensor. This paper presents the top level system design which brings together both passive and active sensors to provide good performance. The passive system operates in two bands between 100 and 600GHz and is based on a cryogen free cooled focal plane array sensor whilst the active system is a solid-state 340GHz radar. A modified version of OpenFX was used for modelling the passive system. This model was recently modified to include realistic location-specific skin temperature and to accept animated characters wearing up to three layers of clothing that move dynamically, such as those typically found in cinematography. Targets under clothing have been modelled and the performance simulated. The strengths and weaknesses of this modelling approach are discussed.

  2. Real-world objects are more memorable than photographs of objects

    Directory of Open Access Journals (Sweden)

    Jacqueline C Snow

    2014-10-01

    Full Text Available Research studies in psychology typically use two-dimensional (2D images of objects as proxies for real-world three-dimensional (3D stimuli. There are, however, a number of important differences between real objects and images that could influence cognition and behavior. Although human memory has been studied extensively, only a handful of studies have used real objects in the context of memory and virtually none have directly compared memory for real objects versus their 2D counterparts. Here we examined whether or not episodic memory is influenced by the format in which objects are displayed. We conducted two experiments asking participants to freely recall, and to recognize, a set of 44 common household objects. Critically, the exemplars were displayed to observers in one of three viewing conditions: real-world objects, colored photographs, or black and white line drawings. Stimuli were closely matched across conditions for size, orientation, and illumination. Surprisingly, recall and recognition performance was significantly better for real objects compared to colored photographs or line drawings (for which memory performance was equivalent. We replicated this pattern in a second experiment comparing memory for real objects versus color photos, when the stimuli were matched for viewing angle across conditions. Again, recall and recognition performance was significantly better for the real objects than matched color photos of the same items. Taken together, our data suggest that real objects are more memorable than pictorial stimuli. Our results highlight the importance of studying real-world object cognition and raise the potential for applied use in developing effective strategies for education, marketing, and further research on object-related cognition.

  3. Chondrule-like object from the Indian Ocean cosmic spherules

    Indian Academy of Sciences (India)

    Five hundred and eighteen cosmic spherules were identified among the 672 spherules handpicked from deep sea sediments by using Scanning Electron Microscope-Energy Dispersive Spectrometry (SEM-EDS). One of the spherules is found to enclose a spherical chondrule-like object that can be distinguished from the ...

  4. Identifying factors affecting about outsourcing in paraclinical services

    African Journals Online (AJOL)

    Objective: Outsourcing refers to the transfer of services or functions to an outsider supplier, which controls them through a contract or cooperative. The main problem of senior managers in health organizations is determining the services which should be outsourced. The present study seeks to identify the factors that affect ...

  5. Identifying patient risks during hospitalization

    Directory of Open Access Journals (Sweden)

    Lucélia Ferreira Lima

    2008-12-01

    Full Text Available Objective: To identify the risks reported at a public institution andto know the main patient risks from the nursing staff point of view.Methods: A retrospective, descriptive and exploratory study. Thesurvey was developed at a hospital in the city of Taboão da Serra, SãoPaulo, Brazil. The study included all nurses working in care areas whoagreed to participate in the study. At the same time, sentinel eventsoccurring in the period from July 2006 to July 2007 were identified.Results: There were 440 sentinel events reported, and the main risksincluded patient falls, medication errors and pressure ulcers. Sixty-fivenurses were interviewed. They also reported patient falls, medicationerrors and pressure ulcers as the main risks. Conclusions: Riskassessment and implementation of effective preventive actions arenecessary to ensure patient’s safety. Involvement of a multidisciplinaryteam is one of the steps for a successful process.

  6. Objectives of the symposium

    International Nuclear Information System (INIS)

    Genter, N.E.

    1996-01-01

    The objective of this symposium was to discuss the sorts of evidence of molecular alterations in DNA which can be used to study causation of the stochastic effects of importance in radiation protection. Specifically, the aim was to address the following: what sort of indications might show whether a cancer was caused by radiation; whether there is a radiogenic signature to distinguish damage caused by ionizing radiation; whether bio-markers might be available for susceptibility, for exposure, for biological consequences. Despite a number of epidemiological studies (referred to), there is no clear, credible, defensible answer as to whether low-level radiation increases the risk of cancer. A new ethical question is, what rules should be in place for identifying and protecting genetically sensitive individuals. 1 tab

  7. Magnetospheres of accreting compact objects in binary systems

    International Nuclear Information System (INIS)

    Aly, J.J.

    1985-09-01

    Bright pulsating X-ray sources (X-ray pulsars, AM Her stars,...) have been identified as strongly magnetized compact objects accreting matter from a binary companion. We give here a summary of some of the work which has been recently done to try to understand the interaction between the magnetic field of the compact object and the matter around. We examine in turn the models describing the interaction of the field with: i) a spherically symmetric accretion flow; ii) a thin keplerian accretion disk; iii) the companion itself. In all these cases, we pay particular attention to the following problems: i) how the external plasma interacting with the magnetosphere can get mixed with the field; ii) by which mechanism the magnetic field controls the mass-momentum-energy exchanges between the two stars. In conclusion, we compare the magnetosphere of an accreting compact object with that one of a planet [fr

  8. Analysis of process parameters in surface grinding using single objective Taguchi and multi-objective grey relational grade

    Directory of Open Access Journals (Sweden)

    Prashant J. Patil

    2016-09-01

    Full Text Available Close tolerance and good surface finish are achieved by means of grinding process. This study was carried out for multi-objective optimization of MQL grinding process parameters. Water based Al2O3 and CuO nanofluids of various concentrations are used as lubricant for MQL system. Grinding experiments were carried out on instrumented surface grinding machine. For experimentation purpose Taguchi's method was used. Important process parameters that affect the G ratio and surface finish in MQL grinding are depth of cut, type of lubricant, feed rate, grinding wheel speed, coolant flow rate, and nanoparticle size. Grinding performance was calculated by the measurement G ratio and surface finish. For improvement of grinding process a multi-objective process parameter optimization is performed by use of Taguchi based grey relational analysis. To identify most significant factor of process analysis of variance (ANOVA has been used.

  9. Object-relational database design-exploiting object orientation at the ...

    African Journals Online (AJOL)

    This paper applies the object-relational database paradigm in the design of a Health Management Information System. The class design, mapping of object classes to relational tables, the representation of inheritance hierarchies, and the appropriate database schema are all examined. Keywords: object relational ...

  10. Examining the Lesbian, Gay, and Bisexual Identity Scale Among Members of an Alternative Sexuality Special Interest Group.

    Science.gov (United States)

    Cramer, Robert J; Golom, Frank D; Gemberling, Tess M; Trost, Kristen; Lewis, Robin; Wright, Susan

    2018-05-01

    The present study contributes to a growing body of literature developing psychometrically and theoretically grounded measures of sexual orientation minority identity. We tested psychometric properties and construct validity of a 27-item measure, the Lesbian, Gay, and Bisexual Identity Scale (LGBIS). The sample consisted of 475 adult (178 male, 237 female, 16 male-to-female, 14 female-to-male, and 30 gender queer persons) members of a special interest group, the National Coalition for Sexual Freedom. Participants completed a health needs questionnaire. Prominent findings included (1) confirmatory factor-analytic, internal consistency, and inter-correlation patterns support two LGBIS factor structures; (2) men, compared primarily to women, reported elevated scores on Acceptance Concerns, Concealment Motivation, Difficulty Process, and Negative Identity; (3) queer-identifying persons tended to report low Concealment Motivation, and high Identity Affirmation and Identity Centrality scores; (4) experimenting/fluid-identifying individuals tended toward higher Identity Uncertainty and Negative Identity, and lower Identity Centrality scores; (5) LGB community involvement was negatively associated with Concealment Motivation, Identity Uncertainty, and Negative Identity, and positively associated with Identity Superiority, Identity Affirmation, and Identity Centrality scores; and (6) Acceptance Concerns, Identity Uncertainty, and Internalized Homonegativity displayed significant positive associations with such mental health symptoms as general anxiety and posttraumatic stress. The LGBIS represents a useful approach to evaluating sexual orientation minority identity. Implications for identity theory, research, and practice are provided.

  11. Object formation in visual working memory: Evidence from object-based attention.

    Science.gov (United States)

    Zhou, Jifan; Zhang, Haihang; Ding, Xiaowei; Shui, Rende; Shen, Mowei

    2016-09-01

    We report on how visual working memory (VWM) forms intact perceptual representations of visual objects using sub-object elements. Specifically, when objects were divided into fragments and sequentially encoded into VWM, the fragments were involuntarily integrated into objects in VWM, as evidenced by the occurrence of both positive and negative object-based attention effects: In Experiment 1, when subjects' attention was cued to a location occupied by the VWM object, the target presented at the location of that object was perceived as occurring earlier than that presented at the location of a different object. In Experiment 2, responses to a target were significantly slower when a distractor was presented at the same location as the cued object (Experiment 2). These results suggest that object fragments can be integrated into objects within VWM in a manner similar to that of visual perception. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Assessment and Instruction of Object Permanence in Children with Blindness and Multiple Disabilities

    Science.gov (United States)

    Bruce, Susan M.; Vargas, Claudia

    2012-01-01

    Introduction: This article discusses the impact of blindness and low vision on the development of object permanence and provides suggestions for assessment and instruction. Methods: The reviewed literature was identified by searching both ERIC and Psych Info using combinations of search terms such as "object permanence" and "visual…

  13. The use of hand gestures to communicate about nonpresent objects in mind among children with autism spectrum disorder.

