WorldWideScience

Sample records for identify concealed objects

  1. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    -to-noise parameter to determine how the frequencies contained in the echo dataset are normalised. The chosen image reconstruction algorithm is based on the back-projection method. The algorithm was implemented in MATLAB and uses a pre-calculated sensitivity matrix to increase the computation speed. The results include both 2D and 3D image datasets. The 3D datasets were obtained by scanning the dual sixteen element linear antenna array over the test object. The system has been tested on both humans and mannequin test objects. The front surface of an object placed on the human/mannequin torso is clearly visible, but its presence is also seen from a tell-tale imaging characteristic. This characteristic is caused by a reduction in the wave velocity as the electromagnetic radiation passes through the object, and manifests as an indentation in the reconstructed image that is readily identifiable. The prototype system has been shown to easily detect a 12 mm x 30 mm x70 mm plastic object concealed under clothing.

  2. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    Science.gov (United States)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  3. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  4. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    Science.gov (United States)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  5. Expanded opportunities of THz passive camera for the detection of concealed objects

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  6. Persistent Identifiers as Boundary Objects

    Science.gov (United States)

    Parsons, M. A.; Fox, P. A.

    2017-12-01

    In 1989, Leigh Star and Jim Griesemer defined the seminal concept of `boundary objects'. These `objects' are what Latour calls `immutable mobiles' that enable communication and collaboration across difference by helping meaning to be understood in different contexts. As Star notes, they are a sort of arrangement that allow different groups to work together without (a priori) consensus. Part of the idea is to recognize and allow for the `interpretive flexibility' that is central to much of the `constructivist' approach in the sociology of science. Persistent Identifiers (PIDs) can clearly act as boundary objects, but people do not usually assume that they enable interpretive flexibility. After all, they are meant to be unambiguous, machine-interpretable identifiers of defined artifacts. In this paper, we argue that PIDs can fill at least two roles: 1) That of the standardized form, where there is strong agreement on what is being represented and how and 2) that of the idealized type, a more conceptual concept that allows many different representations. We further argue that these seemingly abstract conceptions actually help us implement PIDs more effectively to link data, publications, various other artifacts, and especially people. Considering PIDs as boundary objects can help us address issues such as what level of granularity is necessary for PIDs, what metadata should be directly associated with PIDs, and what purpose is the PID serving (reference, provenance, credit, etc.). In short, sociological theory can improve data sharing standards and their implementation in a way that enables broad interdisciplinary data sharing and reuse. We will illustrate this with several specific examples of Earth science data.

  7. Can methodological requirements be fulfilled when studying concealed or unethical research objects? The case of astroturfing

    Directory of Open Access Journals (Sweden)

    Sophie BOULAY

    2013-12-01

    Full Text Available Scientific soundness is key in the development of research designs. Methodological choices bear the responsibility to demonstrate its obtainment. However, it is challenging to abide by these standards while dealing with hidden, masked or unethical objects. In this article, we share the various strategies employed to aim at a sound scientific process in spite of astroturfing’s characteristics and of the methodological orientations it dictates. Facing the dilemma between the importance of scientific value and the richness of inductive and exploratory approaches, we question the influence of positivist research standards in communication studies. We fear these requirements may limit their development.

  8. Concealing with structured light.

    Science.gov (United States)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  9. Having your radioactive objects identified and collected

    International Nuclear Information System (INIS)

    2012-12-01

    This brochure explains the risks linked with some ancient radioactive objects of domestic use (like radium products of medical use), how to identify them and to have them collected by the French national agency of radioactive wastes (Andra) for further processing. Some advice are given regarding the identification of the objects, their relative hazardousness and the precautions to take for their handling

  10. Process Architecture for Managing Digital Object Identifiers

    Science.gov (United States)

    Wanchoo, L.; James, N.; Stolte, E.

    2014-12-01

    In 2010, NASA's Earth Science Data and Information System (ESDIS) Project implemented a process for registering Digital Object Identifiers (DOIs) for data products distributed by Earth Observing System Data and Information System (EOSDIS). For the first 3 years, ESDIS evolved the process involving the data provider community in the development of processes for creating and assigning DOIs, and guidelines for the landing page. To accomplish this, ESDIS established two DOI User Working Groups: one for reviewing the DOI process whose recommendations were submitted to ESDIS in February 2014; and the other recently tasked to review and further develop DOI landing page guidelines for ESDIS approval by end of 2014. ESDIS has recently upgraded the DOI system from a manually-driven system to one that largely automates the DOI process. The new automated feature include: a) reviewing the DOI metadata, b) assigning of opaque DOI name if data provider chooses, and c) reserving, registering, and updating the DOIs. The flexibility of reserving the DOI allows data providers to embed and test the DOI in the data product metadata before formally registering with EZID. The DOI update process allows the changing of any DOI metadata except the DOI name unless the name has not been registered. Currently, ESDIS has processed a total of 557 DOIs of which 379 DOIs are registered with EZID and 178 are reserved with ESDIS. The DOI incorporates several metadata elements that effectively identify the data product and the source of availability. Of these elements, the Uniform Resource Locator (URL) attribute has the very important function of identifying the landing page which describes the data product. ESDIS in consultation with data providers in the Earth Science community is currently developing landing page guidelines that specify the key data product descriptive elements to be included on each data product's landing page. This poster will describe in detail the unique automated process and

  11. CT diagnosis of concealed rupture of intestine following abdominal trauma

    International Nuclear Information System (INIS)

    Ji Jiansong; Wei Tiemin; Wang Zufei; Zhao Zhongwei; Tu Jianfei; Fan Xiaoxi; Xu Min

    2009-01-01

    Objective: To investigate CT findings of concealed rupture of intestine following abdominal trauma. Methods: CT findings of 11 cases with concealed rupture of intestine following abdominal trauma proved by surgery were identified retrospectively. Results: The main special signs included: (1) Free air in 4 cases, mainly around injured small bowel or under the diaphragm, or in the retroperitoneal space or and in the lump. (2) High density hematoma between the intestines or in the bowel wall (4 cases). (3) Bowel wall injury sign, demonstrated as low density of the injured intestinal wall, attenuated locally but relatively enhanced in neighbor wall on enhanced CT. (4) Lump around the injured bowel wall with obvious ring-shaped enhancement (4 cases). Other signs included: (1) Free fluid in the abdominal cavity or between the intestines with blurred borders. (2) Bowel obstruction. Conclusion: CT is valuable in diagnosing concealed rupture of intestine following abdominal trauma. (authors)

  12. Development and validation of the Body Concealment Scale for Scleroderma

    NARCIS (Netherlands)

    Jewett, L.R.; Malcarne, V.L.; Kwakkenbos, C.M.C.; Harcourt, D.; Rumsey, N.; Körner, A.; Steele, R.J.; Hudson, M.; Baron, M.; Haythornthwaite, J.A.; Heinberg, L.; Wigley, F.M.; Thombs, B.D.

    2016-01-01

    Objective: Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Methods: Initial items for the

  13. IRAS colors of VLA identified objects in the galaxy

    International Nuclear Information System (INIS)

    Fich, M.; Terebey, S.

    1987-01-01

    Infrared Astronomy Satellite (IRAS) sources found within 4 degrees of l = 125 deg, b = 2 deg on the 3rd HCON 60 micron Sky Brightness Images were observed at the Very Large Array (VLA). Regions were to be identified where massive stars are forming by looking for small areas of radio continuum emissions. The IRAS sources could be divided into three groups by their IRAS 12 micron/25 micron and 60 micron/100 micron color. The group identified with star forming regions contained essentially all of the objects with extended radio emission. In all of these cases the extended radio emission showed a morphology consistent with the identification of these objects as HII regions. The conclusion drawn is that star formation regions can be distinguished from other objects by their infrared colors

  14. Concealed identification symbols and nondestructive determination of the identification symbols

    Science.gov (United States)

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  15. An Objective Approach to Identify Spectral Distinctiveness for Hearing Impairment

    Directory of Open Access Journals (Sweden)

    Yeou-Jiunn Chen

    2013-01-01

    Full Text Available To facilitate the process of developing speech perception, speech-language pathologists have to teach a subject with hearing loss the differences between two syllables by manually enhancing acoustic cues of speech. However, this process is time consuming and difficult. Thus, this study proposes an objective approach to automatically identify the regions of spectral distinctiveness between two syllables, which is used for speech-perception training. To accurately represent the characteristics of speech, mel-frequency cepstrum coefficients are selected as analytical parameters. The mismatch between two syllables in time domain is handled by dynamic time warping. Further, a filter bank is adopted to estimate the components in different frequency bands, which are also represented as mel-frequency cepstrum coefficients. The spectral distinctiveness in different frequency bands is then easily estimated by using Euclidean metrics. Finally, a morphological gradient operator is applied to automatically identify the regions of spectral distinctiveness. To evaluate the proposed approach, the identified regions are manipulated and then the manipulated syllables are measured by a close-set based speech-perception test. The experimental results demonstrated that the identified regions of spectral distinctiveness are very useful in speech perception, which indeed can help speech-language pathologists in speech-perception training.

  16. Identifying online user reputation of user-object bipartite networks

    Science.gov (United States)

    Liu, Xiao-Lu; Liu, Jian-Guo; Yang, Kai; Guo, Qiang; Han, Jing-Ti

    2017-02-01

    Identifying online user reputation based on the rating information of the user-object bipartite networks is important for understanding online user collective behaviors. Based on the Bayesian analysis, we present a parameter-free algorithm for ranking online user reputation, where the user reputation is calculated based on the probability that their ratings are consistent with the main part of all user opinions. The experimental results show that the AUC values of the presented algorithm could reach 0.8929 and 0.8483 for the MovieLens and Netflix data sets, respectively, which is better than the results generated by the CR and IARR methods. Furthermore, the experimental results for different user groups indicate that the presented algorithm outperforms the iterative ranking methods in both ranking accuracy and computation complexity. Moreover, the results for the synthetic networks show that the computation complexity of the presented algorithm is a linear function of the network size, which suggests that the presented algorithm is very effective and efficient for the large scale dynamic online systems.

  17. Evolution of NASA's Earth Science Digital Object Identifier Registration System

    Science.gov (United States)

    Wanchoo, Lalit; James, Nathan

    2017-01-01

    NASA's Earth Science Data and Information System (ESDIS) Project has implemented a fully automated system for assigning Digital Object Identifiers (DOIs) to Earth Science data products being managed by its network of 12 distributed active archive centers (DAACs). A key factor in the successful evolution of the DOI registration system over last 7 years has been the incorporation of community input from three focus groups under the NASA's Earth Science Data System Working Group (ESDSWG). These groups were largely composed of DOI submitters and data curators from the 12 data centers serving the user communities of various science disciplines. The suggestions from these groups were formulated into recommendations for ESDIS consideration and implementation. The ESDIS DOI registration system has evolved to be fully functional with over 5,000 publicly accessible DOIs and over 200 DOIs being held in reserve status until the information required for registration is obtained. The goal is to assign DOIs to the entire 8000+ data collections under ESDIS management via its network of discipline-oriented data centers. DOIs make it easier for researchers to discover and use earth science data and they enable users to provide valid citations for the data they use in research. Also for the researcher wishing to reproduce the results presented in science publications, the DOI can be used to locate the exact data or data products being cited.

  18. Developing Data Citations from Digital Object Identifier Metadata

    Science.gov (United States)

    Wanchoo, L.; James, N.

    2015-12-01

    NASA's Earth Science Data and Information System (ESDIS) Project has been processing information for the registration of Digital Object Identifiers (DOI) for the last five years of which an automated system has been in operation for the last two years. The ESDIS DOI registration system has registered over 2000 DOIs with over 1000 DOIs held in reserve until all required information has been collected. By working towards the goal of assigning DOIs to the 8000+ data collections under its management, ESDIS has taken the first step towards facilitating the use of data citations with those products. When registering DOIs, ESDIS requires certain DOI elements be collected for the DOI landing page as recommended by NASA's Earth Science Data System Working Group (ESDSWG). The landing page provides sufficient information to 1) identify NASA data as referenced in a science publication, 2) credit data creators and distributors, and 3) access the data itself enabling the trace-ability and reproducibility of the data. However, the required elements for this DOI landing page are also the core required elements for forming an Earth science data citation. Data citations are getting significant attention from the scientific community and data centers alike. So to encourage the citing of Earth science data products, each product DOI landing page displays a sample data citation and makes the required citation elements available to DataCite for use in its Data Citation generation tool. This paper will describe that process. ESDIS data centers are constantly developing technologies to better serve the Earth science user community such as Geospatial Interactive Online Visualization ANd aNalysis Infrastructure (GIOVANNI), Land and Atmospheric Near Real-Time Capability for EOS (LANCE), and advanced tools that support virtual data collections, and virtual data products. These all provide easier access to data and make possible the creation of data products with user specified parameters

  19. Identifying relevant feature-action associations for grasping unmodelled objects

    DEFF Research Database (Denmark)

    Thomsen, Mikkel Tang; Kraft, Dirk; Krüger, Norbert

    2015-01-01

    content. The method is provided with a large and structured set of visual features, motivated by the visual hierarchy in primates and finds relevant feature action associations automatically. We apply our method in a simulated environment on three different object sets for the case of grasp affordance...... learning. For box objects, we achieve a 0.90 success probability, 0.80 for round objects and up to 0.75 for open objects, when presented with novel objects. In this work, we in particular demonstrate the effect of choosing appropriate feature representations. We demonstrate a significant performance...

  20. Identifying Anomalous Citations for Objective Evaluation of Scholarly Article Impact.

    Directory of Open Access Journals (Sweden)

    Xiaomei Bai

    Full Text Available Evaluating the impact of a scholarly article is of great significance and has attracted great attentions. Although citation-based evaluation approaches have been widely used, these approaches face limitations e.g. in identifying anomalous citations patterns. This negligence would inevitably cause unfairness and inaccuracy to the article impact evaluation. In this study, in order to discover the anomalous citations and ensure the fairness and accuracy of research outcome evaluation, we investigate the citation relationships between articles using the following factors: collaboration times, the time span of collaboration, citing times and the time span of citing to weaken the relationship of Conflict of Interest (COI in the citation network. Meanwhile, we study a special kind of COI, namely suspected COI relationship. Based on the COI relationship, we further bring forward the COIRank algorithm, an innovative scheme for accurately assessing the impact of an article. Our method distinguishes the citation strength, and utilizes PageRank and HITS algorithms to rank scholarly articles comprehensively. The experiments are conducted on the American Physical Society (APS dataset. We find that about 80.88% articles contain contributed citations by co-authors in 26,366 articles and 75.55% articles among these articles are cited by the authors belonging to the same affiliation, indicating COI and suspected COI should not be ignored for evaluating impact of scientific papers objectively. Moreover, our experimental results demonstrate COIRank algorithm significantly outperforms the state-of-art solutions. The validity of our approach is verified by using the probability of Recommendation Intensity.

  1. Identifying Anomalous Citations for Objective Evaluation of Scholarly Article Impact.

    Science.gov (United States)

    Bai, Xiaomei; Xia, Feng; Lee, Ivan; Zhang, Jun; Ning, Zhaolong

    2016-01-01

    Evaluating the impact of a scholarly article is of great significance and has attracted great attentions. Although citation-based evaluation approaches have been widely used, these approaches face limitations e.g. in identifying anomalous citations patterns. This negligence would inevitably cause unfairness and inaccuracy to the article impact evaluation. In this study, in order to discover the anomalous citations and ensure the fairness and accuracy of research outcome evaluation, we investigate the citation relationships between articles using the following factors: collaboration times, the time span of collaboration, citing times and the time span of citing to weaken the relationship of Conflict of Interest (COI) in the citation network. Meanwhile, we study a special kind of COI, namely suspected COI relationship. Based on the COI relationship, we further bring forward the COIRank algorithm, an innovative scheme for accurately assessing the impact of an article. Our method distinguishes the citation strength, and utilizes PageRank and HITS algorithms to rank scholarly articles comprehensively. The experiments are conducted on the American Physical Society (APS) dataset. We find that about 80.88% articles contain contributed citations by co-authors in 26,366 articles and 75.55% articles among these articles are cited by the authors belonging to the same affiliation, indicating COI and suspected COI should not be ignored for evaluating impact of scientific papers objectively. Moreover, our experimental results demonstrate COIRank algorithm significantly outperforms the state-of-art solutions. The validity of our approach is verified by using the probability of Recommendation Intensity.

  2. Identifying marine pelagic ecosystem management objectives and indicators

    DEFF Research Database (Denmark)

    Trenkel, Verena M.; Hintzen, Niels T.; Farnsworth, Keith D.

    2015-01-01

    . Overall 26 objectives were proposed, with 58% agreement in proposed objectives between two workshops. Based on published evidence for pressure-state links, examples of operational objectives and suitable indicators for each of the 26 objectives were then selected. It is argued that given the strong......International policy frameworks such as the Common Fisheries Policy and the European Marine Strategy Framework Directive define high-level strategic goals for marine ecosystems. Strategic goals are addressed via general and operational management objectives. To add credibility and legitimacy...... scale in some cases. In the evidence-based approach used in this study, the selection of species or region specific operational objectives and indicators was based on demonstrated pressure-state links. Hence observed changes in indicators can reliably inform on appropriate management measures. (C) 2015...

  3. Induction detection of concealed bulk banknotes

    Science.gov (United States)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  4. Self-Concealment and Suicidal Behaviors

    Science.gov (United States)

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  5. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  6. Camouflage, Concealment, and Decoys

    Science.gov (United States)

    2010-11-26

    otherwise dull Note. Use canned milk or powdered eggs to increase the binding properties of field-expedient paints. RADAR-ABSORBING MATERIAL 3-72. RAM... falsification of evidence, inducing him to react in a manner prejudicial to his interests. decoy An imitation in any sense of a person, an object

  7. Induction detection of concealed bulk banknotes

    International Nuclear Information System (INIS)

    Fuller, Christopher; Chen, Antao

    2011-01-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects

  8. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  9. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  10. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  11. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  12. Crossref an update on article level linking and digital object identifiers

    CERN Multimedia

    2002-01-01

    Description of the CrossRef initiative, "an independent non-profit membership organization that was established by the publishing community to permit article linking based on digital object identifiers (DOIs)" (1 page).

  13. BSDB: A New Consistent Designation Scheme for Identifying Objects in Binary and Multiple Stars

    Directory of Open Access Journals (Sweden)

    Kovaleva D. A.

    2015-06-01

    Full Text Available The new consistent scheme for designation of objects in binary and multiple systems, BSDB, is described. It was developed in the frame of the Binary star DataBase, BDB (http://www.inasan.ru, due to necessity of a unified and consistent system for designation of objects in the database, and the name of the designation scheme was derived from that of the database. The BSDB scheme covers all types of observational data. Three classes of objects introduced within the BSDB nomenclature provide correct links between objects and data, what is especially important for complex multiple stellar systems. The final stage of establishing the BSDB scheme is compilation of the Identification List of Binaries, ILB, where all known objects in binary and multiple stars are presented with their BSDB identifiers along with identifiers according to major catalogues and lists.

  14. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  15. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  16. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  17. RAPTOR-scan: Identifying and Tracking Objects Through Thousands of Sky Images

    International Nuclear Information System (INIS)

    Davidoff, Sherri; Wozniak, Przemyslaw

    2004-01-01

    The RAPTOR-scan system mines data for optical transients associated with gamma-ray bursts and is used to create a catalog for the RAPTOR telescope system. RAPTOR-scan can detect and track individual astronomical objects across data sets containing millions of observed points.Accurately identifying a real object over many optical images (clustering the individual appearances) is necessary in order to analyze object light curves. To achieve this, RAPTOR telescope observations are sent in real time to a database. Each morning, a program based on the DBSCAN algorithm clusters the observations and labels each one with an object identifier. Once clustering is complete, the analysis program may be used to query the database and produce light curves, maps of the sky field, or other informative displays.Although RAPTOR-scan was designed for the RAPTOR optical telescope system, it is a general tool designed to identify objects in a collection of astronomical data and facilitate quick data analysis. RAPTOR-scan will be released as free software under the GNU General Public License

  18. Identifying the Micro-relations Underpinning Familiarity Detection in Dynamic Displays Containing Multiple Objects

    Directory of Open Access Journals (Sweden)

    Jamie S. North

    2017-06-01

    Full Text Available We identified the important micro-relations that are perceived when attempting to recognize patterns in stimuli consisting of multiple dynamic objects. Skilled and less-skilled participants were presented with point light display sequences representing dynamic patterns in an invasion sport and were subsequently required to make familiarity based recognition judgments in three different conditions, each of which contained only a select number of features that were present at initial viewing. No differences in recognition accuracy were observed between skilled and less-skilled participants when just objects located in the periphery were presented. Yet, when presented with the relative motions of two centrally located attacking objects only, skilled participants were significantly more accurate than less-skilled participants and their recognition accuracy improved further when a target object was included against which these relative motions could be judged. Skilled participants can perceive and recognize global patterns on the basis of centrally located relational information.

  19. NEWLY IDENTIFIED EXTENDED GREEN OBJECTS (EGOs) FROM THE SPITZER GLIMPSE II SURVEY. II. MOLECULAR CLOUD ENVIRONMENTS

    Energy Technology Data Exchange (ETDEWEB)

    Chen Xi; Gan Conggui; Shen Zhiqiang [Key Laboratory for Research in Galaxies and Cosmology, Shanghai Astronomical Observatory, Chinese Academy of Sciences, Shanghai 200030 (China); Ellingsen, Simon P.; Titmarsh, Anita [School of Mathematics and Physics, University of Tasmania, Hobart, Tasmania (Australia); He Jinhua, E-mail: chenxi@shao.ac.cn [Key Laboratory for the Structure and Evolution of Celestial Objects, Yunnan Astronomical Observatory/National Astronomical Observatory, Chinese Academy of Sciences, P.O. Box 110, Kunming 650011, Yunnan Province (China)

    2013-06-01

    We have undertaken a survey of molecular lines in the 3 mm band toward 57 young stellar objects using the Australia Telescope National Facility Mopra 22 m radio telescope. The target sources were young stellar objects with active outflows (extended green objects (EGOs)) newly identified from the GLIMPSE II survey. We observe a high detection rate (50%) of broad line wing emission in the HNC and CS thermal lines, which combined with the high detection rate of class I methanol masers toward these sources (reported in Paper I) further demonstrates that the GLIMPSE II EGOs are associated with outflows. The physical and kinematic characteristics derived from the 3 mm molecular lines for these newly identified EGOs are consistent with these sources being massive young stellar objects with ongoing outflow activity and rapid accretion. These findings support our previous investigations of the mid-infrared properties of these sources and their association with other star formation tracers (e.g., infrared dark clouds, methanol masers and millimeter dust sources) presented in Paper I. The high detection rate (64%) of the hot core tracer CH{sub 3}CN reveals that the majority of these new EGOs have evolved to the hot molecular core stage. Comparison of the observed molecular column densities with predictions from hot core chemistry models reveals that the newly identified EGOs from the GLIMPSE II survey are members of the youngest hot core population, with an evolutionary time scale of the order of 10{sup 3} yr.

  20. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  1. Identifying Accessible Near-Earth Objects For Crewed Missions With Solar Electric Propulsion

    Science.gov (United States)

    Smet, Stijn De; Parker, Jeffrey S.; Herman, Jonathan F. C.; Aziz, Jonathan; Barbee, Brent W.; Englander, Jacob A.

    2015-01-01

    This paper discusses the expansion of the Near-Earth Object Human Space Flight Accessible Targets Study (NHATS) with Solar Electric Propulsion (SEP). The research investigates the existence of new launch seasons that would have been impossible to achieve using only chemical propulsion. Furthermore, this paper shows that SEP can be used to significantly reduce the launch mass and in some cases the flight time of potential missions as compared to the current, purely chemical trajectories identified by the NHATS project.

  2. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  3. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  6. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  7. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  8. Intra- and interpersonal consequences of experimentally induced concealment

    NARCIS (Netherlands)

    Bouman, T.K.

    2003-01-01

    Secrecy, concealment, and thought supression are assumed to be important aspects of psychopathology. However, most studies address these from an intrapersonal perspective. This study investigates both the intra- as well as the interpersonal consequences of experimentally induced concealment. Two

  9. The Problem of Informational Object Identification in Case of the Considerable Quantity of Identifying Features

    Directory of Open Access Journals (Sweden)

    S. D. Kulik

    2010-03-01

    Full Text Available The modification of the algorithm of identification of the informational object, used for identification of the hand-written texts performer in an automated workplace of the forensic expert, is presented. As modification, it is offered to use a method of association rules discovery for definition of statistically dependent sets of feature of hand-written capital letters of the Russian language. The algorithm is approved on set of 691 samples of hand-written documents for which about 2000 identifying feature are defined. The modification of the identification algorithm allows to lower level of errors and to raise quality of accepted decisions for information security.

  10. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  11. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    Science.gov (United States)

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Identifying objective criterion to determine a complicated task – A comparative study

    International Nuclear Information System (INIS)

    Park, Jinkyun; Jung, Wondea

    2015-01-01

    Highlights: • Reliable estimation on the likelihood of human error is very critical. • Still there is no clear and objective criterion on a complicated task. • Subjective difficulty scores rated by 75 high speed train drivers are collected. • Collected difficulty scores are compared with the associated TACOM scores. • Criteria for task complexity level seem to be determined by the TACOM measure. - Abstract: A reliable estimation on the likelihood of human error is very critical for evaluating the safety of a large process control system such as NPPs (Nuclear Power Plants). In this regard, one of the determinants is to decide the level of an important PSF (Performance Shaping Factor) through a clear and objective manner along with the context of a given task. Unfortunately, it seems that there are no such decision criteria for certain PSFs including the complexity of a task. Therefore, the feasibility of the TACOM (Task Complexity) measure in providing objective criteria that are helpful for distinguishing the level of a task complexity is investigated in this study. To this end, subjective difficulty scores rated by 75 high-speed train drivers are collected for 38 tasks. After that, subjective difficulty scores are compared with the associated TACOM scores being quantified based on these tasks. As a result, it is observed that there is a significant correlation between subjective difficulty scores rated by high-speed train drivers and the associated TACOM scores. Accordingly, it is promising to expect that the TACOM measure can be used as an objective tool to identify the level of a task complexity in terms of an HRA (Human Reliability Analysis)

  13. Objective Model Selection for Identifying the Human Feedforward Response in Manual Control.

    Science.gov (United States)

    Drop, Frank M; Pool, Daan M; van Paassen, Marinus Rene M; Mulder, Max; Bulthoff, Heinrich H

    2018-01-01

    Realistic manual control tasks typically involve predictable target signals and random disturbances. The human controller (HC) is hypothesized to use a feedforward control strategy for target-following, in addition to feedback control for disturbance-rejection. Little is known about human feedforward control, partly because common system identification methods have difficulty in identifying whether, and (if so) how, the HC applies a feedforward strategy. In this paper, an identification procedure is presented that aims at an objective model selection for identifying the human feedforward response, using linear time-invariant autoregressive with exogenous input models. A new model selection criterion is proposed to decide on the model order (number of parameters) and the presence of feedforward in addition to feedback. For a range of typical control tasks, it is shown by means of Monte Carlo computer simulations that the classical Bayesian information criterion (BIC) leads to selecting models that contain a feedforward path from data generated by a pure feedback model: "false-positive" feedforward detection. To eliminate these false-positives, the modified BIC includes an additional penalty on model complexity. The appropriate weighting is found through computer simulations with a hypothesized HC model prior to performing a tracking experiment. Experimental human-in-the-loop data will be considered in future work. With appropriate weighting, the method correctly identifies the HC dynamics in a wide range of control tasks, without false-positive results.

  14. A Model for Data Citation in Astronomical Research Using Digital Object Identifiers (DOIs)

    Science.gov (United States)

    Novacescu, Jenny; Peek, Joshua E. G.; Weissman, Sarah; Fleming, Scott W.; Levay, Karen; Fraser, Elizabeth

    2018-05-01

    Standardizing and incentivizing the use of digital object identifiers (DOIs) to aggregate and identify both data analyzed and data generated by a research project will advance the field of astronomy to match best practices in other research fields like geoscience and medicine. An increase in the use of DOIs will prepare the discipline for changing expectations among funding agencies and publishers, who increasingly expect accurate and thorough data citation to accompany scientific outputs. The use of DOIs ensures a robust, sustainable, and interoperable approach to data citation in which due credit is given to the researchers and institutions who produce and maintain the primary data. We describe in this work the advantages of DOIs for data citation and best practices for integrating a DOI service in an astronomical archive. We report on a pilot project carried out in collaboration with AAS journals. During the course of the 1.5-year long pilot, over 75% of submitting authors opted to use the integrated DOI service to clearly identify data analyzed during their research project when prompted at the time of paper submission.

  15. The digital object identifier (DOI in electronic scientific journals of communication and information

    Directory of Open Access Journals (Sweden)

    Erik André de Nazaré Pires

    2017-06-01

    Full Text Available The present study seeks to investigate the use of the Digital Object Identifier (DOI in the scientific journals of Communication and Information and, providing new integration utilities with the Lattes Platform. In this sense, it aims to inform the existing titles in Communication Information in electronic format, demonstrate the importance of DOI in the integration with the Lattes Platform in order to guarantee author credibility and analyze the characteristics of publications that have DOI. The methodology used for the development of this study is bibliographic, research with descriptive-descriptive characteristics. From the development of the research, it is inferred that of all the analyzed journals (33 journals, 10 titles in the evaluation of 2013 and 06 titles of the evaluation of 2014 present DOI in their publications, all have WebQualis classification, Qualis A1 in the area Communication and Information. Most publications are international and only 3 titles are national. It is necessary that journals, principally national ones, accompany new technologies such as DOI for objects and ORCID for the identification of people, bringing more mechanisms that guarantee authors 'credibility and to bring the researchers' connection, and both can already be adopted in the Platform Lattes.

  16. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  17. A Concealed Information Test with multimodal measurement.

    Science.gov (United States)

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  18. Objectivity

    CERN Document Server

    Daston, Lorraine

    2010-01-01

    Objectivity has a history, and it is full of surprises. In Objectivity, Lorraine Daston and Peter Galison chart the emergence of objectivity in the mid-nineteenth-century sciences--and show how the concept differs from its alternatives, truth-to-nature and trained judgment. This is a story of lofty epistemic ideals fused with workaday practices in the making of scientific images. From the eighteenth through the early twenty-first centuries, the images that reveal the deepest commitments of the empirical sciences--from anatomy to crystallography--are those featured in scientific atlases, the compendia that teach practitioners what is worth looking at and how to look at it. Galison and Daston use atlas images to uncover a hidden history of scientific objectivity and its rivals. Whether an atlas maker idealizes an image to capture the essentials in the name of truth-to-nature or refuses to erase even the most incidental detail in the name of objectivity or highlights patterns in the name of trained judgment is a...

  19. Concealed semantic and episodic autobiographical memory electrified.

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  20. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  1. Concealed semantic and episodic autobiographical memory electrified

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  2. Is Seeing Believing? Identifying Aspects of Informative Videos that Indicate Objectivity

    NARCIS (Netherlands)

    H.M. Boots-Blankers (Helen)

    2017-01-01

    textabstractInformation in online videos can be misleading and unreliable. Video users tend to select videos with misleading information (Butler, 2013). To facilitate video users in their selection of videos they need an objectivity measure (Palumbo, 2012). We propose thirteen aspects of video that

  3. Digital Object Identifier (DOI) – a must know for every author of ...

    African Journals Online (AJOL)

    It is a unique code preferred by publishers in the identification and exchange of the content of a digital object such as journal articles, web documents, or other intellectual property. This article is an eye opener to the features and benefits of DOI, anatomy of a DOI name, citing DOI in references and locating DOI of references.

  4. An Achievement Degree Analysis Approach to Identifying Learning Problems in Object-Oriented Programming

    Science.gov (United States)

    Allinjawi, Arwa A.; Al-Nuaim, Hana A.; Krause, Paul

    2014-01-01

    Students often face difficulties while learning object-oriented programming (OOP) concepts. Many papers have presented various assessment methods for diagnosing learning problems to improve the teaching of programming in computer science (CS) higher education. The research presented in this article illustrates that although max-min composition is…

  5. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    Science.gov (United States)

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  6. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  7. Generalising human demonstration data by identifying affordance symmetries in object interaction trajectories

    CSIR Research Space (South Africa)

    Claassens, J

    2011-09-01

    Full Text Available presents a formal description of a set of these symmetries, which are termed affordance symmetries, and a method to identify them in multiple demonstration recordings. The approach is robust to arbitrary motion before and after the symmetry artifact...

  8. Clinical and Genetic Associations of Objectively Identified Interstitial Changes in Smokers.

    Science.gov (United States)

    Ash, Samuel Y; Harmouche, Rola; Putman, Rachel K; Ross, James C; Diaz, Alejandro A; Hunninghake, Gary M; Onieva Onieva, Jorge; Martinez, Fernando J; Choi, Augustine M; Lynch, David A; Hatabu, Hiroto; Rosas, Ivan O; San Jose Estepar, Raul; Washko, George R

    2017-10-01

    Smoking-related lung injury may manifest on CT scans as both emphysema and interstitial changes. We have developed an automated method to quantify interstitial changes and hypothesized that this measurement would be associated with lung function, quality of life, mortality, and a mucin 5B (MUC5B) polymorphism. Using CT scans from the Genetic Epidemiology of COPD Study, we objectively labeled lung parenchyma as a tissue subtype. We calculated the percentage of the lung occupied by interstitial subtypes. A total of 8,345 participants had clinical and CT scanning data available. A 5% absolute increase in interstitial changes was associated with an absolute decrease in FVC % predicted of 2.47% (P percentage of lung with interstitial changes. Objective interstitial changes on CT scans were associated with impaired lung function, worse quality of life, increased mortality, and more copies of a MUC5B promoter polymorphism, suggesting that these changes may be a marker of susceptibility to smoking-related lung injury, detectable even in those who are healthy by other measures. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  9. Objective Model Selection for Identifying the Human Feedforward Response in Manual Control

    OpenAIRE

    Drop, F.M.; Pool, D.M.; van Paassen, M.M.; Mulder, M.; Bülthoff, Heinrich H.

