WorldWideScience

Sample records for personal identification numbers

  1. Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

    Directory of Open Access Journals (Sweden)

    Mun-Kyu Lee

    2016-01-01

    Full Text Available Passwords and personal identification numbers (PINs are convenient and ubiquitous, but they are quite vulnerable to attackers who stand near the user (“shoulder-surfers”. This problem may be partially resolved by changing the user interface, but previous solutions of this kind still give shoulder-surfing attackers a significant advantage over brute force search. This paper provides a novel solution based on three dimensions, particularly suitable for glasses-free three-dimensional (3D displays found in many smartphones and handheld game consoles. A user at the “3D spot” may log in easily, while nearby shoulder-surfers gain no advantage. A detailed experimental usability analysis is performed to demonstrate the effectiveness of the proposed scheme in comparison to the existing methods.

  2. Unique Physician Identification Number (UPIN) Directory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Unique Physician Identification Number (UPIN) Directory contains selected information on physicians, doctors of Osteopathy, limited licensed practitioners and...

  3. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  4. Fuel number identification method and device

    International Nuclear Information System (INIS)

    Doi, Takami; Seno, Makoto; Kikuchi, Takashi; Sakamoto, Hiromi; Takahashi, Masaki; Tanaka, Keiji.

    1997-01-01

    The present invention provides a method of and a device for automatically identifying fuel numbers impressed on fuel assemblies disposed in a fuel reprocessing facility, power plant and a reactor core at a high speed and at a high identification rate. Namely, three or more character images are photographed for one fuel assembly as an object of the identification under different illumination conditions. As a result, different character images by the number of the illumination directions can be obtained for identical impressed characters. Learning on a neural network system is applied to the images of all of the characters impressed on the fuel assembly obtained under illumination of predetermined directions. Then, result of the identification by the number of the illumination directions can be obtained for each of the characters as an object of the identification. As a result, since the result of the identification is determined based on a theory of decision of majority, highly automatic identification can be realized. (I.S.)

  5. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Abstract. Reliable person identification is a key factor for any safety measure. Unlike other biometrics such as the palm, retina, gait, face and fingerprints, the characteristic of the iris is stable in a person's lifetime. Iris patterns are chaotically distributed and well suited for recognizing persons throughout their lifetime with.

  6. Fuel number identification method and device therefor

    International Nuclear Information System (INIS)

    Doi, Takami; Seno, Makoto; Tanaka, Keiji

    1998-01-01

    The present invention provides a method of and a device for automatically identifying the number on the upper surface of a fuel of a fuel assembly in a PWR type reactor. Namely, the number on the upper surface of the fuel assembly of the PWR is not arranged in a row, but indent letters are dispersed to predetermined positions of the surface to be indented. Accordingly, the identification of letters is difficult. In the present invention, the letters are identified by the following procedures. Procedure (1): the letters are detected while having a corner portion of the upper surface of a fuel assembly where the number is indented as characteristic points. A procedure (2): a letter region is determined to a relative position based on the characteristic points while determining indent letters having the same direction as one group. A procedure (3): a letter identification treatment is applied to the letter images in the above-mentioned letter region to identify them. A neural network is used for the letter identification treatment. (N.H.)

  7. 33 CFR 181.25 - Hull identification number format.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification number format... (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.25 Hull identification number format. Each of the hull identification numbers required by § 181.23 must consist of twelve...

  8. 33 CFR 181.29 - Hull identification number display.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification number... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.29 Hull identification number display. Two identical hull identification numbers are required to be displayed on each...

  9. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  10. Personal identification and sex determination using cheiloscopy

    Directory of Open Access Journals (Sweden)

    Ravindra Naik Gugulothu

    2015-01-01

    Full Text Available Introduction: Identification of an individual is a prerequisite for certification of death and for personal, social, and legal reasons. The study of lip prints (cheiloscopy was thought of as a method of identification of a person. It is safe to assume that cheiloscopy, in its present stage of development, has become a means of criminal identification dealing with lip prints. Aims and Objectives: To evaluate the lip prints of different individuals in various parts of the lip, to find out the incidence of any particular pattern in relation to specific gender, to ascertain the authenticity of lip prints as a tool for identification of an individual and establish its evidentiary value. Materials and Methods: The study was conducted on 500 subjects, which included 250 males (4 twins and 250 females, in the age group of 18-30 years. After application of lipstick evenly, the lip print of each subject was obtained on a simple bond paper. The lip prints of each individual were scanned using an image scanner set at a resolution of 600 dpi for better interpretation. Results: We had correctly matched the gender of 487 individuals out of 500 samples taken. We also found that no lip prints were similar among the 500 subjects and even in twins. Interpretation and Conclusion: Along with other traditional methods, cheiloscopy can also serve as a very important tool in the identification of a person based on the characteristic arrangement of lines and grooves appearing on the red portion of the lips. It can be used for sex determination and personal identification for forensic purposes.

  11. [Personal identification with biometric and genetic methods].

    Science.gov (United States)

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  12. 33 CFR 181.23 - Hull identification numbers required.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification numbers... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.23 Hull... identify each boat produced or imported with two hull identification numbers that meet the requirements of...

  13. 19 CFR 24.5 - Filing identification number.

    Science.gov (United States)

    2010-04-01

    ... TREASURY CUSTOMS FINANCIAL AND ACCOUNTING PROCEDURE § 24.5 Filing identification number. (a) Generally..., the Social Security number. (2) If neither an Internal Revenue Service employer identification number nor a Social Security number has been assigned, the word “None” shall be written on the line provided...

  14. 78 FR 26244 - Updating of Employer Identification Numbers

    Science.gov (United States)

    2013-05-06

    ... Number, or EIN. Employers are required to know the identity of their responsible party. The amount of...-BK02 Updating of Employer Identification Numbers AGENCY: Internal Revenue Service (IRS), Treasury... assigned an employer identification number (EIN) to provide updated information to the IRS in the manner...

  15. The cognitive neuroscience of person identification.

    Science.gov (United States)

    Biederman, Irving; Shilowich, Bryan E; Herald, Sarah B; Margalit, Eshed; Maarek, Rafael; Meschke, Emily X; Hacker, Catrina M

    2018-02-14

    We compare and contrast five differences between person identification by voice and face. 1. There is little or no cost when a familiar face is to be recognized from an unrestricted set of possible faces, even at Rapid Serial Visual Presentation (RSVP) rates, but the accuracy of familiar voice recognition declines precipitously when the set of possible speakers is increased from one to a mere handful. 2. Whereas deficits in face recognition are typically perceptual in origin, those with normal perception of voices can manifest severe deficits in their identification. 3. Congenital prosopagnosics (CPros) and congenital phonagnosics (CPhon) are generally unable to imagine familiar faces and voices, respectively. Only in CPros, however, is this deficit a manifestation of a general inability to form visual images of any kind. CPhons report no deficit in imaging non-voice sounds. 4. The prevalence of CPhons of 3.2% is somewhat higher than the reported prevalence of approximately 2.0% for CPros in the population. There is evidence that CPhon represents a distinct condition statistically and not just normal variation. 5. Face and voice recognition proficiency are uncorrelated rather than reflecting limitations of a general capacity for person individuation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. 20 CFR 404.1220 - Identification numbers.

    Science.gov (United States)

    2010-04-01

    .... The special number will also be assigned to an interstate instrumentality if pre-1987 coverage is obtained and SSA will send a Form SSA-214-CD to the interstate instrumentality to notify it of the number.... SSA will send the State a Form SSA-214-CD, “Notice of Identifying Number,” to inform the State of the...

  17. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  18. 77 FR 59575 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2012-0843] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Request for public comments... requirement to indicate a boat's model year as part of the 12-character Hull Identification Number (HIN...

  19. Identification of copy number variants in horses

    KAUST Repository

    Doan, R.; Cohen, N.; Harrington, J.; Veazy, K.; Juras, R.; Cothran, G.; McCue, M. E.; Skow, L.; Dindot, S. V.

    2012-01-01

    identical CNVs from each animal yielded 775 CNV regions (CNVRs), involving 1707 protein- and RNA-coding genes. The number of CNVs per animal ranged from 55 to 347, with median and mean sizes of CNVs of 5.3 kb and 99.4 kb, respectively. Approximately 6

  20. Identification of copy number variants in horses

    KAUST Repository

    Doan, R.

    2012-03-01

    Copy number variants (CNVs) represent a substantial source of genetic variation in mammals. However, the occurrence of CNVs in horses and their subsequent impact on phenotypic variation is unknown. We performed a study to identify CNVs in 16 horses representing 15 distinct breeds (Equus caballus) and an individual gray donkey (Equus asinus) using a whole-exome tiling array and the array comparative genomic hybridization methodology. We identified 2368 CNVs ranging in size from 197 bp to 3.5 Mb. Merging identical CNVs from each animal yielded 775 CNV regions (CNVRs), involving 1707 protein- and RNA-coding genes. The number of CNVs per animal ranged from 55 to 347, with median and mean sizes of CNVs of 5.3 kb and 99.4 kb, respectively. Approximately 6% of the genes investigated were affected by a CNV. Biological process enrichment analysis indicated CNVs primarily affected genes involved in sensory perception, signal transduction, and metabolism. CNVs also were identified in genes regulating blood group antigens, coat color, fecundity, lactation, keratin formation, neuronal homeostasis, and height in other species. Collectively, these data are the first report of copy number variation in horses and suggest that CNVs are common in the horse genome and may modulate biological processes underlying different traits observed among horses and horse breeds.