    Science.gov (United States)

    So, Wing-Chee; Lui, Ming; Wong, Tze-Kiu; Sit, Long-Tin

    2015-04-01

    The current study examined whether children with autism spectrum disorder (ASD), in comparison with typically developing children, perceive and produce gestures to identify nonpresent objects (i.e., referent-identifying gestures), which is crucial for communicating ideas in a discourse. An experimenter described the uses of daily-life objects to 6- to 12-year-old children both orally and with gestures. The children were then asked to describe how they performed daily activities using those objects. All children gestured. A gesture identified a nonpresent referent if it was produced in the same location that had previously been established by the experimenter. Children with ASD gestured at the specific locations less often than typically developing children. Verbal and spatial memory were positively correlated with the ability to produce referent-identifying gestures for all children. However, the positive correlation between Raven's Children Progressive Matrices score and the production of referent-identifying gestures was found only in children with ASD. Children with ASD might be less able to perceive and produce referent-identifying gestures and may rely more heavily on visual-spatial skills in producing referent-identifying gestures. The results have clinical implications for designing an intervention program to enhance the ability of children with ASD to communicate about nonpresent objects with gestures.

  14. Identifying motivational factors within a multinational company

    Directory of Open Access Journals (Sweden)

    Daniela Bradutanu

    2011-08-01

    Full Text Available The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interview with the manager. The results confirmed that in Romania, employees put great emphasis on extrinsic motivation, a certain income and job security being primary. These results have implications for managers that in order to effectively motivate staff, first, must know their needs and expectations. To identify the main needs and motivational factors we had as a starting point Maslow's pyramid.

  15. Objectives and methodology of BIOBADASER phase iii.

    Science.gov (United States)

    Sanchez-Piedra, Carlos; Hernández Miguel, M Victoria; Manero, Javier; Roselló, Rosa; Sánchez-Costa, Jesús Tomás; Rodríguez-Lozano, Carlos; Campos, Cristina; Cuende, Eduardo; Fernández-Lopez, Jesús Carlos; Bustabad, Sagrario; Martín Domenech, Raquel; Pérez-Pampín, Eva; Del Pino-Montes, Javier; Millan-Arcineas, Ana Milena; Díaz-González, Federico; Gómez-Reino, Juan Jesús

    2017-09-18

    Describe the objectives, methods and results of the first year of the new version of the Spanish registry of adverse events involving biological therapies and synthetic drugs with an identifiable target in rheumatic diseases (BIOBADASER III). Multicenter prospective registry of patients with rheumatic inflammatory diseases being treated with biological drugs or synthetic drugs with an identifiable target in rheumatology departments in Spain. The main objective of BIOBADASER Phase III is the registry and analysis of adverse events; moreover, a secondary objective was added consisting of assessing the effectiveness by means of the registry of activity indexes. Patients in the registry are evaluated at least once every year and whenever they experience an adverse event or a change in treatment. The collection of data for phase iii began on 17 December 2015. During the first year, 35 centers participated. The number of patients included in this new phase in December 2016 was 2,664. The mean age was 53.7 years and the median duration of treatment was 8.1 years. In all, 40.4% of the patients were diagnosed with rheumatoid arthritis. The most frequent adverse events were infections and infestations. BIOBADASER Phase III has been launched to adapt to a changing pharmacological environment, with the introduction of biosimilars and small molecules in the treatment of rheumatic diseases. This new stage is adapted to the changes in the reporting of adverse events and now includes information related to activity scores. Copyright © 2017 Elsevier España, S.L.U. and Sociedad Española de Reumatología y Colegio Mexicano de Reumatología. All rights reserved.

  16. Identifying Food Safety Concerns when Communication Barriers Exist

    Science.gov (United States)

    Neal, Jack A.; Dawson, Mary; Madera, Juan M.

    2011-01-01

    Abstract: Students must be prepared to lead a diverse workforce. The objective of this study was to establish a teaching method that helps students identify barriers to food safety while working in a simulated environment with communication barriers. This study employed a perspective taking exercise based upon the principles of social learning…

  17. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation.

    Science.gov (United States)

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V; Levy, Mia A

    2017-07-25

    Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score compared to the control group (0.4 points

  18. A Critique of Stephen Downes' "Learning Objects": A Chinese perspective

    Directory of Open Access Journals (Sweden)

    Fuhua (Oscar Lin

    2001-07-01

    Full Text Available This paper by Stephen Downes recommends a way of sharing online teaching/ course materials to accelerate course development and make education more cost-effective. His paper is a review of basic information about learning objects (LOs and includes examples that illustrate such technical terms as XML and TML. His paper, however, does not identify several important issues such as: a the level of granularity of learning objects; b selection and integration of learning objects in an appropriate way to form higher level units of study; c training of professors in the use of learning objects; d appropriate use of metadata to facilitate composition of higher level units; and e the potential of computer agents to facilitate the dynamic composition of personalized lessons. An unorganized aggregate of learning objects simply does not constitute a course. In order to create a properly designed final course, student and instructor interaction must be built in.

  19. Metodology of identification parameters of models control objects of automatic trailing system

    Directory of Open Access Journals (Sweden)

    I.V. Zimchuk

    2017-04-01

    Full Text Available The determining factor for the successful solution of the problem of synthesis of optimal control systems of different processes are adequacy of mathematical model of control object. In practice, the options can differ from the objects taken priori, causing a need to clarification of them. In this context, the article presents the results of the development and application of methods parameters identification of mathematical models of control object of automatic trailing system. The stated problem in the article is solved provided that control object is fully controlled and observed, and a differential equation of control object is known a priori. The coefficients of this equation to be determined. Identifying quality criterion is to minimize the integral value of squared error of identification. The method is based on a description of the dynamics of the object in space state. Equation of identification synthesized using the vector-matrix representation of model. This equation describes the interconnection of coefficients of matrix state and control with inputs and outputs of object. The initial data for calculation are the results of experimental investigation of the reaction of phase coordinates of control object at a typical input signal. The process of calculating the model parameters is reduced to solving the system of equations of the first order each. Application the above approach is illustrated in the example identification of coefficients transfer function of control object first order. Results of digital simulation are presented, they are confirming the justice of set out mathematical calculations. The approach enables to do the identification of models of one-dimensional and multidimensional objects and does not require a large amount of calculation for its implementation. The order of identified model is limited capabilities of measurement phase coordinates of corresponding control object. The practical significance of the work is

  20. Development of national competency-based learning objectives "Medical Informatics" for undergraduate medical education.

    Science.gov (United States)

    Röhrig, R; Stausberg, J; Dugas, M

    2013-01-01

    The aim of this project is to develop a catalogue of competency-based learning objectives "Medical Informatics" for undergraduate medical education (abbreviated NKLM-MI in German). The development followed a multi-level annotation and consensus process. For each learning objective a reason why a physician needs this competence was required. In addition, each objective was categorized according to the competence context (A = covered by medical informatics, B = core subject of medical informatics, C = optional subject of medical informatics), the competence level (1 = referenced knowledge, 2 = applied knowledge, 3 = routine knowledge) and a CanMEDS competence role (medical expert, communicator, collaborator, manager, health advocate, professional, scholar). Overall 42 objectives in seven areas (medical documentation and information processing, medical classifications and terminologies, information systems in healthcare, health telematics and telemedicine, data protection and security, access to medical knowledge and medical signal-/image processing) were identified, defined and consented. With the NKLM-MI the competences in the field of medical informatics vital to a first year resident physician are identified, defined and operationalized. These competencies are consistent with the recommendations of the International Medical Informatics Association (IMIA). The NKLM-MI will be submitted to the National Competence-Based Learning Objectives for Undergraduate Medical Education. The next step is implementation of these objectives by the faculties.

  1. [Gender perspective in health care teaching: a pending task].

    Science.gov (United States)

    Arcos, Estela; Poblete, Johanna; Molina Vega, Irma; Miranda, Christian; Zúñiga, Yanira; Fecci, Ester; Rodríguez, Laura; Márquez, Myriam; Ramírez, Miguel

    2007-06-01

    Gender must be considered in the design and implementation of health policies to safeguard equity and accomplish sanitary objectives. To identify gender perspective in the curricula of five health care careers in the Universidad Austral de Chile. To identify the situation of women in the teaching profile of such curricula. An exploratory and descriptive study with a critical reading of the structure of the programs of 217 courses. Revision of official academic registries. Gender is usually not included in the curricula of health care careers. The generic language conceals female academics and students. There was a scarce inclusion of cross sectional issues such as collaborative work, interpersonal and democratic relationship, equity and critical analysis. There were no differences in academic achievements between female and male students. The contractual profile of female academics reproduces the gender inequity of the work market. The inclusion of gender is a pending task in the training of health care professionals.