    2017-01-01

    Realistic manual control tasks typically involve predictable target signals and random disturbances. The human controller (HC) is hypothesized to use a feedforward control strategy for target-following, in addition to feedback control for disturbance-rejection. Little is known about human feedforward control, partly because common system identification methods have difficulty in identifying whether, and (if so) how, the HC applies a feedforward strategy. In this paper, an identification proce...

  10. Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms

    International Nuclear Information System (INIS)

    Zio, E.; Golea, L.R.; Rocco S, C.M.

    2012-01-01

    In this paper, an analysis of the vulnerability of the Italian high-voltage (380 kV) electrical transmission network (HVIET) is carried out for the identification of the groups of links (or edges, or arcs) most critical considering the network structure and flow. Betweenness centrality and network connection efficiency variations are considered as measures of the importance of the network links. The search of the most critical ones is carried out within a multi-objective optimization problem aimed at the maximization of the importance of the groups and minimization of their dimension. The problem is solved using a genetic algorithm. The analysis is based only on information on the topology of the network and leads to the identification of the most important single component, couples of components, triplets and so forth. The comparison of the results obtained with those reported by previous analyses indicates that the proposed approach provides useful complementary information.

  11. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  13. Organizational Concealment: An Incentive of Reducing the Responsibility

    OpenAIRE

    Tajika, Tomoya

    2017-01-01

    We studyworkers’ incentives of reporting problems within an OLG organization consisting of a subordinate and a manager. The subordinate is responsible for reporting a problem, and the manager is responsible for solving the reported problem. The subordinate has an incentive to conceal a detected problem since if he reports it but the manager is too lazy to solve the problem, the responsibility is transferred to the subordinate since he becomes a manager in the next period. We show that conceal...

  14. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  15. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    Science.gov (United States)

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  16. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  17. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  18. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  19. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    The study emanates from the contentions of leaders of states, who, instead of promoting the ideals and values which promote social and political-coexistence, limit and conceal their views of leadership to some tribalistic, ethnocentric and self-serving idols, and by so doing, they cause a monumental harm to the polity. This is ...

  20. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  1. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  2. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  3. Using raster and vector data to identify objects for classify in flood risk. A case study: Raciborz

    Science.gov (United States)

    Porczek, Mariusz; Rucińska, Dorota; Lewiński, Stanisław

    2018-01-01

    The severe flood of 1997, which seriously affected Polish, Czech and German territories, gave impetus to research into the management of flood-prone areas. The material losses caused by the "Flood of the Millennium" totalled billions of Polish zloty. The extent of the disaster and of infrastructure repair costs changed the attitude of many branches of the economy, and of science. This is the direct result of consideration of the introduction of changes into spatial management and crisis management. At the same time, it focused the interest of many who were trained in analysing the vulnerability of land-use features to natural disasters such as floods. Research into the spatial distribution of geographic environmental features susceptible to flood in the Odra valley was conducted at the Faculty of Geography and Regional Studies of the University of Warsaw using Geographic Information Systems (GIS). This study seeks to examine the possibility of adapting vector and raster data and using them for land-use classification in the context of risk of flood and inundation damage. The analysed area of the city and surrounding area of Raciborz, on the upper Odra River, is a case study for identifying objects and lands susceptible to natural hazards based on publicly available satellite databases of the highest resolution, which is a very important factor in the quality of further risk analyses for applied use. The objective of the research was to create a 10×10-m-pixel raster network using raster data made available by ESA (Copernicus Land Monitoring Service) and vector data from Open Street Map.

  4. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  5. A hybrid frame concealment algorithm for H.264/AVC.

    Science.gov (United States)

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  6. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  7. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  8. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  9. Geophysical techniques for exploration of concealed uranium deposits in the Gwalior basin

    International Nuclear Information System (INIS)

    Choudhary, Kalpan; Singh, R.B.

    2004-01-01

    There is no direct geophysical method for the exploration of concealed uranium ore. Scope of geophysics for this in the Gwalior basin comprises delineating the basement topography, demarcation or zones of intense fracturing intersecting the unconformities and to identify the presence of carbonaceous rocks, specially in the graben-like structures. These geophysical problems have been successfully solved in other places by employing IP, resistivity, SP and gravity techniques for basement mapping, identification of fracture zone/shear zone, delineation of electrical conductors like carbonaceous rocks and sulphides. Three such case histories are presented here that include: a). basement and shear/fracture zone mapping in the Vindhyan basin north of Son-Narmada lineament, b). delineation of conductive zone (proved to be carbon phyllite) in the Mahakoshal Group of Kanhara area of Sonbhadra district, UP and c). Identification of a conductive zone, proved to be sulphide body, within the Mahakoshal group in the Gurharpahar area of Sidhi and Sonbhadra districts of MP and UP respectively. In the context of exploration for concealed uranium in the Gwalior basin, it is suggested to employ IP, resistivity, SP, gravity and magnetic methods for delineation of conductive zones like carbonaceous rocks, basement topography, including the graben like structures, fracture zone, geological boundaries and demarcation of the basin boundary. (author)

  10. [Effects of false memories on the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  11. Concealment tactics among HIV-positive nurses in Uganda

    OpenAIRE

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that thre...

  12. Identifying optimal regional solid waste management strategies through an inexact integer programming model containing infinite objectives and constraints.

    Science.gov (United States)

    He, Li; Huang, Guo-He; Zeng, Guang-Ming; Lu, Hong-Wei

    2009-01-01

    The previous inexact mixed-integer linear programming (IMILP) method can only tackle problems with coefficients of the objective function and constraints being crisp intervals, while the existing inexact mixed-integer semi-infinite programming (IMISIP) method can only deal with single-objective programming problems as it merely allows the number of constraints to be infinite. This study proposes, an inexact mixed-integer bi-infinite programming (IMIBIP) method by incorporating the concept of functional intervals into the programming framework. Different from the existing methods, the IMIBIP can tackle the inexact programming problems that contain both infinite objectives and constraints. The developed method is applied to capacity planning of waste management systems under a variety of uncertainties. Four scenarios are considered for comparing the solutions of IMIBIP with those of IMILP. The results indicate that reasonable solutions can be generated by the IMIBIP method. Compared with IMILP, the system cost from IMIBIP would be relatively high since the fluctuating market factors are considered; however, the IMILP solutions are associated with a raised system reliability level and a reduced constraint violation risk level.

  13. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  14. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  15. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  16. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  17. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  18. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  19. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  20. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  1. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    Science.gov (United States)

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  2. Concealment tactics among HIV-positive nurses in Uganda.

    Science.gov (United States)

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  3. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1...

  4. The Delphi Technique in Identifying Learning Objectives for the Development of Science, Technology and Society Modules for Palestinian Ninth Grade Science Curriculum

    Science.gov (United States)

    Abualrob, Marwan M. A.; Daniel, Esther Gnanamalar Sarojini

    2013-01-01

    This article outlines how learning objectives based upon science, technology and society (STS) elements for Palestinian ninth grade science textbooks were identified, which was part of a bigger study to establish an STS foundation in the ninth grade science curriculum in Palestine. First, an initial list of STS elements was determined. Second,…

  5. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  6. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction.

    Science.gov (United States)

    Singh, P; Ajmera, D-H; Xiao, S-S; Yang, X-Z; Liu, X; Peng, B

    2016-11-01

    The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient's age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated ( p < or = 0.05) with extraction difficulty under regression models. In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice.

  7. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  8. Studies on the detection of concealed objects using the neutron reflection method

    International Nuclear Information System (INIS)

    Papp, A.

    2013-01-01

    The increment of reflected thermal and 1.45 eV resonance neutrons vs. the thickness of the reflector has been measured and described by an analytical expression. Macroscopic, Σ β , and microscopic, σ β , reflection cross sections averaged over the bulk reflector substances were deduced for some elements and compounds. It was found that the σ β values are additive even for bulk samples and so the σ βmol could be given for some illicit drugs, explosives and hiding materials. - Highlights: ► The effect of reflector materials on the increment of neutrons were determined. ► Macroscopic and microscopic reflection cross sections averaged over bulk samples were determined. ► Simple analytical expression was given to describe the yield of reflected neutrons. ► The observed additive behavior in reflected neutrons rendered to characterize other materials

  9. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    Science.gov (United States)

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome.

  10. DOI - Digital Object Identifier : A revolution in the management and trading of copyrighted information over the Internet in the third millenium

    Directory of Open Access Journals (Sweden)

    Martin Žnideršič

    1997-01-01

    Full Text Available Rapid development of information technology in recent years has brought over also the problem of the protection of author's rights related to copyrighted works on electronic media. Information and law specialists were intensively working on this problem for several years and the result has been a new system of labelling copyrighted works on the Internet, called DOI (Digitial Object Identifier. The system was developed in the United States. At the time of the presenta tion of DOI at the Bookfair in Frankfurt, 250.000 author works were labelled with DOI. The system is universal and enables the inclusion of the present standard identifiers (ISBN, ISSN, SICI. The fact that DOI identifier stays "glued on" forever, makes the identification of the carrier of copyright possible at any moment. The DOI system presents the infrastructure system for trading in and use of copyrighted works over the Internet in the third millenium.

  11. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  12. Object-Based Classification as an Alternative Approach to the Traditional Pixel-Based Classification to Identify Potential Habitat of the Grasshopper Sparrow

    Science.gov (United States)

    Jobin, Benoît; Labrecque, Sandra; Grenier, Marcelle; Falardeau, Gilles

    2008-01-01

    The traditional method of identifying wildlife habitat distribution over large regions consists of pixel-based classification of satellite images into a suite of habitat classes used to select suitable habitat patches. Object-based classification is a new method that can achieve the same objective based on the segmentation of spectral bands of the image creating homogeneous polygons with regard to spatial or spectral characteristics. The segmentation algorithm does not solely rely on the single pixel value, but also on shape, texture, and pixel spatial continuity. The object-based classification is a knowledge base process where an interpretation key is developed using ground control points and objects are assigned to specific classes according to threshold values of determined spectral and/or spatial attributes. We developed a model using the eCognition software to identify suitable habitats for the Grasshopper Sparrow, a rare and declining species found in southwestern Québec. The model was developed in a region with known breeding sites and applied on other images covering adjacent regions where potential breeding habitats may be present. We were successful in locating potential habitats in areas where dairy farming prevailed but failed in an adjacent region covered by a distinct Landsat scene and dominated by annual crops. We discuss the added value of this method, such as the possibility to use the contextual information associated to objects and the ability to eliminate unsuitable areas in the segmentation and land cover classification processes, as well as technical and logistical constraints. A series of recommendations on the use of this method and on conservation issues of Grasshopper Sparrow habitat is also provided.

  13. Application of Digital Object Identifiers to data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC)

    Science.gov (United States)

    Vollmer, B.; Ostrenga, D.; Johnson, J. E.; Savtchenko, A. K.; Shen, S.; Teng, W. L.; Wei, J. C.

    2013-12-01

    Digital Object Identifiers (DOIs) are applied to selected data sets at the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC). The DOI system provides an Internet resolution service for unique and persistent identifiers of digital objects. Products assigned DOIs include data from the NASA MEaSUREs Program, the Earth Observing System (EOS) Aqua Atmospheric Infrared Sounder (AIRS) and EOS Aura High Resolution Dynamics Limb Sounder (HIRDLS). DOIs are acquired and registered through EZID, California Digital Library and DataCite. GES DISC hosts a data set landing page associated with each DOI containing information on and access to the data including a recommended data citation when using the product in research or applications. This work includes participation with the earth science community (e.g., Earth Science Information Partners (ESIP) Federation) and the NASA Earth Science Data and Information System (ESDIS) Project to identify, establish and implement best practices for assigning DOIs and managing supporting information, including metadata, for earth science data sets. Future work includes (1) coordination with NASA mission Science Teams and other data providers on the assignment of DOIs for other GES DISC data holdings, particularly for future missions such as Orbiting Carbon Observatory -2 and -3 (OCO-2, OCO-3) and projects (MEaSUREs 2012), (2) construction of landing pages that are both human and machine readable, and (3) pursuing the linking of data and publications with tools such as the Thomson Reuters Data Citation Index.

  14. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  15. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  16. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  17. Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

    Directory of Open Access Journals (Sweden)

    Robert Hudec

    2011-01-01

    Full Text Available This paper deals with video transmission over lossy communication networks. The main idea is to develop video concealment method for information losses and errors correction. At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. Finally, the efficiency of developed algorithm is presented in experimental part of this paper.

  18. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  19. Motivation and Strategies for Implementing Digital Object Identifiers (DOIs at NCAR’s Earth Observing Laboratory – Past Progress and Future Collaborations

    Directory of Open Access Journals (Sweden)

    Janine Aquino

    2017-03-01

    Full Text Available In an effort to lead our community in following modern data citation practices by formally citing data used in published research and implementing standards to facilitate reproducible research results and data, while also producing meaningful metrics that help assess the impact of our services, the National Center for Atmospheric Research (NCAR Earth Observing Laboratory (EOL has implemented the use of Digital Object Identifiers (DOIs (DataCite 2017 for both physical objects (e.g., research platforms and instruments and datasets. We discuss why this work is important and timely, and review the development of guidelines for the use of DOIs at EOL by focusing on how decisions were made. We discuss progress in assigning DOIs to physical objects and datasets, summarize plans to cite software, describe a current collaboration to develop community tools to display citations on websites, and touch on future plans to cite workflows that document dataset processing and quality control. Finally, we will review the status of efforts to engage our scientific community in the process of using DOIs in their research publications.

  20. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  1. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  2. Identifying Objective Physiological Markers and Modifiable Behaviors for Self-Reported Stress and Mental Health Status Using Wearable Sensors and Mobile Phones: Observational Study.

    Science.gov (United States)

    Sano, Akane; Taylor, Sara; McHill, Andrew W; Phillips, Andrew Jk; Barger, Laura K; Klerman, Elizabeth; Picard, Rosalind

    2018-06-08

    Wearable and mobile devices that capture multimodal data have the potential to identify risk factors for high stress and poor mental health and to provide information to improve health and well-being. We developed new tools that provide objective physiological and behavioral measures using wearable sensors and mobile phones, together with methods that improve their data integrity. The aim of this study was to examine, using machine learning, how accurately these measures could identify conditions of self-reported high stress and poor mental health and which of the underlying modalities and measures were most accurate in identifying those conditions. We designed and conducted the 1-month SNAPSHOT study that investigated how daily behaviors and social networks influence self-reported stress, mood, and other health or well-being-related factors. We collected over 145,000 hours of data from 201 college students (age: 18-25 years, male:female=1.8:1) at one university, all recruited within self-identified social groups. Each student filled out standardized pre- and postquestionnaires on stress and mental health; during the month, each student completed twice-daily electronic diaries (e-diaries), wore two wrist-based sensors that recorded continuous physical activity and autonomic physiology, and installed an app on their mobile phone that recorded phone usage and geolocation patterns. We developed tools to make data collection more efficient, including data-check systems for sensor and mobile phone data and an e-diary administrative module for study investigators to locate possible errors in the e-diaries and communicate with participants to correct their entries promptly, which reduced the time taken to clean e-diary data by 69%. We constructed features and applied machine learning to the multimodal data to identify factors associated with self-reported poststudy stress and mental health, including behaviors that can be possibly modified by the individual to improve

  3. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    Science.gov (United States)

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  4. Tectonic Storytelling with Open Source and Digital Object Identifiers - a case study about Plate Tectonics and the Geopark Bergstraße-Odenwald

    Science.gov (United States)

    Löwe, Peter; Barmuta, Jan; Klump, Jens; Neumann, Janna; Plank, Margret

    2014-05-01

    The communication of advances in research to the common public for both education and decision making is an important aspect of scientific work. An even more crucial task is to gain recognition within the scientific community, which is judged by impact factor and citation counts. Recently, the latter concepts have been extended from textual publications to include data and software publications. This paper presents a case study for science communication and data citation. For this, tectonic models, Free and Open Source Software (FOSS), best practices for data citation and a multimedia online-portal for scientific content are combined. This approach creates mutual benefits for the stakeholders: Target audiences receive information on the latest research results, while the use of Digital Object Identifiers (DOI) increases the recognition and citation of underlying scientific data. This creates favourable conditions for every researcher as DOI names ensure citeability and long term availability of scientific research. In the developed application, the FOSS tool for tectonic modelling GPlates is used to visualise and manipulate plate-tectonic reconstructions and associated data through geological time. These capabilities are augmented by the Science on a Halfsphere project (SoaH) with a robust and intuitive visualisation hardware environment. The tectonic models used for science communication are provided by the AGH University of Science and Technology. They focus on the Silurian to Early Carboniferous evolution of Central Europe (Bohemian Massif) and were interpreted for the area of the Geopark Bergstraße Odenwald based on the GPlates/SoaH hardware- and software stack. As scientific story-telling is volatile by nature, recordings are a natural means of preservation for further use, reference and analysis. For this, the upcoming portal for audiovisual media of the German National Library of Science and Technology TIB is expected to become a critical service

  5. Error Concealment using Neural Networks for Block-Based Image Coding

    Directory of Open Access Journals (Sweden)

    M. Mokos

    2006-06-01

    Full Text Available In this paper, a novel adaptive error concealment (EC algorithm, which lowers the requirements for channel coding, is proposed. It conceals errors in block-based image coding systems by using neural network. In this proposed algorithm, only the intra-frame information is used for reconstruction of the image with separated damaged blocks. The information of pixels surrounding a damaged block is used to recover the errors using the neural network models. Computer simulation results show that the visual quality and the MSE evaluation of a reconstructed image are significantly improved using the proposed EC algorithm. We propose also a simple non-neural approach for comparison.

  6. The association between concealing emotions at work and medical utilization in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  7. African land degradation in a world of global atmospheric change: fertilization conceals degradation?

    Science.gov (United States)

    Le, Lulseged Tamene, Paul L. G. Vlek, Quang Bao

    2009-04-01

    Land degradation is one of the most widespread environmental problems worldwide. The sub-Saharan Africa (SSA) is one of the most seriously affected regions with huge implications on food security and economic development. To plan plausible management measures, understanding the magnitude of the problem and identification of hotspot areas are necessary. Analysis of remote sensing and climate data observed from space for the period 1982 - 2003 showed significant improvement in vegetation productivity across 30% of SSA with decline on 5% of the subcontinent. Global change in atmospheric chemistry is likely responsible for the observed increasing trend in vegetation productivity. Such widespread greening observed from space could mask anthropogenic land degradation processes such as land conversion, selective logging, and soil nutrient mining. To assess this possible masking effect, a re-analysis of the vegetation productivity dynamics, taking into account atmospheric fertilization, was conducted. This was performed by analyzing the long-term trend in vegetation productivity of pristine lands (areas with minimum human- and climate- related impacts) identified across different biomes in SSA. The baseline slope values of biomass accrual calculated for those pristine lands were estimated and used to re-calculate the long-term trend of green biomass with and without the impact of atmospheric fertilization. This ultimately enabled to delineate the areas that would have experienced significant loss in vegetation productivity had the atmospheric chemistry not changed. The result suggests that seven times more than the area of actual productivity decline in SSA is affected by land degradation processes that are concealed by atmospheric fertilization. With this rate of surreptitious loss of vital land attributes and with the current rate of population growth (3%), the SSA subcontinent may soon lack the land resources necessary to foster economic development. Spatially

  8. Bayesian interpolation in a dynamic sinusoidal model with application to packet-loss concealment

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Christensen, Mads Græsbøll; Cemgil, Ali Taylan

    2010-01-01

    a Bayesian inference scheme for the missing observations, hidden states and model parameters of the dynamic model. The inference scheme is based on a Markov chain Monte Carlo method known as Gibbs sampler. We illustrate the performance of the inference scheme to the application of packet-loss concealment...

  9. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  10. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...

  11. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    Science.gov (United States)

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  12. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  13. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  14. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  15. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    Science.gov (United States)

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  16. Mobile Techniques for Rapid Detection of Concealed Nuclear Material

    International Nuclear Information System (INIS)

    Rosenstock, W.; Koeble, T.; Risse, M.; Berky, W.

    2015-01-01

    To prevent the diversion of nuclear material as well as illicit production, transport and use of nuclear material we investigated in mobile techniques to detect and identify such material in the field as early as possible. For that purpose we use a highly sensitive gamma measurement system installed in a car. It consists of two large volume plastic scintillators, one on each side of the car, each scintillator with 12 l active volume, and two extreme sensitive high purity Germanium detectors with 57 cm 2 crystal diameter, cooled electrically. The measured data are processed immediately with integrated, appropriate analysis software for direct assessment including material identification and classification within seconds. The software for the plastic scintillators can differentiate between natural and artificial radioactivity, thus giving a clear hint for the existence of unexpected material. In addition, the system is equipped with highly sensitive neutron detectors. We have performed numerous measurements by passing different radioactive and nuclear sources in relatively large distances with this measurement car. Even shielded as well as masked material was detected and identified in most of the cases. We will report on the measurements performed in the field (on an exercise area) and in the lab and discuss the capabilities of the system, especially with respect to timeliness and identification. This system will improve the nuclear verification capabilities also. (author)

  17. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  18. Systematizing the Instruments of Trade Wars and of Concealed Protectionism

    Directory of Open Access Journals (Sweden)

    Serpukhov Maksym Yu.

    2017-11-01

    Full Text Available The article is concerned with the problems of trade wars and hidden protectionism in the process of implementing international trade. The main purpose of the research is systematization of trade barriers and instruments used in the trade wars between countries. The basic instruments of trade wars have been analyzed, a list of the key instruments used in the trade wars between countries has been defined, and also the possible influence of these instruments has been described. The statistical analysis has resulted in identifying the main trade barriers and the most popular sectors of the economy in which protectionism instruments are applied. The authors have also defined the main interventions applied by different world countries in relation to Ukrainian products and groups of Ukrainian goods to which the most restrictions by the world countries are applied. The conclusions on counteraction and adaptation to the most popular instruments of protectionism in the process of activation of the export activity of country have been generalized.

  19. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  20. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  1. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  2. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  3. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    Science.gov (United States)

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    Science.gov (United States)

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  5. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  6. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  7. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Identifying strategies for mitigating the global warming impact of the EU-25 economy using a multi-objective input–output approach

    International Nuclear Information System (INIS)

    Cortés-Borda, D.; Ruiz-Hernández, A.; Guillén-Gosálbez, G.; Llop, M.; Guimerà, R.; Sales-Pardo, M.

    2015-01-01

    Global warming mitigation has recently become a priority worldwide. A large body of literature dealing with energy related problems has focused on reducing greenhouse gases emissions at an engineering scale. In contrast, the minimization of climate change at a wider macroeconomic level has so far received much less attention. We investigate here how to mitigate global warming by performing changes in an economy. To this end, we make use of a systematic tool that combines three methods: linear programming, environmentally extended input output models, and life cycle assessment principles. The problem of identifying key economic sectors that contribute significantly to global warming is posed in mathematical terms as a bi-criteria linear program that seeks to optimize simultaneously the total economic output and the total life cycle CO 2 emissions. We have applied this approach to the European Union economy, finding that significant reductions in global warming potential can be attained by regulating specific economic sectors. Our tool is intended to aid policy makers in the design of more effective public policies for achieving the environmental and economic targets sought. - Highlights: • We minimize climate change by performing small changes in the consumption habits. • We propose a tool that combines multiobjective optimization and macroeconomic models. • Identifying key sectors allows improving the environmental performance significantly with little impact to the economy. • Significant reductions in global warming potential are attained by regulating sectors. • Our tool aids policy makers in the design of effective sustainability policies

  9. Objectives and Design of BLEEDS: A Cohort Study to Identify New Risk Factors and Predictors for Major Bleeding during Treatment with Vitamin K Antagonists.

    Science.gov (United States)

    van Rein, Nienke; Lijfering, Willem M; Bos, Mettine H A; Herruer, Martien H; Vermaas, Helga W; van der Meer, Felix J M; Reitsma, Pieter H

    2016-01-01

    Risk scores for patients who are at high risk for major bleeding complications during treatment with vitamin K antagonists (VKAs) do not perform that well. BLEEDS was initiated to search for new biomarkers that predict bleeding in these patients. To describe the outline and objectives of BLEEDS and to examine whether the study population is generalizable to other VKA treated populations. A cohort was created consisting of all patients starting VKA treatment at three Dutch anticoagulation clinics between January-2012 and July-2014. We stored leftover plasma and DNA following analysis of the INR. Of 16,706 eligible patients, 16,570 (99%) were included in BLEEDS and plasma was stored from 13,779 patients (83%). Patients had a mean age of 70 years (SD 14), 8713 were male (53%). The most common VKA indications were atrial fibrillation (10,876 patients, 66%) and venous thrombosis (3920 patients, 24%). 326 Major bleeds occurred during 17,613 years of follow-up (incidence rate 1.85/100 person years, 95%CI 1.66-2.06). The risk for major bleeding was highest in the initial three months of VKA treatment and increased when the international normalized ratio increased. These results and characteristics are in concordance with results from other VKA treated populations. BLEEDS is generalizable to other VKA treated populations and will permit innovative and unbiased research of biomarkers that may predict major bleeding during VKA treatment.

  10. Shade guide optimization--a novel shade arrangement principle for both ceramic and composite shade guides when identifying composite test objects.

    Science.gov (United States)

    Østervemb, Niels; Jørgensen, Jette Nedergaard; Hørsted-Bindslev, Preben

    2011-02-01

    The most widely used shade guide for composite materials is made of ceramic and arranged according to a non-proven method. There is a need for a composite shade guide using a scientifically based arrangement principle. To compare the shade tab arrangement of the Vitapan Classical shade guide and an individually made composite shade guide using both the originally proposed arrangement principle and arranged according to ΔE2000 values with hue group division. An individual composite shade guide made from Filtek Supreme XT body colors was compared to the Vitapan Classical shade guide. Twenty-five students matched color samples made from Filtek Supreme XT body colors using the two shade guides arranged after the two proposed principles--four shade guides in total. Age, sequence, gender, time, and number of correct matches were recorded. The proposed visually optimal composite shade guide was both fastest and had the highest number of correct matches. Gender was significantly associated with time used for color sampling but not regarding the number of correct shade matches. A composite shade guide is superior compared to the ceramic Vitapan Classical guide when using composite test objects. A rearrangement of the shade guide according to hue, subdivided according to ΔE2000, significantly reduces the time needed to take a color sample and increases the number of correct shade matches. Total color difference in relation to the lightest tab with hue group division is recommended as a possible and universally applicable mode of tab arrangement in dental color standards. Moreover, a shade guide made of the composite materials itself is to be preferred as both a faster and more accurate method of determining color. © 2011, COPYRIGHT THE AUTHORS. JOURNAL COMPILATION © 2011, WILEY PERIODICALS, INC.

  11. Characterizing the Energetics of the Youngest Protostars: FIFI-LS Spectroscopy of Herschel-Identified Extreme Class 0 objects in Orion

    Science.gov (United States)

    Megeath, S.

    2014-10-01

    We propose FIFI-LS spectroscopy observations toward 3 of the youngest known Herschel- detected Class 0 protostars in the Orion molecular clouds. Characterization of the far-IR spectrum toward these PACS Bright Red Sources (PBRS) is imperative: this is the only observational means to characterize the complete energetics of the outflow in the earliest stages of the star formation process. We have already obtained Herschel-PACS spectroscopy for 8/14 PBRS; for these, the CO rotation temperatures are systematically lower than the larger samples of 'more typical' protostars observed. Furthermore, all of the Herschel-detected PBRS also have CARMA CO (J=1-0) outflow maps, enabling us to identify tentative trends between the detection and morphology (compact or extended) of the CO outflow and the presence or lack of far-infrared emission lines. Moreover, we only convincingly detect [OI] emission toward the source with the brightest outflow emission; thus, [OI] may not be universally present in protostellar outflows. However, due to the small-numbers with PACS spectroscopy, it is unclear if these trends are real and the three proposed PBRS have outflow maps of varying morphologies, but no far-infrared spectra. The results from this program will provide a firm observational footing for the presence or lack of such trends and will strengthen the connection of the far-IR emission lines to the outflow.

  12. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    Science.gov (United States)

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  13. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  14. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    Science.gov (United States)

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  15. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  16. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  17. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  18. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  19. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  20. Identifying Typical Movements Among Indoor Objects

    DEFF Research Database (Denmark)

    Radaelli, Laura; Sabonis, Dovydas; Lu, Hua

    2013-01-01

    With the proliferation of mobile computing, positioning systems are becoming available that enable indoor location-based services. As a result, indoor tracking data is also becoming available. This paper puts focus on one use of such data, namely the identification of typical movement patterns...

  1. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  2. Object and Objective Lost?

    DEFF Research Database (Denmark)

    Lopdrup-Hjorth, Thomas

    2015-01-01

    This paper explores the erosion and problematization of ‘the organization’ as a demarcated entity. Utilizing Foucault's reflections on ‘state-phobia’ as a source of inspiration, I show how an organization-phobia has gained a hold within Organization Theory (OT). By attending to the history...... of this organization-phobia, the paper argues that OT has become increasingly incapable of speaking about its core object. I show how organizations went from being conceptualized as entities of major importance to becoming theoretically deconstructed and associated with all kinds of ills. Through this history......, organizations as distinct entities have been rendered so problematic that they have gradually come to be removed from the center of OT. The costs of this have been rather significant. Besides undermining the grounds that gave OT intellectual credibility and legitimacy to begin with, the organization-phobia...

  3. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  4. Crustal concealing of small-scale core-field secular variation

    DEFF Research Database (Denmark)

    Hulot, G.; Olsen, Nils; Thebault, E.

    2009-01-01

    of internal origin happen to be detectable now in spherical harmonic degrees up to, perhaps, 16. All of these changes are usually attributed to changes in the core field itself, the secular variation, on the ground that the lithospheric magnetization cannot produce such signals. It has, however, been pointed...... out, on empirical grounds, that temporal changes in the field of internal origin produced by the induced part of the lithospheric magnetization could dominate the core field signal beyond degree 22. This short note revisits this issue by taking advantage of our improved knowledge of the small...... cause of the observed changes in the field of internal origin up to some critical degree, N-C, is indeed likely to be the secular variation of the core field, but that the signal produced by the time-varying lithospheric field is bound to dominate and conceal the time-varying core signal beyond...

  5. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  6. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    Science.gov (United States)

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  8. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  9. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  10. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  11. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  12. Concealed concern: fathers' experiences of having a child with juvenile idiopathic arthritis.

    Science.gov (United States)

    Waite-Jones, J M; Madill, A

    2008-01-01

    Despite increased research into families of chronically ill children, more needs to be known about the father's experience. We address this issue through asking: 'What is it like to be the father of a child with Juvenile Idiopathic Arthritis?' (JIA). Four members of eight families with an adolescent diagnosed with JIA, including seven fathers, were interviewed and transcripts analysed using grounded theory. This study suggests that fathers of children with JIA experience several severe losses which are exacerbated through comparisons they make between their own situation and that of fathers of healthy children. In addition, the fathers faced several constraints which reduced their opportunities to communicate with their ill child through shared activities. Fathers appeared to conceal their distress by adopting strategies of denial and distraction however their adjustment was facilitated, to some extent, by social support. They could also develop greater acceptance of their situation over time as the care of their ill child became assimilated into family life and constraints upon their life gradually reduced through the increased maturity of their son or daughter with JIA. These findings have implications for healthcare professionals and voluntary organisations.

  13. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  14. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  15. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  16. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials.

    Science.gov (United States)

    Devine, Eric G; Peebles, Kristina R; Martini, Valeria

    2017-03-01

    Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  17. A concealed observational study of infection control and safe injection practices in Jordanian governmental hospitals.