  1. 77 FR 15004 - Updating of Employer Identification Numbers

    Science.gov (United States)

    2012-03-14

    ... operation, maintenance, and purchase of services to provide information. The collection of information in... Identification Number. The IRS accepts applications for EINs electronically and by telephone, facsimile, or mail... taxes, Gift taxes, Income taxes, Penalties, Reporting and recordkeeping requirements. Proposed...

  2. Person Re-Identification by Camera Correlation Aware Feature Augmentation.

    Science.gov (United States)

    Chen, Ying-Cong; Zhu, Xiatian; Zheng, Wei-Shi; Lai, Jian-Huang

    2018-02-01

    The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. While a large number of distance metric/subspace learning models have been developed for re-id, the cross-view transformations they learned are view-generic and thus potentially less effective in quantifying the feature distortion inherent to each camera view. Learning view-specific feature transformations for re-id (i.e., view-specific re-id), an under-studied approach, becomes an alternative resort for this problem. In this work, we formulate a novel view-specific person re-identification framework from the feature augmentation point of view, called Camera coR relation Aware Feature augmenTation (CRAFT). Specifically, CRAFT performs cross-view adaptation by automatically measuring camera correlation from cross-view visual data distribution and adaptively conducting feature augmentation to transform the original features into a new adaptive space. Through our augmentation framework, view-generic learning algorithms can be readily generalized to learn and optimize view-specific sub-models whilst simultaneously modelling view-generic discrimination information. Therefore, our framework not only inherits the strength of view-generic model learning but also provides an effective way to take into account view specific characteristics. Our CRAFT framework can be extended to jointly learn view-specific feature transformations for person re-id across a large network with more than two cameras, a largely under-investigated but realistic re-id setting. Additionally, we present a domain-generic deep person appearance representation which is designed particularly to be towards view invariant for facilitating cross-view adaptation by CRAFT. We conducted extensively comparative experiments to validate the superiority and advantages of our proposed framework over state

  3. Constraint Patch Matching for Faster Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, it is of great importance toextract very discriminative features in order to distinguishbetween images of different persons captured in differentcamera views. Features can be extracted globally from theentire or parts of the image, or locally from patches. Inaddition......36ms to compute per person....

  4. Adding Personality to Gifted Identification: Relationships among Traditional and Personality-Based Constructs

    Science.gov (United States)

    Carman, Carol A.

    2011-01-01

    One of the underutilized tools in gifted identification is personality-based measures. A multiple confirmatory factor analysis was utilized to examine the relationships between traditional identification methods and personality-based measures. The pattern of correlations indicated this model could be measuring two constructs, one related to…

  5. BIFOCAL STEREO FOR MULTIPATH PERSON RE-IDENTIFICATION

    Directory of Open Access Journals (Sweden)

    G. Blott

    2017-11-01

    Full Text Available This work presents an approach for the task of person re-identification by exploiting bifocal stereo cameras. Present monocular person re-identification approaches show a decreasing working distance, when increasing the image resolution to obtain a higher reidentification performance. We propose a novel 3D multipath bifocal approach, containing a rectilinear lens with larger focal length for long range distances and a fish eye lens of a smaller focal length for the near range. The person re-identification performance is at least on par with 2D re-identification approaches but the working distance of the approach is increased and on average 10% more re-identification performance can be achieved in the overlapping field of view compared to a single camera. In addition, the 3D information is exploited from the overlapping field of view to solve potential 2D ambiguities.

  6. Multimodal Neural Network for Overhead Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Krogh, Benjamin

    2017-01-01

    Person re-identification is a topic which has potential to be used for applications within forensics, flow analysis and queue monitoring. It is the process of matching persons across two or more camera views, most often by extracting colour and texture based hand-crafted features, to identify...

  7. Late Fusion in Part-based Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, the purpose is to match persons across, typically, non-overlapping cameras. This introduces challenges such as occlusion and changes in view and light- ing. In order to overcome these challenges, discriminative features are extracted and used in combination with a su...

  8. The Use of Personal Identity Numbers in Sweden and Denmark

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  9. Role of forensic odontologist in post mortem person identification

    Directory of Open Access Journals (Sweden)

    Jahagirdar B Pramod

    2012-01-01

    Full Text Available The natural teeth are the most durable organs in the bodies of vertebrates, and humankind′s understanding of their own past and evolution relies heavily upon remnant dental evidence found as fossils. The use of features unique to the human dentition as an aid to personal identification is widely accepted within the forensic field. Comparative dental identifications play a major role in identifying the victims of violence, disaster or other mass tragedies. The comparison of ante-mortem and postmortem dental records to determine human identity has long been established. Indeed, it is still a major identification method in criminal investigations, mass disasters, grossly decomposed or traumatized bodies, and in other situations where visual identification is neither possible nor desirable. This article has comprehensively described some of the methods, and additional factors aiding in postmortem person identification.

  10. European Unique Hull Identification Number for Inland Navigation

    Directory of Open Access Journals (Sweden)

    Ivica Ružić

    2006-03-01

    Full Text Available To enable efficient management of inland navigation processes,specialized information systems should be developedthrough the application of modern information and communicationtechnology (ICT. For this purpose, individual Europeanwaterway and port authorities have developed their ownlocal information systems and databases. Due to the non-conformityof these databases, their integration at the Europeanlevel is confronted with selious problems (COMPRIS, 2003.One of the major problems is the lack of a common Europeanunique identification number for inland barges. For this reason,in some locally managed databases several different identificationnumbers are attributed to one and the same inlandbarge or certain identification numbers are not available. Thesame problem occurs in the communication between waterwayautholities and between waterway and port authorities. Therefore,a unique identification number for all floating objects onthe European waterways should be introduced. At the momentthere are only two official numbers for vessels. The first, the!MO number, introduced in 1978, is only used by maritimevessels. The second, the OFS number (Official Ship Number,is used only for vessels that have a Rhine patent (issued by theCCNR. The OFS number cannot satisfy all the requirementsof RIS Directive 2005/44/EC and the amendment to Directive82/714/EEC on technical requirements for inland navigationvessels in the enlarged European Union. The fact is that only20% of the ranges of codes are reserved for the non-Rhinecountries. A special Electronic Reporting International group(ER! was appointed to formulate a new system for uniqueidentification of inland vessels and also define a databasemodel for vessel characteristics. The initial suggestion of ERIwas to add one character in front of the OFS number in orderto increase its coding capacity. The intention was to make asfew as possible differences/modifications to the system currentlyused under the regime of

  11. Person identification from aerial footage by a remote-controlled drone.

    Science.gov (United States)

    Bindemann, Markus; Fysh, Matthew C; Sage, Sophie S K; Douglas, Kristina; Tummon, Hannah M

    2017-10-19

    Remote-controlled aerial drones (or unmanned aerial vehicles; UAVs) are employed for surveillance by the military and police, which suggests that drone-captured footage might provide sufficient information for person identification. This study demonstrates that person identification from drone-captured images is poor when targets are unfamiliar (Experiment 1), when targets are familiar and the number of possible identities is restricted by context (Experiment 2), and when moving footage is employed (Experiment 3). Person information such as sex, race and age is also difficult to access from drone-captured footage (Experiment 4). These findings suggest that such footage provides a particularly poor medium for person identification. This is likely to reflect the sub-optimal quality of such footage, which is subject to factors such as the height and velocity at which drones fly, viewing distance, unfavourable vantage points, and ambient conditions.

  12. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana; Volume 31; Issue 3. New methodology for a person identification system. R Bremananth A Chitra. Volume 31 Issue 3 June 2006 pp 259-276 ... Experimental results illustrate that the proposed method has been easily espoused in elections, bank transactions and other security applications.

  13. Multimodal Person Re-identification Using RGB-D Sensors and a Transient Identification Database

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Moeslund, Thomas B.; Nasrollahi, Kamal

    2013-01-01

    This paper describes a system for person re-identification using RGB-D sensors. The system covers the full flow, from detection of subjects, over contour extraction, to re-identification using soft biometrics. The biometrics in question are part-based color histograms and the subjects height...

  14. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  15. Personal Identification by Keystroke Dynamics in Japanese Free Text Typing

    Science.gov (United States)

    Samura, Toshiharu; Nishimura, Haruhiko

    Biometrics is classified into verification and identification. Many researchers on the keystroke dynamics have treated the verification of a fixed short password which is used for the user login. In this research, we pay attention to the identification and investigate several characteristics of the keystroke dynamics in Japanese free text typing. We developed Web-based typing software in order to collect the keystroke data on the Local Area Network and performed experiments on a total of 112 subjects, from which three groups of typing level, the beginner's level and above, the normal level and above and the middle level and above were constructed. Based on the identification methods by the weighted Euclid distance and the neural network for the extracted feature indexes in Japanese texts, we evaluated identification performances for the three groups. As a result, high accuracy of personal identification was confirmed in both methods, in proportion to the typing level of the group.

  16. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  17. 33 CFR 101.515 - TWIC/Personal Identification.

    Science.gov (United States)

    2010-07-01

    ....515 Section 101.515 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Other Provisions § 101.515 TWIC/Personal Identification. (a... TWIC must allow his or her TWIC to be read by a reader and must submit his or her reference biometric...

  18. Attention in Multimodal Neural Networks for Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Krogh, Benjamin; Nasrollahi, Kamal

    2018-01-01

    In spite of increasing interest from the research commu- nity, person re-identification remains an unsolved problem. Correctly deciding on a true match by comparing images of a person, captured by several cameras, requires extrac- tion of discriminative features to counter challenges...... such as changes in lighting, viewpoint and occlusion. Besides de- vising novel feature descriptors, the setup can be changed to capture persons from an overhead viewpoint rather than a horizontal. Furthermore, additional modalities can be considered that are not affected by similar environmental changes as RGB...