  2. The tacit concept of competence in J.S. Mill's On Liberty | Nys | South ...

    African Journals Online (AJOL)

    Mill is often the object of schizophrenic interpretation: he is either interpreted as a fierce proponent of negative freedom, i.e. a prototypical liberal who professes neutrality with regard to different conceptions of the good, or as a concealed moralist whose ultimate goal is to construct society on the basis of a particular and thick ...

  3. Objective-C

    CERN Document Server

    DeVoe, Jiva

    2011-01-01

    A soup-to-nuts guide on the Objective-C programming language. Objective-C is the language behind Cocoa and Cocoa Touch, which is the Framework of applications written for the Macintosh, iPod touch, iPhone, and iPad platforms. Part of the Developer Reference series covering the hottest Apple topics, this book covers everything from the basics of the C language to advanced aspects of Apple development. You'll examine Objective-C and high-level subjects of frameworks, threading, networking, and much more.: Covers the basics of the C language and then quickly moves onto Objective-C and more advanc

  4. Effects of Selected Object Characteristics on Object Permanence Test Performance.

    Science.gov (United States)

    Lingle, Kathleen M.; Lingle, John H.

    A study was conducted to investigate the degree to which both object familiarity and motivational factors influence infants' search behavior in an object permanence test. Infants' search behavior for an unfamiliar test object was compared with search behavior for (a) an experientially familiar object that each infant had played with daily for a…

  5. The application of digital image plane holography technology to identify Chinese herbal medicine

    Science.gov (United States)

    Wang, Huaying; Guo, Zhongjia; Liao, Wei; Zhang, Zhihui

    2012-03-01

    In this paper, the imaging technology of digital image plane holography to identify the Chinese herbal medicine is studied. The optical experiment system of digital image plane holography which is the special case of pre-magnification digital holography was built. In the record system, one is an object light by using plane waves which illuminates the object, and the other one is recording hologram by using spherical light wave as reference light. There is a Micro objective lens behind the object. The second phase factor which caus ed by the Micro objective lens can be eliminated by choosing the proper position of the reference point source when digital image plane holography is recorded by spherical light. In this experiment, we use the Lygodium cells and Onion cells as the object. The experiment results with Lygodium cells and Onion cells show that digital image plane holography avoid the process of finding recording distance by using auto-focusing approach, and the phase information of the object can be reconstructed more accurately. The digital image plane holography is applied to the microscopic imaging of cells more effectively, and it is suit to apply for the identify of Chinese Herbal Medicine. And it promotes the application of digital holographic in practice.

  6. Properties of mathematical objects (Goedel on classes, properties and concepts)

    International Nuclear Information System (INIS)

    Materna, Pavel

    2007-01-01

    In terms of a sufficiently fine-grained theory we should distinguish between classes, properties and concepts. Since properties are best modeled as a kind of non-trivial intensions while mathematical objects are never non-trivial intensions we should not speak about properties of mathematical objects. When we do use the term property in mathematics (as Goedel did) we either mean classes, or the more fine-grained entities to be called concepts. In the latter case concepts have to be defined so that various distinct concepts could identify one and the same object. The notion of construction in transparent intensional logic makes it possible to construe concepts as abstract procedures. At the same time we have to distinguish between this notion and the notion of construction in constructivist systems: the former - unlike the latter - are objective and, therefore, acceptable for a realist

  7. Objectives for Stakeholder Engagement in Global Environmental Assessments

    Directory of Open Access Journals (Sweden)

    Jennifer Garard

    2017-09-01

    Full Text Available Global environmental assessments (GEAs are among the most large-scale, formalized processes for synthesizing knowledge at the science–policy–society interface. The successful engagement of diverse stakeholders in GEAs is often described as a crucial mechanism for increasing their legitimacy, salience and credibility. However, the diversity of perspectives on the more precise objectives for stakeholder engagement remains largely unclear. The aims of this study are to categorize and characterize the diversity of perspectives on objectives for stakeholder engagement in GEAs; to explore differences in perspectives within and between different stakeholder groups and categories; and to test whether the more practical prioritization and selection of objectives in GEAs can be linked to deliberative policy learning as a higher-level rationale for stakeholder engagement. For these purposes, we conduct a grounded theory analysis and a keyword analysis of interview material and official GEA documents relating to two GEAs: UN Environment’s Fifth Global Environment Outlook and the Working Group III contribution to the Intergovernmental Panel on Climate Change Fifth Assessment Report. Based on the analysis, we identify six categories of objectives and present as hypotheses promising ways forward for prioritizing and characterizing objectives for stakeholder engagement in GEAs, as well as potential reasons for the differences between perspectives on objectives. This study draws attention to the need for future GEA processes to have more explicit discussions on the objectives for stakeholder engagement, as well as the importance of moving towards increasingly deliberative and inclusive assessment processes more broadly.

  8. Real Objects Can Impede Conditional Reasoning but Augmented Objects Do Not.

    Science.gov (United States)

    Sato, Yuri; Sugimoto, Yutaro; Ueda, Kazuhiro

    2018-03-01

    In this study, Knauff and Johnson-Laird's (2002) visual impedance hypothesis (i.e., mental representations with irrelevant visual detail can impede reasoning) is applied to the domain of external representations and diagrammatic reasoning. We show that the use of real objects and augmented real (AR) objects can control human interpretation and reasoning about conditionals. As participants made inferences (e.g., an invalid one from "if P then Q" to "P"), they also moved objects corresponding to premises. Participants who moved real objects made more invalid inferences than those who moved AR objects and those who did not manipulate objects (there was no significant difference between the last two groups). Our results showed that real objects impeded conditional reasoning, but AR objects did not. These findings are explained by the fact that real objects may over-specify a single state that exists, while AR objects suggest multiple possibilities. Copyright © 2017 Cognitive Science Society, Inc.

  9. Creating Objects and Object Categories for Studying Perception and Perceptual Learning

    Science.gov (United States)

    Hauffen, Karin; Bart, Eugene; Brady, Mark; Kersten, Daniel; Hegdé, Jay

    2012-01-01

    In order to quantitatively study object perception, be it perception by biological systems or by machines, one needs to create objects and object categories with precisely definable, preferably naturalistic, properties1. Furthermore, for studies on perceptual learning, it is useful to create novel objects and object categories (or object classes) with such properties2. Many innovative and useful methods currently exist for creating novel objects and object categories3-6 (also see refs. 7,8). However, generally speaking, the existing methods have three broad types of shortcomings. First, shape variations are generally imposed by the experimenter5,9,10, and may therefore be different from the variability in natural categories, and optimized for a particular recognition algorithm. It would be desirable to have the variations arise independently of the externally imposed constraints. Second, the existing methods have difficulty capturing the shape complexity of natural objects11-13. If the goal is to study natural object perception, it is desirable for objects and object categories to be naturalistic, so as to avoid possible confounds and special cases. Third, it is generally hard to quantitatively measure the available information in the stimuli created by conventional methods. It would be desirable to create objects and object categories where the available information can be precisely measured and, where necessary, systematically manipulated (or 'tuned'). This allows one to formulate the underlying object recognition tasks in quantitative terms. Here we describe a set of algorithms, or methods, that meet all three of the above criteria. Virtual morphogenesis (VM) creates novel, naturalistic virtual 3-D objects called 'digital embryos' by simulating the biological process of embryogenesis14. Virtual phylogenesis (VP) creates novel, naturalistic object categories by simulating the evolutionary process of natural selection9,12,13. Objects and object categories created

  10. Functional Activation in the Ventral Object Processing Pathway during the First Year

    Directory of Open Access Journals (Sweden)

    Teresa eWilcox

    2016-01-01

    Full Text Available Infants' capacity to represent objects in visual working memory changes substantially during the first year of life. There is a growing body of research focused on identifying neural mechanisms that support this emerging capacity, and the extent to which visual object processing elicits different patterns of cortical activation in the infant as compared to the adult. Recent studies have identified areas in temporal and occipital cortex that mediate infants' developing capacity to track objects on the basis of their featural properties. The current research (Experiments 1 and 2 assessed patterns of activation in posterior temporal cortex and occipital cortex using fNIRS in infants 3 to 13 months of age as they viewed occlusion events. In the occlusion events, either the same object or featurally distinct objects emerged to each side of a screen. The outcome of these studies, combined, revealed that in infants 3 to 6 months, posterior temporal cortex was activated to all events, regardless of the featural properties of the objects and whether the event involved one object or two (featurally distinct objects. Infants 7 to 8 infants months showed a waning posterior temporal response and by 10 to 13 months this response was negligible. Additional analysis showed that the age groups did not differ in their visual attention to the events and that changes in HbO were better explained by age in days than head circumference. In contrast to posterior temporal cortex, robust activation was obtained in occipital cortex across all ages tested. One interpretation of these results is that they reflect pruning of the visual object-processing network during the first year. The functional contribution of occipital and posterior temporal cortex, along with higher-level temporal areas, to infants' capacity to keep track of distinct entities in visual working memory is discussed.