    Science.gov (United States)

    Al-Rawajfah, Omar M; Tubaishat, Ahmad

    2017-10-01

    The recognized international organizations on infection prevention recommend using an observational method as the gold standard procedure for assessing health care professional's compliance with standard infection control practices. However, observational studies are rarely used in Jordanian infection control studies. This study aimed to evaluate injection practices among nurses working in Jordanian governmental hospitals. A cross-sectional concealed observational design is used for this study. A convenience sampling technique was used to recruit a sample of nurses working in governmental hospitals in Jordan. Participants were unaware of the time and observer during the observation episode. A total of 384 nurses from 9 different hospitals participated in the study. A total of 835 injections events were observed, of which 73.9% were performed without handwashing, 64.5% without gloving, and 27.5% were followed by needle recapping. Handwashing rate was the lowest (18.9%) when injections were performed by beginner nurses. Subcutaneous injections were associated with the lowest rate (26.7%) of postinjection handwashing compared with other routes. This study demonstrates the need for focused and effective infection control educational programs in Jordanian hospitals. Future studies should consider exploring the whole infection control practices related to waste disposal and the roles of the infection control nurse in this process in Jordanian hospitals. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  18. Deconstructing Concealed Gayness Text in The Film Negeri van Oranje: Critical Discourse Analysis

    Directory of Open Access Journals (Sweden)

    Heri Setiawan

    2018-02-01

    Full Text Available As one of the most popular creative cultural products, film sometimes speaks beyond what it presents. It is not always produced merely for entertainment purposes, but also to spread a certain ideology and represent a particular culture. Anchored in queer theory, this research looks at the Indonesian film, Negeri Van Oranje, which was chosen purposely to be analyzed using Fairclough’s critical discourse analysis model with an aim to deconstruct the concealed gayness text in the film. From the analysis, it was found that the gay scenes in the film try to tell its audience about the positions, feelings, challenges, and rejections that Indonesian gay people experience living amongst heteronormative surroundings. Some new notions about gay people’s life in Indonesia are extracted based on the analysis of the gay scenes in the film. The strategy of inserting gay content into a film nationally released in Indonesia is also revealed. The results of the analysis could be used to create a picture of what gay life looks like in Indonesia, a multicultural country that is well-known as the place in which the world’s largest Muslim population dwells.

  19. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-11

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  20. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  1. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  2. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...who worked at an abortion clinic that had recently been bombed and whose life had been threatened was denied a license to carry because he was not...populace. The new law laid out new prohibitions and penalties enforceable statewide. Additionally, the Preemption Act was necessary to set the legal

  4. The image of the butcher (13th-20th): In search of respectability between corporate pride and blood concealment.

    OpenAIRE

    Leteux , Sylvain

    2015-01-01

    International audience; In most images that represent butchers in France since the Middle Ages, the animal’s blood and death are often eclipsed or softened, except for the realistic photographs of slaughterhouses in the 20th century. The will to conceal blood shows the butchers’ will to build an honourable image of themselves. This quest for respectability is obvious if you look at the ceremony clothes worn by butchers during civil and religious celebrations. In the 19th century, as the trade...

  5. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  6. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  7. Morte materna mascarada: um caminho para sua identificação Muerte materna enmascarada: un camino para su identificación Identification of concealed or presumable maternal deaths

    Directory of Open Access Journals (Sweden)

    Flávia Azevedo Gomes

    2006-12-01

    maternas no informadas.OBJECTIVE: to identify unreported concealed or presumable maternal deaths which occurred in the states of São Paulo, Paraná, Pará, Ceará, and Mato Grosso Brazil. METHODS: Data were collected from the CD-ROM Hospital Admission Authorization Database of the Hospital Information System of the Unified Health System (SIH-SUS regarding records of obstetric procedures and secondary diagnoses between the years of 1999 to 2000. RESULTS: There were 651 maternal deaths registered. From those, 55 were registered as concealed or presumable maternal deaths according to Chapter XV of the International Classification of Diseases (DID-10 - Pregnancy, Delivery and Postpartum. CONCLUSION: This study showed that this information system can be used as a complementary measure for the identification of unreported maternal deaths.

  8. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  9. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    Science.gov (United States)

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  10. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  11. Sharp and blunt force trauma concealment by thermal alteration in homicides: an in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones

    OpenAIRE

    Macoveciuc, I; Marquez-Grant, N; Horsfall, I; Zioupos, P

    2017-01-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-exi...

  12. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  13. Elegant objects

    CERN Document Server

    Bugayenko, Yegor

    2017-01-01

    There are 23 practical recommendations for object-oriented programmers. Most of them are completely against everything you've read in other books. For example, static methods, NULL references, getters, setters, and mutable classes are called evil. Compound variable names, validators, private static literals, configurable objects, inheritance, annotations, MVC, dependency injection containers, reflection, ORM and even algorithms are our enemies.

  14. Objective lens

    Science.gov (United States)

    Olczak, Eugene G. (Inventor)

    2011-01-01

    An objective lens and a method for using same. The objective lens has a first end, a second end, and a plurality of optical elements. The optical elements are positioned between the first end and the second end and are at least substantially symmetric about a plane centered between the first end and the second end.

  15. Extended objects

    International Nuclear Information System (INIS)

    Creutz, M.

    1976-01-01

    After some disconnected comments on the MIT bag and string models for extended hadrons, I review current understanding of extended objects in classical conventional relativistic field theories and their quantum mechanical interpretation

  16. Trusted Objects

    International Nuclear Information System (INIS)

    CAMPBELL, PHILIP L.; PIERSON, LYNDON G.; WITZKE, EDWARD L.

    1999-01-01

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  17. Blood pressure shifts resulting from a concealed arteriovenous fistula associated with an iliac aneurysm: a case report.

    Science.gov (United States)

    Doi, Shintaro; Motoyama, Yoshiaki; Ito, Hiromi

    2016-01-01

    A solitary iliac aneurysm (SIA) is more uncommon than an abdominal aortic aneurysm. The aneurysm is located in the deep pelvis and is diagnosed when it reaches a large size with symptoms of compression around adjacent structures and organs or when it ruptures. A definite diagnosis of an arteriovenous fistula (AVF) associated with a SIA is difficult preoperatively because there might not be enough symptoms and time for diagnosis. Here, we present a patient with asymptomatic rupture of SIA into the common iliac vein with characteristic blood pressure shifts. A 41-year-old man with a huge SIA underwent aortobifemoral graft replacement. Preoperatively, his blood pressure showed characteristic shifts for one or two heartbeats out of five beats, indicating that an AVF was present and that the shunt was about to having a high flow. During surgery, an AVF associated with the SIA was found to be concealed owing to compression from the huge iliac artery aneurysm, and the shunt showed a high flow, resulting in shock during the surgery. No complications were noted after aortobifemoral graft replacement. Postoperatively, we noted an enhanced paravertebral vein on computed tomography (CT), which indicated the presence of an AVF. Definite diagnosis of an AVF offers advantages in surgical and anesthetic management. We emphasize that a large SIA can push the iliac vein and occlude an AVF laceration, concealing the enhancement of the veins in the arterial phase on CT. Blood pressure shifts might predict the existence of a concealed AVF that has a large shunt. Even if the vena cava and the iliac veins are not enhanced on CT, anesthesiologists should carefully determine whether their distal branches are enhanced.

  18. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  19. Acoustic Parametric Array for Identifying Standoff Targets

    Science.gov (United States)

    Hinders, M. K.; Rudd, K. E.

    2010-02-01

    An integrated simulation method for investigating nonlinear sound beams and 3D acoustic scattering from any combination of complicated objects is presented. A standard finite-difference simulation method is used to model pulsed nonlinear sound propagation from a source to a scattering target via the KZK equation. Then, a parallel 3D acoustic simulation method based on the finite integration technique is used to model the acoustic wave interaction with the target. Any combination of objects and material layers can be placed into the 3D simulation space to study the resulting interaction. Several example simulations are presented to demonstrate the simulation method and 3D visualization techniques. The combined simulation method is validated by comparing experimental and simulation data and a demonstration of how this combined simulation method assisted in the development of a nonlinear acoustic concealed weapons detector is also presented.

  20. Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2009-01-01

    -- an outline which at the same time indicates the need for transformations of the Durkheimian model on decisive points. Thus, thirdly, it returns to Durkheim and undertakes to develop his concepts in a direction suitable for a sociological theory of fashion. Finally, it discusses the theoretical implications......This article attempts to create a framework for understanding modern fashion phenomena on the basis of Durkheim's sociology of religion. It focuses on Durkheim's conception of the relation between the cult and the sacred object, on his notion of 'exteriorisation', and on his theory of the social...... symbol in an attempt to describe the peculiar attraction of the fashion object and its social constitution. However, Durkheim's notions of cult and ritual must undergo profound changes if they are to be used in an analysis of fashion. The article tries to expand the Durkheimian cult, radically enlarging...

  1. Utilities objectives

    International Nuclear Information System (INIS)

    Cousin, Y.; Fabian, H.U.

    1996-01-01

    The policy of French and german utilities is to make use of nuclear energy as a long term, competitive and environmentally friendly power supply. The world electricity generation is due to double within the next 30 years. In the next 20 to 30 years the necessity of nuclear energy will be broadly recognized. More than for most industries, to deal properly with nuclear energy requires the combination of a consistent political will, of a proper institutional framework, of strong and legitimate control authorities, of a sophisticated industry and of operators with skilled management and human resources. One of the major risk facing nuclear energy is the loss of competitiveness. This can be achieved only through the combination of an optimized design, a consistent standardization, a proper industrial partnership and a stable long term strategy. Although the existing plants in Western Europe are already very safe, the policy is clearly to enhance the safety of the next generation of nuclear plants which are designing today. The French and German utilities have chosen an evolutionary approach based on experience and proven technologies, with an enhanced defense in depth and an objective of easier operation and maintenance. The cost objective is to maintain and improve what has been achieved in the best existing power plants in both countries. This calls for rational choices and optimized design to meet the safety objectives, a strong standardization policy, short construction times, high availability and enough flexibility to enable optimization of the fuel cycle throughout the lifetime of the plants. The conceptual design phase has proven that the French and German teams from industry and from the utilities are able to pursue both the safety and the cost objectives, basing their decision on a rational approach which could be accepted by the safety authorities. (J.S.)

  2. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  3. Visual object recognition and tracking

    Science.gov (United States)

    Chang, Chu-Yin (Inventor); English, James D. (Inventor); Tardella, Neil M. (Inventor)

    2010-01-01

    This invention describes a method for identifying and tracking an object from two-dimensional data pictorially representing said object by an object-tracking system through processing said two-dimensional data using at least one tracker-identifier belonging to the object-tracking system for providing an output signal containing: a) a type of the object, and/or b) a position or an orientation of the object in three-dimensions, and/or c) an articulation or a shape change of said object in said three dimensions.

  4. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  5. 一种基于人脸对称性的差错掩盖方法%An Error Concealment Method Based on Facial Symmetry

    Institute of Scientific and Technical Information of China (English)

    赖俊; 张江鑫

    2013-01-01

    This paper presents an error concealment method based on facial symmetry .We first execute color segmentation , determine the skin color region;then judge the symmetry of this region , conceal symmetry face regions with symmetry algorithm , conceal other regions with adaptive interpolation algorithm .Using JM86 model of H.264 standard to simulate the algorithm , the experimental results show that our method achieves better conceal results when compared with traditional interpolation algorithm .%该文提出一种基于人脸对称性的差错掩盖方法。首先进行肤色分割,判断出肤色区域;然后对检测出的肤色区域进行对称性判断,选出对称的人脸区域并采用人脸对称掩盖算法进行差错掩盖,对其它区域则采用自适应插值算法。采用H.264的JM86模型对算法进行验证,实验结果表明,与传统的插值算法相比,该文算法利用了人脸的对称性,对于对称的人脸区域获得了更好的掩盖效果。

  6. Living with a concealable stigmatized identity: the impact of anticipated stigma, centrality, salience, and cultural stigma on psychological distress and health.

    Science.gov (United States)

    Quinn, Diane M; Chaudoir, Stephenie R

    2009-10-01

    The current research provides a framework for understanding how concealable stigmatized identities impact people's psychological well-being and health. The authors hypothesize that increased anticipated stigma, greater centrality of the stigmatized identity to the self, increased salience of the identity, and possession of a stigma that is more strongly culturally devalued all predict heightened psychological distress. In Study 1, the hypotheses were supported with a sample of 300 participants who possessed 13 different concealable stigmatized identities. Analyses comparing people with an associative stigma to those with a personal stigma showed that people with an associative stigma report less distress and that this difference is fully mediated by decreased anticipated stigma, centrality, and salience. Study 2 sought to replicate the findings of Study 1 with a sample of 235 participants possessing concealable stigmatized identities and to extend the model to predicting health outcomes. Structural equation modeling showed that anticipated stigma and cultural stigma were directly related to self-reported health outcomes. Discussion centers on understanding the implications of intraindividual processes (anticipated stigma, identity centrality, and identity salience) and an external process (cultural devaluation of stigmatized identities) for mental and physical health among people living with a concealable stigmatized identity. 2009 APA, all rights reserved.

  7. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  8. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  9. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  10. Child sexual abuse among adolescents in southeast Nigeria: A concealed public health behavioral issue

    Science.gov (United States)

    C, Manyike Pius; M, Chinawa Josephat; Elias, Aniwada; I, Odutola Odetunde; Awoere, Chinawa T.

    2015-01-01

    Background and Objective: Child sexual abuse among adolescents is an often overlooked issue in pediatrics, yet it is a major cause of low self esteem and stigmatization in adolescents. The objective of this study was to determine the socioeconomic determinant and pattern of child sexual abuse among adolescent attending secondary schools in South East Nigeria. Methods: This was a cross-sectional study that was carried out among children in three secondary schools in Enugu and Ebonyi states of Nigeria. Five hundred and six adolescents who met inclusion criteria were consecutively recruited into our prospective study between June and October, 2014. Results: One hundred and ninety nine (40 %) of the respondents had been abused and the commonest form of abuse was to look at pornographic pictures, drawings, films, videotapes or magazine 93(18.4%). Fifty eight (11.5%) adolescents stated that they were abused once with age at first exposure being 7-12 years 57 (11.4%). When grouped together, family members and relatives are perpetrators of child sexual abuse. There was significant difference in sex abuse between males and females (p=0.014) while there were no significant difference for age (p=0.157) and social class (p=0.233). Conclusion: Overall prevalence and one time prevalence rates of sexual abuse among adolescents in south east Nigeria was 40% and 11.5% respectively with male perpetrators. There is no link between socioeconomic class, age and child sexual abuse among adolescents. PMID:26430412

  11. Novel PMS2 Pseudogenes Can Conceal Recessive Mutations Causing a Distinctive Childhood Cancer Syndrome

    OpenAIRE

    De Vos, Michel; Hayward, Bruce E.; Picton, Susan; Sheridan, Eamonn; Bonthron, David T.

    2004-01-01

    We investigated a family with an autosomal recessive syndrome of café-au-lait patches and childhood malignancy, notably supratentorial primitive neuroectodermal tumor. There was no cancer predisposition in heterozygotes; nor was there bowel cancer in any individual. However, autozygosity mapping indicated linkage to a region of 7p22 surrounding the PMS2 mismatch-repair gene. Sequencing of genomic PCR products initially failed to identify a PMS2 mutation. Genome searches then revealed a previo...

  12. Breaking object correspondence across saccadic eye movements deteriorates object recognition

    Directory of Open Access Journals (Sweden)

    Christian H. Poth

    2015-12-01

    Full Text Available Visual perception is based on information processing during periods of eye fixations that are interrupted by fast saccadic eye movements. The ability to sample and relate information on task-relevant objects across fixations implies that correspondence between presaccadic and postsaccadic objects is established. Postsaccadic object information usually updates and overwrites information on the corresponding presaccadic object. The presaccadic object representation is then lost. In contrast, the presaccadic object is conserved when object correspondence is broken. This helps transsaccadic memory but it may impose attentional costs on object recognition. Therefore, we investigated how breaking object correspondence across the saccade affects postsaccadic object recognition. In Experiment 1, object correspondence was broken by a brief postsaccadic blank screen. Observers made a saccade to a peripheral object which was displaced during the saccade. This object reappeared either immediately after the saccade or after the blank screen. Within the postsaccadic object, a letter was briefly presented (terminated by a mask. Observers reported displacement direction and letter identity in different blocks. Breaking object correspondence by blanking improved displacement identification but deteriorated postsaccadic letter recognition. In Experiment 2, object correspondence was broken by changing the object’s contrast-polarity. There were no object displacements and observers only reported letter identity. Again, breaking object correspondence deteriorated postsaccadic letter recognition. These findings identify transsaccadic object correspondence as a key determinant of object recognition across the saccade. This is in line with the recent hypothesis that breaking object correspondence results in separate representations of presaccadic and postsaccadic objects which then compete for limited attentional processing resources (Schneider, 2013. Postsaccadic

  13. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    Science.gov (United States)

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  14. An Integrative Review of the Concealed Connection: Nurse Educators' Critical Thinking.

    Science.gov (United States)

    Raymond, Christy; Profetto-McGrath, Joanne; Myrick, Florence; Strean, William B

    2017-11-01

    The role of nurse educators in the development of students' critical thinking has been overlooked despite the emphasized need for effective teaching methods. An integrative review was performed to examine both quantitative and qualitative research published from 2000 to 2015 related to nurse educators' critical thinking. Many barriers and facilitators existing on individual, interpersonal, and contextual levels affected nurse educators' critical thinking. Various tools have been used to measure nurse educators' critical thinking. This review also highlighted the continued lack of a consensus definition of critical thinking and the limited presence of conceptual models to guide the use of critical thinking in nursing education. Continued examination of nurse educators' critical thinking is needed, given the limited number of studies that have been completed. Much needs to be explored further, including conceptualizations of critical thinking and confirmation of emerging themes identified in this review. [J Nurs Educ. 2017;56(11):648-654.]. © 2017 Raymond, Profetto-McGrath, Myrick, et al.

  15. Reveal or Conceal? Signaling Strategies for Building Legitimacy in Cleantech Firms

    DEFF Research Database (Denmark)

    Bjørnåli, Ekaterina; Giones, Ferran; Billström, Anders

    2017-01-01

    cases while investigating their actions in different phases of the venture’s evolution. The results suggest that, contrary to signaling theory expectations, young clean-tech firms do not always build legitimacy by conveying information on their strengths. Instead, we observe that they use signaling......New entrants in technology-intense industries are in a race to build legitimacy in order to compete with established players. Legitimacy has been identified as a driver of venture survival and growth; it helps mitigate third-party uncertainty and so facilitates access to resources, engagement...... with customers and other stakeholders. Nevertheless, we know little about how legitimacy is built and how new entrants build legitimacy in complex technology-intensive industries. In this research we explore how Norwegian cleantech firms use signaling and strategic actions to build legitimacy. We analyze five...

  16. Instructions to suppress semantic memory enhances or has no effect on P300 in a concealed information test (CIT).

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Drapekin, Jesse; Labkovsky, Elena; Tullman, Samuel

    2017-03-01

    The present study investigated the extent to which people can suppress semantic memory as indexed with the P300 ERP and the autobiographical implicit association test (aIAT). In EXP 1, participants (22) were run in a counterbalanced repeated measures study in both simply knowledgeable (SK) and knowledgeable with suppression (SP) conditions. A P300-based, concealed information test ("Complex Trial Protocol"; CTP) with a 50/50 Target/Nontarget (T/NT) ratio was given both with and without instructions to suppress semantic memories. The results showed increased P300s to probe name stimuli, reduced (but still high positive) aIAT d-scores, and increased simple reaction times to all stimuli used in ERP tests in the SP condition. EXP 2 was similar, but with SP and SK in two separate groups, and a 20/80 T/NT ratio. Again, ERP and aIAT results failed to show a suppression effect for semantic memory. The behavioral data suggest some task demand effects under suppression instructions, and that EXP 1 was more demanding than EXP 2. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. NGC1448 and IC 3639: Two Concealed Black Holes Lurking in our Cosmic Backyard Unveiled by NuSTAR

    Science.gov (United States)

    Stern, Daniel; Boorman, Peter; Annuar, Ady; Gandhi, Poshak; Alexander, D. M.; Lansbury, George B.; Asmus, Daniel; Ballantyne, David R.; Bauer, Franz E.; Boggs, Steven E.; Brandt, W. Niel; Brightman, Murray; Christensen, Finn; Craig, William W.; Farrah, Duncan; Goulding, Andy D.; Hailey, Charles James; Harrison, Fiona; Hoenig, Sebastian; Koss, Michael; LaMassa, Stephanie M.; Masini, Alberto; Murray, Stephen S.; Ricci, Claudio; Risaliti, Guido; Rosario, David J.; Stanley, Flora; Zhang, William

    2017-01-01

    We present NuSTAR observations of two nearby Active Galactic Nuclei (AGN), NGC 1448 and IC 3639, located at distances of 12 Mpc and 54 Mpc, respectively. NuSTAR high-energy X-ray (> 10 keV) observations, combined with archival lower energy X-ray observations from Chandra and Suzaku, reveal both sources to contain heavily obscured, accreting super-massive black holes. NGC 1448 is one of the nearest luminous galaxies to the Milky Way, yet the AGN at its centre was only discovered in 2009. Using state-of-the-art models, we constrain the obscuring column density (NH) of gas concealing both AGN, finding them to be extreme, with NH values well into the Compton-thick (CT) regime with N(H) > 3e24 /cm2. NGC 1448 has an intrinsic X-ray luminosity of L(24 keV) ˜ 5e40 erg/s, making it one of the lowest luminosity CT AGN known. IC 3639, on the other hand, has one of the strongest iron fluorescence emission lines known. We also discuss multi-wavelength diagnostics at optical and mid-infrared energies as indirect indicators to penetrate through the obscuring veils and probe the intrinsic properties of the AGN. Through detailed studies such as we present here, NuSTAR is showing that there are still plenty of interesting discoveries awaiting to be made, even in the nearby Universe.

  18. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  19. Concealed, Unobtrusive Ear-Centered EEG Acquisition: cEEGrids for Transparent EEG

    Science.gov (United States)

    Bleichner, Martin G.; Debener, Stefan

    2017-01-01

    Electroencephalography (EEG) is an important clinical tool and frequently used to study the brain-behavior relationship in humans noninvasively. Traditionally, EEG signals are recorded by positioning electrodes on the scalp and keeping them in place with glue, rubber bands, or elastic caps. This setup provides good coverage of the head, but is impractical for EEG acquisition in natural daily-life situations. Here, we propose the transparent EEG concept. Transparent EEG aims for motion tolerant, highly portable, unobtrusive, and near invisible data acquisition with minimum disturbance of a user's daily activities. In recent years several ear-centered EEG solutions that are compatible with the transparent EEG concept have been presented. We discuss work showing that miniature electrodes placed in and around the human ear are a feasible solution, as they are sensitive enough to pick up electrical signals stemming from various brain and non-brain sources. We also describe the cEEGrid flex-printed sensor array, which enables unobtrusive multi-channel EEG acquisition from around the ear. In a number of validation studies we found that the cEEGrid enables the recording of meaningful continuous EEG, event-related potentials and neural oscillations. Here, we explain the rationale underlying the cEEGrid ear-EEG solution, present possible use cases and identify open issues that need to be solved on the way toward transparent EEG. PMID:28439233

  20. Silently transformable: the many ways bacteria conceal their built-in capacity of genetic exchange.

    Science.gov (United States)

    Attaiech, Laetitia; Charpentier, Xavier

    2017-06-01

    Bacteria can undergo genetic transformation by actively integrating genetic information from phylogenetically related or unrelated organisms. The original function of natural transformation remains a subject of debate, but it is well established as a major player in genome evolution. Naturally transformable bacteria use a highly conserved DNA uptake system to internalize DNA and integrate it in their chromosome by homologous recombination. Expression of the DNA uptake system, often referred to as competence, is tightly controlled and induced by signals that are often elusive. Initially thought to be restricted to a few bacterial species, natural transformation increasingly seems widespread in bacteria. Yet, the triggering signals and regulatory mechanisms involved appear diverse and are understood only in a limited set of species. As a result, natural transformation in most bacterial species remains poorly documented and the potential impact of this mechanism on global genetic mobilization is likely underappreciated. Indeed, even when a conserved activator can be identified to artificially induce the expression of the DNA uptake system, the considered species may still remain non-transformable. Recent works indicate that the DNA uptake system is directly subjected to silencing. At least in Legionella pneumophila and possibly in other species, a small non-coding RNA prevents expression of the DNA uptake system. Silencing constitutes one more way bacteria control expression of their engine of genetic exchange. It may also be the underlying reason of the undetectable natural transformation of many bacterial species grown under laboratory conditions even though they possess a DNA uptake system.

  1. Reveal or Conceal? Signaling Strategies for Building Legitimacy in Cleantech Firms

    Directory of Open Access Journals (Sweden)

    Ekaterina S. Bjornali

    2017-10-01

    Full Text Available New entrants in technology-intense industries are in a race to build legitimacy in order to compete with established players. Legitimacy has been identified as a driver of venture survival and growth; it helps mitigate third-party uncertainty and so facilitates access to resources, engagement with customers and other stakeholders. Nevertheless, we know little about how legitimacy is built and how new entrants build legitimacy in complex technology-intensive industries. In this research we explore how Norwegian cleantech firms use signaling and strategic actions to build legitimacy. We analyze five cases while investigating their actions in different phases of the venture’s evolution. The results suggest that, contrary to signaling theory expectations, young clean-tech firms do not always build legitimacy by conveying information on their strengths. Instead, we observe that they use signaling strategies to address the specific concerns of different stakeholders. This is very much contingent upon the evolutionary stage of the venture and the firm’s current weaknesses.

  2. Investigation of Sediment Pathways and Concealed Sedimentological Features in Hidden River Cave, Kentucky

    Science.gov (United States)

    Feist, S.; Maclachlan, J. C.; Reinhardt, E. G.; McNeill-Jewer, C.; Eyles, C.

    2016-12-01

    Hidden River Cave is part of a cave system hydrogeologically related to Mammoth Cave in Kentucky and is a multi-level active cave system with 25km of mapped passages. Upper levels experience flow during flood events and lower levels have continuously flowing water. Improper industrial and domestic waste disposal and poor understanding of local hydrogeology lead to contamination of Hidden River Cave in the early 1940s. Previously used for hydroelectric power generation and as a source of potable water the cave was closed to the public for almost 50 years. A new sewage treatment plant and remediation efforts since 1989 have improved the cave system's health. This project focuses on sedimentological studies in the Hidden River Cave system. Water and sediment transport in the cave are being investigated using sediment cores, surface sediment samples and water level data. An Itrax core scanner is used to analyze sediment cores for elemental concentrations, magnetic susceptibility, radiography, and high resolution photography. Horizons of metal concentrations in the core allow correlation of sedimentation events in the cave system. Thecamoebian (testate amoebae) microfossils identified in surface samples allow for further constraint of sediment sources, sedimentation rates, and paleoclimatic analysis. Dive recorders monitor water levels, providing data to further understand the movement of sediment through the cave system. A general time constraint on the sediment's age is based on the presence of microplastic in the surface samples and sediment cores, and data from radiocarbon and lead-210 dating. The integration of various sedimentological data allows for better understanding of sedimentation processes and their record of paleoenvironmental change in the cave system. Sediment studies and methodologies from this project can be applied to other karst systems, and have important applications for communities living on karst landscapes and their water management policies.

  3. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  4. Thoughts on identifiers

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    As business processes and information transactions have become an inextricably intertwined with the Web, the importance of assignment, registration, discovery, and maintenance of identifiers has increased. In spite of this, integrated frameworks for managing identifiers have been slow to emerge. Instead, identification systems arise (quite naturally) from immediate business needs without consideration for how they fit into larger information architectures. In addition, many legacy identifier systems further complicate the landscape, making it difficult for content managers to select and deploy identifier systems that meet both the business case and long term information management objectives. This presentation will outline a model for evaluating identifier applications and the functional requirements of the systems necessary to support them. The model is based on a layered analysis of the characteristics of identifier systems, including: * Functional characteristics * Technology * Policy * Business * Social T...

  5. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation.

    Science.gov (United States)

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V; Levy, Mia A

    2017-07-25

    Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score compared to the control group (0.4 points

  6. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  7. Locating an Imaging Radar in Canada for Identifying Spaceborne Objects

    Science.gov (United States)

    1992-12-01

    of residents. Daskin (11:48) extended that model to account for the chance that when a demand arrives at the system it will not be covered since all...Journal of Operational Research, 50: 280-297 (February 1991). 11. Daskin , Mark S. " A Maximum Expected Covering Location Model: Formulation...continue with this thesis-, and Dr. William Wiesel for his instruction and help in developing a satellite coordinate frame and understanding the mechanics

  8. Internally readable identifying tag

    International Nuclear Information System (INIS)

    Jefferts, K.B.; Jefferts, E.R.

    1980-01-01

    A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

  9. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  10. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  11. Reveal or conceal?

    DEFF Research Database (Denmark)

    Giones, Ferran; Bjørnåli, Ekaterina; Billström, Anders

    2017-01-01

    with customers and other stakeholders. Nevertheless, we know little about how legitimacy is built and how new entrants build legitimacy in complex technology-intensive industries. In this research we explore how Norwegian cleantech firms use signaling and strategic actions to build legitimacy. We analyze five...... cases while investigating their actions in different phases of the venture’s evolution. The results suggest that, contrary to signaling theory expectations, young clean-tech firms do not always build legitimacy by conveying information on their strengths. Instead, we observe that they use signaling...... strategies to address the specific concerns of different stakeholders. This is very much contingent upon the evolutionary stage of the venture and the firm’s current weaknesses....

  12. Disclosing and Concealing

    DEFF Research Database (Denmark)

    Flyverbom, Mikkel

    2016-01-01

    The ubiquity of digital technologies and the datafication of many domains of social liferaise important questions about governance. In the emergent field of internet governancestudies, most work has explored novel governance arrangements, institutional developmentsand the effects of interactions...... of the argument is that there is anintimate relationship between seeing, knowing and governing, and that digitalisation anddatafication processes fundamentally shape how we make things visible or invisible, knowableor unknowable and governable or ungovernable. Having articulated this conceptual argument...

  13. Revealing/Concealing

    DEFF Research Database (Denmark)

    Isar, Nicoletta

    2017-01-01

    and potential to disrupt the dualism of Platonism challenged by Nietzsche. Yet the substance of this contribution, intended to express the symptom of perception of premodern image, must greatly differ from the grounds of phenomenology. This paper aims to bring however some arguments in support...... to disrupt the Platonic dualism, but also to provide the arguments to challenge the misunderstood dualism of Platonism itself as it was incorporated into the Western thinking. The subject of this paper will provide the means for this demonstration, and hopefully shed new lights on the nature of the premodern...... image. My argument is based on the third Platonic term – χώρα – a concept with a long tradition since Antiquity until the Byzantine era. I will take further her argument and explore the paradigmatic dimension of this syntagm which could be viewed as “an integrated part of the ancient and premodern image...

  14. Object Knowledge Modulates Colour Appearance

    Directory of Open Access Journals (Sweden)

    Christoph Witzel

    2011-01-01

    Full Text Available We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis.

  15. Object knowledge modulates colour appearance

    Science.gov (United States)

    Witzel, Christoph; Valkova, Hanna; Hansen, Thorsten; Gegenfurtner, Karl R

    2011-01-01

    We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective) colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis. PMID:23145224

  16. Adobe Boxes: Locating Object Proposals Using Object Adobes.

    Science.gov (United States)

    Fang, Zhiwen; Cao, Zhiguo; Xiao, Yang; Zhu, Lei; Yuan, Junsong

    2016-09-01

    Despite the previous efforts of object proposals, the detection rates of the existing approaches are still not satisfactory enough. To address this, we propose Adobe Boxes to efficiently locate the potential objects with fewer proposals, in terms of searching the object adobes that are the salient object parts easy to be perceived. Because of the visual difference between the object and its surroundings, an object adobe obtained from the local region has a high probability to be a part of an object, which is capable of depicting the locative information of the proto-object. Our approach comprises of three main procedures. First, the coarse object proposals are acquired by employing randomly sampled windows. Then, based on local-contrast analysis, the object adobes are identified within the enlarged bounding boxes that correspond to the coarse proposals. The final object proposals are obtained by converging the bounding boxes to tightly surround the object adobes. Meanwhile, our object adobes can also refine the detection rate of most state-of-the-art methods as a refinement approach. The extensive experiments on four challenging datasets (PASCAL VOC2007, VOC2010, VOC2012, and ILSVRC2014) demonstrate that the detection rate of our approach generally outperforms the state-of-the-art methods, especially with relatively small number of proposals. The average time consumed on one image is about 48 ms, which nearly meets the real-time requirement.

  17. Objective interpretation as conforming interpretation

    OpenAIRE

    Lidka Rodak

    2011-01-01

    The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and ...

  18. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  19. Early object relations into new objects.

    Science.gov (United States)

    Downey, T W

    2001-01-01

    dramatic change that has hitherto been poorly identified and conceptualized. In child analysis, play is the medium for picking the lock of both arrested maturation and stultified development. Realizing that should permit the child analyst to engage more freely with the child in their own style of play without being overly concerned about the presence or absence of relational dynamic material. Non-dynamic play may not usually be defensive play, though it has often been misinterpreted as such. It may represent activity supporting renewed maturation--practice play in the service of memory, motility, or small or large motor function rather than in the service of the playful, repetitive externalization of threatening introjects. Dynamic play highlights the stagnant or emerging functions of the ego with regard to defense and affect management, which may then be interpreted using the play as key or using words as key to unlock the troubled relationship that is being dramatized. The analyst remains in a non-defensive stance, assigned by the analysand as audience or benign participant. Similarly, in adult analyses some individuals come pre-programmed not so much for interpretation as to discover the analyst as new object. They are in search of near psychobiological maturational closure on an object, already constituted in fantasy, that is respectful, attentive, objective, interested, and sometimes enlightening in their attempts at analytic understanding and developmental homeostasis. This phenomenon is akin to love at first sight, though without the flagrant libidinal romantic element. It occurs as the analytic narrative unfolds and the patient comes to a new sense of self, often around some developmental role or mix of roles, such as spouse, lover, mother, student, sibling, or worker. The point is that playing on the black and white keys of development and maturation leads to the appreciation of a psychoanalytic instrument that is at once more complex and yet easier to get music

  20. Quasi-objects, Cult Objects and Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2011-01-01

    This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics. T...... as a unique opportunity for studying the interchange between these two forms of fetishism and their respective phenomenologies. Finally, returning to Serres, I briefly consider the theoretical consequences of introducing the fashion object as a quasi-object.......This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics....... These two phenomenologies are, so I argue, essential to quasi-object theory, yet largely ignored by Serres’ sociological interpreters. They correspond with the two different theories of fetishism found in Marx and Durkheim, respectively. In the second half of the article, I introduce the fashion object...