  19. Unaware person recognition from the body when face identification fails.

    Science.gov (United States)

    Rice, Allyson; Phillips, P Jonathon; Natu, Vaidehi; An, Xiaobo; O'Toole, Alice J

    2013-11-01

    How does one recognize a person when face identification fails? Here, we show that people rely on the body but are unaware of doing so. State-of-the-art face-recognition algorithms were used to select images of people with almost no useful identity information in the face. Recognition of the face alone in these cases was near chance level, but recognition of the person was accurate. Accuracy in identifying the person without the face was identical to that in identifying the whole person. Paradoxically, people reported relying heavily on facial features over noninternal face and body features in making their identity decisions. Eye movements indicated otherwise, with gaze duration and fixations shifting adaptively toward the body and away from the face when the body was a better indicator of identity than the face. This shift occurred with no cost to accuracy or response time. Human identity processing may be partially inaccessible to conscious awareness.

  20. Evaluating common de-identification heuristics for personal health information.

    Science.gov (United States)

    El Emam, Khaled; Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael

    2006-11-21

    With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here. For professional subpopulations with published

  1. Personal Identification Based on Vectorcardiogram Derived from Limb Leads Electrocardiogram

    Directory of Open Access Journals (Sweden)

    Jongshill Lee

    2012-01-01

    Full Text Available We propose a new method for personal identification using the derived vectorcardiogram (dVCG, which is derived from the limb leads electrocardiogram (ECG. The dVCG was calculated from the standard limb leads ECG using the precalculated inverse transform matrix. Twenty-one features were extracted from the dVCG, and some or all of these 21 features were used in support vector machine (SVM learning and in tests. The classification accuracy was 99.53%, which is similar to the previous dVCG analysis using the standard 12-lead ECG. Our experimental results show that it is possible to identify a person by features extracted from a dVCG derived from limb leads only. Hence, only three electrodes have to be attached to the person to be identified, which can reduce the effort required to connect electrodes and calculate the dVCG.

  2. Multi-patch matching for person re-identification

    Science.gov (United States)

    Labidi, Hocine; Luo, Sen-Lin; Boubekeur, Mohamed B.; Benlefki, Tarek

    2015-08-01

    Recognizing a target object across non-overlapping distributed cameras is known in the computer vision community as the problem of person re-identification. In this paper, a multi-patch matching method for person reidentification is presented. Starting from the assumption that: the appearance (clothes) of a person does not change during the time of passing in different cameras field of view , which means the regions with the same color in target image will be identical while crossing cameras. First, we extract distinctive features in the training procedure, where each image target is devised into small patches, the SIFT features and LAB color histograms are computed for each patch. Then we use the KNN approach to detect group of patches with high similarity in the target image and then we use a bi-directional weighted group matching mechanism for the re-identification. Experiments on a challenging VIPeR dataset show that the performances of the proposed method outperform several baselines and state of the art approaches.

  3. 75 FR 25137 - Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report...

    Science.gov (United States)

    2010-05-07

    ...-2003-14963] RIN 1625-AB45 Changes to Standard Numbering System, Vessel Identification System, and... System (SNS), the Vessel Identification System (VIS), and casualty reporting; require validation of... Standard Numbering System U.S.C. United States Code VIS Vessel Identification System III. Background Coast...

  4. Processing of Natural Signals like EMG for Person Identification using NUFB-GMM

    OpenAIRE

    Suresh M; P G Krishnamohan; Mallikarjun S Holi

    2014-01-01

    Physiological signals like Electrocardiogram(ECG) and Electroencephalogram(EEG), including deoxyribonucleic acid(DNA) are person specific and distinct for different persons. The motor unit firing pattern, motor unit recruitment order and characteristics of muscle changing from person to person, and therefore Electromyogram (EMG) can be used for person identification. EMG records obtained from a single channel data acquisition system are used to develop person identification system. Non-unifor...

  5. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  6. 24 CFR 200.6 - Employer identification and social security numbers.

    Science.gov (United States)

    2010-04-01

    ... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and... security numbers. 200.6 Section 200.6 Housing and Urban Development Regulations Relating to Housing and...

  7. Personal identification based on blood vessels of retinal fundus images

    Science.gov (United States)

    Fukuta, Keisuke; Nakagawa, Toshiaki; Hayashi, Yoshinori; Hatanaka, Yuji; Hara, Takeshi; Fujita, Hiroshi

    2008-03-01

    Biometric technique has been implemented instead of conventional identification methods such as password in computer, automatic teller machine (ATM), and entrance and exit management system. We propose a personal identification (PI) system using color retinal fundus images which are unique to each individual. The proposed procedure for identification is based on comparison of an input fundus image with reference fundus images in the database. In the first step, registration between the input image and the reference image is performed. The step includes translational and rotational movement. The PI is based on the measure of similarity between blood vessel images generated from the input and reference images. The similarity measure is defined as the cross-correlation coefficient calculated from the pixel values. When the similarity is greater than a predetermined threshold, the input image is identified. This means both the input and the reference images are associated to the same person. Four hundred sixty-two fundus images including forty-one same-person's image pairs were used for the estimation of the proposed technique. The false rejection rate and the false acceptance rate were 9.9×10 -5% and 4.3×10 -5%, respectively. The results indicate that the proposed method has a higher performance than other biometrics except for DNA. To be used for practical application in the public, the device which can take retinal fundus images easily is needed. The proposed method is applied to not only the PI but also the system which warns about misfiling of fundus images in medical facilities.

  8. Personal suicidality in reception and identification with suicidal film characters.

    Science.gov (United States)

    Till, Benedikt; Vitouch, Peter; Herberth, Arno; Sonneck, Gernot; Niederkrotenthaler, Thomas

    2013-04-01

    The authors investigated the impact of suicidality on identity work during film exposure. Adults with low suicidality (n = 150) watched either It's My Party or The Fire Within, censored versions of these films not depicting the suicide, or the control film that concluded with a non-suicidal death. Baseline suicidality was measured with questionnaires before the movie. Identity work and identification with the protagonist were measured after the movie. Suicidality was directly associated with identity work during film dramas depicting suicide methods. The reception of suicide-related media content seems to partially depend on personal suicidality. Potential implications for suicide prevention are discussed.

  9. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

    Directory of Open Access Journals (Sweden)

    Atul S. CHAUDHARI

    2014-01-01

    Full Text Available Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, iris or behavioral (e.g., gait, signature characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and its extensive use in forensics. Fingerprint is reliable biometric characteristic as it is unique and persistence. Fingerprint is the pattern of ridges and valleys on the surface of fingertip. However, recognizing fingerprints in poor quality images is still a very complex job, so the fingerprint image must be preprocessed before matching. It is very difficult to extract fingerprint features directly from gray scale fingerprint image. In this paper we have proposed the system which uses minutiae based matching algorithm for fingerprint identification. There are three main phases in proposed algorithm. First phase enhance the input fingerprint image by preprocessing it. The enhanced fingerprint image is converted into thinned binary image and then minutiae are extracted by using Crossing Number Concept in second phase. Third stage compares input fingerprint image (after preprocessing and minutiae extraction with fingerprint images enrolled in database and makes decision whether the input fingerprint is matched with the fingerprint stored in database or not.

  10. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  11. Developing a personal computer based expert system for radionuclide identification

    International Nuclear Information System (INIS)

    Aarnio, P.A.; Hakulinen, T.T.

    1990-01-01

    Several expert system development tools are available for personal computers today. We have used one of the LISP-based high end tools for nearly two years in developing an expert system for identification of gamma sources. The system contains a radionuclide database of 2055 nuclides and 48000 gamma transitions with a knowledge base of about sixty rules. This application combines a LISP-based inference engine with database management and relatively heavy numerical calculations performed using C-language. The most important feature needed has been the possibility to use LISP and C together with the more advanced object oriented features of the development tool. Main difficulties have been long response times and the big amount (10-16 MB) of computer memory required

  12. Significance of Dental Records in Personal Identification in Forensic Sciences

    Directory of Open Access Journals (Sweden)

    Vagish Kumar L Shanbhag

    2016-01-01

    Full Text Available Forensic odontology is a branch that connects dentistry and the legal profession. One of the members in the forensic investigation team is a dentist. Dentists play an important and significant role in various aspects of the identification of persons in various forensic circumstances. However, several dentists and legal professionals are quite ignorant of this fascinating aspect of forensic odontology. A need was felt to fill this gap. The dental record is a legal document possessed by the dentist and it contains subjective and objective information about the patient. A PubMed search and Google search were done for articles highlighting the importance of dental records in forensic sciences using the key words "forensic odontology, forensic dentistry, forensic dentists, identification, dental records, and dental chart". A total of 42 articles relevant to the title of the article were found and reviewed. The present article highlights the role of dentists in forensic sciences, their possible contributions to forensics, and the various aspects of forensic dentistry, thus bridging the gap of knowledge between the legal and the dental fraternities.

  13. 33 CFR 187.321 - What are the hull identification number (HIN) provisions?

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false What are the hull identification number (HIN) provisions? 187.321 Section 187.321 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... Vessel Titling Systems § 187.321 What are the hull identification number (HIN) provisions? A State must...

  14. 33 CFR 181.27 - Information displayed near hull identification number.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Information displayed near hull... displayed near hull identification number. With the exception of the characters “US-”, which constitute the... the 12-character hull identification number (HIN), that information must be separated from the HIN by...