  11. Identifying patients at high risk for obstructive sleep apnoea ...

    African Journals Online (AJOL)

    Background: Obstructive sleep apnoea is associated with significant health consequences. A significant proportion of hospitalized patients at risk for obstructive sleep apnoea were never identified and referred for polysomnography for diagnosis. The objective of this study was to determine the factors associated with high ...

  12. Learning Object Repositories

    Science.gov (United States)

    Lehman, Rosemary

    2007-01-01

    This chapter looks at the development and nature of learning objects, meta-tagging standards and taxonomies, learning object repositories, learning object repository characteristics, and types of learning object repositories, with type examples. (Contains 1 table.)

  13. Acoustic features of objects matched by an echolocating bottlenose dolphin.

    Science.gov (United States)

    Delong, Caroline M; Au, Whitlow W L; Lemonds, David W; Harley, Heidi E; Roitblat, Herbert L

    2006-03-01

    The focus of this study was to investigate how dolphins use acoustic features in returning echolocation signals to discriminate among objects. An echolocating dolphin performed a match-to-sample task with objects that varied in size, shape, material, and texture. After the task was completed, the features of the object echoes were measured (e.g., target strength, peak frequency). The dolphin's error patterns were examined in conjunction with the between-object variation in acoustic features to identify the acoustic features that the dolphin used to discriminate among the objects. The present study explored two hypotheses regarding the way dolphins use acoustic information in echoes: (1) use of a single feature, or (2) use of a linear combination of multiple features. The results suggested that dolphins do not use a single feature across all object sets or a linear combination of six echo features. Five features appeared to be important to the dolphin on four or more sets: the echo spectrum shape, the pattern of changes in target strength and number of highlights as a function of object orientation, and peak and center frequency. These data suggest that dolphins use multiple features and integrate information across echoes from a range of object orientations.

  14. School Foodservice Personnel's Struggle with Using Labels to Identify Whole-Grain Foods

    Science.gov (United States)

    Chu, Yen Li; Orsted, Mary; Marquart, Len; Reicks, Marla

    2012-01-01

    Objective: To describe how school foodservice personnel use current labeling methods to identify whole-grain products and the influence on purchasing for school meals. Methods: Focus groups explored labeling methods to identify whole-grain products and barriers to incorporating whole-grain foods in school meals. Qualitative analysis procedures and…

  15. Objective past of a quantum universe: Redundant records of consistent histories

    Science.gov (United States)

    Riedel, C. Jess; Zurek, Wojciech H.; Zwolak, Michael

    2016-03-01

    Motivated by the advances of quantum Darwinism and recognizing the role played by redundancy in identifying the small subset of quantum states with resilience characteristic of objective classical reality, we explore the implications of redundant records for consistent histories. The consistent histories formalism is a tool for describing sequences of events taking place in an evolving closed quantum system. A set of histories is consistent when one can reason about them using Boolean logic, i.e., when probabilities of sequences of events that define histories are additive. However, the vast majority of the sets of histories that are merely consistent are flagrantly nonclassical in other respects. This embarras de richesses (known as the set selection problem) suggests that one must go beyond consistency to identify how the classical past arises in our quantum universe. The key intuition we follow is that the records of events that define the familiar objective past are inscribed in many distinct systems, e.g., subsystems of the environment, and are accessible locally in space and time to observers. We identify histories that are not just consistent but redundantly consistent using the partial-trace condition introduced by Finkelstein as a bridge between histories and decoherence. The existence of redundant records is a sufficient condition for redundant consistency. It selects, from the multitude of the alternative sets of consistent histories, a small subset endowed with redundant records characteristic of the objective classical past. The information about an objective history of the past is then simultaneously within reach of many, who can independently reconstruct it and arrive at compatible conclusions in the present.

  16. Location performance objectives for the NNWSI area-to-location screening activity

    Energy Technology Data Exchange (ETDEWEB)

    Sinnock, S.; Fernandez, J.A.

    1984-01-01

    Fifty-four objectives were identified to guide the screening of the Nevada Research and Development Area of the Nevada Test Site for relatively favorable locations for the disposal of nuclear waste in a mined geologic repository. The objectives were organized as a hierarchy composed of 4 upper-level, 12 middle-level, and 38 lower-level objectives. The four upper-level objectives account for broad national goals to contain and isolate nuclear waste in an environmentally sound and economically acceptable manner. The middle-level objectives correspond to topical categories that logically relate the upper-level objectives to site-specific concerns such as seismicity, sensitive species, and flooding hazards (represented by the lower-level objectives). The relative merits of alternative locations were compared by an application of decision analysis based on standard utility theory. The relative favorabilities of pertinent physical conditions at each alternative location were weighted in relation to the importance of objectives, and summed to produce maps indicating the most and the least favorable locations. Descriptions of the objectives were organized by the hierarchical format; they detail the applicability of each objective to geologic repository siting, previously published siting criteria corresponding to each objective, and the rationale for the weight assigned to each objective, and the pertinent attributes for evaluating locations with respect to each objective. 51 references, 47 figures, 4 tables.

  17. Location performance objectives for the NNWSI area-to-location screening activity

    International Nuclear Information System (INIS)

    Sinnock, S.; Fernandez, J.A.

    1984-01-01

    Fifty-four objectives were identified to guide the screening of the Nevada Research and Development Area of the Nevada Test Site for relatively favorable locations for the disposal of nuclear waste in a mined geologic repository. The objectives were organized as a hierarchy composed of 4 upper-level, 12 middle-level, and 38 lower-level objectives. The four upper-level objectives account for broad national goals to contain and isolate nuclear waste in an environmentally sound and economically acceptable manner. The middle-level objectives correspond to topical categories that logically relate the upper-level objectives to site-specific concerns such as seismicity, sensitive species, and flooding hazards (represented by the lower-level objectives). The relative merits of alternative locations were compared by an application of decision analysis based on standard utility theory. The relative favorabilities of pertinent physical conditions at each alternative location were weighted in relation to the importance of objectives, and summed to produce maps indicating the most and the least favorable locations. Descriptions of the objectives were organized by the hierarchical format; they detail the applicability of each objective to geologic repository siting, previously published siting criteria corresponding to each objective, and the rationale for the weight assigned to each objective, and the pertinent attributes for evaluating locations with respect to each objective. 51 references, 47 figures, 4 tables

  18. Object-based spatial attention when objects have sufficient depth cues.

    Science.gov (United States)

    Takeya, Ryuji; Kasai, Tetsuko

    2015-01-01

    Attention directed to a part of an object tends to obligatorily spread over all of the spatial regions that belong to the object, which may be critical for rapid object-recognition in cluttered visual scenes. Previous studies have generally used simple rectangles as objects and have shown that attention spreading is reflected by amplitude modulation in the posterior N1 component (150-200 ms poststimulus) of event-related potentials, while other interpretations (i.e., rectangular holes) may arise implicitly in early visual processing stages. By using modified Kanizsa-type stimuli that provided less ambiguity of depth ordering, the present study examined early event-related potential spatial-attention effects for connected and separated objects, both of which were perceived in front of (Experiment 1) and in back of (Experiment 2) the surroundings. Typical P1 (100-140 ms) and N1 (150-220 ms) attention effects of ERP in response to unilateral probes were observed in both experiments. Importantly, the P1 attention effect was decreased for connected objects compared to separated objects only in Experiment 1, and the typical object-based modulations of N1 were not observed in either experiment. These results suggest that spatial attention spreads over a figural object at earlier stages of processing than previously indicated, in three-dimensional visual scenes with multiple depth cues.

  19. Basic objects of marketing in project activities

    OpenAIRE

    Онищенко, Світлана Петрівна; Берневек, Тетяна Іванівна

    2013-01-01

    The article identified the main types of a project product from the point of view of a business level that is necessary to determine the specificity of the project marketing. As such objects of marketing - variants of the project product we have singled out: a product, a combination "product-market segment," a commodity group, a strategic business unit, a company. We have analyzed the relation "product life cycle - project-organization" and received a generalized representation of this relati...