  1. Object permanence in cats: Analysis in locomotor space.

    Science.gov (United States)

    Thinus-Blanc, C; Poucet, B; Chapuis, N

    1982-04-01

    Stages IV and V object permanence were studied with 38-40-week-old cats. A constraining apparatus preventing animals from pursuing the bowl containing meat before it was concealed was used. Either the bowl was seen moving and disappeared from view behind a screen (stage IV trials), or after this sequence, it reappeared from behind the first screen and disappeared behind a second screen (stage V trials). In both situations cats performed significantly above chance but the paths taken to reach the food were different according to the stage. In stage V trials, cats expressed a preference for the path leading to the end of the second screen where the food was last seen disappearing. Copyright © 1982. Published by Elsevier B.V.

  2. Learning Object Repositories

    Science.gov (United States)

    Lehman, Rosemary

    2007-01-01

    This chapter looks at the development and nature of learning objects, meta-tagging standards and taxonomies, learning object repositories, learning object repository characteristics, and types of learning object repositories, with type examples. (Contains 1 table.)

  3. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications

    Directory of Open Access Journals (Sweden)

    Chan Wai-Yip

    2009-01-01

    Full Text Available Wireless-VoIP communications introduce perceptual degradations that are not present with traditional VoIP communications. This paper investigates the effects of such degradations on the performance of three state-of-the-art standard objective quality measurement algorithms—PESQ, P.563, and an "extended" E-model. The comparative study suggests that measurement performance is significantly affected by acoustic background noise type and level as well as speech codec and packet loss concealment strategy. On our data, PESQ attains superior overall performance and P.563 and E-model attain comparable performance figures.

  5. Visual Priming of Inverted and Rotated Objects

    Science.gov (United States)

    Knowlton, Barbara J.; McAuliffe, Sean P.; Coelho, Chase J.; Hummel, John E.

    2009-01-01

    Object images are identified more efficiently after prior exposure. Here, the authors investigated shape representations supporting object priming. The dependent measure in all experiments was the minimum exposure duration required to correctly identify an object image in a rapid serial visual presentation stream. Priming was defined as the change…

  6. Workshop objectives and structure

    International Nuclear Information System (INIS)

    2004-01-01

    The overall aim of the Workshop was to create a platform in order to better understand different approaches to managing uncertainty in post-closure safety cases and regulatory approaches in different national waste management programmes. The principal objectives of the Workshop were to: - To identify common elements in different approaches for managing uncertainty. - To facilitate information exchange and to promote discussion on different technical approaches to the management and characterisation of uncertainty and on the role of risk. - To explore the merits of alternative approaches to risk-informed decision making. - To identify the potential for further developments of methods or strategies to support the management of uncertainties. The workshop was organised into plenary sessions and working group discussions: The first plenary session focused on establishing a framework for understanding the management of uncertainties and the use of risk. It comprised oral presentations drawing on a range of experience from both active participants in the development and assessment of safety cases and keynotes presentations by external participants involved in risk management in other sectors. The working group discussions covered three technical themes: Risk management and decision making. Regulatory requirements and review of uncertainty and risk in safety cases. Practical approaches and tools for the management of uncertainties and the assignment of probabilities, the use of expert judgements, and the presentation of information on uncertainties and risk were examined. The aim of the working groups was to develop an understanding of the specific issues, and to identify any further activities that will support the development and/or evaluation of safety cases. The round up plenary session brought together information and conclusions from each of the working groups. Common elements in the different approaches to treating uncertainty and risk were identified, along with

  7. Objectives of the symposium

    International Nuclear Information System (INIS)

    Genter, N.E.

    1996-01-01

    The objective of this symposium was to discuss the sorts of evidence of molecular alterations in DNA which can be used to study causation of the stochastic effects of importance in radiation protection. Specifically, the aim was to address the following: what sort of indications might show whether a cancer was caused by radiation; whether there is a radiogenic signature to distinguish damage caused by ionizing radiation; whether bio-markers might be available for susceptibility, for exposure, for biological consequences. Despite a number of epidemiological studies (referred to), there is no clear, credible, defensible answer as to whether low-level radiation increases the risk of cancer. A new ethical question is, what rules should be in place for identifying and protecting genetically sensitive individuals. 1 tab

  8. Numerical Analysis Objects

    Science.gov (United States)

    Henderson, Michael

    1997-08-01

    The Numerical Analysis Objects project (NAO) is a project in the Mathematics Department of IBM's TJ Watson Research Center. While there are plenty of numerical tools available today, it is not an easy task to combine them into a custom application. NAO is directed at the dual problems of building applications from a set of tools, and creating those tools. There are several "reuse" projects, which focus on the problems of identifying and cataloging tools. NAO is directed at the specific context of scientific computing. Because the type of tools is restricted, problems such as tools with incompatible data structures for input and output, and dissimilar interfaces to tools which solve similar problems can be addressed. The approach we've taken is to define interfaces to those objects used in numerical analysis, such as geometries, functions and operators, and to start collecting (and building) a set of tools which use these interfaces. We have written a class library (a set of abstract classes and implementations) in C++ which demonstrates the approach. Besides the classes, the class library includes "stub" routines which allow the library to be used from C or Fortran, and an interface to a Visual Programming Language. The library has been used to build a simulator for petroleum reservoirs, using a set of tools for discretizing nonlinear differential equations that we have written, and includes "wrapped" versions of packages from the Netlib repository. Documentation can be found on the Web at "http://www.research.ibm.com/nao". I will describe the objects and their interfaces, and give examples ranging from mesh generation to solving differential equations.

  9. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  10. Cognitive object recognition system (CORS)

    Science.gov (United States)

    Raju, Chaitanya; Varadarajan, Karthik Mahesh; Krishnamurthi, Niyant; Xu, Shuli; Biederman, Irving; Kelley, Troy

    2010-04-01

    We have developed a framework, Cognitive Object Recognition System (CORS), inspired by current neurocomputational models and psychophysical research in which multiple recognition algorithms (shape based geometric primitives, 'geons,' and non-geometric feature-based algorithms) are integrated to provide a comprehensive solution to object recognition and landmarking. Objects are defined as a combination of geons, corresponding to their simple parts, and the relations among the parts. However, those objects that are not easily decomposable into geons, such as bushes and trees, are recognized by CORS using "feature-based" algorithms. The unique interaction between these algorithms is a novel approach that combines the effectiveness of both algorithms and takes us closer to a generalized approach to object recognition. CORS allows recognition of objects through a larger range of poses using geometric primitives and performs well under heavy occlusion - about 35% of object surface is sufficient. Furthermore, geon composition of an object allows image understanding and reasoning even with novel objects. With reliable landmarking capability, the system improves vision-based robot navigation in GPS-denied environments. Feasibility of the CORS system was demonstrated with real stereo images captured from a Pioneer robot. The system can currently identify doors, door handles, staircases, trashcans and other relevant landmarks in the indoor environment.

  11. Identification of computer graphics objects

    Directory of Open Access Journals (Sweden)

    Rossinskyi Yu.M.

    2016-04-01

    Full Text Available The article is devoted to the use of computer graphics methods in problems of creating drawings, charts, drafting, etc. The widespread use of these methods requires the development of efficient algorithms for the identification of objects of drawings. The article analyzes the model-making algorithms for this problem and considered the possibility of reducing the time using graphics editing operations. Editing results in such operations as copying, moving and deleting objects specified images. These operations allow the use of a reliable identification of images of objects methods. For information on the composition of the image of the object along with information about the identity and the color should include information about the spatial location and other characteristics of the object (the thickness and style of contour lines, fill style, and so on. In order to enable the pixel image analysis to structure the information it is necessary to enable the initial code image objects color. The article shows the results of the implementation of the algorithm of encoding object identifiers. To simplify the process of building drawings of any kind, and reduce time-consuming, method of drawing objects identification is proposed based on the use as the ID information of the object color.

  12. Specification of Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    relation over two objects and an event. In the model, objects can be composed by parallel composition, encapsulation, and hiding of operations. Refinement between objects is defined as fair trace inclusion.A specification language is presented where objects can be specified operationally by abstract...

  13. Paradigms in object recognition

    International Nuclear Information System (INIS)

    Mutihac, R.; Mutihac, R.C.

    1999-09-01

    A broad range of approaches has been proposed and applied for the complex and rather difficult task of object recognition that involves the determination of object characteristics and object classification into one of many a priori object types. Our paper revises briefly the three main different paradigms in pattern recognition, namely Bayesian statistics, neural networks, and expert systems. (author)

  14. BL Lacertae objects

    International Nuclear Information System (INIS)

    Disney, M.J.; Veron, P.

    1977-01-01

    The properties of BL Lacertae objects are discussed including their spectra, variability, and brightness. The historical development of observation, and the conclusion that these objects are possibly quasar-related objects rather than variable stars as originally supposed are treated. The possible mechanisms for the unusual luminosity of these objects are considered

  15. Designing the Object Game

    DEFF Research Database (Denmark)

    Filip, Diane; Lindegaard, Hanne

    2016-01-01

    The Object Game is an exploratory design game and an experiment of developing a tangible object that can spark dialogue and retrospection between collaborative partners and act as a boundary object. The objective of this article is to show and elaborate on the development of the Object Game......, and to provide case examples of the game in action. The Object Game has two parts – Story-building and Co-rating of objects – with the aim of stimulating a collaborative reflection on knowledge sharing with different objects. In Story-building, the participants visualize their knowledge sharing process...... these facilitated knowledge transfer, knowledge exchange, knowledge generation, and knowledge integration. The participants collaborative reflected on their use of different objects for knowledge sharing and learn which objects have been effective (and which have not been effective) in their collaborative...

  16. Objective interpretation as conforming interpretation

    Directory of Open Access Journals (Sweden)

    Lidka Rodak

    2011-12-01

    Full Text Available The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and should be rather linked with conforming interpretation. And what this actually implies is that it is not the virtue of certainty and predictability – which are usually associated with objectivity- but coherence that makes the foundation of applicability of objectivity in law.What could be observed from the analyses, is that both the phenomenon of conforming interpretation and objective interpretation play the role of arguments in the interpretive discourse, arguments that provide justification that interpretation is not arbitrary or subjective. With regards to the important part of the ideology of legal application which is the conviction that decisions should be taken on the basis of law in order to exclude arbitrariness, objective interpretation could be read as a question “what kind of authority “supports” certain interpretation”? that is almost never free of judicial creativity and judicial activism.One can say that, objective and conforming interpretation are just another arguments used in legal discourse.

  17. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Testing a potential alternative to traditional identification procedures: Reaction time-based concealed information test does not work for lineups with cooperative witnesses.

    Science.gov (United States)

    Sauerland, Melanie; Wolfs, Andrea C F; Crans, Samantha; Verschuere, Bruno

    2017-11-27

    Direct eyewitness identification is widely used, but prone to error. We tested the validity of indirect eyewitness identification decisions using the reaction time-based concealed information test (CIT) for assessing cooperative eyewitnesses' face memory as an alternative to traditional lineup procedures. In a series of five experiments, a total of 401 mock eyewitnesses watched one of 11 different stimulus events that depicted a breach of law. Eyewitness identifications in the CIT were derived from longer reaction times as compared to well-matched foil faces not encountered before. Across the five experiments, the weighted mean effect size d was 0.14 (95% CI 0.08-0.19). The reaction time-based CIT seems unsuited for testing cooperative eyewitnesses' memory for faces. The careful matching of the faces required for a fair lineup or the lack of intent to deceive may have hampered the diagnosticity of the reaction time-based CIT.

  19. Sex difference in choice of concealed or exposed refuge sites by preschool children viewing a model leopard in a playground simulation of antipredator behavior

    Directory of Open Access Journals (Sweden)

    Richard G. Coss

    2016-07-01

    Full Text Available The current study of preschool children characterizes a semi-natural extension of experimental questions on how human ancestors evaded predation when encountering dangerous felids. In a pretend game on a playground, we presented full-size leopard and deer models to children (N = 39 in a repeatedmeasures experimental design. Prior to viewing the model presented 15-m away, each child was instructed by the experimenter to go where she or he would feel safe. The rationale for this study was based on the anthropological construct of “sexual dinichism,” positing that, during the Pliocene, smaller-bodied hominin females engaged in more arboreal behavior than larger-bodied males. Consistent with this construct, our previous simulation research using images of an African rock outcrop showed that, after viewing a lion, girls preferred a tree as refuge rather than a crevice or large boulder whereas boys did not differentiate these refuge sites. In this follow-up study, we predicted that, after viewing the model leopard, the preschool girls would differ from the boys by not choosing enclosed refuge sites analogous to the crevice. Analyses of a contingency table for the leopard model supported this hypothesis by yielding a significant interaction of sex and refuge location (p = .031, d = .76, the source of which was a reliably larger percentage of girls not choosing concealed refuge (p = .005, d = 2.3. The interaction of sex and refuge location for the model deer was not significant (p > .5. Our findings suggest that, in contrast to the deer, the girls selected exposed playground refuge sites rather than concealing ones to maintain visual contact with the leopard as a contingency for future action

  20. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (pvisual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Seeing Objects as Faces Enhances Object Detection.

    Science.gov (United States)

    Takahashi, Kohske; Watanabe, Katsumi

    2015-10-01

    The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  2. Seeing Objects as Faces Enhances Object Detection

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2015-09-01

    Full Text Available The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  3. Object detection and tracking system

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Tian J.

    2017-05-30

    Methods and apparatuses for analyzing a sequence of images for an object are disclosed herein. In a general embodiment, the method identifies a region of interest in the sequence of images. The object is likely to move within the region of interest. The method divides the region of interest in the sequence of images into sections and calculates signal-to-noise ratios for a section in the sections. A signal-to-noise ratio for the section is calculated using the section in the image, a prior section in a prior image to the image, and a subsequent section in a subsequent image to the image. The signal-to-noise ratios are for potential velocities of the object in the section. The method also selects a velocity from the potential velocities for the object in the section using a potential velocity in the potential velocities having a highest signal-to-noise ratio in the signal-to-noise ratios.

  4. Hamiltonian dynamics of extended objects

    Science.gov (United States)

    Capovilla, R.; Guven, J.; Rojas, E.

    2004-12-01

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler Lagrange equations.

  5. Hamiltonian dynamics of extended objects

    International Nuclear Information System (INIS)

    Capovilla, R; Guven, J; Rojas, E

    2004-01-01

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler-Lagrange equations

  6. Hamiltonian dynamics of extended objects

    Energy Technology Data Exchange (ETDEWEB)

    Capovilla, R [Departamento de FIsica, Centro de Investigacion y de Estudios Avanzados del IPN, Apdo Postal 14-740, 07000 Mexico, DF (Mexico); Guven, J [School of Theoretical Physics, Dublin Institute for Advanced Studies, 10 Burlington Road, Dublin 4 (Ireland); Rojas, E [Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apdo Postal 70-543, 04510 Mexico, DF (Mexico)

    2004-12-07

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler-Lagrange equations.

  7. Objectivity And Moral Relativism

    OpenAIRE

    Magni, Sergio Filippo

    2017-01-01

    The relativity of morals has usually been taken as an argument against the objectivity of ethics. However, a more careful analysis can show that there are forms of moral objectivism which have relativistic implications, and that moral relativism can be compatible with the objectivity of ethics. Such an objectivity is not always in contrast to moral relativism and it is possible to be relativists without having to give up the claim of objectivity in ethics

  8. Objects in Motion

    Science.gov (United States)

    Damonte, Kathleen

    2004-01-01

    One thing scientists study is how objects move. A famous scientist named Sir Isaac Newton (1642-1727) spent a lot of time observing objects in motion and came up with three laws that describe how things move. This explanation only deals with the first of his three laws of motion. Newton's First Law of Motion says that moving objects will continue…

  9. Survivability via Control Objectives

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.

    2000-08-11

    Control objectives open an additional front in the survivability battle. A given set of control objectives is valuable if it represents good practices, it is complete (it covers all the necessary areas), and it is auditable. CobiT and BS 7799 are two examples of control objective sets.

  10. Repurposing learning object components

    NARCIS (Netherlands)

    Verbert, K.; Jovanovic, J.; Gasevic, D.; Duval, E.; Meersman, R.

    2005-01-01

    This paper presents an ontology-based framework for repurposing learning object components. Unlike the usual practice where learning object components are assembled manually, the proposed framework enables on-the-fly access and repurposing of learning object components. The framework supports two

  11. Objects, materiality and meaning

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Lindegaard, Hanne

    2008-01-01

    The present research work investigates the relation between physical objects, their materiality, understood as the physical substances they are made from, and the communication from the objects. In product design of physical objects the communicative aspects are just as important as the function...... of the object, and the designers aim is therefore to tune both in order to achieve a desired goal. To do so the designer basically has 2 options: Alteration of the physical shape of the object and the selection of materials. Through the manipulation of shape and materials can symbolic and sensory information...... be written into the object. The materials are therefore carriers of communication, even though this is dependent of the cultural context and the environment which the object will be part of. However the designer has only minor influence on those....

  12. Reasoning about Function Objects

    Science.gov (United States)

    Nordio, Martin; Calcagno, Cristiano; Meyer, Bertrand; Müller, Peter; Tschannen, Julian

    Modern object-oriented languages support higher-order implementations through function objects such as delegates in C#, agents in Eiffel, or closures in Scala. Function objects bring a new level of abstraction to the object-oriented programming model, and require a comparable extension to specification and verification techniques. We introduce a verification methodology that extends function objects with auxiliary side-effect free (pure) methods to model logical artifacts: preconditions, postconditions and modifies clauses. These pure methods can be used to specify client code abstractly, that is, independently from specific instantiations of the function objects. To demonstrate the feasibility of our approach, we have implemented an automatic prover, which verifies several non-trivial examples.

  13. Birth of the Object: Detection of Objectness and Extraction of Object Shape through Object Action Complexes

    DEFF Research Database (Denmark)

    Kraft, Dirk; Pugeault, Nicolas; Baseski, Emre

    2008-01-01

    We describe a process in which the segmentation of objects as well as the extraction of the object shape becomes realized through active exploration of a robot vision system. In the exploration process, two behavioral modules that link robot actions to the visual and haptic perception of objects...... interact. First, by making use of an object independent grasping mechanism, physical control over potential objects can be gained. Having evaluated the initial grasping mechanism as being successful, a second behavior extracts the object shape by making use of prediction based on the motion induced...... system, knowledge about its own embodiment as well as knowledge about geometric relationships such as rigid body motion. This prior knowledge allows the extraction of representations that are semantically richer compared to many other approaches....

  14. Herbig-Haro objects

    International Nuclear Information System (INIS)

    Schwartz, R.D.

    1983-01-01

    Progress in the understanding of Herbig-Haro (HH) objects is reviewed. The results of optical studies of the proper motions and alignments, variability, and polarization of HH objects and the results of spectroscopic studies are discussed. Ground-based infrared studies and far-infrared observations are reviewed. Findings on the properties of molecular clouds associated with HH objects, on gas flows associated with HH IR stars, on maser emission, and on radio continuum observations are considered. A history of proposed excitation mechanisms for HH objects is briefly presented, and the salient shock-wave calculations aimed at synthesizing the spectra of HH objects are summarized along with hypotheses that have been advanced about the origin of the objects. 141 references

  15. Object color affects identification and repetition priming.

    Science.gov (United States)

    Uttl, Bob; Graf, Peter; Santacruz, Pilar

    2006-10-01

    We investigated the influence of color on the identification of both non-studied and studied objects. Participants studied black and white and color photos of common objects and memory was assessed with an identification test. Consistent with our meta-analysis of prior research, we found that objects were easier to identify from color than from black and white photos. We also found substantial priming in all conditions, and study-to-test changes in an object's color reduced the magnitude of priming. Color-specific priming effects were large for color-complex objects, but minimal for color-simple objects. The pattern and magnitude of priming effects was not influenced either by the extent to which an object always appears in the same color (i.e., whether a color is symptomatic of an object) or by the object's origin (natural versus fabricated). We discuss the implications of our findings for theoretical accounts of object perception and repetition priming.

  16. Propelling Extended Objects

    Science.gov (United States)

    Humbert, Richard

    2010-01-01

    A force acting on just part of an extended object (either a solid or a volume of a liquid) can cause all of it to move. That motion is due to the transmission of the force through the object by its material. This paper discusses how the force is distributed to all of the object by a gradient of stress or pressure in it, which creates the local…

  17. BL Lacertae objects

    International Nuclear Information System (INIS)

    Miller, J.S.

    1978-01-01

    An overview is given of the principal characteristics and problems associated with the prototype BL Lacertae. The most important characteristics of this group and its relevance, the consideration of a few particular objects in moderate detail, the relation between these objects QSOs, and normal galaxies, and finally the possible physical nature of BL Lac objects and the important questions they raise are treated. 15 references

  18. Objective-C

    CERN Document Server

    DeVoe, Jiva

    2011-01-01

    A soup-to-nuts guide on the Objective-C programming language. Objective-C is the language behind Cocoa and Cocoa Touch, which is the Framework of applications written for the Macintosh, iPod touch, iPhone, and iPad platforms. Part of the Developer Reference series covering the hottest Apple topics, this book covers everything from the basics of the C language to advanced aspects of Apple development. You'll examine Objective-C and high-level subjects of frameworks, threading, networking, and much more.: Covers the basics of the C language and then quickly moves onto Objective-C and more advanc

  19. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...

  20. Programs as Data Objects

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second Symposium on Programs as Data Objects, PADO 2001, held in Aarhus, Denmark, in May 2001. The 14 revised full papers presented were carefully reviewed and selected from 30 submissions. Various aspects of looking at programs as data objects...... are covered from the point of view of program analysis, program transformation, computational complexity, etc....

  1. Exhibiting Epistemic Objects

    DEFF Research Database (Denmark)

    Tybjerg, Karin

    2017-01-01

    of exhibiting epistemic objects that utilize their knowledge-generating potential and allow them to continue to stimulate curiosity and generate knowledge in the exhibition. The epistemic potential of the objects can then be made to work together with the function of the exhibition as a knowledge-generating set...

  2. Object permanence in lemurs.

    Science.gov (United States)

    Deppe, Anja M; Wright, Patricia C; Szelistowski, William A

    2009-03-01

    Object permanence, the ability to mentally represent objects that have disappeared from view, should be advantageous to animals in their interaction with the natural world. The objective of this study was to examine whether lemurs possess object permanence. Thirteen adult subjects representing four species of diurnal lemur (Eulemur fulvus rufus, Eulemur mongoz, Lemur catta and Hapalemur griseus) were presented with seven standard Piagetian visible and invisible object displacement tests, plus one single visible test where the subject had to wait predetermined times before allowed to search, and two invisible tests where each hiding place was made visually unique. In all visible tests lemurs were able to find an object that had been in clear view before being hidden. However, when lemurs were not allowed to search for up to 25-s, performance declined with increasing time-delay. Subjects did not outperform chance on any invisible displacements regardless of whether hiding places were visually uniform or unique, therefore the upper limit of object permanence observed was Stage 5b. Lemur species in this study eat stationary foods and are not subject to stalking predators, thus Stage 5 object permanence is probably sufficient to solve most problems encountered in the wild.

  3. Investigating Music Information Objects

    Science.gov (United States)

    Weissenberger, Lynnsey K.

    2016-01-01

    This dissertation, titled "Investigating Music Information Objects," is a study of the nature, description, representations, and ideas related to music information objects (MIOs). This research study investigates how music practitioners from various traditions describe and conceptualize MIOs, using a theoretical framework to classify…

  4. Objects of Desire.

    Science.gov (United States)

    Zielinski, Dave

    2000-01-01

    Describes learning objects, also known as granules, chunks, or information nuggets, and likens them to help screens. Discusses concerns about how they can go wrong: (1) faulty pretest questions; (2) missing links in the learning object chain; (3) poor frames of reference; and (4) lack of customization. (JOW)

  5. Per Object statistical analysis

    DEFF Research Database (Denmark)

    2008-01-01

    of a specific class in turn, and uses as pair of PPO stages to derive the statistics and then assign them to the objects' Object Variables. It may be that this could all be done in some other, simply way, but several other ways that were tried did not succeed. The procedure ouptut has been tested against...

  6. On Objects and Events

    DEFF Research Database (Denmark)

    Eugster, Patrick Thomas; Guerraoui, Rachid; Damm, Christian Heide

    2001-01-01

    This paper presents linguistic primitives for publish/subscribe programming using events and objects. We integrate our primitives into a strongly typed object-oriented language through four mechanisms: (1) serialization, (2) multiple sub typing, (3) closures, and (4) deferred code evaluation. We...

  7. Stability of multihypernuclear objects

    International Nuclear Information System (INIS)

    Ikram, M.; Rather, Asloob A.; Usmani, A.A.; Patra, S.K.

    2016-01-01

    In present work, we analyze the stability of multi-hypernuclear objects having higher content of strangeness. The aim of this work is to test the stability of such objects which might be produced in heavy-ion reactions. Studies of such type of systems might have great implication to nuclear-astrophysics

  8. Cultivating objects in interaction

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2014-01-01

    is chapter explores patterns of repeated orientations to physical objects in interactants’ visuo-spatial and haptic surround. A number of examples are presented from advice-giving activities in various institutional settings, where participants-in-interaction initially draw on material objects...

  9. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei; Keyser, John

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many

  10. Object oriented programming

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1990-01-01

    This paper is an introduction to object oriented programming techniques. It tries to explain the concepts by using analogies with traditional programming. The object oriented approach not inherently difficult, but most programmers find a relatively high threshold in learning it. Thus, this paper will attempt to convey the concepts with examples rather than explain the formal theory

  11. Beginning Objective-C

    CERN Document Server

    Dovey, James

    2012-01-01

    Objective-C is today's fastest growing programming language, at least in part due to the popularity of Apple's Mac, iPhone and iPad. Beginning Objective-C is for you if you have some programming experience, but you're new to the Objective-C programming language and you want a modern-and fast-way forwards to your own coding projects. Beginning Objective-C offers you a modern programmer's perspective on Objective-C courtesy of two of the best iOS and Mac developers in the field today, and gets you programming to the best of your ability in this important language.  It gets you rolling fast into

  12. Hardware Objects for Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Thalinger, Christian; Korsholm, Stephan

    2008-01-01

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... an underlying middleware is an attractive architecture. When running the JVM on bare metal, we need access to I/O devices from Java; therefore we investigate a safe and efficient mechanism to represent I/O devices as first class Java objects, where device registers are represented by object fields. Access...... to those registers is safe as Java’s type system regulates it. The access is also fast as it is directly performed by the bytecodes getfield and putfield. Hardware objects thus provide an object-oriented abstraction of low-level hardware devices. As a proof of concept, we have implemented hardware objects...

  13. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which these obj......Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...

  14. Identification of uncommon objects in containers

    Science.gov (United States)

    Bremer, Peer-Timo; Kim, Hyojin; Thiagarajan, Jayaraman J.

    2017-09-12

    A system for identifying in an image an object that is commonly found in a collection of images and for identifying a portion of an image that represents an object based on a consensus analysis of segmentations of the image. The system collects images of containers that contain objects for generating a collection of common objects within the containers. To process the images, the system generates a segmentation of each image. The image analysis system may also generate multiple segmentations for each image by introducing variations in the selection of voxels to be merged into a segment. The system then generates clusters of the segments based on similarity among the segments. Each cluster represents a common object found in the containers. Once the clustering is complete, the system may be used to identify common objects in images of new containers based on similarity between segments of images and the clusters.

  15. Nuclear Energy General Objectives

    International Nuclear Information System (INIS)

    2011-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way it achieves this objective is to issue publications in various series. Two of these series are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III, paragraph A.6, of the IAEA Statute, the IAEA safety standards establish 'standards of safety for protection of health and minimization of danger to life and property.' The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are primarily written in a regulatory style, and are binding on the IAEA for its own activities. The principal users are Member State regulatory bodies and other national authorities. The IAEA Nuclear Energy Series consists of reports designed to encourage and assist research on, and development and practical application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in Member States, implementing organizations, academia and politicians, among others. The information is presented in guides, reports on the status of technology and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The series complements the IAEA's safety standards, and provides detailed guidance, experience, good practices and examples on the five areas covered in the IAEA Nuclear Energy Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be

  16. Functional Object Analysis

    DEFF Research Database (Denmark)

    Raket, Lars Lau

    We propose a direction it the field of statistics which we will call functional object analysis. This subfields considers the analysis of functional objects defined on continuous domains. In this setting we will focus on model-based statistics, with a particularly emphasis on mixed......-effect formulations, where the observed functional signal is assumed to consist of both fixed and random functional effects. This thesis takes the initial steps toward the development of likelihood-based methodology for functional objects. We first consider analysis of functional data defined on high...

  17. Underwater Object Segmentation Based on Optical Features

    Directory of Open Access Journals (Sweden)

    Zhe Chen

    2018-01-01

    Full Text Available Underwater optical environments are seriously affected by various optical inputs, such as artificial light, sky light, and ambient scattered light. The latter two can block underwater object segmentation tasks, since they inhibit the emergence of objects of interest and distort image information, while artificial light can contribute to segmentation. Artificial light often focuses on the object of interest, and, therefore, we can initially identify the region of target objects if the collimation of artificial light is recognized. Based on this concept, we propose an optical feature extraction, calculation, and decision method to identify the collimated region of artificial light as a candidate object region. Then, the second phase employs a level set method to segment the objects of interest within the candidate region. This two-phase structure largely removes background noise and highlights the outline of underwater objects. We test the performance of the method with diverse underwater datasets, demonstrating that it outperforms previous methods.

  18. Radiograph identifying means

    International Nuclear Information System (INIS)

    Sheldon, A.D.

    1983-01-01

    A flexible character-indentable plastics embossing tape is backed by and bonded to a lead strip, not more than 0.025 inches thick, to form a tape suitable for identifying radiographs. The lead strip is itself backed by a relatively thin and flimsy plastics or fabric strip which, when removed, allows the lead plastic tape to be pressure-bonded to the surface to be radiographed. A conventional tape-embossing gun is used to indent the desired characters in succession into the lead-backed tape, without necessarily severing the lead; and then the backing strip is peeled away to expose the layer of adhesive which pressure-bonds the indented tape to the object to be radiographed. X-rays incident on the embossed tape will cause the raised characters to show up dark on the subsequently-developed film, whilst the raised side areas will show up white. Each character will thus stand out on the developed film. (author)

  19. Application of deep geophysical data to the discussion on the relationship between deep faults, concealed over thrust napped structure and uranium metallogenesis in central-southern Jiangxi

    International Nuclear Information System (INIS)

    Jiang Jinyuan; Qi Liang

    1999-01-01

    Based on the comparative analysis and study on 10 profiles of telluric electromagnetic sounding (MT) and regional gravimetric, magnetic data and Moho surface, the deep geological-tectonic pattern of the central-southern Jiangxi is discussed. It is suggested that: the studied region belongs to the Soyth-China block; in the area along Pingxiang-Guangfeng, at the border with Yangzi block an approximately EW-trending mantle concave-mantle slope zone occurs; the NNE-NE trending mantle uplift-mantle slope-mantle concave structure is developed within the South-China block; deep fault zones are represented by variation sites of Moho surface. Then, a series of deep structures is inferred including the approximately EW-striking Pingxian-Guangfeng deep fault zone, the NNE-striking Fuzhou-Anyuan deep fault zone, the NNE-trending Fengcheng-Dayu deep fault zone, as well as the NE-striking Yudu-Ningdu over thrust napped and sliding thrust structural systems, the approximately E W-trending Le'an-Nancheng over thrust napped structural systems etc. According to the distribution of known uranium mineralizations it is confirmed that close time-space relation exists between the uranium metallogenesis and variations of Moho surface, and over thrust napped structures, providing clues for locating concealed uranium deposits

  20. The Burden of Stigma on Health and Well-Being: A Taxonomy of Concealment, Course, Disruptiveness, Aesthetics, Origin, and Peril Across 93 Stigmas.

    Science.gov (United States)

    Pachankis, John E; Hatzenbuehler, Mark L; Wang, Katie; Burton, Charles L; Crawford, Forrest W; Phelan, Jo C; Link, Bruce G

    2018-04-01

    Most individuals are stigmatized at some point. However, research often examines stigmas separately, thus underestimating the overall impact of stigma and precluding comparisons across stigmatized identities and conditions. In their classic text, Social Stigma: The Psychology of Marked Relationships, Edward Jones and colleagues laid the groundwork for unifying the study of different stigmas by considering the shared dimensional features of stigmas: aesthetics, concealability, course, disruptiveness, origin, peril. Despite the prominence of this framework, no study has documented the extent to which stigmas differ along these dimensions, and the implications of this variation for health and well-being. We reinvigorated this framework to spur a comprehensive account of stigma's impact by classifying 93 stigmas along these dimensions. With the input of expert and general public raters, we then located these stigmas in a six-dimensional space and created discrete clusters organized around these dimensions. Next, we linked this taxonomy to health and stigma-related mechanisms. This quantitative taxonomy offers parsimonious insights into the relationship among the numerous qualities of numerous stigmas and health.