  15. The role of patient personality in the identification of depression in older primary care patients.

    Science.gov (United States)

    McCray, Laura W; Bogner, Hillary R; Sammel, Mary D; Gallo, Joseph J

    2007-11-01

    Our aim was to evaluate whether personality factors significantly contribute to the identification of depression in older primary care patients, even after controlling for depressive symptoms. We examined the association between personality factors and the identification of depression among 318 older adults who participated in the Spectrum study. High neuroticism (unadjusted Odds Ratio (OR) 2.36, 95% Confidence Interval (CI) [1.42, 3.93]) and low extraversion (adjusted OR 2.24, CI [1.26, 4.00]) were associated with physician identification of depression. Persons with high conscientiousness were less likely to be identified as depressed by the doctor (adjusted OR 0.45, CI [0.22, 0.91]). Personality factors influence the identification of depression among older persons in primary care over and above the relationship of depressive symptoms with physician identification. Knowledge of personality may influence the diagnosis and treatment of depression in primary care. Copyright 2007 John Wiley & Sons, Ltd.

  16. Identification of serial number on bank card using recurrent neural network

    Science.gov (United States)

    Liu, Li; Huang, Linlin; Xue, Jian

    2018-04-01

    Identification of serial number on bank card has many applications. Due to the different number printing mode, complex background, distortion in shape, etc., it is quite challenging to achieve high identification accuracy. In this paper, we propose a method using Normalization-Cooperated Gradient Feature (NCGF) and Recurrent Neural Network (RNN) based on Long Short-Term Memory (LSTM) for serial number identification. The NCGF maps the gradient direction elements of original image to direction planes such that the RNN with direction planes as input can recognize numbers more accurately. Taking the advantages of NCGF and RNN, we get 90%digit string recognition accuracy.

  17. 20 CFR 422.112 - Employer identification numbers.

    Science.gov (United States)

    2010-04-01

    ... Form SSA-214-CD to the interstate instrumentality to notify it of the number assigned. [60 FR 42433... pension or excise tax return is not subject to this requirement. To apply for an EIN, employers file Form... employers, Form SS-4 is available at all SSA and IRS offices. Household employers, agricultural employers...

  18. Management number identification method for nuclear fuel assembly

    International Nuclear Information System (INIS)

    Furuya, Nobuo; Mori, Kazuma.

    1995-01-01

    In the present invention, a management number indicated to appropriate portions of a fuel assembly can be read with no error for the management of nuclear fuel materials in the nuclear fuel assembly (counting management) and physical protection: PP. Namely, bar codes as a management number are printed by electrolytic polishing to one or more portions of a side surface of an upper nozzle of the assembly, an upper surface of a clamp and a side surface of a lower nozzle. The bar codes are read by a reader at one or more portions in a transporting path for transporting the fuel assembly and at a fuel detection device disposed in a fuel storage pool. The read signals are inputted to a computer. With such procedures, the nuclear fuel assembly can be identified with no error by reading the bar codes and without applying no danger to a human body. Since the reader is disposed in the course of the transportation and test for the assembly, and the read signals are inputted to the computer, the management for the counting number and PP is facilitated. (I.S.)

  19. Identification of Bodies by Unique Serial Numbers on Implanted Medical Devices.

    Science.gov (United States)

    Blessing, Melissa M; Lin, Peter T

    2018-05-01

    Visual identification is the most common identification method used by medical examiners but is not always possible. Alternative methods include X-ray, fingerprint, or DNA comparison, but these methods require additional resources. Comparison of serial numbers on implanted medical devices is a rapid and definitive method of identification. To assess the practicality of using this method, we reviewed 608 consecutive forensic autopsies performed at a regional medical examiner office. Of these, 56 cases required an alternative method of identification due to decomposition (n = 35), gunshot wound (n = 9), blunt trauma (n = 6), or charring (n = 6). Of these 56 cases, eight (14.3%) were known to have an implanted medical device. Of these eight cases, five (63%) could be positively identified by comparing serial numbers. If an implanted medical device is known to be present, and medical records are available, identification by medical device serial number should be a first-line method. © 2017 American Academy of Forensic Sciences.

  20. Retrival experience as an accurate indicator of person identification in line-ups

    Directory of Open Access Journals (Sweden)

    María José Contreras

    2011-07-01

    Full Text Available Responses in eyewitness identification of a person in a line-up may be based on two types of recovery experiences, remember and know experiences. Remember responses involve eyewitness identification of the target person as an episodic memory task, because it implies retrieving information about the target person in the place and at the time of the event. Know responses, in contrast, engage recognition based on familiarity or perceptual facilitation, that is, as a semantic memory task. To explore the relation between retrieval experiences and recognition accuracy, 86 participants took part in a recognition task with two conditions: one with an interpolated target absent line-up and the other only with the target present line-up. Accuracy of recognition and retrieval experience was measured. The results showed that, having previously participated in a target-absent line-up, increased omissions, while the number of hits decreased. Furthermore, participants’ know responses were associated to false recognition, whilst remember responses were associated to hits in recognition. Thus, asking eyewitnesses to inform about the kind of retrieval experience in which they based their recognition responses, may serve as a reliable indicator of accuracy in recognition. Future studies are needed to investigate whether this is also the case in natural settings.

  1. 26 CFR 31.3406(j)-1 - Taxpayer Identification Number (TIN) matching program.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 15 2010-04-01 2010-04-01 false Taxpayer Identification Number (TIN) matching program. 31.3406(j)-1 Section 31.3406(j)-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE... COLLECTION OF INCOME TAX AT SOURCE Collection of Income Tax at Source § 31.3406(j)-1 Taxpayer Identification...

  2. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  3. Large data analysis: automatic visual personal identification in a demography of 1.2 billion persons

    Science.gov (United States)

    Daugman, John

    2014-05-01

    The largest biometric deployment in history is now underway in India, where the Government is enrolling the iris patterns (among other data) of all 1.2 billion citizens. The purpose of the Unique Identification Authority of India (UIDAI) is to ensure fair access to welfare benefits and entitlements, to reduce fraud, and enhance social inclusion. Only a minority of Indian citizens have bank accounts; only 4 percent possess passports; and less than half of all aid money reaches its intended recipients. A person who lacks any means of establishing their identity is excluded from entitlements and does not officially exist; thus the slogan of UIDAI is: To give the poor an identity." This ambitious program enrolls a million people every day, across 36,000 stations run by 83 agencies, with a 3-year completion target for the entire national population. The halfway point was recently passed with more than 600 million persons now enrolled. In order to detect and prevent duplicate identities, every iris pattern that is enrolled is first compared against all others enrolled so far; thus the daily workflow now requires 600 trillion (or 600 million-million) iris cross-comparisons. Avoiding identity collisions (False Matches) requires high biometric entropy, and achieving the tremendous match speed requires phase bit coding. Both of these requirements are being delivered operationally by wavelet methods developed by the author for encoding and comparing iris patterns, which will be the focus of this Large Data Award" presentation.

  4. A person is not a number: discourse involvement in subject-verb agreement computation.

    Science.gov (United States)

    Mancini, Simona; Molinaro, Nicola; Rizzi, Luigi; Carreiras, Manuel

    2011-09-02

    Agreement is a very important mechanism for language processing. Mainstream psycholinguistic research on subject-verb agreement processing has emphasized the purely formal and encapsulated nature of this phenomenon, positing an equivalent access to person and number features. However, person and number are intrinsically different, because person conveys extra-syntactic information concerning the participants in the speech act. To test the person-number dissociation hypothesis we investigated the neural correlates of subject-verb agreement in Spanish, using person and number violations. While number agreement violations produced a left-anterior negativity followed by a P600 with a posterior distribution, the negativity elicited by person anomalies had a centro-posterior maximum and was followed by a P600 effect that was frontally distributed in the early phase and posteriorly distributed in the late phase. These data reveal that the parser is differentially sensitive to the two features and that it deals with the two anomalies by adopting different strategies, due to the different levels of analysis affected by the person and number violations. Copyright © 2011 Elsevier B.V. All rights reserved.

  5. Targeted next-generation sequencing at copy-number breakpoints for personalized analysis of rearranged ends in solid tumors.

    Directory of Open Access Journals (Sweden)

    Hyun-Kyoung Kim

    Full Text Available BACKGROUND: The concept of the utilization of rearranged ends for development of personalized biomarkers has attracted much attention owing to its clinical applicability. Although targeted next-generation sequencing (NGS for recurrent rearrangements has been successful in hematologic malignancies, its application to solid tumors is problematic due to the paucity of recurrent translocations. However, copy-number breakpoints (CNBs, which are abundant in solid tumors, can be utilized for identification of rearranged ends. METHOD: As a proof of concept, we performed targeted next-generation sequencing at copy-number breakpoints (TNGS-CNB in nine colon cancer cases including seven primary cancers and two cell lines, COLO205 and SW620. For deduction of CNBs, we developed a novel competitive single-nucleotide polymorphism (cSNP microarray method entailing CNB-region refinement by competitor DNA. RESULT: Using TNGS-CNB, 19 specific rearrangements out of 91 CNBs (20.9% were identified, and two polymerase chain reaction (PCR-amplifiable rearrangements were obtained in six cases (66.7%. And significantly, TNGS-CNB, with its high positive identification rate (82.6% of PCR-amplifiable rearrangements at candidate sites (19/23, just from filtering of aligned sequences, requires little effort for validation. CONCLUSION: Our results indicate that TNGS-CNB, with its utility for identification of rearrangements in solid tumors, can be successfully applied in the clinical laboratory for cancer-relapse and therapy-response monitoring.

  6. Targeted next-generation sequencing at copy-number breakpoints for personalized analysis of rearranged ends in solid tumors.