  20. A Qualitative Study of US Clinical Ethics Services: Objectives and Outcomes.

    Science.gov (United States)

    McClimans, Leah; Pressgrove, Geah; Rhea, James

    2016-01-01

    The quality of clinical ethics services in health care organizations is increasingly seen as an important aspect of the overall quality of care. But measuring this quality is difficult because there is a lack of clarity and consensus regarding the objectives of clinical ethics and the best outcome domains to measure. The aim of this qualitative study is to explore the views of experts about the objectives and outcomes of clinical ethics services in the US. We interviewed 19 experts in clinical ethics, focusing on the appropriate objectives and outcomes of a clinical ethics service (CES). Participants were selected using a purposive snowball sampling strategy. The development of the interview protocol was informed by the clinical ethics literature as well as by research and theories that inform clinical ethics practice. Interviews were conducted by phone, recorded, and transcribed for individual analysis. Analysis proceeded through the development of a codebook of categories using QDA Miner software. Our experts identified 12 objectives and nine outcomes. Some of these identifications were familiar (e.g., mediation and satisfaction) and some were novel (e.g., be of service and transformation). We found that experts are divided in their emphasis on the kinds of objectives that are most important. In terms of outcomes, our experts were concerned with the appropriateness of different proxy and direct measures. This study provides the perspectives of a select group of experts on the objectives and outcomes appropriate for a CES in the United States. The themes identified will be used in future research to inform a Delphi study to refine and obtain expert consensus.

  1. Ikke-markerede reklamer på Instagram

    OpenAIRE

    Madsen, Nanna Bay; Mølgaard, Ida Nicole; Andersen, Møller; Emilie, Freja; Tworek, Nynne Billesbølle; Arenstorff, von; Sofie, Anna; Faarup, Astrid; Rasmussen, Josefine Løvig

    2014-01-01

    This project concerns concealed advertising on the social network Instagram. The purpose of the project is to generate knowledge about concealed advertising and the preconditions for its existence on Instagram. This is done in order to create greater awareness of concealed advertising in social networks. The project encompasses empirical data formed in three focus groups, in which users of In-stagram present their attitudes towards and experience with concealed advertising on Instagram. The p...

  2. Optimization of constrained multiple-objective reliability problems using evolutionary algorithms

    International Nuclear Information System (INIS)

    Salazar, Daniel; Rocco, Claudio M.; Galvan, Blas J.

    2006-01-01

    This paper illustrates the use of multi-objective optimization to solve three types of reliability optimization problems: to find the optimal number of redundant components, find the reliability of components, and determine both their redundancy and reliability. In general, these problems have been formulated as single objective mixed-integer non-linear programming problems with one or several constraints and solved by using mathematical programming techniques or special heuristics. In this work, these problems are reformulated as multiple-objective problems (MOP) and then solved by using a second-generation Multiple-Objective Evolutionary Algorithm (MOEA) that allows handling constraints. The MOEA used in this paper (NSGA-II) demonstrates the ability to identify a set of optimal solutions (Pareto front), which provides the Decision Maker with a complete picture of the optimal solution space. Finally, the advantages of both MOP and MOEA approaches are illustrated by solving four redundancy problems taken from the literature

  3. Optimization of constrained multiple-objective reliability problems using evolutionary algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Salazar, Daniel [Instituto de Sistemas Inteligentes y Aplicaciones Numericas en Ingenieria (IUSIANI), Division de Computacion Evolutiva y Aplicaciones (CEANI), Universidad de Las Palmas de Gran Canaria, Islas Canarias (Spain) and Facultad de Ingenieria, Universidad Central Venezuela, Caracas (Venezuela)]. E-mail: danielsalazaraponte@gmail.com; Rocco, Claudio M. [Facultad de Ingenieria, Universidad Central Venezuela, Caracas (Venezuela)]. E-mail: crocco@reacciun.ve; Galvan, Blas J. [Instituto de Sistemas Inteligentes y Aplicaciones Numericas en Ingenieria (IUSIANI), Division de Computacion Evolutiva y Aplicaciones (CEANI), Universidad de Las Palmas de Gran Canaria, Islas Canarias (Spain)]. E-mail: bgalvan@step.es

    2006-09-15

    This paper illustrates the use of multi-objective optimization to solve three types of reliability optimization problems: to find the optimal number of redundant components, find the reliability of components, and determine both their redundancy and reliability. In general, these problems have been formulated as single objective mixed-integer non-linear programming problems with one or several constraints and solved by using mathematical programming techniques or special heuristics. In this work, these problems are reformulated as multiple-objective problems (MOP) and then solved by using a second-generation Multiple-Objective Evolutionary Algorithm (MOEA) that allows handling constraints. The MOEA used in this paper (NSGA-II) demonstrates the ability to identify a set of optimal solutions (Pareto front), which provides the Decision Maker with a complete picture of the optimal solution space. Finally, the advantages of both MOP and MOEA approaches are illustrated by solving four redundancy problems taken from the literature.

  4. Identification of a Multicriteria Decision-Making Model Using the Characteristic Objects Method

    Directory of Open Access Journals (Sweden)

    Andrzej Piegat

    2014-01-01

    Full Text Available This paper presents a new, nonlinear, multicriteria, decision-making method: the characteristic objects (COMET. This approach, which can be characterized as a fuzzy reference model, determines a measurement standard for decision-making problems. This model is distinguished by a constant set of specially chosen characteristic objects that are independent of the alternatives. After identifying a multicriteria model, this method can be used to compare any number of decisional objects (alternatives and select the best one. In the COMET, in contrast to other methods, the rank-reversal phenomenon is not observed. Rank-reversal is a paradoxical feature in the decision-making methods, which is caused by determining the absolute evaluations of considered alternatives on the basis of the alternatives themselves. In the Analytic Hierarchy Process (AHP method and similar methods, when a new alternative is added to the original alternative set, the evaluation base and the resulting evaluations of all objects change. A great advantage of the COMET is its ability to identify not only linear but also nonlinear multicriteria models of decision makers. This identification is based not on a ranking of component criteria of the multicriterion but on a ranking of a larger set of characteristic objects (characteristic alternatives that are independent of the small set of alternatives analyzed in a given problem. As a result, the COMET is free of the faults of other methods.

  5. Mining the Kilo-Degree Survey for solar system objects

    Science.gov (United States)

    Mahlke, M.; Bouy, H.; Altieri, B.; Verdoes Kleijn, G.; Carry, B.; Bertin, E.; de Jong, J. T. A.; Kuijken, K.; McFarland, J.; Valentijn, E.

    2018-02-01

    Context. The search for minor bodies in the solar system promises insights into its formation history. Wide imaging surveys offer the opportunity to serendipitously discover and identify these traces of planetary formation and evolution. Aim. We aim to present a method to acquire position, photometry, and proper motion measurements of solar system objects (SSOs) in surveys using dithered image sequences. The application of this method on the Kilo-Degree Survey (KiDS) is demonstrated. Methods: Optical images of 346 deg2 fields of the sky are searched in up to four filters using the AstrOmatic software suite to reduce the pixel to catalog data. The SSOs within the acquired sources are selected based on a set of criteria depending on their number of observation, motion, and size. The Virtual Observatory SkyBoT tool is used to identify known objects. Results: We observed 20 221 SSO candidates, with an estimated false-positive content of less than 0.05%. Of these SSO candidates, 53.4% are identified by SkyBoT. KiDS can detect previously unknown SSOs because of its depth and coverage at high ecliptic latitude, including parts of the Southern Hemisphere. Thus we expect the large fraction of the 46.6% of unidentified objects to be truly new SSOs. Conclusions: Our method is applicable to a variety of dithered surveys such as DES, LSST, and Euclid. It offers a quick and easy-to-implement search for SSOs. SkyBoT can then be used to estimate the completeness of the recovered sample. The tables of raw data are only available at the CDS via anonymous ftp to http://cdsarc.u-strasbg.fr (http://130.79.128.5) or via http://cdsarc.u-strasbg.fr/viz-bin/qcat?J/A+A/610/A21

  6. BL Lacertae objects

    International Nuclear Information System (INIS)

    Disney, M.J.; Veron, P.

    1977-01-01

    The properties of BL Lacertae objects are discussed including their spectra, variability, and brightness. The historical development of observation, and the conclusion that these objects are possibly quasar-related objects rather than variable stars as originally supposed are treated. The possible mechanisms for the unusual luminosity of these objects are considered

  7. Conceptual Coherence Affects Phonological Activation of Context Objects During Object Naming

    NARCIS (Netherlands)

    Oppermann, F.; Jescheniak, J.D.; Schriefers, H.J.

    2008-01-01

    In 4 picture-word interference experiments, speakers named a target object that was presented with a context object. Using auditory distractors that were phonologically related or unrelated either to the target object or the context object, the authors assessed whether phonological processing was

  8. Seeing Objects as Faces Enhances Object Detection.

    Science.gov (United States)

    Takahashi, Kohske; Watanabe, Katsumi

    2015-10-01

    The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  9. Seeing Objects as Faces Enhances Object Detection

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2015-09-01

    Full Text Available The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  10. Mapping Robots to Therapy and Educational Objectives for Children with Autism Spectrum Disorder

    Science.gov (United States)

    Huijnen, Claire A. G. J.; Lexis, Monique A. S.; Jansens, Rianne; de Witte, Luc P.