  1. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many of these situations by explicitly modeling the piles that the objects may form into. By modeling pile behavior rather than the behavior of all individual objects, we can achieve realistic results in less time, and without directly modeling the frictional component that leads to desired pile shapes. Our method is simple to implement and can be easily integrated with existing rigid body simulations. We observe notable speedups in several rigid body examples, and generate a wider variety of piled structures than possible with strict impulse-based simulation. © 2010 ACM.

  2. Safety objectives for 2014

    CERN Multimedia

    HSE Unit

    2014-01-01

    This is the third year in which the CERN Management has presented annual safety objectives for the Organization, the “HSE Objectives”.   The HSE objectives for 2014, which were announced by the Director-General at his traditional New Year’s address to the staff and were presented at the first Enlarged Directorate meeting of the year, have been drawn up and agreed in close collaboration between the DSOs, the HSE Unit and the DG himself. From safety in the workplace to radiation and environmental protection, the document emphasises that “Safety is a priority for CERN” and that safety policy is a key element in how the Organization is run. And, like all policies, it generates objectives that “serve as a general framework for action”. The HSE objectives are broken down into the following fields: occupational health and safety on sites and in the workplace, radiation protection, radiation safety, environmental protection, emerge...

  3. Registration of Space Objects

    Science.gov (United States)

    Schmidt-Tedd, Bernhard

    2017-07-01

    Space objects are subject to registration in order to allocate "jurisdiction and control" over those objects in the sovereign-free environment of outer space. This approach is similar to the registration of ships in view of the high sea and for aircrafts with respect to the international airspace. Registration is one of the basic principles of space law, starting with UN General Assembly Resolution 1721 B (XVI) of December 20, 1961, followed by Resolution 1962 (XVIII) of December 13, 1963, then formulated in Article VIII of the Outer Space Treaty of 1967 and as specified in the Registration Convention of 1975. Registration of space objects can be seen today as a principle of customary international law, relevant for each spacefaring state. Registration is divided into a national and an international level. The State Party establishes a national registry for its space objects, and those registrations have to be communicated via diplomatic channel to the UN Register of space objects. This UN Register is handled by the UN Office for Outer Space Affairs (UNOOSA) and is an open source of information for space objects worldwide. Registration is linked to the so-called launching state of the relevant space object. There might be more than one launching state for the specific launch event, but only one state actor can register a specific space object. The state of registry gains "jurisdiction and control" over the space object and therefore no double registration is permissible. Based on the established UN Space Law, registration practice was subject to some adaptions due to technical developments and legal challenges. After the privatization of the major international satellite organizations, a number of non-registrations had to be faced. The state actors reacted with the UN Registration Practice Resolution of 2007 as elaborated in the Legal Subcommittee of UNCOPUOS, the Committee for the Peaceful Use of Outer Space. In this context an UNOOSA Registration Information

  4. Protected Objects in Java

    DEFF Research Database (Denmark)

    Løvengreen, Hans Henrik; Schwarzer, Jens Christian

    1998-01-01

    We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library.......We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library....

  5. CODAS object monitoring service

    International Nuclear Information System (INIS)

    Wheatley, M.R.; Rainford, M.

    2001-01-01

    The primary Control and Data Acquisition System (CODAS) of JET is based on a TCP/IP network of more than 150 computers. The CODAS computers provide the JET machine control and data acquisition for over 70,000 digital and analog signals. The Object Monitoring Service (OMS) is used by applications for monitoring objects for presentation to the JET machine operators and for the operation of individual software components (such as valve state, access control, mimic definition changes and internal data distribution). Each server typically handles connections from around 60 clients monitoring upwards of 2000 objects. Some servers have over 150 clients and 5000 objects. Acquisition libraries are dynamically linked into a running server as required either to acquire data values for objects or to forward requests to other OMS servers. A mechanism involving dynamic linking allows new libraries to be integrated without stopping or changing running software. OMS provides a very reliable and highly successful 'data-type independent' means of monitoring many different objects. It allows applications to take advantage of new data sources, without the need to change existing code

  6. Nuclear Fuel Cycle Objectives

    International Nuclear Information System (INIS)

    2013-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way this objective is achieved is through the publication of a range of technical series. Two of these are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III.A.6 of the IAEA Statute, the safety standards establish 'standards of safety for protection of health and minimization of danger to life and property'. The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are written primarily in a regulatory style, and are binding on the IAEA for its own programmes. The principal users are the regulatory bodies in member States and other national authorities. The IAEA Nuclear Energy Series comprises reports designed to encourage and assist R and D on, and application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in member States, implementing organizations, academia and government officials, among others. This information is presented in guides, reports on technology status and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The IAEA Nuclear Energy Series complements the IAEA Safety Standards Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series, and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be considered and the specific goals to be achieved at different stages of implementation, all of which are consistent with the Basic Principles

  7. Objects of consciousness

    Directory of Open Access Journals (Sweden)

    Donald David Hoffman

    2014-06-01

    Full Text Available Current models of visual perception typically assume that human vision estimates true properties of physical objects, properties that exist even if unperceived. However, recent studies of perceptual evolution, using evolutionary games and genetic algorithms, reveal that natural selection often drives true perceptions to extinction when they compete with perceptions tuned to fitness rather than truth: Perception guides adaptive behavior; it does not estimate a preexisting physical truth. Moreover, shifting from evolutionary biology to quantum physics, there is reason to disbelieve in preexist-ing physical truths: Certain interpretations of quantum theory deny that dynamical properties of physical objects have defi-nite values when unobserved. In some of these interpretations the observer is fundamental, and wave functions are com-pendia of subjective probabilities, not preexisting elements of physical reality. These two considerations, from evolutionary biology and quantum physics, suggest that current models of object perception require fundamental reformulation. Here we begin such a reformulation, starting with a formal model of consciousness that we call a conscious agent. We develop the dynamics of interacting conscious agents, and study how the perception of objects and space-time can emerge from such dynamics. We show that one particular object, the quantum free particle, has a wave function that is identical in form to the harmonic functions that characterize the asymptotic dynamics of conscious agents; particles are vibrations not of strings but of interacting conscious agents. This allows us to reinterpret physical properties such as position, momentum, and energy as properties of interacting conscious agents, rather than as preexisting physical truths. We sketch how this approach might extend to the perception of relativistic quantum objects, and to classical objects of macroscopic scale.

  8. Radioactive Waste Management Objectives

    International Nuclear Information System (INIS)

    2011-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way it achieves this objective is to issue publications in various series. Two of these series are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III, paragraph A.6, of the IAEA Statute, the IAEA safety standards establish 'standards of safety for protection of health and minimization of danger to life and property.' The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are primarily written in a regulatory style, and are binding on the IAEA for its own activities. The principal users are Member State regulatory bodies and other national authorities. The IAEA Nuclear Energy Series consists of reports designed to encourage and assist research on, and development and practical application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in Member States, implementing organizations, academia and politicians, among others. The information is presented in guides, reports on the status of technology and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The series complements the IAEA's safety standards, and provides detailed guidance, experience, good practices and examples on the five areas covered in the IAEA Nuclear Energy Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be

  9. Intra-event isotope and raindrop size data of tropical rain reveal effects concealed by event averaged data

    Science.gov (United States)

    Managave, S. R.; Jani, R. A.; Narayana Rao, T.; Sunilkumar, K.; Satheeshkumar, S.; Ramesh, R.

    2016-08-01

    Evaporation of rain is known to contribute water vapor, a potent greenhouse gas, to the atmosphere. Stable oxygen and hydrogen isotopic compositions (δ18O and, δD, respectively) of precipitation, usually measured/presented as values integrated over rain events or monthly mean values, are important tools for detecting evaporation effects. The slope ~8 of the linear relationship between such time-averaged values of δD and δ18O (called the meteoric water line) is widely accepted as a proof of condensation under isotopic equilibrium and absence of evaporation of rain during atmospheric fall. Here, through a simultaneous investigation of the isotopic and drop size distributions of seventeen rain events sampled on an intra-event scale at Gadanki (13.5°N, 79.2°E), southern India, we demonstrate that the evaporation effects, not evident in the time-averaged data, are significantly manifested in the sub-samples of individual rain events. We detect this through (1) slopes significantly less than 8 for the δD-δ18O relation on intra-event scale and (2) significant positive correlations between deuterium excess ( d-excess = δD - 8*δ18O; lower values in rain indicate evaporation) and the mass-weighted mean diameter of the raindrops ( D m ). An estimated ~44 % of rain is influenced by evaporation. This study also reveals a signature of isotopic equilibration of rain with the cloud base vapor, the processes important for modeling isotopic composition of precipitation. d-excess values of rain are modified by the post-condensation processes and the present approach offers a way to identify the d-excess values least affected by such processes. Isotope-enabled global circulation models could be improved by incorporating intra-event isotopic data and raindrop size dependent isotopic effects.

  10. TESS Objects of Interest

    Science.gov (United States)

    Guerrero, Natalia; Glidden, Ana; Fausnaugh, Michael; TESS Team

    2018-01-01

    We describe the search for TESS Objects of Interest (TOIs), led by the MIT branch of the TESS Science Office (TSO). TSO has developed a tool called TESS Exoplanet Vetter (TEV) to facilitate this process. Individuals independently examine data validation products for each target and assign a category to the object: planet candidate, eclipsing binary, other astrophysical, stellar variability, or instrument noise/systematic. TEV assigns a preliminary follow-up priority designation to each object and allows for modification when final dispositions are decided on in a group setting. When all targets are vetted, TEV exports a catalogue of TOIs which is delivered to the TESS Follow-Up Observing Program (TFOP), working with ExoFOP-TESS, and made publicly available on the official TESS website and the Mikulski Archive for Space Telescopes (MAST).

  11. [Medicine and conscientious objection].

    Science.gov (United States)

    Martínez, K

    2007-01-01

    Conscientious objection to democratically accepted laws in democratic societies is a fact, both among citizens and among professionals. Due respect for laws is a prima facie duty in these societies. But democratic justice must at the same time respect peoples' conscience for it constitutes the ethical identity of individuals. And both law and ethics are necessary - although neither of them is sufficient - for its realization. The problem of conscientious objection among healthcare professionals is analysed from this standpoint and the conclusion is that objection is not an absolute right to exemption from several duties, but that the responsibility of the professional and of the institutions towards the citizenry must always be taken into account. Some solutions are suggested that try to protect both the professionals and the citizens in a bi-directional way.

  12. Media, journalism, objectivity

    Directory of Open Access Journals (Sweden)

    Vlajki Emil

    2013-01-01

    Full Text Available This is the text around the themes: Media and Journalism, are confronted two directions of opinions: humanism and elitism. Humanism believes that media and journalism must be metaphysically objective: able to tell the truth regardless of time, place and terms of events. Another approach, elitism, is connected with Hegel's philosophy of history. Hegel's conceptual apparatus includes: Idea, History dialectic, 'cunning mind,' self- development and self-realization. In this context, media and journalism are considered as organic unity, an inseparable part of some dialectical totality. More specifically media and journalism can be objective only if they defend concrete ideological assumptions of society to which they belong. Any other understanding of these two concepts is non-objective, mere moralizing and / or demagoguery.

  13. Pinocchio: Geppetto's transitional object

    Directory of Open Access Journals (Sweden)

    Gabriele Zeloni

    2015-01-01

    Full Text Available The literature has been considered by Freud and others after him, a form of unaware exploration of mind that can leads to discoveries similar to psychoanalysis’s discoveries. From this perspective, the author puts forward the following hypothesis: Pinocchio is a puppet who comes to life and is therefore, from a child's perception, a transitional object according to Winnicott. Consequently Geppetto is nothing more than the involuntary representation of any child interacting with the transitional object. The author explains the results of the analysis of the text in support of the hypothesis and reflects on the impact of The adventure of Pinocchio on the reader.

  14. Object-oriented communications

    International Nuclear Information System (INIS)

    Chapman, L.J.

    1989-01-01

    OOC is a high-level communications protocol based on the object-oriented paradigm. OOC's syntax, semantics, and pragmatics balance simplicity and expressivity for controls environments. While natural languages are too complex, computer protocols are often insufficiently expressive. An object-oriented communications philosophy provides a base for building the necessary high-level communications primitives like I don't understand and the current value of X is K. OOC is sufficiently flexible to express data acquisition, control requests, alarm messages, and error messages in a straightforward generic way. It can be used in networks, for inter-task communication, and even for intra-task communication

  15. Quantum objective realism

    International Nuclear Information System (INIS)

    Bednorz, Adam

    2015-01-01

    The question of whether quantum measurements reflect some underlying objective reality has no generally accepted answer. We show that a description of such reality is possible under natural conditions such as linearity and causality, although in terms of moments and cumulants of finite order and without relativistic invariance. The proposed construction of observations’ probability distribution originates from weak, noninvasive measurements, with detection error replaced by some external finite noise. The noise allows us to construct microscopic objective reality, but remains dynamically decoupled and hence unobservable at the macroscopic level. (paper)

  16. Learning Objects Web

    DEFF Research Database (Denmark)

    Blåbjerg, Niels Jørgen

    2005-01-01

    Learning Objects Web er et DEFF projekt som Aalborg Universitetsbibliotek har initieret. Projektet tager afsæt i de resultater og erfaringer som er opnået med vores tidligere projekt Streaming Webbased Information Modules (SWIM). Vi har et internationalt netværk af interessenter som giver os...... sparring og feedback i forhold til udviklingskoncept både omkring de teoretiske rammer og i forhold til praktisk anvendelse af vores undervisningskoncept. Med disse rygstød og input har vi forfulgt ønsket om at videreudvikle SWIM i det nye projekt Learning Objects Web. Udgivelsesdato: juni...

  17. A Temporal Same-Object Advantage in the Tunnel Effect: Facilitated Change Detection for Persisting Objects

    Science.gov (United States)

    Flombaum, Jonathan I.; Scholl, Brian J.

    2006-01-01

    Meaningful visual experience requires computations that identify objects as the same persisting individuals over time, motion, occlusion, and featural change. This article explores these computations in the tunnel effect: When an object moves behind an occluder, and then an object later emerges following a consistent trajectory, observers…

  18. The visual extent of an object: suppose we know the object locations

    NARCIS (Netherlands)

    Uijlings, J.R.R.; Smeulders, A.W.M.; Scha, R.J.H.

    2012-01-01

    The visual extent of an object reaches beyond the object itself. This is a long standing fact in psychology and is reflected in image retrieval techniques which aggregate statistics from the whole image in order to identify the object within. However, it is unclear to what degree and how the visual

  19. Moving object detection using background subtraction

    CERN Document Server

    Shaikh, Soharab Hossain; Chaki, Nabendu

    2014-01-01

    This Springer Brief presents a comprehensive survey of the existing methodologies of background subtraction methods. It presents a framework for quantitative performance evaluation of different approaches and summarizes the public databases available for research purposes. This well-known methodology has applications in moving object detection from video captured with a stationery camera, separating foreground and background objects and object classification and recognition. The authors identify common challenges faced by researchers including gradual or sudden illumination change, dynamic bac

  20. Big Java late objects

    CERN Document Server

    Horstmann, Cay S

    2012-01-01

    Big Java: Late Objects is a comprehensive introduction to Java and computer programming, which focuses on the principles of programming, software engineering, and effective learning. It is designed for a two-semester first course in programming for computer science students.

  1. Technical objectives of inspection

    International Nuclear Information System (INIS)

    Sorenson, R.J.; Stewart, K.B.; Schneider, R.A.

    1976-01-01

    The various technical objectives of inspection are discussed in a very general manner. The discussion includes how the inspection function is related to the assumed threat, the various degrees of assurance and reliance on criteria, and the hierarchy of assurance which is obtained from the various types or levels of inspection

  2. Testing object Interactions

    NARCIS (Netherlands)

    Grüner, Andreas

    2010-01-01

    In this thesis we provide a unit testing approach for multi-purposes object-oriented programming languages in the style of Java and C#. Our approach includes the definition of a test specification language which results from extending the programming language with new designated specification

  3. Boundary-Object Trimming

    DEFF Research Database (Denmark)

    Bossen, Claus; Jensen, Lotte Groth; Udsen, Flemming Witt

    2014-01-01

    implementation, which also coupled the work of medical secretaries more tightly to that of other staff, and led to task drift among professions. Medical secretaries have been relatively invisible to health informatics and CSCW, and we propose the term ‘boundary-object trimming’ to foreground and conceptualize...

  4. The Object of Research

    DEFF Research Database (Denmark)

    Bean, Jonathan; Figueiredo, Bernardo; Pico Larsen, Hanne

    2017-01-01

    The paper outlines a methodological approach for investigating how consumers create brand meaning using the material resources companies provide. The approach draws from Material Engagement Theory—to discuss the role of consumers in creating patterns of meaning by engaging with objects. It also e...

  5. Robust video object cosegmentation.

    Science.gov (United States)

    Wang, Wenguan; Shen, Jianbing; Li, Xuelong; Porikli, Fatih

    2015-10-01

    With ever-increasing volumes of video data, automatic extraction of salient object regions became even more significant for visual analytic solutions. This surge has also opened up opportunities for taking advantage of collective cues encapsulated in multiple videos in a cooperative manner. However, it also brings up major challenges, such as handling of drastic appearance, motion pattern, and pose variations, of foreground objects as well as indiscriminate backgrounds. Here, we present a cosegmentation framework to discover and segment out common object regions across multiple frames and multiple videos in a joint fashion. We incorporate three types of cues, i.e., intraframe saliency, interframe consistency, and across-video similarity into an energy optimization framework that does not make restrictive assumptions on foreground appearance and motion model, and does not require objects to be visible in all frames. We also introduce a spatio-temporal scale-invariant feature transform (SIFT) flow descriptor to integrate across-video correspondence from the conventional SIFT-flow into interframe motion flow from optical flow. This novel spatio-temporal SIFT flow generates reliable estimations of common foregrounds over the entire video data set. Experimental results show that our method outperforms the state-of-the-art on a new extensive data set (ViCoSeg).

  6. Administrative Management by Objectives. Policy 2100.

    Science.gov (United States)

    East Allen County Schools, New Haven, IN.

    Management-by-objectives (MBO) focuses attention on objectives stated as end accomplishments rather than the activities which bring about those accomplishments. MBO identifies eight major areas of management which become involved in the process: (1) planning, (2) performance appraisal, (3) individual motivation, (4) coordination, (5) control, (6)…

  7. Location mortgage in accounting objects

    Directory of Open Access Journals (Sweden)

    I.M. Vygiska

    2015-12-01

    Full Text Available The article analyzes the mechanism of the implementation of all kinds of mortgage (mortgage, pledge, mortgage of securities, security of property rights, the mortgage of goods in circulation or processing, tax lien defined the specificity of receipt/return of the mortgage, particularly payments between mortgagor and the mortgagee. Determine the subject property entities that can act as mortgage; identified by their place in the system of objects of accounting mortgagor and the mortgagee. The peculiarities of the balance sheet and off-balance sheet assets as a reflection of your collateral. Identified two groups of mortgage transactions: transactions with mortgage for its receipt and transmission; business transactions related to the conditions of loan agreements (loan and mortgage. The results are shown in the research paper proposals allow for further research to develop mortgage organizational and methodological support the operations accounting for the effective management of financial resources and obligations, collateralised.

  8. The NOAA Dataset Identifier Project

    Science.gov (United States)

    de la Beaujardiere, J.; Mccullough, H.; Casey, K. S.

    2013-12-01

    The US National Oceanic and Atmospheric Administration (NOAA) initiated a project in 2013 to assign persistent identifiers to datasets archived at NOAA and to create informational landing pages about those datasets. The goals of this project are to enable the citation of datasets used in products and results in order to help provide credit to data producers, to support traceability and reproducibility, and to enable tracking of data usage and impact. A secondary goal is to encourage the submission of datasets for long-term preservation, because only archived datasets will be eligible for a NOAA-issued identifier. A team was formed with representatives from the National Geophysical, Oceanographic, and Climatic Data Centers (NGDC, NODC, NCDC) to resolve questions including which identifier scheme to use (answer: Digital Object Identifier - DOI), whether or not to embed semantics in identifiers (no), the level of granularity at which to assign identifiers (as coarsely as reasonable), how to handle ongoing time-series data (do not break into chunks), creation mechanism for the landing page (stylesheet from formal metadata record preferred), and others. Decisions made and implementation experience gained will inform the writing of a Data Citation Procedural Directive to be issued by the Environmental Data Management Committee in 2014. Several identifiers have been issued as of July 2013, with more on the way. NOAA is now reporting the number as a metric to federal Open Government initiatives. This paper will provide further details and status of the project.

  9. Objectives and Outcomes

    Energy Technology Data Exchange (ETDEWEB)

    Segalman, D.J.

    1998-11-30

    I have recently become involved in the ABET certification process under the new system - ABET 2000. This system relies heavily on concepts of Total Quality Management (TQM). It encourages each institution to define its objectives in terms of its own mission and then create a coherent program based on it. The prescribed steps in setting up the new system at an engineering institution are: o identification of constituencies G definition of mission. It is expected that the department's mission will be consistent with that of the overall institution, but containing some higher resolution language appropriate to that particular discipline of the engineering profession. o statement of objectives consistent with the mission 3G~~\\vED " enumeration of desired, and preferably measurable, outcomes of the process that would ~ `=. verify satisfaction of the objectives. ~~~ 07 !398 o establish performance standards for each outcome. o creation of appropriate feedback loops to assure that the objectives are still consistent with Q$YT1 the mission, that the outcomes remain consistent with the objectives, and that the curriculum and the teaching result in those outcomes. It is my assertion that once the institution verbalizes a mission, enumerated objectives naturally flow from that mission. (We shall try to demonstrate by example.) Further, if the mission uses the word "engineer", one would expect that word also to appear in at least one of the objectives. The objective of producing engineers of any sort must -by decree - involve the presence of the ABET criteria in the outcomes list. In other words, successful satisfaction of the ABET items a-k are a necessary subset of the measure of success in producing engineers. o We shall produce bachelor level engineers whose training in the core topics of chemical (or electrical, or mechanical) engineering is recognized to be among the best in the nation. o We shall provide an opportunity for our students to gain

  10. Influence of allocation concealment and intention-to-treat analysis on treatment effects of physical therapy interventions in low back pain randomised controlled trials: a protocol of a meta-epidemiological study.

    Science.gov (United States)

    Almeida, Matheus Oliveira; Saragiotto, Bruno T; Maher, Chris G; Pena Costa, Leonardo Oliveira

    2017-09-27

    Meta-epidemiological studies examining the influence of methodological characteristics, such as allocation concealment and intention-to-treat analysis have been performed in a large number of healthcare areas. However, there are no studies investigating these characteristics in physical therapy interventions for patients with low back pain. The aim of this study is to investigate the influence of allocation concealment and the use of intention-to-treat analysis on estimates of treatment effects of physical therapy interventions in low back pain clinical trials. Searches on PubMed, Embase, Cochrane Database of Systematic Reviews, Physiotherapy Evidence Database (PEDro) and CINAHL databases will be performed. We will search for systematic reviews that include a meta-analysis of randomised controlled trials that compared physical therapy interventions in patients with low back pain with placebo or no intervention, and have pain intensity or disability as the primary outcomes. Information about selection (allocation concealment) and attrition bias (intention-to-treat analysis) will be extracted from the PEDro database for each included trial. Information about bibliographic data, study characteristics, participants' characteristics and study results will be extracted. A random-effects model will be used to provide separate estimates of treatment effects for trials with and without allocation concealment and with and without intention-to-treat analysis (eg, four estimates). A meta-regression will be performed to measure the association between methodological features and treatment effects from each trial. The dependent variable will be the treatment effect (the mean between-group differences) for the primary outcomes (pain or disability), while the independent variables will be the methodological features of interest (allocation concealment and intention-to-treat analysis). Other covariates will include sample size and sequence generation. No ethical approval will be

  11. Suggestive Objects at Work

    DEFF Research Database (Denmark)

    Ratner, Helene Gad

    2009-01-01

    In Western secular societies, spiritual life is no longer limited to classical religious institutions but can also be found at workplace organizations. While spirituality is conventionally understood as a subjective and internal process, this paper proposes the concept of ‘suggestive objects......’, constructed by combining insights from Gabriel Tarde's sociology with Bruno Latour's actor-network theory, to theorize the material dimension of organizational spirituality. The sacred in organizations arises not from the internalization of collective values but through the establishment of material...... scaffolding. This has deep implications for our understanding of the sacred, including a better appreciation of the way that suggestive objects make the sacred durable, the way they organize it....

  12. Near Earth Objects

    DEFF Research Database (Denmark)

    Wolff, Stefan

    2006-01-01

    , Near Earth Objects: Asteroids and comets following paths that bring them near the Earth. NEOs have collided with the Earth since its formation, some causing local devastation, some causing global climate changes, yet the threat from a collision with a near Earth object has only recently been recognised...... and accepted. The European Space Agency mission Gaia is a proposed space observatory, designed to perform a highly accurate census of our galaxy, the Milky Way, and beyond. Through accurate measurement of star positions, Gaia is expected to discover thousands of extra-solar planets and follow the bending...... of starlight by the Sun, and therefore directly observe the structure of space-time. This thesis explores several aspects of the observation of NEOs with Gaia, emphasising detection of NEOs and the quality of orbits computed from Gaia observations. The main contribution is the work on motion detection...

  13. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D' Azevedo, E.F.

    1994-01-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  14. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D`Azevedo, E.F.; Romine, C.H.

    1994-10-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  15. War Journalism and 'Objectivity'

    Directory of Open Access Journals (Sweden)

    Annabel McGoldrick

    2006-10-01

    Full Text Available This article opens by considering an apparent paradox. Many professional journalists, working on many media in many countries, consider themselves 'objective'. They do not, at least, set out to skew their coverage of important issues in favour of one side or the other. And yet much of their coverage of conflicts shows a discernible dominant pattern of War Journalism - biased in favour of war. This is not because of a lack of objectivity, the article suggests, but a surfeit. The set of conventions many editors and reporters regard as defining 'objective' journalism arose in response to economic and political conditions which rewarded news that could commend itself as unobjectionable to the maximum number of potential customers. Three of the most important conventions privilege official sources; a dualistic construction of stories and event, over process. Each of these, when applied to the representation of conflicts, leads readers and audiences - or leaves them - to over-value violent, reactive responses and under-value non-violent, developmental responses. Industry conventions sit uneasily alongside equally time-honoured expectations of journalism. These are encoded in rules and regulations governing the content of broadcast news, in many jurisdictions which have a public service concept for radio and television. In some respects, War Journalism can be shown to make it more difficult for broadcast news services to fulfil their public service obligations. Awareness is now growing, of the tension between these two pressures on journalism and its influence on the way pressing public debates are shaped and mediated. More Peace Journalism would help to bring public service news back into line with legitimate public expectations.

  16. The Language of Objects

    DEFF Research Database (Denmark)

    Eskildsen, Kasper Risbjerg

    2012-01-01

    The Danish amateur scholar Christian Jürgensen Thomsen has often been described as a founder of modern “scientific” archaeology. Thomsen's innovation, this essay argues, reflects developments within neighboring fields, such as philology and history. He reacted against historians who limited....... The arrangement of artifacts not only helped him formulate his theories, but also allowed him to present his arguments in a language of objects. At the same time, Thomsen's definition of archaeology as a museum science placed his branch of archaeology in a closer relationship with other museum sciences...

  17. Remote viewing of objects

    International Nuclear Information System (INIS)

    Motin, J.D.; Reformatsky, I.A.; Sinitsyn, P.R.; Ivanov, N.M.; Ivanov, B.I.; Malakhov, I.K.

    1979-01-01

    An object in a nuclear power plant is viewed through a radiation-proof shield by means of an entrance lens, optic fibre bundle and exit lens. The optic fibre bundle being heated to ensure thermostabilization of its light conducting properties in the presence of ionising radiation. Heating is by an electric heating coil. Alternatively, heating may be by argon itself heated by an electric heating element, a coating of resistive heating material, or absorption of neutrons in the material of the fibres or a coating therefor. Viewing may be on a CRT screen. (author)

  18. Part Objects and Their Location

    DEFF Research Database (Denmark)

    Madsen, Ole Lehrmann; Møller-Pedersen, Birger

    1992-01-01

    The notion of location of part objects is introduced, yielding a reference to the containing object. Combined with locally defined objects and classes (block structure), singularly defined part objects, and references to part objects, it is a powerful language mechanism for defining objects...

  19. Object-Based Benefits without Object-Based Representations

    OpenAIRE

    Alvarez, George Angelo; Fougnie, Daryl; Cormiea, Sarah M

    2012-01-01

    The organization of visual information into objects strongly influences visual memory: Displays with objects defined by two features (e.g. color, orientation) are easier to remember than displays with twice as many objects defined by one feature (Olson & Jiang, 2002). Existing theories suggest that this ‘object-benefit’ is based on object-based limitations in working memory: because a limited number of objects can be stored, packaging features together so that fewer objects have to be remembe...

  20. Object linking in repositories

    Science.gov (United States)

    Eichmann, David (Editor); Beck, Jon; Atkins, John; Bailey, Bill

    1992-01-01

    This topic is covered in three sections. The first section explores some of the architectural ramifications of extending the Eichmann/Atkins lattice-based classification scheme to encompass the assets of the full life cycle of software development. A model is considered that provides explicit links between objects in addition to the edges connecting classification vertices in the standard lattice. The second section gives a description of the efforts to implement the repository architecture using a commercially available object-oriented database management system. Some of the features of this implementation are described, and some of the next steps to be taken to produce a working prototype of the repository are pointed out. In the final section, it is argued that design and instantiation of reusable components have competing criteria (design-for-reuse strives for generality, design-with-reuse strives for specificity) and that providing mechanisms for each can be complementary rather than antagonistic. In particular, it is demonstrated how program slicing techniques can be applied to customization of reusable components.

  1. Object tracking using multiple camera video streams

    Science.gov (United States)

    Mehrubeoglu, Mehrube; Rojas, Diego; McLauchlan, Lifford

    2010-05-01

    Two synchronized cameras are utilized to obtain independent video streams to detect moving objects from two different viewing angles. The video frames are directly correlated in time. Moving objects in image frames from the two cameras are identified and tagged for tracking. One advantage of such a system involves overcoming effects of occlusions that could result in an object in partial or full view in one camera, when the same object is fully visible in another camera. Object registration is achieved by determining the location of common features in the moving object across simultaneous frames. Perspective differences are adjusted. Combining information from images from multiple cameras increases robustness of the tracking process. Motion tracking is achieved by determining anomalies caused by the objects' movement across frames in time in each and the combined video information. The path of each object is determined heuristically. Accuracy of detection is dependent on the speed of the object as well as variations in direction of motion. Fast cameras increase accuracy but limit the speed and complexity of the algorithm. Such an imaging system has applications in traffic analysis, surveillance and security, as well as object modeling from multi-view images. The system can easily be expanded by increasing the number of cameras such that there is an overlap between the scenes from at least two cameras in proximity. An object can then be tracked long distances or across multiple cameras continuously, applicable, for example, in wireless sensor networks for surveillance or navigation.

  2. Identifiability in stochastic models

    CERN Document Server

    1992-01-01

    The problem of identifiability is basic to all statistical methods and data analysis, occurring in such diverse areas as Reliability Theory, Survival Analysis, and Econometrics, where stochastic modeling is widely used. Mathematics dealing with identifiability per se is closely related to the so-called branch of ""characterization problems"" in Probability Theory. This book brings together relevant material on identifiability as it occurs in these diverse fields.

  3. Review of Meeting Objectives

    International Nuclear Information System (INIS)

    Braams, B.J.; Chung, H.-K.

    2011-01-01

    This is the 21st meeting of the International Atomic and Molecular Data Centres Network. The traditional DCN meeting objectives are: to exchange information about activities in the Centres and review progress; to coordinate work in the Centres; to assess priorities in data evaluation and data production; to make plans for specific evaluations; and to evaluate and revise procedures for collection and exchange of bibliographical and numerical data. All of these are objectives for the present meeting too. In addition to the presentations from DCN and prospective DCN members we have two participants from outside the field of fusion data: Dr N. Mason will tell us about coordination of the Virtual Atomic and Molecular Data Centre and Dr S. Simakov will describe the manner in which nuclear structure and cross-section database development is coordinated by our colleagues in the Nuclear Data Section. In the discussions on Thursday and Friday there are two topics that need special attention this year: the future of our bibliographical data compilation and ways in which we can strengthen data evaluation activities, all with emphasis on collision processes and plasma-material interaction. The first 3 Data Centre Network meetings were held in 1977, 1980 and 1982 and the reports of those meetings make interesting reading and can still provide inspiration for the present meeting. I show some excerpts in the presentation. In 1977 the emphasis was on the coordination of the bibliographical database, AMBDAS, and a collision data index, CIAMDA, as the initial activities of the Network and of the newly formed IAEA A+M Data Unit. In 1980 the central topic of discussion at the meeting shifted to the numerical database and to data evaluation. The Network recommended that numerical data be reviewed by a selected group of scientists and that no unevaluated numerical A+M collision data should be distributed by the IAEA. The report of the meeting in 1982 shows that the bibliographical

  4. Distributed Persistent Identifiers System Design

    Directory of Open Access Journals (Sweden)

    Pavel Golodoniuc

    2017-06-01

    Full Text Available The need to identify both digital and physical objects is ubiquitous in our society. Past and present persistent identifier (PID systems, of which there is a great variety in terms of technical and social implementation, have evolved with the advent of the Internet, which has allowed for globally unique and globally resolvable identifiers. PID systems have, by in large, catered for identifier uniqueness, integrity, and persistence, regardless of the identifier’s application domain. Trustworthiness of these systems has been measured by the criteria first defined by Bütikofer (2009 and further elaborated by Golodoniuc 'et al'. (2016 and Car 'et al'. (2017. Since many PID systems have been largely conceived and developed by a single organisation they faced challenges for widespread adoption and, most importantly, the ability to survive change of technology. We believe that a cause of PID systems that were once successful fading away is the centralisation of support infrastructure – both organisational and computing and data storage systems. In this paper, we propose a PID system design that implements the pillars of a trustworthy system – ensuring identifiers’ independence of any particular technology or organisation, implementation of core PID system functions, separation from data delivery, and enabling the system to adapt for future change. We propose decentralisation at all levels — persistent identifiers and information objects registration, resolution, and data delivery — using Distributed Hash Tables and traditional peer-to-peer networks with information replication and caching mechanisms, thus eliminating the need for a central PID data store. This will increase overall system fault tolerance thus ensuring its trustworthiness. We also discuss important aspects of the distributed system’s governance, such as the notion of the authoritative source and data integrity

  5. Objectives of the symposium

    International Nuclear Information System (INIS)

    Osborne, R.V.