    Science.gov (United States)

    Kim, Hyun-Kyoung; Park, Won Cheol; Lee, Kwang Man; Hwang, Hai-Li; Park, Seong-Yeol; Sorn, Sungbin; Chandra, Vishal; Kim, Kwang Gi; Yoon, Woong-Bae; Bae, Joon Seol; Shin, Hyoung Doo; Shin, Jong-Yeon; Seoh, Ju-Young; Kim, Jong-Il; Hong, Kyeong-Man

    2014-01-01

    The concept of the utilization of rearranged ends for development of personalized biomarkers has attracted much attention owing to its clinical applicability. Although targeted next-generation sequencing (NGS) for recurrent rearrangements has been successful in hematologic malignancies, its application to solid tumors is problematic due to the paucity of recurrent translocations. However, copy-number breakpoints (CNBs), which are abundant in solid tumors, can be utilized for identification of rearranged ends. As a proof of concept, we performed targeted next-generation sequencing at copy-number breakpoints (TNGS-CNB) in nine colon cancer cases including seven primary cancers and two cell lines, COLO205 and SW620. For deduction of CNBs, we developed a novel competitive single-nucleotide polymorphism (cSNP) microarray method entailing CNB-region refinement by competitor DNA. Using TNGS-CNB, 19 specific rearrangements out of 91 CNBs (20.9%) were identified, and two polymerase chain reaction (PCR)-amplifiable rearrangements were obtained in six cases (66.7%). And significantly, TNGS-CNB, with its high positive identification rate (82.6%) of PCR-amplifiable rearrangements at candidate sites (19/23), just from filtering of aligned sequences, requires little effort for validation. Our results indicate that TNGS-CNB, with its utility for identification of rearrangements in solid tumors, can be successfully applied in the clinical laboratory for cancer-relapse and therapy-response monitoring.

  7. The Fregoli delusion: a disorder of person identification and tracking.

    Science.gov (United States)

    Langdon, Robyn; Connaughton, Emily; Coltheart, Max

    2014-10-01

    Fregoli delusion is the mistaken belief that some person currently present in the deluded person's environment (typically a stranger) is a familiar person in disguise. The stranger is believed to be psychologically identical to this known person (who is not present) even though the deluded person perceives the physical appearance of the stranger as being different from the known person's typical appearance. To gain a deeper understanding of this contradictory error in the normal system for tracking and identifying known persons, we conducted a detailed survey of all the Fregoli cases reported in the literature since the seminal Courbon and Fail (1927) paper. Our preliminary reading of these cases revealed a notable lack of definitional clarity. So, we first formulated a classification scheme of different person misidentification delusions so as to identify those cases that qualified as instances of Fregoli according to the above characterization: the mistaken belief that a known person is present in the environment in a different guise to his or her typical appearance. We identified 38 clear cases of this type and set out to answer a series of questions motivated by current hypotheses about the origin of the Fregoli delusion. We asked whether the patients misidentified particular strangers, made reference to the misidentified known persons using wigs or plastic surgery (or other techniques to disguise their appearance), misidentified many different strangers or only one, showed other symptoms (in particular, other misidentification delusions), and made inferences about the motives of the known persons in disguise. We conclude by discussing the implications of our findings for current hypotheses concerning the origin of the Fregoli delusion. Copyright © 2014 Cognitive Science Society, Inc.

  8. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    Science.gov (United States)

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  9. A robust estimate of the number and characteristics of persons released from prison in Australia.

    Science.gov (United States)

    Avery, Alex; Kinner, Stuart A

    2015-08-01

    To estimate the number and characteristics of adults released from prison in Australia. We calculated ratios, stratified by age, sex and Indigenous status, by comparing the number of persons released from prison in New South Wales (NSW), with the number in NSW prisons on 30 June of the corresponding year. These stratified ratios were applied to Australia-wide prison data to estimate the number and characteristics of persons released annually. We estimated that in 2013, 38,576 persons were released from prison in Australia - 25.3% more than the daily prison population. Young people, Indigenous people and women were over-represented among those released. We estimated that 3.69 Indigenous women aged 18-24 were released annually for each equivalent person in prison; and 2.75 non-Indigenous women aged 18-24 were released annually for each equivalent person in prison. The annual 'flow' through Australia's prisons is well in excess of the daily number, but information on those moving through prison systems is not yet publicly available. The characteristics of those released from prison differ meaningfully from those of people in prison. Routine, national reporting of prison separations is critical to informing upscaling and targeting of Throughcare services for this profoundly vulnerable population. © 2015 Public Health Association of Australia.

  10. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  11. Algorithm for personal identification in distance learning system based on registration of keyboard rhythm

    Science.gov (United States)

    Nikitin, P. V.; Savinov, A. N.; Bazhenov, R. I.; Sivandaev, S. V.

    2018-05-01

    The article describes the method of identifying a person in distance learning systems based on a keyboard rhythm. An algorithm for the organization of access control is proposed, which implements authentication, identification and verification of a person using the keyboard rhythm. Authentication methods based on biometric personal parameters, including those based on the keyboard rhythm, due to the inexistence of biometric characteristics without a particular person, are able to provide an advanced accuracy and inability to refuse authorship and convenience for operators of automated systems, in comparison with other methods of conformity checking. Methods of permanent hidden keyboard monitoring allow detecting the substitution of a student and blocking the key system.

  12. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban... REQUIREMENTS; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security...

  13. An automated procedure for identification of a person using gait analysis

    Directory of Open Access Journals (Sweden)

    Alena Galajdová

    2016-10-01

    Full Text Available Different biometric methods are available for identification purpose of a person. The most commonly used are fingerprints, but there are also other biometric methods such as voice, morphology of ears, structure of iris and so on. In some cases, it is required to identify a person according to his/her biomechanical parameters or even his/her gait pattern. Gait is an outstanding biometric behavioural characteristic that is not widely used yet for identification purposes because efficient and proven automated processes are not yet available. Several systems and gait pattern databases have been developed for rapid evaluation and processing of gait. This article describes an original automated evaluation procedure of gait pattern and identification of unique gait parameters for automatic identification purposes.

  14. Identification of persons entering through the door from the accelerometers data

    OpenAIRE

    Vodopivec, Tadej

    2013-01-01

    This thesis presents a system for automatic identification of a person who walks through a door based on the information gathered with acceleration sensors, which are mounted on the door. The proccedure for automatic identification consists of four steps. In the first step, data acquisition and coordinate system rotation is performed. Coordinate system rotation is needed in order to match the direction of measured accelerations with the direction of components of the forces acting on the door...

  15. Hyperspectral Based Skin Detection for Person of Interest Identification

    Science.gov (United States)

    2015-03-01

    short-wave infrared VIS visible spectrum PCA principal component analysis FCBF Fast Correlation- Based Filter POI person of interest ANN artificial neural...an artificial neural network (ANN) that is created in MATLAB® using the Neural Network Toolbox to identify a POI based on their skin spectral data. A...identifying a POI based on skin spectral data. She identified an optimal feature subset to be used with the hyperspectral data she collected using a

  16. Exploiting Multiple Detections for Person Re-Identification

    Directory of Open Access Journals (Sweden)

    Amran Bhuiyan

    2018-01-01

    Full Text Available Re-identification systems aim at recognizing the same individuals in multiple cameras, and one of the most relevant problems is that the appearance of same individual varies across cameras due to illumination and viewpoint changes. This paper proposes the use of cumulative weighted brightness transfer functions (CWBTFs to model these appearance variations. Different from recently proposed methods which only consider pairs of images to learn a brightness transfer function, we exploit such a multiple-frame-based learning approach that leverages consecutive detections of each individual to transfer the appearance. We first present a CWBTF framework for the task of transforming appearance from one camera to another. We then present a re-identification framework where we segment the pedestrian images into meaningful parts and extract features from such parts, as well as from the whole body. Jointly, both of these frameworks contribute to model the appearance variations more robustly. We tested our approach on standard multi-camera surveillance datasets, showing consistent and significant improvements over existing methods on three different datasets without any other additional cost. Our approach is general and can be applied to any appearance-based method.

  17. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  18. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  19. Greater number of group identifications is associated with healthier behaviour: Evidence from a Scottish community sample.

    Science.gov (United States)

    Sani, Fabio; Madhok, Vishnu; Norbury, Michael; Dugard, Pat; Wakefield, Juliet R H

    2015-09-01

    This paper investigates the interplay between group identification (i.e., the extent to which one has a sense of belonging to a social group, coupled with a sense of commonality with in-group members) and four types of health behaviour, namely physical exercise, smoking, drinking, and diet. Specifically, we propose a positive relationship between one's number of group identifications and healthy behaviour. This study is based on the Scottish portion of the data obtained for Wave 1 of the two-wave cross-national Health in Groups project. Totally 1,824 patients from five Scottish general practitioner (GP) surgeries completed the Wave 1 questionnaire in their homes. Participants completed measures of group identification, group contact, health behaviours, and demographic variables. Results demonstrate that the greater the number of social groups with which one identifies, the healthier one's behaviour on any of the four health dimensions considered. We believe our results are due to the fact that group identification will generally (1) enhance one's sense of meaning in life, thereby leading one to take more care of oneself, (2) increase one's sense of responsibility towards other in-group members, thereby enhancing one's motivation to be healthy in order to fulfil those responsibilities, and (3) increase compliance with healthy group behavioural norms. Taken together, these processes amply overcompensate for the fact that some groups with which people may identify can actually prescribe unhealthy behaviours. © 2014 The British Psychological Society.