    2016-01-01

    The aim of this study was to increase knowledge on therapy and educational objectives professionals work on with children with autism spectrum disorder (ASD) and to identify corresponding state of the art robots. Focus group sessions (n = 9) with ASD professionals (n = 53) from nine organisations were carried out to create an objectives overview,…

  11. Aerodynamic multi-objective integrated optimization based on principal component analysis

    Directory of Open Access Journals (Sweden)

    Jiangtao HUANG

    2017-08-01

    Full Text Available Based on improved multi-objective particle swarm optimization (MOPSO algorithm with principal component analysis (PCA methodology, an efficient high-dimension multi-objective optimization method is proposed, which, as the purpose of this paper, aims to improve the convergence of Pareto front in multi-objective optimization design. The mathematical efficiency, the physical reasonableness and the reliability in dealing with redundant objectives of PCA are verified by typical DTLZ5 test function and multi-objective correlation analysis of supercritical airfoil, and the proposed method is integrated into aircraft multi-disciplinary design (AMDEsign platform, which contains aerodynamics, stealth and structure weight analysis and optimization module. Then the proposed method is used for the multi-point integrated aerodynamic optimization of a wide-body passenger aircraft, in which the redundant objectives identified by PCA are transformed to optimization constraints, and several design methods are compared. The design results illustrate that the strategy used in this paper is sufficient and multi-point design requirements of the passenger aircraft are reached. The visualization level of non-dominant Pareto set is improved by effectively reducing the dimension without losing the primary feature of the problem.

  12. Implications of perspective in teaching objects first and object design

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2005-01-01

    There are an increasing number of books published on the important topics of "object-oriented programming" and "object-oriented design" for use in education. However, object-orientation can be viewed from a number of different perspectives---each perspective having its benefits and liabilities...

  13. Object-orientated DBMS techniques for time-oriented medical record.

    Science.gov (United States)

    Pinciroli, F; Combi, C; Pozzi, G

    1992-01-01

    In implementing time-orientated medical record (TOMR) management systems, use of a relational model played a big role. Many applications have been developed to extend query and data manipulation languages to temporal aspects of information. Our experience in developing TOMR revealed some deficiencies inside the relational model, such as: (a) abstract data type definition; (b) unified view of data, at a programming level; (c) management of temporal data; (d) management of signals and images. We identified some first topics to face by an object-orientated approach to database design. This paper describes the first steps in designing and implementing a TOMR by an object-orientated DBMS.

  14. Associative recognition and the hippocampus: differential effects of hippocampal lesions on object-place, object-context and object-place-context memory.

    Science.gov (United States)

    Langston, Rosamund F; Wood, Emma R

    2010-10-01

    The hippocampus is thought to be required for the associative recognition of objects together with the spatial or temporal contexts in which they occur. However, recent data showing that rats with fornix lesions perform as well as controls in an object-place task, while being impaired on an object-place-context task (Eacott and Norman (2004) J Neurosci 24:1948-1953), suggest that not all forms of context-dependent associative recognition depend on the integrity of the hippocampus. To examine the role of the hippocampus in context-dependent recognition directly, the present study tested the effects of large, selective, bilateral hippocampus lesions in rats on performance of a series of spontaneous recognition memory tasks: object recognition, object-place recognition, object-context recognition and object-place-context recognition. Consistent with the effects of fornix lesions, animals with hippocampus lesions were impaired only on the object-place-context task. These data confirm that not all forms of context-dependent associative recognition are mediated by the hippocampus. Subsequent experiments suggested that the object-place task does not require an allocentric representation of space, which could account for the lack of impairment following hippocampus lesions. Importantly, as the object-place-context task has similar spatial requirements, the selective deficit in object-place-context recognition suggests that this task requires hippocampus-dependent neural processes distinct from those required for allocentric spatial memory, or for object memory, object-place memory or object-context memory. Two possibilities are that object, place, and context information converge only in the hippocampus, or that recognition of integrated object-place-context information requires a hippocampus-dependent mode of retrieval, such as recollection. © 2009 Wiley-Liss, Inc.

  15. Higher Level Visual Cortex Represents Retinotopic, Not Spatiotopic, Object Location

    Science.gov (United States)

    Kanwisher, Nancy

    2012-01-01

    The crux of vision is to identify objects and determine their locations in the environment. Although initial visual representations are necessarily retinotopic (eye centered), interaction with the real world requires spatiotopic (absolute) location information. We asked whether higher level human visual cortex—important for stable object recognition and action—contains information about retinotopic and/or spatiotopic object position. Using functional magnetic resonance imaging multivariate pattern analysis techniques, we found information about both object category and object location in each of the ventral, dorsal, and early visual regions tested, replicating previous reports. By manipulating fixation position and stimulus position, we then tested whether these location representations were retinotopic or spatiotopic. Crucially, all location information was purely retinotopic. This pattern persisted when location information was irrelevant to the task, and even when spatiotopic (not retinotopic) stimulus position was explicitly emphasized. We also conducted a “searchlight” analysis across our entire scanned volume to explore additional cortex but again found predominantly retinotopic representations. The lack of explicit spatiotopic representations suggests that spatiotopic object position may instead be computed indirectly and continually reconstructed with each eye movement. Thus, despite our subjective impression that visual information is spatiotopic, even in higher level visual cortex, object location continues to be represented in retinotopic coordinates. PMID:22190434

  16. Multiple Object Permanence Tracking: Maintenance, Retrieval and Transformation of Dynamic Object Representations

    OpenAIRE

    Saiki, Jun

    2008-01-01

    Multiple object permanence tracking (MOPT) task revealed that our ability of maintaining and transforming multiple representations of complex feature-bound objects is limited to handle only 1-2 objects. Often reported capacity of 3-5 objects likely reflects memory for partial representations of objects and simple cases such as just color and their locations. Also, performance in multiple object tracking (MOT) task is likely mediated by spatiotemporal indices, not by feature-bound object repre...

  17. Mistakes and missed opportunities regarding cosmetic surgery and conscientious objection.

    Science.gov (United States)

    Saad, Toni C

    2017-04-24

    In her paper 'Cosmetic surgery and conscientious objection', Minerva rightly identifies cosmetic surgery as an interesting test case for the question of conscientious objection in medicine. Her treatment of this important subject, however, seems problematic. It is argued that Minerva's suggestion that a doctor has a prima facie duty to satisfy patient preferences even against his better clinical judgment, which we call Patient Preference Absolutism, must be regarded with scepticism. This is because (1) it overlooks an important distinction regarding autonomy's meaning and place in clinical practice, and (2) it makes obsolete the important concepts of expert clinical judgment and beneficence. Finally, we discuss two ideas which emerge from consideration of cosmetic surgery in relation to conscientious objection. These are the possible analogy between clinical judgment and conscientious objection, and the possible role the goals of medicine can play in defining the scope of conscientious objection. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  18. Comparative analysis of imaging configurations and objectives for Fourier microscopy.

    Science.gov (United States)

    Kurvits, Jonathan A; Jiang, Mingming; Zia, Rashid

    2015-11-01

    Fourier microscopy is becoming an increasingly important tool for the analysis of optical nanostructures and quantum emitters. However, achieving quantitative Fourier space measurements requires a thorough understanding of the impact of aberrations introduced by optical microscopes that have been optimized for conventional real-space imaging. Here we present a detailed framework for analyzing the performance of microscope objectives for several common Fourier imaging configurations. To this end, we model objectives from Nikon, Olympus, and Zeiss using parameters that were inferred from patent literature and confirmed, where possible, by physical disassembly. We then examine the aberrations most relevant to Fourier microscopy, including the alignment tolerances of apodization factors for different objective classes, the effect of magnification on the modulation transfer function, and vignetting-induced reductions of the effective numerical aperture for wide-field measurements. Based on this analysis, we identify an optimal objective class and imaging configuration for Fourier microscopy. In addition, the Zemax files for the objectives and setups used in this analysis have been made publicly available as a resource for future studies.

  19. Motivational Objects in Natural Scenes (MONS): A Database of >800 Objects.

    Science.gov (United States)

    Schomaker, Judith; Rau, Elias M; Einhäuser, Wolfgang; Wittmann, Bianca C

    2017-01-01

    In daily life, we are surrounded by objects with pre-existing motivational associations. However, these are rarely controlled for in experiments with natural stimuli. Research on natural stimuli would therefore benefit from stimuli with well-defined motivational properties; in turn, such stimuli also open new paths in research on motivation. Here we introduce a database of Motivational Objects in Natural Scenes (MONS). The database consists of 107 scenes. Each scene contains 2 to 7 objects placed at approximately equal distance from the scene center. Each scene was photographed creating 3 versions, with one object ("critical object") being replaced to vary the overall motivational value of the scene (appetitive, aversive, and neutral), while maintaining high visual similarity between the three versions. Ratings on motivation, valence, arousal and recognizability were obtained using internet-based questionnaires. Since the main objective was to provide stimuli of well-defined motivational value, three motivation scales were used: (1) Desire to own the object; (2) Approach/Avoid; (3) Desire to interact with the object. Three sets of ratings were obtained in independent sets of observers: for all 805 objects presented on a neutral background, for 321 critical objects presented in their scene context, and for the entire scenes. On the basis of the motivational ratings, objects were subdivided into aversive, neutral, and appetitive categories. The MONS database will provide a standardized basis for future studies on motivational value under realistic conditions.