    1992-01-01

    The author defined the objectives of the symposium as follows: to present and examine the recent evidence associating clusters of leukemia with sources of ionizing radiation; to examine the statistical basis for the analysis of clustering; to examine the underlying assumptions in epidemiological studies that clusters must have an environmental cause; to examine the extent to which we can take into account the biological causes of non-randomness in populations, particularly those of geographic and genetic origin; to evaluate the relative merits of different kinds of epidemiological studies for yielding significant information concerning clustering; to consider the potential utility of combining the results from existing studies, and whether new epidemiological studies might be helpful; to consider what other directions, including application of the technologies of molecular biology, are likely to help clarify the underlying mechanisms or causes

  6. Tracking target objects orbiting earth using satellite-based telescopes

    Science.gov (United States)

    De Vries, Willem H; Olivier, Scot S; Pertica, Alexander J

    2014-10-14

    A system for tracking objects that are in earth orbit via a constellation or network of satellites having imaging devices is provided. An object tracking system includes a ground controller and, for each satellite in the constellation, an onboard controller. The ground controller receives ephemeris information for a target object and directs that ephemeris information be transmitted to the satellites. Each onboard controller receives ephemeris information for a target object, collects images of the target object based on the expected location of the target object at an expected time, identifies actual locations of the target object from the collected images, and identifies a next expected location at a next expected time based on the identified actual locations of the target object. The onboard controller processes the collected image to identify the actual location of the target object and transmits the actual location information to the ground controller.

  7. Bottlenose dolphins perceive object features through echolocation.

    Science.gov (United States)

    Harley, Heidi E; Putman, Erika A; Roitblat, Herbert L

    2003-08-07

    How organisms (including people) recognize distant objects is a fundamental question. The correspondence between object characteristics (distal stimuli), like visual shape, and sensory characteristics (proximal stimuli), like retinal projection, is ambiguous. The view that sensory systems are 'designed' to 'pick up' ecologically useful information is vague about how such mechanisms might work. In echolocating dolphins, which are studied as models for object recognition sonar systems, the correspondence between echo characteristics and object characteristics is less clear. Many cognitive scientists assume that object characteristics are extracted from proximal stimuli, but evidence for this remains ambiguous. For example, a dolphin may store 'sound templates' in its brain and identify whole objects by listening for a particular sound. Alternatively, a dolphin's brain may contain algorithms, derived through natural endowments or experience or both, which allow it to identify object characteristics based on sounds. The standard method used to address this question in many species is indirect and has led to equivocal results with dolphins. Here we outline an appropriate method and test it to show that dolphins extract object characteristics directly from echoes.

  8. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  9. Data quality objectives

    International Nuclear Information System (INIS)

    Haeberer, F.

    1993-01-01

    The U.S. Environmental Protection Agency (EPA) spends about $500 million annually in collecting environmental data for scientific research and regulatory decision making. In addition, the regulated community may spend as much as ten times more each year in responding to EPA compliance requirements. Among the EPA and the regulated community there are several important common concerns: both want to make informed decisions using the right type, quality, and quantity of data. Collecting new data is very resource intensive to all parties. Neither EPA nor the regulated community can afford to collect more or open-quotes betterclose quotes data than are really needed; the Data Quality Objectives (DQO) process is a systematic planning tool for ensuring that the right data will be collected for arriving at a decision within the desired confidence constraints. Using the DQO process to plan environmental data collections can help improve their effectiveness and efficiency, and enhance the defensibility of the decisions for which the data are used

  10. Data quality objectives

    Energy Technology Data Exchange (ETDEWEB)

    Haeberer, F. [Environmental Protection Agency, Washington, DC (United States)

    1993-12-31

    The U.S. Environmental Protection Agency (EPA) spends about $500 million annually in collecting environmental data for scientific research and regulatory decision making. In addition, the regulated community may spend as much as ten times more each year in responding to EPA compliance requirements. Among the EPA and the regulated community there are several important common concerns: both want to make informed decisions using the right type, quality, and quantity of data. Collecting new data is very resource intensive to all parties. Neither EPA nor the regulated community can afford to collect more or {open_quotes}better{close_quotes} data than are really needed; the Data Quality Objectives (DQO) process is a systematic planning tool for ensuring that the right data will be collected for arriving at a decision within the desired confidence constraints. Using the DQO process to plan environmental data collections can help improve their effectiveness and efficiency, and enhance the defensibility of the decisions for which the data are used.

  11. Beyond the Object

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Object orientation (OO is regained not only in all components of integrate development media but it remarks in the rest of software world from operating system to last application domain - of course, with different intensity and success. A clear prove of OO application in all situations is the development of a wide range of industrial applications. OO technology allows drawing of relation between the geometry, topology and dimensions of data on a class hierarchy; thus, the observation of the amount of data gained by research in many scientific domains is facilitated through class libraries both for graphic primitives and for events examination. In conformity to all waiting, OO asserts in every distributive system, there are very important the applications for making open systems customer-server and dis-tributed applications in Java. Finally OO application in robot's programming and modeling needn't be omitted. However, far to be panacea, OO has also shades which will be researched so on.

  12. Identifying patient risks during hospitalization

    Directory of Open Access Journals (Sweden)

    Lucélia Ferreira Lima

    2008-12-01

    Full Text Available Objective: To identify the risks reported at a public institution andto know the main patient risks from the nursing staff point of view.Methods: A retrospective, descriptive and exploratory study. Thesurvey was developed at a hospital in the city of Taboão da Serra, SãoPaulo, Brazil. The study included all nurses working in care areas whoagreed to participate in the study. At the same time, sentinel eventsoccurring in the period from July 2006 to July 2007 were identified.Results: There were 440 sentinel events reported, and the main risksincluded patient falls, medication errors and pressure ulcers. Sixty-fivenurses were interviewed. They also reported patient falls, medicationerrors and pressure ulcers as the main risks. Conclusions: Riskassessment and implementation of effective preventive actions arenecessary to ensure patient’s safety. Involvement of a multidisciplinaryteam is one of the steps for a successful process.

  13. Identifying Strategic Scientific Opportunities

    Science.gov (United States)

    As NCI's central scientific strategy office, CRS collaborates with the institute's divisions, offices, and centers to identify research opportunities to advance NCI's vision for the future of cancer research.

  14. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2011-10-01

    cells we observed that it promoted transformation of HMLE cells, suggesting a tumor suppressive role of Merlin in breast cancer (Figure 4B). A...08-1-0767 TITLE: Identifying Breast Cancer Oncogenes PRINCIPAL INVESTIGATOR: Yashaswi Shrestha...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 W81XWH-08-1-0767 Identifying Breast Cancer Oncogenes Yashaswi Shrestha Dana-Farber

  15. Effects of Selected Object Characteristics on Object Permanence Test Performance.

    Science.gov (United States)

    Lingle, Kathleen M.; Lingle, John H.

    A study was conducted to investigate the degree to which both object familiarity and motivational factors influence infants' search behavior in an object permanence test. Infants' search behavior for an unfamiliar test object was compared with search behavior for (a) an experientially familiar object that each infant had played with daily for a…

  16. Setting priorities for ambient air quality objectives

    International Nuclear Information System (INIS)

    2004-10-01

    Alberta has ambient air quality objectives in place for several pollutants, toxic substances and other air quality parameters. A process is in place to determine if additional air quality objectives are required or if existing objectives should be changed. In order to identify the highest priority substances that may require an ambient air quality objective to protect ecosystems and public health, a rigorous, transparent and cost effective priority setting methodology is required. This study reviewed, analyzed and assessed successful priority setting techniques used by other jurisdictions. It proposed an approach for setting ambient air quality objective priorities that integrates the concerns of stakeholders with Alberta Environment requirements. A literature and expert review were used to examine existing priority-setting techniques used by other jurisdictions. An analysis process was developed to identify the strengths and weaknesses of various techniques and their ability to take into account the complete pathway between chemical emissions and damage to human health or the environment. The key strengths and weaknesses of each technique were identified. Based on the analysis, the most promising technique was the tool for the reduction and assessment of chemical and other environmental impacts (TRACI). Several considerations for using TRACI to help set priorities for ambient air quality objectives were also presented. 26 refs, 8 tabs., 4 appendices

  17. Balance between calibration objectives in a conceptual hydrological model

    NARCIS (Netherlands)

    Booij, Martijn J.; Krol, Martinus S.

    2010-01-01

    Three different measures to determine the optimum balance between calibration objectives are compared: the combined rank method, parameter identifiability and model validation. Four objectives (water balance, hydrograph shape, high flows, low flows) are included in each measure. The contributions of

  18. Identifying Knowledge and Communication

    Directory of Open Access Journals (Sweden)

    Eduardo Coutinho Lourenço de Lima

    2006-12-01

    Full Text Available In this paper, I discuss how the principle of identifying knowledge which Strawson advances in ‘Singular Terms and Predication’ (1961, and in ‘Identifying Reference and Truth-Values’ (1964 turns out to constrain communication. The principle states that a speaker’s use of a referring expression should invoke identifying knowledge on the part of the hearer, if the hearer is to understand what the speaker is saying, and also that, in so referring, speakers are attentive to hearers’ epistemic states. In contrasting it with Russell’s Principle (Evans 1982, as well as with the principle of identifying descriptions (Donnellan 1970, I try to show that the principle of identifying knowledge, ultimately a condition for understanding, makes sense only in a situation of conversation. This allows me to conclude that the cooperative feature of communication (Grice 1975 and reference (Clark andWilkes-Gibbs 1986 holds also at the understanding level. Finally, I discuss where Strawson’s views seem to be unsatisfactory, and suggest how they might be improved.

  19. Utilizing Provenance in Reusable Research Objects

    Directory of Open Access Journals (Sweden)

    Zhihao Yuan

    2018-03-01

    Full Text Available Science is conducted collaboratively, often requiring the sharing of knowledge about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs or Digital Object Identifiers (DOIs. An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research Object has recently emerged as a comprehensive and systematic method for aggregation and identification of diverse elements of computational experiments. While a necessary method, mere aggregation is not sufficient for the sharing of computational experiments. Other users must be able to easily recompute on these shared research objects. Computational provenance is often the key to enable such reuse. In this paper, we show how reusable research objects can utilize provenance to correctly repeat a previous reference execution, to construct a subset of a research object for partial reuse, and to reuse existing contents of a research object for modified reuse. We describe two methods to summarize provenance that aid in understanding the contents and past executions of a research object. The first method obtains a process-view by collapsing low-level system information, and the second method obtains a summary graph by grouping related nodes and edges with the goal to obtain a graph view similar to application workflow. Through detailed experiments, we show the efficacy and efficiency of our algorithms.

  20. Object-based attention: strength of object representation and attentional guidance.

    Science.gov (United States)

    Shomstein, Sarah; Behrmann, Marlene

    2008-01-01

    Two or more features belonging to a single object are identified more quickly and more accurately than are features belonging to different objects--a finding attributed to sensory enhancement of all features belonging to an attended or selected object. However, several recent studies have suggested that this "single-object advantage" may be a product of probabilistic and configural strategic prioritizations rather than of object-based perceptual enhancement per se, challenging the underlying mechanism that is thought to give rise to object-based attention. In the present article, we further explore constraints on the mechanisms of object-based selection by examining the contribution of the strength of object representations to the single-object advantage. We manipulated factors such as exposure duration (i.e., preview time) and salience of configuration (i.e., objects). Varying preview time changes the magnitude of the object-based effect, so that if there is ample time to establish an object representation (i.e., preview time of 1,000 msec), then both probability and configuration (i.e., objects) guide attentional selection. If, however, insufficient time is provided to establish a robust object-based representation, then only probabilities guide attentional selection. Interestingly, at a short preview time of 200 msec, when the two objects were sufficiently different from each other (i.e., different colors), both configuration and probability guided attention selection. These results suggest that object-based effects can be explained both in terms of strength of object representations (established at longer exposure durations and by pictorial cues) and probabilistic contingencies in the visual environment.

  1. Tracking in Object Action Space

    DEFF Research Database (Denmark)

    Krüger, Volker; Herzog, Dennis

    2013-01-01

    the space of the object affordances, i.e., the space of possible actions that are applied on a given object. This way, 3D body tracking reduces to action tracking in the object (and context) primed parameter space of the object affordances. This reduces the high-dimensional joint-space to a low...

  2. Object grammars and random generation

    Directory of Open Access Journals (Sweden)

    I. Dutour

    1998-12-01

    Full Text Available This paper presents a new systematic approach for the uniform random generation of combinatorial objects. The method is based on the notion of object grammars which give recursive descriptions of objects and generalize context-freegrammars. The application of particular valuations to these grammars leads to enumeration and random generation of objects according to non algebraic parameters.

  3. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  4. First-Class Object Sets

    DEFF Research Database (Denmark)

    Ernst, Erik

    Typically, objects are monolithic entities with a fixed interface. To increase the flexibility in this area, this paper presents first-class object sets as a language construct. An object set offers an interface which is a disjoint union of the interfaces of its member objects. It may also be used...... for a special kind of method invocation involving multiple objects in a dynamic lookup process. With support for feature access and late-bound method calls object sets are similar to ordinary objects, only more flexible. The approach is made precise by means of a small calculus, and the soundness of its type...

  5. Object width modulates object-based attentional selection.

    Science.gov (United States)

    Nah, Joseph C; Neppi-Modona, Marco; Strother, Lars; Behrmann, Marlene; Shomstein, Sarah

    2018-04-24

    Visual input typically includes a myriad of objects, some of which are selected for further processing. While these objects vary in shape and size, most evidence supporting object-based guidance of attention is drawn from paradigms employing two identical objects. Importantly, object size is a readily perceived stimulus dimension, and whether it modulates the distribution of attention remains an open question. Across four experiments, the size of the objects in the display was manipulated in a modified version of the two-rectangle paradigm. In Experiment 1, two identical parallel rectangles of two sizes (thin or thick) were presented. Experiments 2-4 employed identical trapezoids (each having a thin and thick end), inverted in orientation. In the experiments, one end of an object was cued and participants performed either a T/L discrimination or a simple target-detection task. Combined results show that, in addition to the standard object-based attentional advantage, there was a further attentional benefit for processing information contained in the thick versus thin end of objects. Additionally, eye-tracking measures demonstrated increased saccade precision towards thick object ends, suggesting that Fitts's Law may play a role in object-based attentional shifts. Taken together, these results suggest that object-based attentional selection is modulated by object width.

  6. Mechanisms underlying selecting objects for action

    Directory of Open Access Journals (Sweden)

    Melanie eWulff

    2015-04-01

    Full Text Available We assessed the factors which affect the selection of objects for action, focusing on the role of action knowledge and its modulation by distracters. 14 neuropsychological patients and 10 healthy aged-matched controls selected pairs of objects commonly used together among distracters in two contexts: with real objects and with pictures of the same objects presented sequentially on a computer screen. Across both tasks, semantically related distracters led to slower responses and more errors than unrelated distracters and the object actively used for action was selected prior to the object that would be passively held during the action. We identified a sub-group of patients (N=6 whose accuracy was 2SD below the controls performances in the real object task. Interestingly, these impaired patients were more affected by the presence of unrelated distracters during both tasks than intact patients and healthy controls. Note the impaired had lesions to left parietal, right anterior temporal and bilateral pre-motor regions. We conclude that: (1 motor procedures guide object selection for action, (2 semantic knowledge affects action-based selection, (3 impaired action decision is associated with the inability to ignore distracting information and (4 lesions to either the dorsal or ventral visual stream can lead to deficits in making action decisions. Overall, the data indicate that impairments in everyday tasks can be evaluated using a simulated computer task. The implications for rehabilitation are discussed.

  7. Salient Object Detection via Structured Matrix Decomposition.

    Science.gov (United States)

    Peng, Houwen; Li, Bing; Ling, Haibin; Hu, Weiming; Xiong, Weihua; Maybank, Stephen J

    2016-05-04

    Low-rank recovery models have shown potential for salient object detection, where a matrix is decomposed into a low-rank matrix representing image background and a sparse matrix identifying salient objects. Two deficiencies, however, still exist. First, previous work typically assumes the elements in the sparse matrix are mutually independent, ignoring the spatial and pattern relations of image regions. Second, when the low-rank and sparse matrices are relatively coherent, e.g., when there are similarities between the salient objects and background or when the background is complicated, it is difficult for previous models to disentangle them. To address these problems, we propose a novel structured matrix decomposition model with two structural regularizations: (1) a tree-structured sparsity-inducing regularization that captures the image structure and enforces patches from the same object to have similar saliency values, and (2) a Laplacian regularization that enlarges the gaps between salient objects and the background in feature space. Furthermore, high-level priors are integrated to guide the matrix decomposition and boost the detection. We evaluate our model for salient object detection on five challenging datasets including single object, multiple objects and complex scene images, and show competitive results as compared with 24 state-of-the-art methods in terms of seven performance metrics.

  8. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2010-10-01

    tyrosine kinases with an SH3, SH2 and catalytic domain, it lacks a native myristylation signal shared by most members of this class [14], [38]. The...therapeutics and consequently, improve clinical outcomes. We aim to identify novel drivers of breast oncogenesis. We hypothesize that a kinase gain-of...human mammary epithelial cells. A pBabe-Puro-Myr-Flag kinase open reading frame (ORF) library was screened in immortalized human mammary epithelial

  9. Rock disposal problems identified

    Energy Technology Data Exchange (ETDEWEB)

    Knox, R

    1978-06-01

    Mathematical models are the only way of examining the return of radioactivity from nuclear waste to the environment over long periods of time. Work in Britain has helped identify areas where more basic data is required, but initial results look very promising for final disposal of high level waste in hard rock repositories. A report by the National Radiological Protection Board of a recent study, is examined.

  10. Automatic Recognition of Object Names in Literature

    Science.gov (United States)

    Bonnin, C.; Lesteven, S.; Derriere, S.; Oberto, A.

    2008-08-01

    SIMBAD is a database of astronomical objects that provides (among other things) their bibliographic references in a large number of journals. Currently, these references have to be entered manually by librarians who read each paper. To cope with the increasing number of papers, CDS develops a tool to assist the librarians in their work, taking advantage of the Dictionary of Nomenclature of Celestial Objects, which keeps track of object acronyms and of their origin. The program searches for object names directly in PDF documents by comparing the words with all the formats stored in the Dictionary of Nomenclature. It also searches for variable star names based on constellation names and for a large list of usual names such as Aldebaran or the Crab. Object names found in the documents often correspond to several astronomical objects. The system retrieves all possible matches, displays them with their object type given by SIMBAD, and lets the librarian make the final choice. The bibliographic reference can then be automatically added to the object identifiers in the database. Besides, the systematic usage of the Dictionary of Nomenclature, which is updated manually, permitted to automatically check it and to detect errors and inconsistencies. Last but not least, the program collects some additional information such as the position of the object names in the document (in the title, subtitle, abstract, table, figure caption...) and their number of occurrences. In the future, this will permit to calculate the 'weight' of an object in a reference and to provide SIMBAD users with an important new information, which will help them to find the most relevant papers in the object reference list.

  11. AN OBJECTIVE CLIMATOLOGY OF CAROLINA COASTAL FRONTS

    Science.gov (United States)

    This study describes a simple objective method to identify cases of coastal frontogenesis offshore of the Carolinas and to characterize the sensible weather associated with frontal passage at measurement sites near the coast. The identification method, based on surface hourly d...

  12. Learning Objects, Repositories, Sharing and Reusability

    Science.gov (United States)

    Koppi, Tony; Bogle, Lisa; Bogle, Mike

    2005-01-01

    The online Learning Resource Catalogue (LRC) Project has been part of an international consortium for several years and currently includes 25 institutions worldwide. The LRC Project has evolved for several pragmatic reasons into an academic network whereby members can identify and share reusable learning objects as well as collaborate in a number…

  13. Data quality objectives for PUREX deactivation flushing

    International Nuclear Information System (INIS)

    Bhatia, R.K.

    1995-01-01

    This Data Quality Objection (DQO) defines the sampling and analysis requirements necessary to support the deactivation of the Plutonium-Uranium Extraction (PUREX) facility vessels that are regulated by WAC 173-303. Specifically, sampling and analysis requirements are identified for the flushing operations that are a major element of PUREX deactivation

  14. Implications of perspective in teaching objects first and object design

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2005-01-01

    There are an increasing number of books published on the important topics of "object-oriented programming" and "object-oriented design" for use in education. However, object-orientation can be viewed from a number of different perspectives---each perspective having its benefits and liabilities...

  15. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  16. Identifying phenomenal consciousness.

    Science.gov (United States)

    Schier, Elizabeth

    2009-03-01

    This paper examines the possibility of finding evidence that phenomenal consciousness is independent of access. The suggestion reviewed is that we should look for isomorphisms between phenomenal and neural activation spaces. It is argued that the fact that phenomenal spaces are mapped via verbal report is no problem for this methodology. The fact that activation and phenomenal space are mapped via different means does not mean that they cannot be identified. The paper finishes by examining how data addressing this theoretical question could be obtained.

  17. Advertising. Advanced placement of objects

    Directory of Open Access Journals (Sweden)

    Hassan Ali Al-Ababneh

    2016-06-01

    Full Text Available The article is devoted to the study of one of the most important concepts and marketing events which is advertising. The author studies the history of the formation of modern advertising and covers the main interpretations of the concept of advertising. The article presents the data on the chronology of the formation of the key objectives of the advertising process and the basic classification of types of advertising, its purpose and place in the marketing mix. It sets out the classification and content of the basic concepts of marketing. The article considers the potential effectiveness of the basic types of advertising communications, and especially the impact of these promotional activities on the perception of the end user. Particular attention is paid to the study of certain promising areas of advertising, namely, advertising at airports and in airplanes, it is a special case of transit advertising. The author describes the identified advantages and disadvantages of this direction of marketing communications as well as the analysis of statistical data on the effectiveness of advertising at airports and in airplanes. It is suggested to consider this type of advertising as promising and effective in the conditions of modern times because there is the tendency to increase the dynamic potential users of the specified mode of transport and, as a consequence, it is possible with certainty to predict the transformation of potential passengers into real consumers of the studied type of advertising

  18. Parallel object-oriented data mining system

    Science.gov (United States)

    Kamath, Chandrika; Cantu-Paz, Erick

    2004-01-06

    A data mining system uncovers patterns, associations, anomalies and other statistically significant structures in data. Data files are read and displayed. Objects in the data files are identified. Relevant features for the objects are extracted. Patterns among the objects are recognized based upon the features. Data from the Faint Images of the Radio Sky at Twenty Centimeters (FIRST) sky survey was used to search for bent doubles. This test was conducted on data from the Very Large Array in New Mexico which seeks to locate a special type of quasar (radio-emitting stellar object) called bent doubles. The FIRST survey has generated more than 32,000 images of the sky to date. Each image is 7.1 megabytes, yielding more than 100 gigabytes of image data in the entire data set.

  19. Eye-tracking study of inanimate objects

    Directory of Open Access Journals (Sweden)

    Ković Vanja

    2009-01-01

    Full Text Available Unlike the animate objects, where participants were consistent in their looking patterns, for inanimates it was difficult to identify both consistent areas of fixations and a consistent order of fixations. Furthermore, in comparison to animate objects, in animates received significantly shorter total looking time, shorter longest looks and a smaller number of overall fixations. However, as with animates, looking patterns did not systematically differ between the naming and non-naming conditions. These results suggested that animacy, but not labelling, impacts on looking behavior in this paradigm. In the light of feature-based accounts of semantic memory organization, one could interpret these findings as suggesting that processing of the animate objects is based on the saliency/diagnosticity of their visual features (which is then reflected through participants eye-movements towards those features, whereas processing of the inanimate objects is based more on functional features (which cannot be easily captured by looking behavior in such a paradigm.

  20. Swing damped movement of suspended objects

    International Nuclear Information System (INIS)

    Jones, J.F.; Petterson, B.J.; Werner, J.C.

    1990-01-01

    Transportation of large objects such as nuclear waste shipping casks using overhead cranes can induce pendular motion of the object. Residual oscillation from transportation typically must be damped or allowed to decay before the next process can take place. By properly programming the acceleration of the transporting device (e.g., crane) an oscillation damped transport and swing free stop are obtainable. This report reviews the theory associated with formulating such oscillation damped trajectories for a simply suspended object (e.g., simple pendulum). In addition, the use of force servo damping to eliminate initial oscillation of simply suspended objects is discussed. This is often needed to provide a well defined initial state for the system prior to executing an oscillation damped move. Also included are descriptions of experiments using a CIMCORP XR6100 gantry robot and results from these experiments. Finally, sources of error resulting in small residual oscillations are identified and possible solutions presented

  1. Two Types of Visual Objects

    Directory of Open Access Journals (Sweden)

    Skrzypulec Błażej

    2015-06-01

    Full Text Available While it is widely accepted that human vision represents objects, it is less clear which of the various philosophical notions of ‘object’ adequately characterizes visual objects. In this paper, I show that within contemporary cognitive psychology visual objects are characterized in two distinct, incompatible ways. On the one hand, models of visual organization describe visual objects in terms of combinations of features, in accordance with the philosophical bundle theories of objects. However, models of visual persistence apply a notion of visual objects that is more similar to that endorsed in philosophical substratum theories. Here I discuss arguments that might show either that only one of the above notions of visual objects is adequate in the context of human vision, or that the category of visual objects is not uniform and contains entities properly characterized by different philosophical conceptions.

  2. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-11-09

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  3. Foreign Objects in the Rectum

    Science.gov (United States)

    ... Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse (See ... Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse NOTE: ...

  4. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  5. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  6. A Model for Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    1996-01-01

    We present a model for concurrent objects where obejcts interact by taking part in common events that are closely matched to form call-response pairs, resulting in resulting in rendez-vous like communications. Objects are built from primitive objects by parallel composition, encapsulation...

  7. Decoupling Object Detection and Categorization

    Science.gov (United States)

    Mack, Michael L.; Palmeri, Thomas J.

    2010-01-01

    We investigated whether there exists a behavioral dependency between object detection and categorization. Previous work (Grill-Spector & Kanwisher, 2005) suggests that object detection and basic-level categorization may be the very same perceptual mechanism: As objects are parsed from the background they are categorized at the basic level. In…

  8. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon

  9. Auditory memory can be object based.

    Science.gov (United States)

    Dyson, Benjamin J; Ishfaq, Feraz

    2008-04-01

    Identifying how memories are organized remains a fundamental issue in psychology. Previous work has shown that visual short-term memory is organized according to the object of origin, with participants being better at retrieving multiple pieces of information from the same object than from different objects. However, it is not yet clear whether similar memory structures are employed for other modalities, such as audition. Under analogous conditions in the auditory domain, we found that short-term memories for sound can also be organized according to object, with a same-object advantage being demonstrated for the retrieval of information in an auditory scene defined by two complex sounds overlapping in both space and time. Our results provide support for the notion of an auditory object, in addition to the continued identification of similar processing constraints across visual and auditory domains. The identification of modality-independent organizational principles of memory, such as object-based coding, suggests possible mechanisms by which the human processing system remembers multimodal experiences.

  10. Preserving urban objects of historicaland architectural heritage

    Directory of Open Access Journals (Sweden)

    Bal'zannikova Ekaterina Mikhailovna

    2014-01-01

    Full Text Available Large cities of central Russia were built under the influence of the factors that played an important role in protecting their population; natural resources and opportunities for trading were also essential. The industrial development and construction of large industrial facilities were significant for the formation of urban environment. As a result architectural monuments of great historical value that have a significant influence on the formation of the modern city image were preserved.Nowadays, a great number of buildings of historical and architectural heritage turned out to be in poor condition. Funding and its efficient use are rational means of saving the most valuable objects of historical and cultural heritage. In order to do this it is necessary to solve the problems of developing complex and effective measures for preserving these objectsThe existing method of preserving urban objects does not focus on urban architectural objects of historical and architectural value. It does not cover the study of urban development features in architectural and town-planning environment surrounding this object, it does not determine the historical and architectural value of the object and it does not identify the relationship of the object and the surrounding objects as well as architectural frame of the total area. That is why the existing method cannot be considered an appropriate system for preserving the objects of historical and architectural heritage.In order to avoid the disadvantages mentioned above and to increase tourist interest to the architecturally valuable buildings in urban areas, the author has proposed a complex approach to improve the method of reconstructing urban objects of great historical and architectural significance.The existing method of preserving historical objects includes the preparatory period of studying the degree of historical and architectural heritage wear and decay, developing the techniques for strengthening

  11. List identifies threatened ecosystems

    Science.gov (United States)

    Showstack, Randy

    2012-09-01

    The International Union for Conservation of Nature (IUCN) announced on 9 September that it will develop a new Red List of Ecosystems that will identify which ecosystems are vulnerable or endangered. The list, which is modeled on the group's Red List of Threatened Species™, could help to guide conservation activities and influence policy processes such as the Convention on Biological Diversity, according to the group. “We will assess the status of marine, terrestrial, freshwater, and subterranean ecosystems at local, regional, and global levels,” stated Jon Paul Rodriguez, leader of IUCN's Ecosystems Red List Thematic Group. “The assessment can then form the basis for concerted implementation action so that we can manage them sustainably if their risk of collapse is low or restore them if they are threatened and then monitor their recovery.”

  12. Global Microbial Identifier

    DEFF Research Database (Denmark)

    Wielinga, Peter; Hendriksen, Rene S.; Aarestrup, Frank Møller

    2017-01-01

    ) will likely also enable a much better understanding of the pathogenesis of the infection and the molecular basis of the host response to infection. But the full potential of these advances will only transpire if the data in this area become transferable and thereby comparable, preferably in open-source...... of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect outbreaks and emerging pathogens. To harness the full potential of WGS, a shared global database of genomes linked to relevant metadata and the necessary software tools needs to be generated, hence the global...... microbial identifier (GMI) initiative. This tool will ideally be used in amongst others in the diagnosis of infectious diseases in humans and animals, in the identification of microorganisms in food and environment, and to track and trace microbial agents in all arenas globally. This will require...

  13. SODA: Smart Objects, Dumb Archives

    Science.gov (United States)

    Nelson, Michael L.; Maly, Kurt; Zubair, Mohammad; Shen, Stewart N. T.

    2004-01-01

    We present the Smart Object, Dumb Archive (SODA) model for digital libraries (DLs). The SODA model transfers functionality traditionally associated with archives to the archived objects themselves. We are exploiting this shift of responsibility to facilitate other DL goals, such as interoperability, object intelligence and mobility, and heterogeneity. Objects in a SODA DL negotiate presentation of content and handle their own terms and conditions. In this paper we present implementations of our smart objects, buckets, and our dumb archive (DA). We discuss the status of buckets and DA and how they are used in a variety of DL projects.

  14. Does long-term object priming depend on the explicit detection of object identity at encoding?

    Directory of Open Access Journals (Sweden)

    Carlos Alexandre Gomes

    2015-03-01

    Full Text Available It is currently unclear whether objects have to be explicitly identified at encoding for reliable behavioural long-term object priming to occur. We conducted two experiments that investigated long-term object and non-object priming using a selective-attention encoding manipulation that reduces explicit object identification. In Experiment 1, participants either counted dots flashed within an object picture (shallow encoding or engaged in an animacy task (deep encoding at study, whereas, at test, they performed an object-decision task. Priming, as measured by reaction times, was observed for both types of encoding, and was of equivalent magnitude. In Experiment 2, non-object priming (faster reaction times for studied relative to unstudied non-objects was also obtained under the same selective-attention encoding manipulation as in Experiment 1, and the magnitude of the priming effect was equivalent between experiments. In contrast, we observed a linear decrement in recognition memory accuracy across conditions (deep encoding of Experiment 1 > shallow encoding Experiment 1 > shallow encoding of Experiment 2, suggesting that priming was not contaminated by explicit memory strategies. We argue that our results are more consistent with the identification/production framework than the perceptual/conceptual distinction, and we conclude that priming of pictures largely ignored at encoding can be subserved by the automatic retrieval of two types of instances: one at the motor-level and another at an object-decision level.