  20. Personalized identification of differentially expressed pathways in pediatric sepsis.

    Science.gov (United States)

    Li, Binjie; Zeng, Qiyi

    2017-10-01

    Sepsis is a leading killer of children worldwide with numerous differentially expressed genes reported to be associated with sepsis. Identifying core pathways in an individual is important for understanding septic mechanisms and for the future application of custom therapeutic decisions. Samples used in the study were from a control group (n=18) and pediatric sepsis group (n=52). Based on Kauffman's attractor theory, differentially expressed pathways associated with pediatric sepsis were detected as attractors. When the distribution results of attractors are consistent with the distribution of total data assessed using support vector machine, the individualized pathway aberrance score (iPAS) was calculated to distinguish differences. Through attractor and Kyoto Encyclopedia of Genes and Genomes functional analysis, 277 enriched pathways were identified as attractors. There were 81 pathways with Ppathways with Ppathway clusters and four sample clusters. Thus, in the majority pediatric sepsis samples, core pathways can be detected as different from accumulated normal samples. In conclusion, a novel procedure that identified the dysregulated attractors in individuals with pediatric sepsis was constructed. Attractors can be markers to identify pathways involved in pediatric sepsis. iPAS may provide a correlation score for each of the signaling pathways present in an individual patient. This process may improve the personalized interpretation of disease mechanisms and may be useful in the forthcoming era of personalized medicine.

  1. A Study of Hand Back Skin Texture Patterns for Personal Identification and Gender Classification

    Directory of Open Access Journals (Sweden)

    Jin Xie

    2012-06-01

    Full Text Available Human hand back skin texture (HBST is often consistent for a person and distinctive from person to person. In this paper, we study the HBST pattern recognition problem with applications to personal identification and gender classification. A specially designed system is developed to capture HBST images, and an HBST image database was established, which consists of 1,920 images from 80 persons (160 hands. An efficient texton learning based method is then presented to classify the HBST patterns. First, textons are learned in the space of filter bank responses from a set of training images using the -minimization based sparse representation (SR technique. Then, under the SR framework, we represent the feature vector at each pixel over the learned dictionary to construct a representation coefficient histogram. Finally, the coefficient histogram is used as skin texture feature for classification. Experiments on personal identification and gender classification are performed by using the established HBST database. The results show that HBST can be used to assist human identification and gender classification.

  2. The clinical identification of peripheral neuropathy among older persons.

    Science.gov (United States)

    Richardson, James K

    2002-11-01

    To identify simple clinical rules for the detection of a diffuse peripheral neuropathy among older outpatients. Observational, blinded, controlled study. A tertiary-care electrodiagnostic laboratory and biomechanics laboratory. One hundred research subjects, 68 with electrodiagnostic evidence of peripheral neuropathy, between the ages of 50 and 80 years. Not applicable. One examiner, unaware of the results of electrodiagnostic testing, evaluated Achilles' and patellar reflexes, Romberg testing, semiquantified vibration, and position sense at the toe and ankle in all subjects, and unipedal stance time and the Michigan Diabetes Neuropathy Score in a subset of subjects. Significant group differences were present in all clinical measures tested. Three signs, Achilles' reflex (absent despite facilitation), vibration (128Hz tuning fork perceived for <10s), and position sense (<8/10 1-cm trials) at the toe, were the best predictors of peripheral neuropathy on both univariate and logistic regression (pseudo R(2)=.744) analyses. The presence of 2 or 3 signs versus 0 or 1 sign identified peripheral neuropathy with sensitivity, specificity, and positive and negative predictive values of 94.1%, 84.4%, 92.8%, and 87.1%, respectively. Values were similar among subgroups of subjects with and without diabetes mellitus. When other clinicians applied the technique to 12 more subjects, excellent interrater reliability regarding the presence of peripheral neuropathy (kappa=.833) and good to excellent interrater reliability for each sign (kappa range,.667-1.00) were shown. Among older persons, the presence of 2 or 3 of the 3 clinical signs strongly suggested electrodiagnostic evidence of a peripheral neuropathy, regardless of etiology. Age-related decline in peripheral nerve function need not be a barrier to the clinical recognition of a diffuse peripheral neuropathy among older persons. Copyright 2002 by the American Congress of Rehabilitation Medicine and the American Academy of

  3. [Factors related to nurses' patient identification behavior and the moderating effect of person-organization value congruence climate within nursing units].

    Science.gov (United States)

    Kim, Young Mee; Kang, Seung Wan; Kim, Se Young

    2014-04-01

    This research was an empirical study designed to identify precursors and interaction effects related to nurses' patient identification behavior. A multilevel analysis methodology was used. A self-report survey was administered to registered nurses (RNs) of a university hospital in South Korea. Of the questionnaires, 1114 were analyzed. The individual-level factors that had a significantly positive association with patient identification behavior were person-organization value congruence, organizational commitment, occupational commitment, tenure at the hospital, and tenure at the unit. Significantly negative group-level precursors of patient identification behavior were burnout climate and the number of RNs. Two interaction effects of the person-organization value congruence climate were identified. The first was a group-level moderating effect in which the negative relationship between the number of RNs and patient identification behavior was weaker when the nursing unit's value congruence climate was high. The second was a cross-level moderating effect in which the positive relationship between tenure at the unit and patient identification behavior was weaker when value congruence climate was high. This study simultaneously tested both individual-level and group-level factors that potentially influence patient identification behavior and identified the moderating role of person-organization value congruence climate. Implications of these results are discussed.

  4. Enhancing Person Re-identification by Late Fusion of Low-, Mid-, and High-Level Features

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2018-01-01

    Person re-identification is the process of finding people across different cameras. In this process, focus often lies in developing strong feature descriptors or a robust metric learning algorithm. While the two aspects are the most important steps in order to secure a high performance, a less...

  5. Person re-identification using height-based gait in colour depth camera

    NARCIS (Netherlands)

    John, V.; Englebienne, G.; Kröse, B.

    2013-01-01

    We address the problem of person re-identification in colour-depth camera using the height temporal information of people. Our proposed gait-based feature corresponds to the frequency response of the height temporal information. We demonstrate that the discriminative periodic motion associated with

  6. Preschoolers' Person Description and Identification Accuracy: A Comparison of the Simultaneous and Elimination Lineup Procedures

    Science.gov (United States)

    Pozzulo, Joanna D.; Dempsey, Julie; Crescini, Charmagne

    2009-01-01

    Preschoolers' (3- to 6-year-olds) person description and identification abilities were examined using the simultaneous and elimination lineup procedures. Participants (N = 100) were exposed to a 20-minute mask-making session conducted by a female confederate who acted as the mask-making teacher. After a brief delay (20 min), participants were…

  7. 40 CFR 91.113 - Requirement of certification-emission control information label and engine identification number.

    Science.gov (United States)

    2010-07-01

    ... control information label and engine identification number. 91.113 Section 91.113 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM... certification—emission control information label and engine identification number. (a) The engine manufacturer...

  8. Identification during imposed change: the roles of personal values, type of change, and anxiety.

    Science.gov (United States)

    Sverdlik, Noga; Oreg, Shaul

    2015-06-01

    Using a person-situation perspective, we explain what happens to individuals' identification with a collective in the context of a change. We propose that given the anxiety that often emerges during change, individuals' personal values (conservation and openness to change) interact with type of change (imposed vs. voluntary) in predicting identification following change. In a pilot, longitudinal field study (N = 61, 67% female) of an imposed university campus relocation, we measured employees' values and identification with the university before and several months after the relocation. In two lab experiments (Study 1: N = 104, 91.3% female; Study 2: N = 113, 75.2% female), we manipulated a change to be either imposed or voluntary and compared the relationships between values and identification across types of change. In Study 2, we also measured anxiety from the change. When change was imposed (all three studies), but not when voluntary (Studies 1 and 2), individuals' conservation was positively, and openness negatively, related to individuals' post-change identification. The effects emerged only for individuals who experienced change-related anxiety (Study 2). Our findings demonstrate that individuals' identification with a changing collective depends on the amount of anxiety change elicits and on the particular combination of their values and type of change. © 2014 Wiley Periodicals, Inc.

  9. How do brand personality, identification, and relationship length drive loyalty in sports?

    OpenAIRE

    Karjaluoto, Heikki; Munnukka, Juha; Salmi, Milja

    2016-01-01

    Purpose – The purpose of this paper is to extend brand identification theory to the sports team context by testing the direct and indirect effects of a sports team’s personality, sports fans’ identification with the team, and the effect of the length of fans’ relationship with a team on their loyalty to it. Design/methodology/approach – The authors conducted a quantitative study among ice hockey fans of one Finnish hockey team before play-off games. Data came from an online question...

  10. Tri-modal Person Re-identification with RGB, Depth and Thermal Features

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Bahnsen, Chris; Moeslund, Thomas B.

    2013-01-01

    Person re-identification is about recognizing people who have passed by a sensor earlier. Previous work is mainly based on RGB data, but in this work we for the first time present a system where we combine RGB, depth, and thermal data for re-identification purposes. First, from each of the three...... modalities, we obtain some particular features: from RGB data, we model color information from different regions of the body, from depth data, we compute different soft body biometrics, and from thermal data, we extract local structural information. Then, the three information types are combined in a joined...

  11. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy

    Directory of Open Access Journals (Sweden)

    Irena Jekova

    2015-01-01

    Full Text Available Traditional means for identity validation (PIN codes, passwords, and physiological and behavioral biometric characteristics (fingerprint, iris, and speech are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (rI, II (rII, calculated from them first principal ECG component (rPCA, linear and nonlinear combinations between rI, rII, and rPCA. For the verification task, the one-to-one scenario is applied and threshold values for rI, rII, and rPCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension has been considered. In addition a common reference PTB dataset (14 healthy individuals with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%.