  20. Exploring the relationship between object realism and object-based attention effects.

    Science.gov (United States)

    Roque, Nelson; Boot, Walter R

    2015-09-01

    Visual attention prioritizes processing of locations in space, and evidence also suggests that the benefits of attention can be shaped by the presence of objects (object-based attention). However, the prevalence of object-based attention effects has been called into question recently by evidence from a large-sampled study employing classic attention paradigms (Pilz et al., 2012). We conducted two experiments to explore factors that might determine when and if object-based attention effects are observed, focusing on the degree to which the concreteness and realism of objects might contribute to these effects. We adapted the classic attention paradigm first reported by Egly, Driver, and Rafal (1994) by replacing abstract bar stimuli in some conditions with objects that were more concrete and familiar to participants: items of silverware. Furthermore, we varied the realism of these items of silverware, presenting either cartoon versions or photo-realistic versions. Contrary to predictions, increased realism did not increase the size of object-based effects. In fact, no clear object-based effects were observed in either experiment, consistent with previous failures to replicate these effects in similar paradigms. While object-based attention may exist, and may have important influences on how we parse the visual world, these and other findings suggest that the two-object paradigm typically relied upon to study object-based effects may not be the best paradigm to investigate these issues. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Herbig-Haro objects

    International Nuclear Information System (INIS)

    Schwartz, R.D.

    1983-01-01

    Progress in the understanding of Herbig-Haro (HH) objects is reviewed. The results of optical studies of the proper motions and alignments, variability, and polarization of HH objects and the results of spectroscopic studies are discussed. Ground-based infrared studies and far-infrared observations are reviewed. Findings on the properties of molecular clouds associated with HH objects, on gas flows associated with HH IR stars, on maser emission, and on radio continuum observations are considered. A history of proposed excitation mechanisms for HH objects is briefly presented, and the salient shock-wave calculations aimed at synthesizing the spectra of HH objects are summarized along with hypotheses that have been advanced about the origin of the objects. 141 references

  2. Being seen or being watched? A psychoanalytic perspective on body dysmorphia.

    Science.gov (United States)

    Lemma, Alessandra

    2009-08-01

    The focus of this paper is on individuals who present as excessively preoccupied with their body, perceiving some aspect(s) to be 'ugly' such that they feel compelled to alter and/or conceal this 'ugly' body part. These difficulties are understood as symptoms of an underlying narcissistic disturbance. The author suggests that the relative pervasiveness of an identification with a 'super'-ego accounts for the degree of severity of the disturbance (increasing the compulsion to alter and/or conceal the hated body part) and that it has implications for the patient's accessibility in analytic treatment. Understanding the vicissitudes of the development of the body-self in the context of the earliest relationship with the 'object of desire' is core to helping these patients because of the quality of the identifications that ensue and that are then enacted the transference.

  3. Misidentifying a tennis racket as keys: object identification in people with age-related macular degeneration.

    Science.gov (United States)

    Thibaut, Miguel; Tran, Thi Ha Chau; Delerue, Céline; Boucart, Muriel

    2015-05-01

    Previous studies showed that people with age-related macular degeneration (AMD) can categorise a pre-defined target object or scene with high accuracy (above 80%). In these studies participants were asked to detect the target (e.g. an animal) in serial visual presentation. People with AMD must rely on peripheral vision which is more adapted to the low resolution required for detection than for the higher resolution required to identify a specific exemplar. We investigated the ability of people with central vision loss to identify photographs of objects and scenes. Photographs of isolated objects, natural scenes and objects in scenes were centrally displayed for 2 s each. Participants were asked to name the stimuli. We measured accuracy and naming times in 20 patients with AMD, 15 age-matched and 12 young controls. Accuracy was lower (by about 30%) and naming times were longer (by about 300 ms) in people with AMD than in age-matched controls in the three categories of images. Correct identification occurred in 62-66% of the stimuli for patients. More than 20% of the misidentifications resulted from a structural and/or semantic similarity between the object and the name (e.g. spectacles for dog plates or dolphin for shark). Accuracy and naming times did not differ significantly between young and older normally sighted participants indicating that the deficits resulted from pathology rather than to normal ageing. These results show that, in contrast to performance for categorisation of a single pre-defined target, people with central vision loss are impaired at identifying various objects and scenes. The decrease in accuracy and the increase in response times in patients with AMD indicate that peripheral vision might be sufficient for object and scene categorisation but not for precise scene or object identification. © 2015 The Authors Ophthalmic & Physiological Optics © 2015 The College of Optometrists.

  4. Identifying strategies to improve the effectiveness of booster seat laws

    Science.gov (United States)

    2008-05-01

    The objective of this project was to identify strategies to improve the effectiveness of booster seat laws. The project explored the possible factors that relate to the use and nonuse of booster seats, and examined the attitudes of law enforcement of...

  5. A Neural Model Combining Attentional Orienting to Object Recognition: Preliminary Explorations on the Interplay Between Where and What

    National Research Council Canada - National Science Library

    Miau, Florence

    2001-01-01

    ... ("where") pathway and an object recognition ("what") pathway. The fast visual attention front-end rapidly selects the few most conspicuous image locations, and the slower object recognition back-end identifies objects at the selected locations...

  6. Neutron tomography of axially symmetric objects using 14 MeV neutrons from a portable neutron generator

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, P., E-mail: peter.andersson@physics.uu.se; Andersson-Sunden, E.; Sjöstrand, H.; Jacobsson-Svärd, S. [Department of Physics and Astronomy, Division of Applied Nuclear Physics, Uppsala University, Lägerhyddsgatan 1, 751 20 Uppsala (Sweden)

    2014-08-01

    In nuclear boiling water reactor cores, the distribution of water and steam (void) is essential for both safety and efficiency reasons. In order to enhance predictive capabilities, void distribution assessment is performed in two-phase test-loops under reactor-relevant conditions. This article proposes the novel technique of fast-neutron tomography using a portable deuterium-tritium neutron generator to determine the time-averaged void distribution in these loops. Fast neutrons have the advantage of high transmission through the metallic structures and pipes typically concealing a thermal-hydraulic test loop, while still being fairly sensitive to the water/void content. However, commercially available fast-neutron generators also have the disadvantage of a relatively low yield and fast-neutron detection also suffers from relatively low detection efficiency. Fortunately, some loops are axially symmetric, a property which can be exploited to reduce the amount of data needed for tomographic measurement, thus limiting the interrogation time needed. In this article, three axially symmetric test objects depicting a thermal-hydraulic test loop have been examined; steel pipes with outer diameter 24 mm, thickness 1.5 mm, and with three different distributions of the plastic material POM inside the pipes. Data recorded with the FANTOM fast-neutron tomography instrument have been used to perform tomographic reconstructions to assess their radial material distribution. Here, a dedicated tomographic algorithm that exploits the symmetry of these objects has been applied, which is described in the paper. Results are demonstrated in 20 rixel (radial pixel) reconstructions of the interior constitution and 2D visualization of the pipe interior is demonstrated. The local POM attenuation coefficients in the rixels were measured with errors (RMS) of 0.025, 0.020, and 0.022 cm{sup −1}, solid POM attenuation coefficient. The accuracy and precision is high enough to provide a useful

  7. Neutron tomography of axially symmetric objects using 14 MeV neutrons from a portable neutron generator.

    Science.gov (United States)

    Andersson, P; Andersson-Sunden, E; Sjöstrand, H; Jacobsson-Svärd, S

    2014-08-01

    In nuclear boiling water reactor cores, the distribution of water and steam (void) is essential for both safety and efficiency reasons. In order to enhance predictive capabilities, void distribution assessment is performed in two-phase test-loops under reactor-relevant conditions. This article proposes the novel technique of fast-neutron tomography using a portable deuterium-tritium neutron generator to determine the time-averaged void distribution in these loops. Fast neutrons have the advantage of high transmission through the metallic structures and pipes typically concealing a thermal-hydraulic test loop, while still being fairly sensitive to the water/void content. However, commercially available fast-neutron generators also have the disadvantage of a relatively low yield and fast-neutron detection also suffers from relatively low detection efficiency. Fortunately, some loops are axially symmetric, a property which can be exploited to reduce the amount of data needed for tomographic measurement, thus limiting the interrogation time needed. In this article, three axially symmetric test objects depicting a thermal-hydraulic test loop have been examined; steel pipes with outer diameter 24 mm, thickness 1.5 mm, and with three different distributions of the plastic material POM inside the pipes. Data recorded with the FANTOM fast-neutron tomography instrument have been used to perform tomographic reconstructions to assess their radial material distribution. Here, a dedicated tomographic algorithm that exploits the symmetry of these objects has been applied, which is described in the paper. Results are demonstrated in 20 rixel (radial pixel) reconstructions of the interior constitution and 2D visualization of the pipe interior is demonstrated. The local POM attenuation coefficients in the rixels were measured with errors (RMS) of 0.025, 0.020, and 0.022 cm(-1), solid POM attenuation coefficient. The accuracy and precision is high enough to provide a useful