  15. Object recognition memory in zebrafish.

    Science.gov (United States)

    May, Zacnicte; Morrill, Adam; Holcombe, Adam; Johnston, Travis; Gallup, Joshua; Fouad, Karim; Schalomon, Melike; Hamilton, Trevor James

    2016-01-01

    The novel object recognition, or novel-object preference (NOP) test is employed to assess recognition memory in a variety of organisms. The subject is exposed to two identical objects, then after a delay, it is placed back in the original environment containing one of the original objects and a novel object. If the subject spends more time exploring one object, this can be interpreted as memory retention. To date, this test has not been fully explored in zebrafish (Danio rerio). Zebrafish possess recognition memory for simple 2- and 3-dimensional geometrical shapes, yet it is unknown if this translates to complex 3-dimensional objects. In this study we evaluated recognition memory in zebrafish using complex objects of different sizes. Contrary to rodents, zebrafish preferentially explored familiar over novel objects. Familiarity preference disappeared after delays of 5 mins. Leopard danios, another strain of D. rerio, also preferred the familiar object after a 1 min delay. Object preference could be re-established in zebra danios by administration of nicotine tartrate salt (50mg/L) prior to stimuli presentation, suggesting a memory-enhancing effect of nicotine. Additionally, exploration biases were present only when the objects were of intermediate size (2 × 5 cm). Our results demonstrate zebra and leopard danios have recognition memory, and that low nicotine doses can improve this memory type in zebra danios. However, exploration biases, from which memory is inferred, depend on object size. These findings suggest zebrafish ecology might influence object preference, as zebrafish neophobia could reflect natural anti-predatory behaviour. Copyright © 2015 Elsevier B.V. All rights reserved.

  16. Objective voice parameters in Colombian school workers with healthy voices

    NARCIS (Netherlands)

    L.C. Cantor Cutiva (Lady Catherine); A. Burdorf (Alex)

    2015-01-01

    textabstractObjectives: To characterize the objective voice parameters among school workers, and to identify associated factors of three objective voice parameters, namely fundamental frequency, sound pressure level and maximum phonation time. Materials and methods: We conducted a cross-sectional

  17. Moderate financial incentive does not appear to influence the P300 Concealed Information Test (CIT) effect in the Complex Trial Protocol (CTP) version of the CIT in a forensic scenario, while affecting P300 peak latencies and behavior.

    Science.gov (United States)

    Rosenfeld, J Peter; Sitar, Evan; Wasserman, Joshua; Ward, Anne

    2018-03-01

    Previous research indicated that the skin conductance response (SCR) of the Autonomic Nervous System (ANS) in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor for P300 tests based on the 3-stimulus protocol or Complex Trial Protocol for detection of cognitive malingering (although these are not the same as forensic CITs). The present report extends earlier studies of malingerers by running five groups of subjects (15-16 per group yielding 78 total) in a mock crime (forensic) scenario: paid (to beat the test) and unpaid, instructed and uninstructed, and simply guilty. There was no evidence that the "CIT effect" (probe-minus-irrelevant P300 differences) differed among groups, although behavioral differences among groups were seen. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Channels as Objects in Concurrent Object-Oriented Programming

    Directory of Open Access Journals (Sweden)

    Joana Campos

    2011-10-01

    Full Text Available There is often a sort of a protocol associated to each class, stating when and how certain methods should be called. Given that this protocol is, if at all, described in the documentation accompanying the class, current mainstream object-oriented languages cannot provide for the verification of client code adherence against the sought class behaviour. We have defined a class-based concurrent object-oriented language that formalises such protocols in the form of usage types. Usage types are attached to class definitions, allowing for the specification of (1 the available methods, (2 the tests clients must perform on the result of methods, and (3 the object status - linear or shared - all of which depend on the object's state. Our work extends the recent approach on modular session types by eliminating channel operations, and defining the method call as the single communication primitive in both sequential and concurrent settings. In contrast to previous works, we define a single category for objects, instead of distinct categories for linear and for shared objects, and let linear objects evolve into shared ones. We introduce a standard sync qualifier to prevent thread interference in certain operations on shared objects. We formalise the language syntax, the operational semantics, and a type system that enforces by static typing that methods are called only when available, and by a single client if so specified in the usage type. We illustrate the language via a complete example.

  19. Haptic identification of objects and their depictions.

    Science.gov (United States)

    Klatzky, R L; Loomis, J M; Lederman, S J; Wake, H; Fujita, N

    1993-08-01

    Haptic identification of real objects is superior to that of raised two-dimensional (2-D) depictions. Three explanations of real-object superiority were investigated: contribution of material information, contribution of 3-D shape and size, and greater potential for integration across the fingers. In Experiment 1, subjects, while wearing gloves that gently attenuated material information, haptically identified real objects that provided reduced cues to compliance, mass, and part motion. The gloves permitted exploration with free hand movement, a single outstretched finger, or five outstretched fingers. Performance decreased over these three conditions but was superior to identification of pictures of the same objects in all cases, indicating the contribution of 3-D structure and integration across the fingers. Picture performance was also better with five fingers than with one. In Experiment 2, the subjects wore open-fingered gloves, which provided them with material information. Consequently, the effect of type of exploration was substantially reduced but not eliminated. Material compensates somewhat for limited access to object structure but is not the primary basis for haptic object identification.

  20. Detecting objects in radiographs for homeland security

    Science.gov (United States)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  1. Rough multiple objective decision making

    CERN Document Server

    Xu, Jiuping

    2011-01-01

    Rough Set TheoryBasic concepts and properties of rough sets Rough Membership Rough Intervals Rough FunctionApplications of Rough SetsMultiple Objective Rough Decision Making Reverse Logistics Problem with Rough Interval Parameters MODM based Rough Approximation for Feasible RegionEVRMCCRMDCRM Reverse Logistics Network Design Problem of Suji Renewable Resource MarketBilevel Multiple Objective Rough Decision Making Hierarchical Supply Chain Planning Problem with Rough Interval Parameters Bilevel Decision Making ModelBL-EVRM BL-CCRMBL-DCRMApplication to Supply Chain Planning of Mianyang Co., LtdStochastic Multiple Objective Rough Decision Multi-Objective Resource-Constrained Project Scheduling UnderRough Random EnvironmentRandom Variable Stochastic EVRM Stochastic CCRM Stochastic DCRM Multi-Objective rc-PSP/mM/Ro-Ra for Longtan Hydropower StationFuzzy Multiple Objective Rough Decision Making Allocation Problem under Fuzzy Environment Fuzzy Variable Fu-EVRM Fu-CCRM Fu-DCRM Earth-Rock Work Allocation Problem.

  2. Rethinking the objectivity of ethics

    OpenAIRE

    Kurth, Charles Burke

    2011-01-01

    Commonsense says that morality is objective. But skeptics deny that the normativity and fallibility that characterize this objectivity really exist. I disagree. I develop an account of moral facts that vindicates the objectivity of ethics. Moreover, I do this without relying on either the strong foundational claims of realism and constructivism, or the revisionary logic of expressivism. Instead, I build from a moral psychology that is modest and familiar--one that focuses on the distinctive, ...

  3. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  4. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  5. Intuitive modeling of vaporish objects

    International Nuclear Information System (INIS)

    Sokolov, Dmitry; Gentil, Christian

    2015-01-01

    Attempts to model gases in computer graphics started in the late 1970s. Since that time, there have been many approaches developed. In this paper we present a non-physical method allowing to create vaporish objects like clouds or smoky characters. The idea is to create a few sketches describing the rough shape of the final vaporish object. These sketches will be used as condensation sets of Iterated Function Systems, providing intuitive control over the object. The advantages of the new method are: simplicity, good control of resulting shapes and ease of eventual object animation.

  6. Object 'Ukryttya' 1986-2006

    International Nuclear Information System (INIS)

    Klyuchnikov, A.A.; Krasnov, V.A.; Rud'ko, V.M.; Shcherbin, V.N.

    2006-01-01

    This monograph summarizes the materials pertaining to 'Ukryttya' Object state. The results of researches of fuel containing materials conditions and of forecast of their future behavior are demonstrated, aerosol characterizations, mechanisms of production of liquid radioactive waste, radiation conditions at SO industrial site and NSC assembly site, as well as analysis of 'Ukryttya' Objects environmental impact, are performed. The conditions of 'Ukryttya' Object building structures are described. Preparation and realization of international projects for conversion of 'Ukryttya' Object into an ecologically safe system, including the 'Ukryttya' Implementation Plan (SIP), are considered

  7. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  8. Aggregating and Disaggregating Flexibility Objects

    DEFF Research Database (Denmark)

    Siksnys, Laurynas; Valsomatzis, Emmanouil; Hose, Katja

    2015-01-01

    In many scientific and commercial domains we encounter flexibility objects, i.e., objects with explicit flexibilities in a time and an amount dimension (e.g., energy or product amount). Applications of flexibility objects require novel and efficient techniques capable of handling large amounts...... and aiming at energy balancing during aggregation. In more detail, this paper considers the complete life cycle of flex-objects: aggregation, disaggregation, associated requirements, efficient incremental computation, and balance aggregation techniques. Extensive experiments based on real-world data from...

  9. Identifying Foods causing Allergies/ Intolerances among Diabetic ...

    African Journals Online (AJOL)

    Objective: This study was designed to identify the foods that caused allergies / intolerances and symptoms of reaction experienced by diabetic patients attending State Specialist Hospital, Akure. Materials and Methods: Ninety-eight diabetics aged 30-80 years (30 males and 68 females) were included in the study.

  10. Quantum objects non-local correlation, causality and objective indefiniteness in the quantum world

    CERN Document Server

    Jaeger, Gregg

    2013-01-01

    This monograph identifies the essential characteristics of the objects described by current quantum theory and considers their relationship to space-time. In the process, it explicates the senses in which quantum objects may be consistently considered to have parts of which they may be composed or into which they may be decomposed. The book also demonstrates the degree to which reduction is possible in quantum mechanics, showing it to be related to the objective indefiniteness of quantum properties and the strong non-local correlations that can occur between the physical quantities of quantum

  11. STRATEGIC MANAGEMENT OBJECT AS AN OBJECT OF SCIENTIFIC RESEARCH

    Directory of Open Access Journals (Sweden)

    Mykola Bondar

    2015-11-01

    Full Text Available The purpose of research is to highlight the main areas of the system of strategic management accounting, improvement of the principles on which it operates. Subject of research is theoretical and practical aspects of functioning and development of strategic management accounting. Subject area is focused on strategic management information support towards the implementation of the principle of balancing of activity of the entities. Objectives of the research is to determine the place and role of strategic management accounting in the creation of information infrastructure management in the current economic conditions; disclosure of decomposition problems and improvement of the functioning of the system of strategic management accounting, prioritization of development. Hypothesis of the research is based on the assumption that the effectiveness of entities management adapted to the needs of the market environment of complete, accurate and timely information, which is formed in properly organized system of strategic management accounting. Methodology is based on analysis of data of respondents from 125 industrial entities of Kharkiv region. Data was collected through direct surveys and in the preparation of Kharkiv Oblast Development Strategy for the period until 2020. Respondents were asked a number of questions that determine: results of the system of information support of strategic management in enterprises employing respondents; direction of the system of strategic management accounting in enterprises employing respondents. By means of expert assessments was evaluated important source of information for making strategic management decisions. General system of research methodology is based on a systematic approach. Conclusion. During the research was confirmed the role and importance of strategic management accounting information for the purpose of strategic management. According to the results outlined challenges facing the leaders of

  12. Automated analysis of objective-prism spectra

    International Nuclear Information System (INIS)

    Hewett, P.C.; Irwin, M.J.; Bunclark, P.; Bridgeland, M.T.; Kibblewhite, E.J.; Smith, M.G.

    1985-01-01

    A fully automated system for the location, measurement and analysis of large numbers of low-resolution objective-prism spectra is described. The system is based on the APM facility at the University of Cambridge, and allows processing of objective-prism, grens or grism data. Particular emphasis is placed on techniques to obtain the maximum signal-to-noise ratio from the data, both in the initial spectral estimation procedure and for subsequent feature identification. Comparison of a high-quality visual catalogue of faint quasar candidates with an equivalent automated sample demonstrates the ability of the APM system to identify all the visually selected quasar candidates. In addition, a large population of new, faint (msub(J)approx. 20) candidates is identified. (author)

  13. Problem of identifying an object in a robotics scene from an imprecise verbal description

    Energy Technology Data Exchange (ETDEWEB)

    Farreny, H; Prade, H

    1983-01-01

    The authors investigate the problem of relating imprecise and incomplete verbal descriptions to noisy high-level features supplied by an image analyzer. Pattern-matching problems are specially addressed. The proposed approach allows the direct processing of human-like descriptions. Moreover, the imprecision due to the use of natural language expressions or to the noisiness of the image analyzer, is taken into account. 26 references.

  14. Identifying key research objectives to make European forests greener for bats

    Directory of Open Access Journals (Sweden)

    Danilo Russo

    2016-07-01

    Full Text Available Bats are a biodiverse mammal order providing key ecosystem services such as pest suppression, pollination and seed dispersal. Bats are also very sensitive to human actions, and significant declines in many bat populations have been recorded consequently. Many bat species find crucial roosting and foraging opportunities in European forests. Such forests have historically been exploited by humans and are still influenced by harvesting. One of the consequences of this pressure is the loss of key habitat resources, often making forests inhospitable to bats. Despite the legal protection granted to bats across Europe, the impacts of forestry on bats are still often neglected. Because forest exploitation influences forest structure at several spatial scales, economically viable forestry could become more sustainable and even favour bats. We highlight that a positive future for bat conservation that simultaneously benefits forestry is foreseeable, although more applied research is needed to develop sound management. Key future research topics include the detection of factors influencing the carrying capacity of forests, and determining the impacts of forest management and the economic importance of bats in forests. Predictive tools to inform forest managers are much needed, together with greater synergies between forest managers and bat conservationists.

  15. Magnetic Resonance Spectroscopy: An Objective Modality to Identify the Pathology of Breast Neoplasms

    National Research Council Canada - National Science Library

    Mountford, Carolyn

    1998-01-01

    ... at 8.3 Tesla and the results compared with histopathological and clinical data. The results of the blinded study were compared with currently employed diagnostic approaches used in the assessment of breast lesions...

  16. Buried object detection in GPR images

    Science.gov (United States)

    Paglieroni, David W; Chambers, David H; Bond, Steven W; Beer, W. Reginald

    2014-04-29

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  17. Radiodisinfestation of cultural and religious objects

    International Nuclear Information System (INIS)

    Ritacco, Miguel A.

    2003-01-01

    The ionizing radiation treatment of cultural and religious objects to control the arthropod fauna seems to be a non toxic, non contaminant process that, at the radiation dose needed to control the insects and other arthropods, is not detrimental to the objects. Since 1999 CNEA has been working on the radiodisinfestation of cultural and religious objects. The Laboratory of Radiodisinfestation of the Ezeiza Atomic Center has studied musical instruments, books, religious imagery, oil paintings, embalmed animals, bones, tapestry, clothes and sculptures, to identify the contaminant arthropods and to treat them by ionizing radiation at doses between 3 and 5 kGy in the Semi-Industrial Irradiation Plant of the Center. At present, in addition to these activities, the effects of the radiation on paintings are being studied with the Pratt Institute of New York as well as the radiation effects on different types of fabrics with the University of Buenos Aires. (author)

  18. Basic objects of marketing in project activities

    OpenAIRE

    Онищенко, Світлана Петрівна; Берневек, Тетяна Іванівна

    2013-01-01

    The article identified the main types of a project product from the point of view of a business level that is necessary to determine the specificity of the project marketing. As such objects of marketing - variants of the project product we have singled out: a product, a combination "product-market segment," a commodity group, a strategic business unit, a company. We have analyzed the relation "product life cycle - project-organization" and received a generalized representation of this relati...

  19. Refining Visually Detected Object poses

    DEFF Research Database (Denmark)

    Holm, Preben; Petersen, Henrik Gordon

    2010-01-01

    to the particular object and in order to handle the demand for flexibility, there is an increasing demand for avoiding such dedicated mechanical alignment systems. Rather, it would be desirable to automatically locate and grasp randomly placed objects from tables, conveyor belts or even bins with a high accuracy...

  20. Welding. Performance Objectives. Intermediate Course.

    Science.gov (United States)

    Vincent, Kenneth

    Several intermediate performance objectives and corresponding criterion measures are listed for each of nine terminal objectives for an intermediate welding course. The materials were developed for a 36-week (3 hours daily) course designed to prepare the student for employment in the field of welding. Electric welding and specialized (TIG & MIG)…

  1. Welding. Performance Objectives. Basic Course.

    Science.gov (United States)

    Vincent, Kenneth

    Several intermediate performance objectives and corresponding criterion measures are listed for each of eight terminal objectives for a basic welding course. The materials were developed for a 36-week (2 hours daily) course developed to teach the fundamentals of welding shop work, to become familiar with the operation of the welding shop…

  2. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit

    2016-02-19

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  3. Moving eyes and naming objects

    NARCIS (Netherlands)

    Meulen, F.F. van der

    2001-01-01

    The coordination between eye movements and speech was examined while speakers were naming objects. Earlier research has shown that eye movements reflect on the underlying visual attention. Also, eye movements were found to reflect upon not only the visual and conceptual processing of an object, but

  4. [The Object Permanence Fallacy.] Commentary.

    Science.gov (United States)

    Bradley, Ben S.

    1996-01-01

    Suggests that Greenberg's challenge to the centrality of object permanence in developmental thinking reveals that developmentalists' theories about childhood speak about their own self-images. Notes that developmentalists have been guilty of not only the object permanence fallacy but also the genetic fallacy, or the mistaken belief that describing…

  5. Introducing Object-Oriented Programming

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard

    2008-01-01

    The practice of teaching programming at universities, colleges and high schools went through a major change roughly in the mid 1990s: The teaching of objectorientation in introductory courses slowly became mainstream. Fairly soon, the Object First or Objects Early school of thought was formulated...

  6. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-01

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal

  7. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit; Peterson, Joshua; Khosla, Aditya; Yang, Ming-Hsuan; Ghanem, Bernard

    2016-01-01

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  8. Turbulent wakes of fractal objects

    NARCIS (Netherlands)

    Staicu, A.D.; Mazzi, B.; Vassilicos, J.C.; Water, van de W.

    2003-01-01

    Turbulence of a windtunnel flow is stirred using objects that have a fractal structure. The strong turbulent wakes resulting from three such objects which have different fractal dimensions are probed using multiprobe hot-wire anemometry in various configurations. Statistical turbulent quantities are

  9. Taxonomies of Educational Objective Domain

    OpenAIRE

    Eman Ghanem Nayef; Nik Rosila Nik Yaacob; Hairul Nizam Ismail

    2013-01-01

    This paper highlights an effort to study the educational objective domain taxonomies including Bloom’s taxonomy, Lorin Anderson’s taxonomy, and Wilson’s taxonomy. In this study a comparison among these three taxonomies have been done. Results show that Bloom’s taxonomy is more suitable as an analysis tool to Educational Objective domain.

  10. Exploring Power with Object Theatre

    DEFF Research Database (Denmark)

    Ryöppy, Merja; Ylirisku, Salu; Knutz, Eva

    2017-01-01

    This paper explores Object Theatre as an approach to address power in design. We understand power as a relational activity that emerges and is upheld through particular ways of relating (Elias, 1991; Stacey, 2007). The spontaneity in participant actions through Object Theatre exercises renders pr...

  11. Semantic memory in object use.

    Science.gov (United States)

    Silveri, Maria Caterina; Ciccarelli, Nicoletta

    2009-10-01

    We studied five patients with semantic memory disorders, four with semantic dementia and one with herpes simplex virus encephalitis, to investigate the involvement of semantic conceptual knowledge in object use. Comparisons between patients who had semantic deficits of different severity, as well as the follow-up, showed that the ability to use objects was largely preserved when the deficit was mild but progressively decayed as the deficit became more severe. Naming was generally more impaired than object use. Production tasks (pantomime execution and actual object use) and comprehension tasks (pantomime recognition and action recognition) as well as functional knowledge about objects were impaired when the semantic deficit was severe. Semantic and unrelated errors were produced during object use, but actions were always fluent and patients performed normally on a novel tools task in which the semantic demand was minimal. Patients with severe semantic deficits scored borderline on ideational apraxia tasks. Our data indicate that functional semantic knowledge is crucial for using objects in a conventional way and suggest that non-semantic factors, mainly non-declarative components of memory, might compensate to some extent for semantic disorders and guarantee some residual ability to use very common objects independently of semantic knowledge.

  12. Object Oriented Programming in Director

    Directory of Open Access Journals (Sweden)

    Marian DARDALA

    2006-01-01

    Full Text Available Director is one of the most popular authoring software. As software for developing multimedia applications, Director is an object oriented programming environment. A very important issue to develop multimedia applications is the designing of their own classes. This paper presents the particular aspects concerning the available facilities offered by Lingo to design classes and to generate objects.

  13. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available...

  14. Properties of BL Lac objects

    International Nuclear Information System (INIS)

    Wolfe, A.M.; Pittsburgh, University, Pittsburgh, Pa.)

    1980-01-01

    The properties of BL Lacertae objects are examined in light of their recently realized similarities to quasars and associations with galactic radiation. The criteria typically used to define BL Lac objects are analyzed, with attention given to radio spectra, optical continual, radio and optical variability, optical polarization and emission lines, and evidence that BL Lac objects and optically violent variables represent the most compact and strongly variable sources among the general class of quasars is discussed. Connections between BL Lac objects and the galaxies in which they have been observed to be embedded are discussed and it is pointed out that no low-luminosity quasars have been found to be associated with first-ranked giant ellipticals. Future observations which may clarify the properties and relationships of BL Lac objects are indicated

  15. The Surrealist Collection of Objects

    Directory of Open Access Journals (Sweden)

    Pérez, Leticia

    2010-01-01

    Full Text Available In this article I shall discuss the Surrealist collection of objects as a form of art which arises out of mass production forces of the new era. These goods, deeply rooted in the capitalist laws of use-, exchange- and surplus-value, carry in themselves two materialist approaches which end in dialectical materialism. On the one hand, they epitomize the supreme forces of commodity fetishism ingrained in capitalist structures; on the other hand, they arouse unconscious desires which respond to the needs of the society of consumption. Thus, I will explore the act of object-collecting in the most radical Surrealist practices (dream objects, found objects, poème-objets, calligrammes, readymades and Surrealist objects as a way to not only delve into a new art, but also to reflect on societal ongoing transformations and paradoxes.

  16. Occlusion Handling in Videos Object Tracking: A Survey

    International Nuclear Information System (INIS)

    Lee, B Y; Liew, L H; Cheah, W S; Wang, Y C

    2014-01-01

    Object tracking in video has been an active research since for decades. This interest is motivated by numerous applications, such as surveillance, human-computer interaction, and sports event monitoring. Many challenges related to tracking objects still remain, this can arise due to abrupt object motion, changing appearance patterns of objects and the scene, non-rigid object structures and most significant are occlusion of tracked object be it object-to-object or object-to-scene occlusions. Generally, occlusion in object tracking occur under three situations: self-occlusion, inter-object occlusion by background scene structure. Self-occlusion occurs most frequently while tracking articulated objects when one part of the object occludes another. Inter-object occlusion occurs when two objects being tracked occlude each other whereas occlusion by the background occurs when a structure in the background occludes the tracked objects. Typically, tracking methods handle occlusion by modelling the object motion using linear and non-linear dynamic models. The derived models will be used to continuously predicting the object location when a tracked object is occluded until the object reappears. Example of these method are Kalman filtering and Particle filtering trackers. Researchers have also utilised other features to resolved occlusion, for example, silhouette projections, colour histogram and optical flow. We will present some result from a previously conducted experiment when tracking single object using Kalman filter, Particle filter and Mean Shift trackers under various occlusion situation in this paper. We will also review various other occlusion handling methods that involved using multiple cameras. In a nutshell, the goal of this paper is to discuss in detail the problem of occlusion in object tracking and review the state of the art occlusion handling methods, classify them into different categories, and identify new trends. Moreover, we discuss the important

  17. Occlusion Handling in Videos Object Tracking: A Survey

    Science.gov (United States)

    Lee, B. Y.; Liew, L. H.; Cheah, W. S.; Wang, Y. C.

    2014-02-01

    Object tracking in video has been an active research since for decades. This interest is motivated by numerous applications, such as surveillance, human-computer interaction, and sports event monitoring. Many challenges related to tracking objects still remain, this can arise due to abrupt object motion, changing appearance patterns of objects and the scene, non-rigid object structures and most significant are occlusion of tracked object be it object-to-object or object-to-scene occlusions. Generally, occlusion in object tracking occur under three situations: self-occlusion, inter-object occlusion by background scene structure. Self-occlusion occurs most frequently while tracking articulated objects when one part of the object occludes another. Inter-object occlusion occurs when two objects being tracked occlude each other whereas occlusion by the background occurs when a structure in the background occludes the tracked objects. Typically, tracking methods handle occlusion by modelling the object motion using linear and non-linear dynamic models. The derived models will be used to continuously predicting the object location when a tracked object is occluded until the object reappears. Example of these method are Kalman filtering and Particle filtering trackers. Researchers have also utilised other features to resolved occlusion, for example, silhouette projections, colour histogram and optical flow. We will present some result from a previously conducted experiment when tracking single object using Kalman filter, Particle filter and Mean Shift trackers under various occlusion situation in this paper. We will also review various other occlusion handling methods that involved using multiple cameras. In a nutshell, the goal of this paper is to discuss in detail the problem of occlusion in object tracking and review the state of the art occlusion handling methods, classify them into different categories, and identify new trends. Moreover, we discuss the important

  18. The subjective experience of object recognition: comparing metacognition for object detection and object categorization.

    Science.gov (United States)

    Meuwese, Julia D I; van Loon, Anouk M; Lamme, Victor A F; Fahrenfort, Johannes J

    2014-05-01

    Perceptual decisions seem to be made automatically and almost instantly. Constructing a unitary subjective conscious experience takes more time. For example, when trying to avoid a collision with a car on a foggy road you brake or steer away in a reflex, before realizing you were in a near accident. This subjective aspect of object recognition has been given little attention. We used metacognition (assessed with confidence ratings) to measure subjective experience during object detection and object categorization for degraded and masked objects, while objective performance was matched. Metacognition was equal for degraded and masked objects, but categorization led to higher metacognition than did detection. This effect turned out to be driven by a difference in metacognition for correct rejection trials, which seemed to be caused by an asymmetry of the distractor stimulus: It does not contain object-related information in the detection task, whereas it does contain such information in the categorization task. Strikingly, this asymmetry selectively impacted metacognitive ability when objective performance was matched. This finding reveals a fundamental difference in how humans reflect versus act on information: When matching the amount of information required to perform two tasks at some objective level of accuracy (acting), metacognitive ability (reflecting) is still better in tasks that rely on positive evidence (categorization) than in tasks that rely more strongly on an absence of evidence (detection).

  19. Integrating ergonomics into engineering design: the role of objects.

    Science.gov (United States)

    Hall-Andersen, Lene Bjerg; Broberg, Ole

    2014-05-01

    The objective of this study was to explore the role of objects in integrating ergonomic knowledge in engineering design processes. An engineering design case was analyzed using the theoretical concepts of boundary objects and intermediary objects: Boundary objects facilitate collaboration between different knowledge domains, while the aim of an intermediary object is to circulate knowledge and thus produce a distant effect. Adjustable layout drawings served as boundary objects and had a positive impact on the dialog between an ergonomist and designers. An ergonomic guideline document was identified as an intermediary object. However, when the ergonomic guidelines were circulated in the design process, only some of the guidelines were transferred to the design of the sterile processing plant. Based on these findings, recommendations for working with objects in design processes are included. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  20. Multiparty Compatibility for Concurrent Objects

    Directory of Open Access Journals (Sweden)

    Roly Perera

    2016-06-01

    Full Text Available Objects and actors are communicating state machines, offering and consuming different services at different points in their lifecycle. Two complementary challenges arise when programming such systems. When objects interact, their state machines must be "compatible", so that services are requested only when they are available. Dually, when objects refine other objects, their state machines must be "compliant", so that services are honoured whenever they are promised. In this paper we show how the idea of multiparty compatibility from the session types literature can be applied to both of these problems. We present an untyped language in which concurrent objects are checked automatically for compatibility and compliance. For simple objects, checking can be exhaustive and has the feel of a type system. More complex objects can be partially validated via test cases, leading to a methodology closer to continuous testing. Our proof-of-concept implementation is limited in some important respects, but demonstrates the potential value of the approach and the relationship to existing software development practices.

  1. Conscientious objection in health care

    Directory of Open Access Journals (Sweden)

    Kuře Josef

    2016-12-01

    Full Text Available The paper deals with conscientious objection in health care, addressing the problems of scope, verification and limitation of such refusal, paying attention to ideological agendas hidden behind the right of conscience where the claimed refusal can cause harm or where such a claim is an attempt to impose certain moral values on society or an excuse for not providing health care. The nature of conscientious objection will be investigated and an ethical analysis of conscientious objection will be conducted. Finally some suggestions for health care policy will be proposed.

  2. Object manipulation facilitates kind-based object individuation of shape-similar objects

    DEFF Research Database (Denmark)

    Kingo, Osman Skjold; Krøjgaard, Peter

    2011-01-01

    Five experiments investigated the importance of shape and object manipulation when 12-month-olds were given the task of individuating objects representing exemplars of kinds in an event-mapping design. In Experiments 1 and 2, results of the study from Xu, Carey, and Quint (2004, Experiment 4) wer...

  3. Modulation of the Object/Background Interaction by Spatial Frequency

    Directory of Open Access Journals (Sweden)

    Yanju Ren

    2011-05-01

    Full Text Available With regard to the relationship between object and background perception in the natural scene images, functional isolation hypothesis and interactive hypothesis were proposed. Based on previous studies, the present study investigated the role of spatial frequency in the relationship between object and background perception in the natural scene images. In three experiments, participants reported the object, background, or both after seeing each picture for 500 ms followed by a mask. The authors found that (a backgrounds were identified more accurately when they contained a consistent rather than an inconsistent object, independently of spatial frequency; (b objects were identified more accurately in a consistent than an inconsistent background under the condition of low spatial frequencies but not high spatial frequencies; (c spatial frequency modulation remained when both objects and backgrounds were reported simultaneously. The authors conclude that object/background interaction is partially dependent on spatial frequency.

  4. Tagging partially reconstructed objects with jet substructure

    Energy Technology Data Exchange (ETDEWEB)

    Freytsis, Marat, E-mail: freytsis@uoregon.edu [Department of Physics, Harvard University, Cambridge, MA, 02138 (United States); Volansky, Tomer [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel); Walsh, Jonathan R. [Ernest Orlando Lawrence Berkeley National Laboratory, University of California, Berkeley, CA 94720 (United States); Berkeley Center for Theoretical Physics, University of California, Berkeley, CA 94720 (United States)

    2017-06-10

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  5. Tagging partially reconstructed objects with jet substructure

    International Nuclear Information System (INIS)

    Freytsis, Marat; Volansky, Tomer; Walsh, Jonathan R.

    2017-01-01

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  6. Tagging partially reconstructed objects with jet substructure

    Science.gov (United States)

    Freytsis, Marat; Volansky, Tomer; Walsh, Jonathan R.

    2017-06-01

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  7. Ghost Imaging of Space Objects

    Data.gov (United States)

    National Aeronautics and Space Administration — Ghost imaging is an optical imaging technique that utilizes the correlations between optical fields in two channels. One of the channels contains the object, however...

  8. Delphi FND Application Object Library -

    Data.gov (United States)

    Department of Transportation — Delphi FND Application Object Library contains the following data elements, but are not limited to temporary data tables for the logged in session, information about...

  9. Incremental Visualizer for Visible Objects

    DEFF Research Database (Denmark)

    Bukauskas, Linas; Bøhlen, Michael Hanspeter

    This paper discusses the integration of database back-end and visualizer front-end into a one tightly coupled system. The main aim which we achieve is to reduce the data pipeline from database to visualization by using incremental data extraction of visible objects in a fly-through scenarios. We...... also argue that passing only relevant data from the database will substantially reduce the overall load of the visualization system. We propose the system Incremental Visualizer for Visible Objects (IVVO) which considers visible objects and enables incremental visualization along the observer movement...... path. IVVO is the novel solution which allows data to be visualized and loaded on the fly from the database and which regards visibilities of objects. We run a set of experiments to convince that IVVO is feasible in terms of I/O operations and CPU load. We consider the example of data which uses...

  10. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    binding. Existing languages employ different type systems, and it can be difficult to compare, evaluate and improve them, since there is currently no uniform theory for such languages. This book provides such a theory. The authors review the type systems of Simula, Smalltalk, C++ and Eiffel and present......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity...

  11. Laser sources for object illumination

    Energy Technology Data Exchange (ETDEWEB)

    Albrecht, G.F. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    The considerations which formulate the specifications for a laser illuminator are explained, using the example of an underwater object. Depending on the parameters which define the scenario, widely varying laser requirements result.

  12. Topological objects in hadron physics

    International Nuclear Information System (INIS)

    Rho, M.