  12. How brand personality, brand identification and service quality influence service brand equity

    Directory of Open Access Journals (Sweden)

    Sandra Maria Correia Loureiro

    2014-12-01

    Full Text Available During the past couple of decades, brand equity has emerged as one of the key concepts in marketing. Literature concerned with consumer brand relationship is calling for more studies in order to increase understanding of brand equity dimensions. Therefore, this study aims to contribute to the existing body of knowledge by examining the strength of relational variables on brand equity perceived by consumers. Findings support the proposed model in the service industry revealing that brand loyalty, brand identification, trust, brand personality and brand awareness are the variables that have a greatest impact on brand equity. Thus, this study is the first to measure the strength of assorted relational variables, and variables related with identification and personality on brand equity for brands in the service industry. In this vein, brand managers should be aware of the importance of building a brand regarding the way they communicate the features of the brand.

  13. Ensemble of different approaches for a reliable person re-identification system

    Directory of Open Access Journals (Sweden)

    Loris Nanni

    2016-07-01

    Full Text Available An ensemble of approaches for reliable person re-identification is proposed in this paper. The proposed ensemble is built combining widely used person re-identification systems using different color spaces and some variants of state-of-the-art approaches that are proposed in this paper. Different descriptors are tested, and both texture and color features are extracted from the images; then the different descriptors are compared using different distance measures (e.g., the Euclidean distance, angle, and the Jeffrey distance. To improve performance, a method based on skeleton detection, extracted from the depth map, is also applied when the depth map is available. The proposed ensemble is validated on three widely used datasets (CAVIAR4REID, IAS, and VIPeR, keeping the same parameter set of each approach constant across all tests to avoid overfitting and to demonstrate that the proposed system can be considered a general-purpose person re-identification system. Our experimental results show that the proposed system offers significant improvements over baseline approaches. The source code used for the approaches tested in this paper will be available at https://www.dei.unipd.it/node/2357 and http://robotics.dei.unipd.it/reid/.

  14. Assessment of the stability of morphological ECG features and their potential for person verification/identification

    Directory of Open Access Journals (Sweden)

    Matveev Mikhail

    2017-01-01

    Full Text Available This study investigates the potential of a set of ECG morphological features for person verification/identification. The measurements are done over 145 pairs of ECG recordings from healthy subjects, acquired 5 years apart (T1, T2 = T1+5 years. Time, amplitude, area and slope descriptors of the QRS-T pattern are analysed in 4 ECG leads, forming quasi-orthogonal lead system (II&III, V1, V5. The correspondence between feature values in T1 and T2 is verified via factor analysis by principal components extraction method; correlation analysis applied over the measurements in T1 and T2; synthesis of regression equations for prediction of features’ values in T2 based on T1 measurements; and cluster analysis for assessment of the correspondence between measured and predicted feature values. Thus, 11 amplitude descriptors of the QRS complex are highlighted as stable, i.e. keeping their strong correlation (≥0.7 within a certain factor, weak correlation (<0.3 with the features from the remaining factors and presenting high correlation in the two measurement periods that is a sign for their person verification/identification potential. The observed coincidence between feature values measured in T2 and predicted via the designed regression models (r=0.93 suggests about the confidence of person identification via the proposed morphological features.

  15. Identification of copy number variants defining genomic differences among major human groups.

    Directory of Open Access Journals (Sweden)

    Lluís Armengol

    Full Text Available BACKGROUND: Understanding the genetic contribution to phenotype variation of human groups is necessary to elucidate differences in disease predisposition and response to pharmaceutical treatments in different human populations. METHODOLOGY/PRINCIPAL FINDINGS: We have investigated the genome-wide profile of structural variation on pooled samples from the three populations studied in the HapMap project by comparative genome hybridization (CGH in different array platforms. We have identified and experimentally validated 33 genomic loci that show significant copy number differences from one population to the other. Interestingly, we found an enrichment of genes related to environment adaptation (immune response, lipid metabolism and extracellular space within these regions and the study of expression data revealed that more than half of the copy number variants (CNVs translate into gene-expression differences among populations, suggesting that they could have functional consequences. In addition, the identification of single nucleotide polymorphisms (SNPs that are in linkage disequilibrium with the copy number alleles allowed us to detect evidences of population differentiation and recent selection at the nucleotide variation level. CONCLUSIONS: Overall, our results provide a comprehensive view of relevant copy number changes that might play a role in phenotypic differences among major human populations, and generate a list of interesting candidates for future studies.

  16. The Use of Personal Projects Analysis to Enhance Occupational Therapy Goal Identification

    Directory of Open Access Journals (Sweden)

    Mary Egan

    2016-01-01

    Full Text Available Background: Client-centered occupational therapy begins with the identification of personally-relevant patient goals. This study aimed to determine whether the elicitation module of Personal Projects Analysis (PPA could help patients in an acquired brain injury day hospital program identify more meaningful goals than those identified using the Canadian Occupational Performance Measure (COPM alone. Method: Ten patients completed the COPM. They rated the importance of each goal and their confidence that they could attain each goal. During the next session, using the elicitation module of PPA, they identified personal projects just prior to their brain injuries, current personal projects, and future desired personal projects. They were then invited to revise their COPM goals and re-rate them for importance and confidence. Results: Following completion of the elicitation module of PPA, seven participants changed at least one goal. Of the goals that were changed, half were revised to include the mention of another person. There were no significant changes in average goal importance or perceived attainability. Occupational therapists reported that the elicitation module of PPA helped them get to know their patients better and identify potential therapeutic occupations. Discussion: The elicitation module of PPA may help people develop goals that are more embedded in their social contexts.

  17. Blind identification of the number of sub-carriers for orthogonal frequency division multiplexing-based elastic optical networking

    Science.gov (United States)

    Zhao, Lei; Xu, Hengying; Bai, Chenglin

    2018-03-01

    In orthogonal frequency division multiplexing (OFDM)-based elastic optical networking (EON), it is imperative to identify unknown parameters of OFDM-based EON signals quickly, intelligently and robustly. Because the number of sub-carriers determines the size of the sub-carriers spacing and then affects the symbol period of the OFDM and the anti-dispersion capability of the system, the identification of the number of sub-carriers has a profound effect on the identification of other key parameters of the system. In this paper, we proposed a method of number identification for sub-carriers of OFDM-based EON signals with help of high-order cyclic cumulant. The specific fourth-order cyclic cumulant exists only at the location of its sub-carriers frequencies. So the identification of the number of sub-carriers can be implemented by detecting the cyclic-frequencies. The proposed scheme in our study can be divided into three sub-stages, i.e. estimating the spectral range, calculating the high-order cyclic cumulant and identifying the number of sub-carriers. When the optical signal-to-noise ratios (OSNR) varied from 16dB to 22dB, the number of sub-carriers (64-512) was successfully identified in the experiment, and from the statistical point of view, the average identification absolute accuracy (IAAs) exceeded 94%.

  18. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    .... This functionality creep has led to the SSN becoming an almost de facto national ID number. Employers, universities, credit agencies and financial institutions began using the SSN as a unique personal identifier...

  19. Evaluation of 13 short tandem repeated loci for use in personal identification applications

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, H.A.; Caskey, C.T. (Baylor College of Medicine, Houston, TX (United States)); Jin, L.; Zhong, Y.; Chakraborty, R. (Univ. of Texas Graduate School of Biomedical Sciences, Houston, TX (United States))

    1994-07-01

    Personal identification by using DNA typing methodologies has been an issue in the popular and scientific press for several years. The authors present a PCR-based DNA-typing method using 13 unlinked short tandem repeat (STR) loci. Validation of the loci and methodology has been performed to meet standards set by the forensic community and the accrediting organization for parentage testing. Extensive statistical analysis has addressed the issues surrounding the presentation of [open quotes]match[close quotes] statistics. The authors have found STR loci to provide a rapid, sensitive, and reliable method of DNA typing for parentage testing, forensic identification, and medical diagnostics. Valid statistical analysis is generally simpler than similar analysis of RFLP-VNTR results and provides powerful statistical evidence of the low frequency of random multilocus genotype matching. 54 refs., 4 figs., 6 tabs.

  20. Genotoxic effects of daily personal exposure to particle mass and number concentrations on buccal cells

    Science.gov (United States)

    de Almeida, Daniela S.; da Costa, Silvano César; Ribeiro, Marcos; Moreira, Camila A. B.; Beal, Alexandra; Squizzato, Rafaela; Rudke, Anderson Paulo; Rafee, Sameh Adib Abou; Martins, Jorge A.; Palioto, Graciana Freitas; Kumar, Prashant; Martins, Leila D.