  8. Significance of Objective Structured Clinical Examinations to Plastic Surgery Residency Training.

    Science.gov (United States)

    Simmons, Brian J; Zoghbi, Yasmina; Askari, Morad; Birnbach, David J; Shekhter, Ilya; Thaller, Seth R

    2017-09-01

    Objective structured clinical examinations (OSCEs) have proven to be a powerful tool. They possess more than a 30-year track record in assessing the competency of medical students, residents, and fellows. Objective structured clinical examinations have been used successfully in a variety of medical specialties, including surgery. They have recently found their way into the subspecialty of plastic surgery. This article uses a systematic review of the available literature on OSCEs and their recent use in plastic surgery. It incorporates survey results assessing program directors' views on the use of OSCEs. Approximately 40% of programs surveyed use OSCEs to assess the Accreditation Council for Graduate Medical Education core competencies. We found that 40% use OSCEs to evaluate specific plastic surgery milestones. Objective structured clinical examinations are usually performed annually. They cost anywhere between $100 and more than $1000 per resident. Four milestones giving residents the most difficulties on OSCEs were congenital anomalies, noncancer breast surgery, breast reconstruction, and practice-based learning and improvement. It was determined that challenges with milestones were due to lack of adequate general knowledge and surgical ward patient care, as well as deficits in professionalism and system-based problems. Programs were able to remediate weakness found by OSCEs using a variety of methods. Objective structured clinical examinations offer a unique tool to objectively assess the proficiency of residents in key areas of the Accreditation Council for Graduate Medical Education core competencies. In addition, they can be used to assess the specific milestones that plastic surgery residents must meet. This allows programs to identify and improve identified areas of weakness.

  9. Environmental measurements and technology for non-proliferation objectives. Final report

    International Nuclear Information System (INIS)

    Broadway, J.A.

    1998-01-01

    The purpose of this study is to identify multi-disciplinary and single focus laboratories from the environmental and public health communities that can serve as technical center of opportunity for nuclear, inorganic and organic analyses. The objectives of the Office of Research and Development effort are twofold: (1) to identify the technology shortcomings and technologies gaps (thus requirements) within these communities that could benefit from state-of-the-art infield analysis technologies currently under development and (2) to promote scientist-to-scientist dialog and technical exchange under such existing US government internship programs (eg SABIT/USDOC) to improve skills and work relationships. Although the data analysis will focus on environmentally sensitive signatures and materials, the office of Research and Development wishes to further its nuclear non-proliferation objectives by assessing the current technical skill and ingenious analytical tools in less-developed countries so as to broaden the base of capability for multi-species measurement technology development

  10. The Influence of New European Union Driver’s License Legislation on Reporting of Severe Hypoglycemia by Patients With Type 1 Diabetes

    DEFF Research Database (Denmark)

    Pedersen-Bjergaard, Ulrik; Færch, Louise; Allingbjerg, Marie-Louise

    2015-01-01

    OBJECTIVE: We test the hypotheses that the implementation in Denmark of new, stricter European Union (EU) legislation on driver's licensing, with the purpose to improve traffic safety in January 2012, has reduced the self-reported rate of severe hypoglycemia in a routine clinical setting...... of concealed severe hypoglycemia may impair the safety of affected patients and unintentionally paradoxically reduce the general traffic safety....

  11. The Reviewing of Object Files: Object-Specific Integration of Information.

    Science.gov (United States)

    Kahneman, Daniel; And Others

    1992-01-01

    Seven experiments involving a total of 203 college students explored a form of object-specific priming and established a robust object-specific benefit that indicates that a new stimulus will be named faster if it physically matches a previous stimulus seen as part of the same perceptual object. (SLD)

  12. CoMIC: Good features for detection and matching at object boundaries

    OpenAIRE

    Ravindran, Swarna Kamlam; Mittal, Anurag

    2014-01-01

    Feature or interest points typically use information aggregation in 2D patches which does not remain stable at object boundaries when there is object motion against a significantly varying background. Level or iso-intensity curves are much more stable under such conditions, especially the longer ones. In this paper, we identify stable portions on long iso-curves and detect corners on them. Further, the iso-curve associated with a corner is used to discard portions from the background and impr...

  13. Effect of objective function on multi-objective inverse planning of radiation therapy

    International Nuclear Information System (INIS)

    Li Guoli; Wu Yican; Song Gang; Wang Shifang

    2006-01-01

    There are two kinds of objective functions in radiotherapy inverse planning: dose distribution-based and Dose-Volume Histogram (DVH)-based functions. The treatment planning in our days is still a trial and error process because the multi-objective problem is solved by transforming it into a single objective problem using a specific set of weights for each object. This work investigates the problem of objective function setting based on Pareto multi-optimization theory, and compares the effect on multi-objective inverse planning of those two kinds of objective functions including calculation time, converge speed, etc. The basis of objective function setting on inverse planning is discussed. (authors)

  14. Ten years of Object-Oriented analysis on H1

    International Nuclear Information System (INIS)

    Laycock, Paul

    2012-01-01

    Over a decade ago, the H1 Collaboration decided to embrace the object-oriented paradigm and completely redesign its data analysis model and data storage format. The event data model, based on the ROOT framework, consists of three layers - tracks and calorimeter clusters, identified particles and finally event summary data - with a singleton class providing unified access. This original solution was then augmented with a fourth layer containing user-defined objects. This contribution will summarise the history of the solutions used, from modifications to the original design, to the evolution of the high-level end-user analysis object framework which is used by H1 today. Several important issues are addressed - the portability of expert knowledge to increase the efficiency of data analysis, the flexibility of the framework to incorporate new analyses, the performance and ease of use, and lessons learned for future projects.

  15. Identifying and Assessing Self-Images in Drawings by Delinquent Adolescents (in 2 Parts).

    Science.gov (United States)

    Silver, Rawley; Ellison, JoAnne

    1995-01-01

    Examines assumption that art therapists can objectively identify self-images in drawings by troubled adolescents without talking to these youth. Findings suggest that discussion, though preferable, is not required for identifying self-images. Analysis of adolescents' drawings indicates that structured art assessment can be useful in evaluating…

  16. Architectural Implications for Spatial Object Association Algorithms*

    Science.gov (United States)

    Kumar, Vijay S.; Kurc, Tahsin; Saltz, Joel; Abdulla, Ghaleb; Kohn, Scott R.; Matarazzo, Celeste

    2013-01-01

    Spatial object association, also referred to as crossmatch of spatial datasets, is the problem of identifying and comparing objects in two or more datasets based on their positions in a common spatial coordinate system. In this work, we evaluate two crossmatch algorithms that are used for astronomical sky surveys, on the following database system architecture configurations: (1) Netezza Performance Server®, a parallel database system with active disk style processing capabilities, (2) MySQL Cluster, a high-throughput network database system, and (3) a hybrid configuration consisting of a collection of independent database system instances with data replication support. Our evaluation provides insights about how architectural characteristics of these systems affect the performance of the spatial crossmatch algorithms. We conducted our study using real use-case scenarios borrowed from a large-scale astronomy application known as the Large Synoptic Survey Telescope (LSST). PMID:25692244

  17. Vicarious learning from human models in monkeys.

    Science.gov (United States)

    Falcone, Rossella; Brunamonti, Emiliano; Genovesio, Aldo

    2012-01-01

    We examined whether monkeys can learn by observing a human model, through vicarious learning. Two monkeys observed a human model demonstrating an object-reward association and consuming food found underneath an object. The monkeys observed human models as they solved more than 30 learning problems. For each problem, the human models made a choice between two objects, one of which concealed a piece of apple. In the test phase afterwards, the monkeys made a choice of their own. Learning was apparent from the first trial of the test phase, confirming the ability of monkeys to learn by vicarious observation of human models.

  18. Contraband detection

    International Nuclear Information System (INIS)

    Gozzani, T.

    1995-01-01

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container

  19. Contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Gozzani, T. [Science Applications International Corporation, Santa Clara (United States)

    1995-07-15

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container.

  20. Financial incentive does not affect P300 (in response to certain episodic and semantic probe stimuli) in the Complex Trial Protocol (CTP) version of the Concealed Information Test (CIT) in detection of malingering.

    Science.gov (United States)

    Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren

    2017-05-01

    Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.