    1988-01-01

    The notion of topological objects in hadronic physics is discussed, with emphasis on the role of the Wess-Zumino term and induced transmutation of quantum numbers in chiral bag models. Some applications to nuclear systems are given

  13. On the Aging of Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2016-01-01

    The article seeks to develop a new conceptual framework suitable for analysing the ageing processes of objects in modern culture. The basic intuition is that object experience cannot be analysed separately from collective participation. The article focuses on the question of the ‘timeless’ nature...... of modernist design and seeks to understand why modernist objects age more slowly than other objects. First, inspired by the late Durkheim’s account of symbolism, I turn to the experiential effects of collective embeddedness. Second, I enter the field of architectural practices and architectural theory....... Visiting early modernist ideologue Adolf Loos, I seek to understand the modernist attitude as a direct response to experiences of the acceleration of ageing processes characteristic of modern culture. I then try to show how Loos’s explicit awareness of the collective dimension is ignored by the subsequent...

  14. Experimental Object-Oriented Modelling

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius

    through, e.g., technical prototyping and active user involvement. We introduce and examine “experimental object-oriented modelling” as the intersection of these practices. The contributions of this thesis are expected to be within three perspectives on models and modelling in experimental system...... development: Grounding We develop an empirically based conceptualization of modelling and use of models in system development projects characterized by a high degree of uncertainty in requirements and point to implications for tools and techniques for modelling in such a setting. Techniques We introduce......This thesis examines object-oriented modelling in experimental system development. Object-oriented modelling aims at representing concepts and phenomena of a problem domain in terms of classes and objects. Experimental system development seeks active experimentation in a system development project...

  15. Exotic objects of atomic physics

    Science.gov (United States)

    Eletskii, A. V.

    2017-11-01

    There has been presented a short survey of physical properties, methods of production and exploration as well as directions of practical usage of the objects of atomic physics which are not yet described in detail in modern textbooks and manuals intended for students of technical universities. The family of these objects includes negative and multicharged ions, Rydberg atoms, excimer molecules, clusters. Besides of that, in recent decades this family was supplemented with new nanocarbon structures such as fullerenes, carbon nanotubes and graphene. The textbook “Exotic objects of atomic physics” [1] edited recently contains some information on the above-listed objects of the atomic physics. This textbook can be considered as a supplement to classic courses of atomic physics teaching in technical universities.

  16. Precise object tracking under deformation

    International Nuclear Information System (INIS)

    Saad, M.H

    2010-01-01

    The precise object tracking is an essential issue in several serious applications such as; robot vision, automated surveillance (civil and military), inspection, biomedical image analysis, video coding, motion segmentation, human-machine interface, visualization, medical imaging, traffic systems, satellite imaging etc. This frame-work focuses on the precise object tracking under deformation such as scaling , rotation, noise, blurring and change of illumination. This research is a trail to solve these serious problems in visual object tracking by which the quality of the overall system will be improved. Developing a three dimensional (3D) geometrical model to determine the current pose of an object and predict its future location based on FIR model learned by the OLS. This framework presents a robust ranging technique to track a visual target instead of the traditional expensive ranging sensors. The presented research work is applied to real video stream and achieved high precession results.

  17. First-Class Object Sets

    DEFF Research Database (Denmark)

    Ernst, Erik

    2009-01-01

    Typically, an object is a monolithic entity with a fixed interface.  To increase flexibility in this area, this paper presents first-class object sets as a language construct.  An object set offers an interface which is a disjoint union of the interfaces of its member objects.  It may also be use...... to a mainstream virtual machine in order to improve on the support for family polymorphism.  The approach is made precise by means of a small calculus, and the soundness of its type system has been shown by a mechanically checked proof in Coq....

  18. Superluminal motion of extragalactic objects

    Energy Technology Data Exchange (ETDEWEB)

    Matveenko, L.I. (AN SSSR, Moscow. Inst. Kosmicheskikh Issledovanij)

    1983-07-01

    Extragalactic objects with active nuclei are reviewed. Experimental data are obtained with the method of superfar radiointerferometry. The main peculiarities of the complex structure of Seyfert galaxies, quasars and lacertae objects are considered: the distribution of radiobrightness, spectra, alteration of the density of radiation flux and the distance between the components of sources. The superluminal velocities of component divergence observed are explained by different reasons: fast motion of components considerable difference of the Hubble component or non-cosmologic nature of the red shift of objects, effect of echoreflection of radiation, gravitation lens, systematic alteration of the optical thickness of the object, synchronouys radiation of electrons in the dipole magnetic field, as well as different kinematic illusions connected with the final time of signal propagation.

  19. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  20. Stream Clustering of Growing Objects

    Science.gov (United States)

    Siddiqui, Zaigham Faraz; Spiliopoulou, Myra

    We study incremental clustering of objects that grow and accumulate over time. The objects come from a multi-table stream e.g. streams of Customer and Transaction. As the Transactions stream accumulates, the Customers’ profiles grow. First, we use an incremental propositionalisation to convert the multi-table stream into a single-table stream upon which we apply clustering. For this purpose, we develop an online version of K-Means algorithm that can handle these swelling objects and any new objects that arrive. The algorithm also monitors the quality of the model and performs re-clustering when it deteriorates. We evaluate our method on the PKDD Challenge 1999 dataset.

  1. Precise Object Tracking under Deformation

    International Nuclear Information System (INIS)

    Saad, M.H.

    2010-01-01

    The precise object tracking is an essential issue in several serious applications such as; robot vision, automated surveillance (civil and military), inspection, biomedical image analysis, video coding, motion segmentation, human-machine interface, visualization, medical imaging, traffic systems, satellite imaging etc. This framework focuses on the precise object tracking under deformation such as scaling, rotation, noise, blurring and change of illumination. This research is a trail to solve these serious problems in visual object tracking by which the quality of the overall system will be improved. Developing a three dimensional (3D) geometrical model to determine the current pose of an object and predict its future location based on FIR model learned by the OLS. This framework presents a robust ranging technique to track a visual target instead of the traditional expensive ranging sensors. The presented research work is applied to real video stream and achieved high precession results. xiiiThe precise object tracking is an essential issue in several serious applications such as; robot vision, automated surveillance (civil and military), inspection, biomedical image analysis, video coding, motion segmentation, human-machine interface, visualization, medical imaging, traffic systems, satellite imaging etc. This framework focuses on the precise object tracking under deformation such as scaling, rotation, noise, blurring and change of illumination. This research is a trail to solve these serious problems in visual object tracking by which the quality of the overall system will be improved. Developing a three dimensional (3D) geometrical model to determine the current pose of an object and predict its future location based on FIR model learned by the OLS. This framework presents a robust ranging technique to track a visual target instead of the traditional expensive ranging sensors. The presented research work is applied to real video stream and achieved high

  2. Well-Being and Objectivity

    Directory of Open Access Journals (Sweden)

    Jakub Bożydar Wiśniewski

    2011-03-01

    Full Text Available In this paper, I investigate the issue of whether there exists an objective element of well-being, completely independent of anyone’s desires, interests and preferences. After rejecting health-based and convention-based approaches to objectivity, I conclude that the element in question consists in respecting autonomy, voluntariness of every purposive agent and the principle of non-aggression.

  3. SPARQL-enabled identifier conversion with Identifiers.org

    Science.gov (United States)

    Wimalaratne, Sarala M.; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-01-01

    Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. Results: We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. Availability and implementation: The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. Contact: sarala@ebi.ac.uk PMID:25638809

  4. SPARQL-enabled identifier conversion with Identifiers.org.

    Science.gov (United States)

    Wimalaratne, Sarala M; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-06-01

    On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. © The Author 2015. Published by Oxford University Press.

  5. Identifying Relevant Studies in Software Engineering

    DEFF Research Database (Denmark)

    Zhang, He; Ali Babar, Muhammad; Tell, Paolo

    2011-01-01

    Context: Systematic literature review (SLR) has become an important research methodology in software engineering since the introduction of evidence-based software engineering (EBSE) in 2004. One critical step in applying this methodology is to design and execute appropriate and effective search....... Objective: The main objective of the research reported in this paper is to improve the search step of undertaking SLRs in software engineering (SE) by devising and evaluating systematic and practical approaches to identifying relevant studies in SE. Method: We have systematically selected and analytically...

  6. Training Objectives for Tank Platoon Leaders Covering Tasks Performed during Four Armor Operations

    Science.gov (United States)

    1983-01-01

    screens to conceal their movement to covered and concealed positions. The M250 grenade launcher consists of two six-barreled dischargers wired for two...generates smoke by the injestion of fuel onto the hot engine exhaust system. The smoke screen generated by VEESS is used to compli- ment the M250 smoke...grenade system by reinforcing and sustaining the screen created by the M250 system. The purpose of the smoke producing systems is to make it more

  7. DETERMINATION OF OBJECTIVES FOR URBAN FREIGHT POLICY

    Directory of Open Access Journals (Sweden)

    Daniel Kaszubowski

    2014-12-01

    Full Text Available Background: Decisions regarding strategic planning of urban freight transport very often are based on superficial assumptions inadequately reflecting the actual character of encountered challenges. The trend may be observed to adapt isolated solutions without supporting measures and verification of expected outcomes. Selected urban freight solutions have a significant potential to alleviate transport related problems, but they require unorthodox approach beyond standard traffic planning and road management. City's current planning experience must be taken into account to plan an optimized sequence of actions. Method: Due to complexity of the problem and specific decision making factors the analytic network process ANP was selected to determine relevant objective of the urban freight policy. Gdynia was selected as the subject for modeling with a review of the current freight planning practice as a first step. Then, classification of policy objective and their prerequisites were identified supported with descriptive feasibility assessment. This allowed for a development of the ANP decision-making model. Results: Considered objectives for urban freight policy were identified were optimization, reduction and transfer. After verifying relevant decision factors optimization was selected as the most feasible option for Gdynia. Other alternatives were rated around four times lower with a slight prevalence of reduction over transfer. Such ranking reflects current planning practice and availability of transferable experiences. Despite the indicative results, it must be stressed that urban freight planning should be based on the long term methodical approach not to exclude any emerging possibilities. 

  8. Testing Object-Oriented Software

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard; Madsen, Ole Lehrmann; Skov, Stefan H.

    The report is a result of an activity within the project Centre for Object Technology (COT), case 2. In case 2 a number of pilot projects have been carried out to test the feasibility of using object technology within embedded software. Some of the pilot projects have resulted in proto-types that......The report is a result of an activity within the project Centre for Object Technology (COT), case 2. In case 2 a number of pilot projects have been carried out to test the feasibility of using object technology within embedded software. Some of the pilot projects have resulted in proto......-types that are currently being developed into production versions. To assure a high quality in the product it was decided to carry out an activ-ity regarding issues in testing OO software. The purpose of this report is to discuss the issues of testing object-oriented software. It is often claimed that testing of OO...... software is radically different form testing traditional software developed using imperative/procedural programming. Other authors claim that there is no difference. In this report we will attempt to give an answer to these questions (or at least initiate a discussion)....

  9. Object Pragmatics and Language Development.

    Science.gov (United States)

    Béguin, Marie

    2016-12-01

    The purpose of this contribution is to investigate the advent of language in the light of the appropriation of the cultural uses of the material objects related to material culture and the constitution of their public and shared meanings linked to their uses. First, we suggest that the Object Pragmatics paradigm offers a framework which allows us to take into account the uses of objects in daily life as a site of social conventions, communication and public and shared meanings. Second, we would like to underline the key role of the adult's mediations in the child's ability to evolve towards linguistic development. This contribution will discuss the notion of scenario involving primarily the object, as a possible semiotic tool to support the child's transition to language. We will finally illustrate that it is possible to take into consideration the mastery of conventional uses of the object in the child's ability to engage in a scenario and then to move towards communication and speech development. These issues will be addressed in the context of a research project which focuses on the observation of children interacting with an adult at 16, 20 and 24 months. These longitudinal data were collected by video in a semi-experimental triadic interaction design. The triadic interaction is considered as a relevant unit for the observation and analysis of the role of material culture in speech development, suggesting the existence of new mechanisms to be taken into account in addition to the interactive conditions largely mentioned in literature.

  10. The OKS persistent in-memory object manager

    International Nuclear Information System (INIS)

    Jones, R.; Mapelli, L.; Soloviev, I.

    1998-01-01

    The OKS (Object Kernel Support) is a library to support a simple, active persistent in-memory object manager. It is suitable for applications which need to create persistent structured information with fast access but do not require full database functionality. It can be used as the frame of configuration databases and real-time object managers for Data Acquisition and Detector Control Systems in such fields as setup, diagnostics and general configuration description. OKS is based on an object model that supports objects, classes, associations, methods, inheritance, polymorphism, object identifiers, composite objects, integrity constraints, schema evolution, data migration and active notification. OKS stores the class definitions and their instances in portable ASCII files. It provides query facilities, including indices support. The OKS has a C++ API (Application Program Interface) and includes Motif based GUI applications to design class schema and to manipulate objects. OKS has been developed on top of the Rogue Wave Tools h++ C++ class library

  11. RTDB: A memory resident real-time object database

    International Nuclear Information System (INIS)

    Nogiec, Jerzy M.; Desavouret, Eugene

    2003-01-01

    RTDB is a fast, memory-resident object database with built-in support for distribution. It constitutes an attractive alternative for architecting real-time solutions with multiple, possibly distributed, processes or agents sharing data. RTDB offers both direct and navigational access to stored objects, with local and remote random access by object identifiers, and immediate direct access via object indices. The database supports transparent access to objects stored in multiple collaborating dispersed databases and includes a built-in cache mechanism that allows for keeping local copies of remote objects, with specifiable invalidation deadlines. Additional features of RTDB include a trigger mechanism on objects that allows for issuing events or activating handlers when objects are accessed or modified and a very fast, attribute based search/query mechanism. The overall architecture and application of RTDB in a control and monitoring system is presented

  12. Object technology: A white paper

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, S.R.; Arrowood, L.F.; Cain, W.D.; Stephens, W.M.; Vickers, B.D.

    1992-05-11

    Object-Oriented Technology (OOT), although not a new paradigm, has recently been prominently featured in the trade press and even general business publications. Indeed, the promises of object technology are alluring: the ability to handle complex design and engineering information through the full manufacturing production life cycle or to manipulate multimedia information, and the ability to improve programmer productivity in creating and maintaining high quality software. Groups at a number of the DOE facilities have been exploring the use of object technology for engineering, business, and other applications. In this white paper, the technology is explored thoroughly and compared with previous means of developing software and storing databases of information. Several specific projects within the DOE Complex are described, and the state of the commercial marketplace is indicated.

  13. Exploring object-oriented technologies

    CERN Multimedia

    2000-01-01

    Object oriented technologies are the corner stone of modern software development. A piece of software is today conceived, constructed and tested as a set of objects interacting with each other, rather than as a large sequential program. OO is present throughout the whole software life cycle allowing for maintainable code re-use, clean design and manageable complexity. OO is also the seed upon which other technologies are being built and deployed, such as distributed computing, component models, open interoperability, etc.This series of three seminars will provide a pragmatic overview on the main ideas behind OO software development and will explain the inner workings of the most outstanding technologies being built on OO, such as UML, CORBA, Component Models, Agent Oriented Computing, Business Objects, etc.

  14. Acoustic Characterization of Mesoscale Objects

    Energy Technology Data Exchange (ETDEWEB)

    Chinn, D; Huber, R; Chambers, D; Cole, G; Balogun, O; Spicer, J; Murray, T

    2007-03-13

    This report describes the science and engineering performed to provide state-of-the-art acoustic capabilities for nondestructively characterizing mesoscale (millimeter-sized) objects--allowing micrometer resolution over the objects entire volume. Materials and structures used in mesoscale objects necessitate the use of (1) GHz acoustic frequencies and (2) non-contacting laser generation and detection of acoustic waves. This effort demonstrated that acoustic methods at gigahertz frequencies have the necessary penetration depth and spatial resolution to effectively detect density discontinuities, gaps, and delaminations. A prototype laser-based ultrasonic system was designed and built. The system uses a micro-chip laser for excitation of broadband ultrasonic waves with frequency components reaching 1.0 GHz, and a path-stabilized Michelson interferometer for detection. The proof-of-concept for mesoscale characterization is demonstrated by imaging a micro-fabricated etched pattern in a 70 {micro}m thick silicon wafer.

  15. Superluminal motion of extragalactic objects

    International Nuclear Information System (INIS)

    Matveenko, L.I.

    1983-01-01

    Extragalactic objects with active nuclei are reviewed. Experimental data are obtained with the method of superfar radiointerferometry. The main peculiarities of the complex strUcture of Seyfert galaxies quasars and lacertae ob ects are considered: the distribution of radiobrightness, spectra, alteration of the density of radiation flux and the distance between the components of sources. The superluminal velocities of component divergence observed are explained by different reasons: fast motion of components considerable difference of the Hubble component or non-cosmologic nature of the red shift of objects, effect of echoreflection of radiation, gravitation lens, systematic alteration of the optical thickness of the object, synchronoUs radiation of electrons in the dipole magnetic field, as well as different kinematic illusions connected with the final time of signal propagation

  16. Elaborazione didattica di Learning Objects.

    Directory of Open Access Journals (Sweden)

    Luigi Guerra

    2006-01-01

    Full Text Available L’idea di un modello didattico problematico per la realizzazione di Learning Objects riprende i temi del problematicismo pedagogico e si impegna a definire un’ipotesi formativa complessa capace di valorizzare la possibile positiva compresenza integrata di strategie didattiche diverse (finanche antitetiche ma componibili in una logica appunto di matrice problematicista. Il punto di partenza del modello proposto è rappresentato dalla opportunità di definire tre tipologie fondamentali di Learning Objects, rispettivamente centrati sull’oggetto, sul processo e sul soggetto dell’apprendimento.

  17. TACTILE SENSING FOR OBJECT IDENTIFICATION

    DEFF Research Database (Denmark)

    Drimus, Alin; Marian, Nicolae; Bilberg, Arne

    2009-01-01

    The artificial sense of touch is a research area that can be considered still in demand, compared with the human dexterity of grasping a wide variety of shapes and sizes, perform complex tasks, and switch between grasps in response to changing task requirements. For handling unknown objects...... in unstructured environments, tactile sensing can provide more than valuable to complementary vision information about mechanical properties such as recognition and characterization, force, pressure, torque, compliance, friction, and mass as well as object shape, texture, position and pose. In this paper, we...

  18. Object oriented JavaScript

    CERN Document Server

    Stefanov, Stoyan

    2013-01-01

    You will first be introduced to object-oriented programming, then to the basics of objects in JavaScript. This book takes a do-it-yourself approach when it comes to writing code, because the best way to really learn a programming language is by writing code. You are encouraged to type code into Firebug's console, see how it works and then tweak it and play around with it. There are practice questions at the end of each chapter to help you review what you have learned.For new to intermediate JavaScript developer who wants to prepare themselves for web development problems solved by smart JavaSc

  19. Board characteristics, governance objectives, and hospital performance

    DEFF Research Database (Denmark)

    Thiel, Andrea; Winter, Vera; Büchner, Vera Antonia

    2018-01-01

    membership relates to board characteristics and financial performance. METHODOLOGY: Using factor analysis, we identify latent classes of governance objectives and use hierarchical cluster analysis to detect distinct clusters with varying emphasis on the classes. We then use multinomial regression to explore...... the associations between cluster membership and board characteristics (size, gender diversity, and occupational diversity) and examine the associations between clusters and financial performance using OLS regression. RESULTS: Classes of objectives reflecting three governance theories-agency theory, stewardship...... and hospital financial performance, with two of three groups performing significantly better than the reference group. CONCLUSION: High performance in hospitals can be the result of governance logics, which, compared to simple board characteristics, are associated with better financial outcomes. PRACTICE...

  20. Object extraction in photogrammetric computer vision

    Science.gov (United States)

    Mayer, Helmut

    This paper discusses state and promising directions of automated object extraction in photogrammetric computer vision considering also practical aspects arising for digital photogrammetric workstations (DPW). A review of the state of the art shows that there are only few practically successful systems on the market. Therefore, important issues for a practical success of automated object extraction are identified. A sound and most important powerful theoretical background is the basis. Here, we particularly point to statistical modeling. Testing makes clear which of the approaches are suited best and how useful they are for praxis. A key for commercial success of a practical system is efficient user interaction. As the means for data acquisition are changing, new promising application areas such as extremely detailed three-dimensional (3D) urban models for virtual television or mission rehearsal evolve.

  1. Architectural Implications for Spatial Object Association Algorithms*

    Science.gov (United States)

    Kumar, Vijay S.; Kurc, Tahsin; Saltz, Joel; Abdulla, Ghaleb; Kohn, Scott R.; Matarazzo, Celeste

    2013-01-01

    Spatial object association, also referred to as crossmatch of spatial datasets, is the problem of identifying and comparing objects in two or more datasets based on their positions in a common spatial coordinate system. In this work, we evaluate two crossmatch algorithms that are used for astronomical sky surveys, on the following database system architecture configurations: (1) Netezza Performance Server®, a parallel database system with active disk style processing capabilities, (2) MySQL Cluster, a high-throughput network database system, and (3) a hybrid configuration consisting of a collection of independent database system instances with data replication support. Our evaluation provides insights about how architectural characteristics of these systems affect the performance of the spatial crossmatch algorithms. We conducted our study using real use-case scenarios borrowed from a large-scale astronomy application known as the Large Synoptic Survey Telescope (LSST). PMID:25692244

  2. Connection-based and object-based grouping in multiple-object tracking: A developmental study.

    Science.gov (United States)

    Van der Hallen, Ruth; Reusens, Julie; Evers, Kris; de-Wit, Lee; Wagemans, Johan

    2018-03-30

    Developmental research on Gestalt laws has previously revealed that, even as young as infancy, we are bound to group visual elements into unitary structures in accordance with a variety of organizational principles. Here, we focus on the developmental trajectory of both connection-based and object-based grouping, and investigate their impact on object formation in participants, aged 9-21 years old (N = 113), using a multiple-object tracking paradigm. Results reveal a main effect of both age and grouping type, indicating that 9- to 21-year-olds are sensitive to both connection-based and object-based grouping interference, and tracking ability increases with age. In addition to its importance for typical development, these results provide an informative baseline to understand clinical aberrations in this regard. Statement of contribution What is already known on this subject? The origin of the Gestalt principles is still an ongoing debate: Are they innate, learned over time, or both? Developmental research has revealed how each Gestalt principle has its own trajectory and unique relationship to visual experience. Both connectedness and object-based grouping play an important role in object formation during childhood. What does this study add? The study identifies how sensitivity to connectedness and object-based grouping evolves in individuals, aged 9-21 years old. Using multiple-object tracking, results reveal that the ability to track multiple objects increases with age. These results provide an informative baseline to understand clinical aberrations in different types of grouping. © 2018 The Authors. British Journal of Developmental Psychology published by John Wiley & Sons Ltd on behalf of British Psychological Society.

  3. Object-Oriented Type Inference

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    1991-01-01

    We present a new approach to inferring types in untyped object-oriented programs with inheritance, assignments, and late binding. It guarantees that all messages are understood, annotates the program with type information, allows polymorphic methods, and can be used as the basis of an op...

  4. Interaction between beans and objects

    International Nuclear Information System (INIS)

    Farias, J.T.

    1988-01-01

    The interaction between the X-ray beans and objects are studied, with the modification in the intensity. The kilovolt, the bundle filtration, the structure and composition of the patient and the quantity of scattered radiation are also described, as the main parameters for the contrast and for the dose of the patient. (C.G.C.) [pt

  5. Photogrammetric Measurements of Heritage Objects

    Science.gov (United States)

    Tumeliene, E.; Nareiko, V.; Suziedelyte Visockiene, J.

    2017-12-01

    Cultural heritage is an invaluable example of human culture and creativity. The majority of them can become unstable or can be destroyed due to a combination of human and natural disturbances. In order to restore, preserve, and systematize data about architectural heritage objects, it is necessary to have geodetic, photogrammetric measurements of such data and to constantly monitor condition of the objects. The data of immovable cultural objects for many years are stored in photogrammetric data archives. Such archives have Germany, Lithuania, England and other countries. The article gives a brief introduction of the history of data archives formation and presents a photogrammetric and modern methods of modelling the spatial geometric properties of objects currently used to reveal immovable cultural properties and to evaluate geometric sizes. The pilot work was done with the Concept Capture simulation program that was developed by the Bentley company with photos of the Blessed Virgin Mary painting in Pivašiūnai of Trakai district. A shot from the ground with 12.4 MP resolution Pentax K-x camera was done using lenses with different focal lengths. The painting of the Blessed Virgin Mary is coordinated by 4 reference geodesic points and therefore after the modelling work it was possible to evaluate the accuracy of the created model. Based on the results of the spatial (3D) model, photo shooting and modelling recommendations are presented, the advantages of the new technology are distinguished.

  6. Michael Beitz: Objects of Communication

    Science.gov (United States)

    Hoefferle, Mary

    2014-01-01

    For this Instructional Resource, the author interviewed contemporary sculptor Michael Beitz, who uses art to explore the role of designed objects in human communication and emotional experience. This column was written in response to calls for using Enduring Understandings/Big Ideas (National Coalition for Core Arts Standards, 2013; Stewart &…

  7. Managed Objects for Infrastructure Data

    DEFF Research Database (Denmark)

    Kjems, Erik; Bodum, Lars; Kolar, Jan

    2009-01-01

    Using data objects to describe features in the real world is a new idea and several approaches have already been shown to match scientific paradigms exceedingly well. Depending on the required level of abstraction, it is possible to represent the world more or less close to reality. In the realm ...

  8. Subjectivity, objectivity, and triangular space.

    Science.gov (United States)

    Britton, Ronald

    2004-01-01

    The author reviews his ideas on subjectivity, objectivity, and the third position in the psychoanalytic encounter, particularly in clinical work with borderline and narcissistic patients. Using the theories of Melanie Klein and Wilfred Bion as a basis, the author describes his concept of triangular space. A case presentation of a particular type of narcissistic patient illustrates the principles discussed.

  9. Quantitative Nuclear Cardiology: How objective?

    International Nuclear Information System (INIS)

    Crawley, J.C.W.; Raval, U.; Soman, P.; Lahiri, A.

    1997-01-01

    The object of this study was to establish the accuracy required from the operator in indicating the centre and axis the left ventricle, and in placing regions of interest (ROIs), whilst using the MYO TOMO and MYO QUANT software to analyze tomographic data from nuclear cardiology

  10. Teachers' Careers: The Objective Dimension.

    Science.gov (United States)

    Evetts, Julia

    1986-01-01

    Analyzes the objective dimension of teachers' careers showing how 530 British male/female teachers are distributed throughout the pay scale and promotions making up the formal structure of teaching. Indicates length of experience is the rewarding but not the sole factor in bureaucratic structure and differential male/female career achievements.…

  11. Compact objects and accretion disks

    NARCIS (Netherlands)

    Blandford, Roger; Agol, Eric; Broderick, Avery; Heyl, Jeremy; Koopmans, Leon; Lee, Hee-Won

    2002-01-01

    Recent developments in the spectropolarimetric study of compact objects, specifically black holes (stellar and massive) and neutron stars are reviewed. The lectures are organized around five topics: disks, jets, outflows, neutron stars and black holes. They emphasize physical mechanisms and are

  12. The Objective of Financial Reporting.

    Science.gov (United States)

    Schermann, Kenneth R.

    1986-01-01

    Alerts public school business officials to a financial reporting concepts statement to be issued by the Governmental Accounting Standards Board in late 1986. The new directive will outline four objectives concerned with accountability procedures, resource management and compliance information, operating results, and future financial capabilities.…

  13. Objective consensus from decision trees

    International Nuclear Information System (INIS)

    Putora, Paul Martin; Panje, Cedric M; Papachristofilou, Alexandros; Pra, Alan Dal; Hundsberger, Thomas; Plasswilm, Ludwig

    2014-01-01

    Consensus-based approaches provide an alternative to evidence-based decision making, especially in situations where high-level evidence is limited. Our aim was to demonstrate a novel source of information, objective consensus based on recommendations in decision tree format from multiple sources. Based on nine sample recommendations in decision tree format a representative analysis was performed. The most common (mode) recommendations for each eventuality (each permutation of parameters) were determined. The same procedure was applied to real clinical recommendations for primary radiotherapy for prostate cancer. Data was collected from 16 radiation oncology centres, converted into decision tree format and analyzed in order to determine the objective consensus. Based on information from multiple sources in decision tree format, treatment recommendations can be assessed for every parameter combination. An objective consensus can be determined by means of mode recommendations without compromise or confrontation among the parties. In the clinical example involving prostate cancer therapy, three parameters were used with two cut-off values each (Gleason score, PSA, T-stage) resulting in a total of 27 possible combinations per decision tree. Despite significant variations among the recommendations, a mode recommendation could be found for specific combinations of parameters. Recommendations represented as decision trees can serve as a basis for objective consensus among multiple parties

  14. Objective techniques for psychological assessment

    Science.gov (United States)

    Wortz, E.; Hendrickson, W.; Ross, T.

    1973-01-01

    A literature review and a pilot study are used to develop psychological assessment techniques for determining objectively the major aspects of the psychological state of an astronaut. Relationships between various performance and psychophysiological variables and between those aspects of attention necessary to engage successfully in various functions are considered in developing a paradigm to be used for collecting data in manned isolation chamber experiments.

  15. Fast and Objective MRTD measurement

    NARCIS (Netherlands)

    Jong, A.N. de; Bakker, S.J.M.

    1988-01-01

    Manufacturers and Users of the Thermal Imagers have spent very much time upon the definition and measurement of the generally accepted performance curve: MRTD (Minimum Resolvable Temperature Difference). The need for a cheap and fast, objective measurement method has considerably increased since the

  16. Objective consensus from decision trees.

    Science.gov (United States)

    Putora, Paul Martin; Panje, Cedric M; Papachristofilou, Alexandros; Dal Pra, Alan; Hundsberger, Thomas; Plasswilm, Ludwig

    2014-12-05

    Consensus-based approaches provide an alternative to evidence-based decision making, especially in situations where high-level evidence is limited. Our aim was to demonstrate a novel source of information, objective consensus based on recommendations in decision tree format from multiple sources. Based on nine sample recommendations in decision tree format a representative analysis was performed. The most common (mode) recommendations for each eventuality (each permutation of parameters) were determined. The same procedure was applied to real clinical recommendations for primary radiotherapy for prostate cancer. Data was collected from 16 radiation oncology centres, converted into decision tree format and analyzed in order to determine the objective consensus. Based on information from multiple sources in decision tree format, treatment recommendations can be assessed for every parameter combination. An objective consensus can be determined by means of mode recommendations without compromise or confrontation among the parties. In the clinical example involving prostate cancer therapy, three parameters were used with two cut-off values each (Gleason score, PSA, T-stage) resulting in a total of 27 possible combinations per decision tree. Despite significant variations among the recommendations, a mode recommendation could be found for specific combinations of parameters. Recommendations represented as decision trees can serve as a basis for objective consensus among multiple parties.

  17. How Medical Students Use Objectives.

    Science.gov (United States)

    Mast, Terrill A.; And Others

    Two related studies were undertaken at Southern Illinois University on how students in the School of Medicine use the instructional objectives faculty prepare for them. Students in the classes of 1978 and 1979 were surveyed in their final month of training. The second survey was modified, based on responses from the first. The five research…

  18. 'Shelter' object safety. Structural aspects

    International Nuclear Information System (INIS)

    Krivosheev, P.I.; Nemchinov, Yu.I.; Bambura, A.N.; Sokolov, A.P.; Shenderovich, V.Ya.; Vasyagin, R.V.; Klyuchnikov, A.A.; Shcherbin, V.N.; Rud'ko, V.M.; Tokarevskij, V.V.; Belousov, E.L.; Khejger, D.; Gorodetskij, L.

    2001-01-01

    In 1997 the group of the international experts including Ukrainian organizations and 'Shelter' Object ChNPP are developed the plan of SO transformation into ecological safe status (plan SIP). The realization of the plan was carried out on basis of international tender. The results of structural aspects of SO safety and it transformation into ecological safe state (ESS) are resented in this report

  19. Recurrent processing during object recognition

    Directory of Open Access Journals (Sweden)

    Randall C. O'Reilly

    2013-04-01

    Full Text Available How does the brain learn to recognize objects visually, and perform this difficult feat robustly in the face of many sources of ambiguity and variability? We present a computational model based on the biology of the relevant visual pathways that learns to reliably recognize 100 different object categories in the face of of naturally-occurring variability in location, rotation, size, and lighting. The model exhibits robustness to highly ambiguous, partially occluded inputs. Both the unified, biologically plausible learning mechanism and the robustness to occlusion derive from the role that recurrent connectivity and recurrent processing mechanisms play in the model. Furthermore, this interaction of recurrent connectivity and learning predicts that high-level visual representations should be shaped by error signals from nearby, associated brain areas over the course of visual learning. Consistent with this prediction, we show how semantic knowledge about object categories changes the nature of their learned visual representations, as well as how this representational shift supports the mapping between perceptual and conceptual knowledge. Altogether, these findings support the potential importance of ongoing recurrent processing throughout the brain's visual system and suggest ways in which object recognition can be understood in terms of interactions within and between processes over time.

  20. Design of object processing systems

    NARCIS (Netherlands)

    Grigoras, D.R.; Hoede, C.

    Object processing systems are met rather often in every day life, in industry, tourism, commerce, etc. When designing such a system, many problems can be posed and considered, depending on the scope and purpose of design. We give here a general approach which involves graph theory, and which can