    2018-03-01

    The aim of this study is to assess personal exposure to Particle Number Concentrations (PNC) in four size ranges between 0.3 and 10 μm, and particulate matter (PM1; PM2.5; PM4; PM10) in order to evaluate possible genotoxic effects through a comet assay in buccal cells. A convenience cohort of 30 individuals from a Brazilian medium-sized city was selected. These individuals aged between 20 and 61 and worked in typical job categories (i.e., administrative, commerce, education, general services and transport). They were recruited to perform personal exposure measurements during their typical daily routine activities, totaling 240 h of sampling. The 8-h average mass concentrations in air for volunteers ranged from 2.4 to 31.8 μg m-3 for PM1, 4.2-45.1 μg m-3 for PM2.5, 7.9-66.1 μg m-3 for PM4 and from 23.1 to 131.7 μg m-3 for PM10. The highest PNC variation was found for 0.3-0.5 range, between 14 and 181 particles cm-3, 1 to 14 particles cm-3 for the 0.5-1.0 range, 0.2 to 2 particles cm-3 for the 1.0-2.5 range, and 0.06 to 0.7 particles cm-3 for the 2.5-10 range. Volunteers in the 'education' category experienced the lowest inhaled dose of PM2.5, as opposed to those involved in 'commercial' activities with the highest doses for PM10 (1.63 μg kg-1 h-1) and PM2.5 (0.61 μg kg-1 h-1). The predominant cause for these high doses was associated with the proximity of the workplace to the street and vehicle traffic. The comet assay performed in buccal cells indicated that the volunteers in 'commerce' category experienced the highest damage to their DeoxyriboNucleic Acid (DNA) compared with the control category (i.e. 'education'). These results indicate the variability in personal exposure of the volunteers in different groups, and the potential damage to DNA was much higher for those spending time in close proximity to the vehicle sources (e.g. commercial services) leading to exposure to a higher fraction of fine particles. This study builds understanding on the exposure

  1. The PDD-MRS : An instrument for identification of autism spectrum disorders in persons with mental retardation

    NARCIS (Netherlands)

    Kraijer, D; de Bildt, A

    The Scale of Pervasive Developmental Disorder in Mentally Retarded Persons (PDD-MRS) is described. The PDD-MRS is a simple classification and screening instrument devised for identification of autistic disorders (of the entire spectrum) in persons with mental retardation from mild to profound

  2. A comprehensive profile of DNA copy number variations in a Korean population: identification of copy number invariant regions among Koreans.

    Science.gov (United States)

    Jeon, Jae Pil; Shim, Sung Mi; Jung, Jong Sun; Nam, Hye Young; Lee, Hye Jin; Oh, Berm Seok; Kim, Kuchan; Kim, Hyung Lae; Han, Bok Ghee

    2009-09-30

    To examine copy number variations among the Korean population, we compared individual genomes with the Korean reference genome assembly using the publicly available Korean HapMap SNP 50 k chip data from 90 individuals. Korean individuals exhibited 123 copy number variation regions (CNVRs) covering 27.2 mb, equivalent to 1.0% of the genome in the copy number variation (CNV) analysis using the combined criteria of P value (Por= 0.25) among study subjects. In contrast, when compared to the Affymetrix reference genome assembly from multiple ethnic groups, considerably more CNVRs (n=643) were detected in larger proportions (5.0%) of the genome covering 135.1 mb even by more stringent criteria (Por=0.25), reflecting ethnic diversity of structural variations between Korean and other populations. Some CNVRs were validated by the quantitative multiplex PCR of short fluorescent fragment (QMPSF) method, and then copy number invariant regions were detected among the study subjects. These copy number invariant regions would be used as good internal controls for further CNV studies. Lastly, we demonstrated that the CNV information could stratify even a single ethnic population with a proper reference genome assembly from multiple heterogeneous populations.

  3. Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination

    Science.gov (United States)

    Bouma, Henri; Borsboom, Sander; den Hollander, Richard J. M.; Landsmeer, Sander H.; Worring, Marcel

    2012-06-01

    The capability to track individuals in CCTV cameras is important for surveillance and forensics alike. However, it is laborious to do over multiple cameras. Therefore, an automated system is desirable. In literature several methods have been proposed, but their robustness against varying viewpoints and illumination is limited. Hence performance in realistic settings is also limited. In this paper, we present a novel method for the automatic re-identification of persons in video from surveillance cameras in a realistic setting. The method is computationally efficient, robust to a wide variety of viewpoints and illumination, simple to implement and it requires no training. We compare the performance of our method to several state-of-the-art methods on a publically available dataset that contains the variety of viewpoints and illumination to allow benchmarking. The results indicate that our method shows good performance and enables a human operator to track persons five times faster.

  4. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    Science.gov (United States)

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  5. Morphological Variations and Biometrics of Ear: An Aid to Personal Identification.

    Science.gov (United States)

    Verma, Pradhuman; Sandhu, Harpreet Kaur; Verma, Kanika Gupta; Goyal, Sharry; Sudan, Madhu; Ladgotra, Amit

    2016-05-01

    The morphological characteristics and dimensions of external ear vary in different human ethnic races which can be utilized in forensics for personal identification of living or deceased. To determine uniqueness of morphological and biometric variations of both ears for individualization among North East (NE) and North West (NW) subpopulation of India. The study was conducted on randomly selected 80 students, 40 from each subgroup. Nine ear parameters were recorded twice using digital Vernier's caliper by single investigator and two indices (Ear Index and Lobule Index) were calculated for both the ears. Morphological ear shapes and lobule attachment were also noted. Pearson's coefficient correlation test was performed on cross-tabulations to evaluate significant relationship between different variables. Of the total 35% free and 65% attached ear lobes were noted in both population groups. Oval ear shape was most commonly noted followed by triangular, rectangular and round in both populations. On comparing anthropometric measurements of ears in two populations it was found that except the tragus length and lobule index all other values were noted more in NW population. No statistical difference was found in ear and lobular indices of males and females although the left ear index and lobule index were found to be higher than right in both populations except in NW females where right lobule index was recorded more than left. The results obtained can be used in anthropological and forensic sciences for the inclusion and exclusion of persons for identification on the basis of ear variations.

  6. 31 CFR 351.68 - Are taxpayer identification numbers (TINs) required for registration of book-entry Series EE...

    Science.gov (United States)

    2010-07-01

    ... (TINs) required for registration of book-entry Series EE savings bonds? 351.68 Section 351.68 Money and... TREASURY BUREAU OF THE PUBLIC DEBT OFFERING OF UNITED STATES SAVINGS BONDS, SERIES EE Book-Entry Series EE Savings Bonds § 351.68 Are taxpayer identification numbers (TINs) required for registration of book-entry...

  7. Problems of the processing of nuclear magnetic logging signals (identification of fluid-containing strata from a number of measurements)

    International Nuclear Information System (INIS)

    Aliev, T.M.; Orlov, G.L.; Lof, V.M.; Mityushin, E.M.; Ragimova, E.K.

    1978-01-01

    Problems of the processing of nuclear magnetic logging signals to identification of fluid-containing strata from a number of measurements. Problems of application statistical decision theory to discovery of fluid-containing beds from a number of measurements are considered. Using the technique possibilities of nuclear magnetic logging method the necessary volume of samples is motivated, the rational algorithm for processing of sequential measurements is obtained

  8. The number of persons with alcohol problems in the Danish population

    DEFF Research Database (Denmark)

    Hansen, Anders B.G.; Hvidtfeldt, Ulla Arthur; Grønbæk, Morten

    2011-01-01

    , which included a personal interview of 14,566 individuals (response rate 66.7 %), and of 5,552 individuals who completed a self-administered questionnaire containing the Alcohol Use Disorder Test (AUDIT) (response rate 50.9%). Heavy drinkers were defined as consuming >14/21 drinks/week (women....... Results: In the Danish population, 20% were heavy drinkers (862,876 persons 95% confidence interval (95% CI): 672,002—1,195,069), 14% had harmful alcohol use (620,301 persons 95% CI: 439,221—944,992), 3% were dependent drinkers (147,528 persons 95% CI: 118,196—188,384). Being male was associated...

  9. Accurate identification of layer number for few-layer WS2 and WSe2 via spectroscopic study.

    Science.gov (United States)

    Li, Yuanzheng; Li, Xinshu; Yu, Tong; Yang, Guochun; Chen, Heyu; Zhang, Cen; Feng, Qiushi; Ma, Jiangang; Liu, Weizhen; Xu, Haiyang; Liu, Yichun; Liu, Xinfeng

    2018-03-23

    Transition metal dichalcogenides (TMDs) with a typical layered structure are highly sensitive to their layer number in optical and electronic properties. Seeking a simple and effective method for layer number identification is very important to low-dimensional TMD samples. Herein, a rapid and accurate layer number identification of few-layer WS 2 and WSe 2 is proposed via locking their photoluminescence (PL) peak-positions. As the layer number of WS 2 /WSe 2 increases, it is found that indirect transition emission is more thickness-sensitive than direct transition emission, and the PL peak-position differences between the indirect and direct transitions can be regarded as fingerprints to identify their layer number. Theoretical calculation confirms that the notable thickness-sensitivity of indirect transition derives from the variations of electron density of states of W atom d-orbitals and chalcogen atom p-orbitals. Besides, the PL peak-position differences between the indirect and direct transitions are almost independent of different insulating substrates. This work not only proposes a new method for layer number identification via PL studies, but also provides a valuable insight into the thickness-dependent optical and electronic properties of W-based TMDs.

  10. Identification of copy number variations and translocations in cancer cells from Hi-C data.

    Science.gov (United States)

    Chakraborty, Abhijit; Ay, Ferhat

    2017-10-18

    with CNV events for a breast cancer cell line (r=0.89) and capture most of the CNVs we simulate using Avesim. For HiCtrans predictions, we report evidence from the literature for 30 out of 90 translocations for eight of our cancer cell lines. Furthermore, we show that our tools identify and correctly classify relatively understudied rearrangements such as double minutes (DMs) and homogeneously staining regions (HSRs). Considering the inherent limitations of existing techniques for karyotyping (i.e., missing balanced rearrangements and those near repetitive regions), the accurate identification of CNVs and translocations in a cost-effective and high-throughput setting is still a challenge. Our results show that the set of tools we develop effectively utilize moderately sequenced Hi-C libraries (100-300 million reads) to identify known and de novo chromosomal rearrangements/abnormalities in well-established cancer cell lines. With the decrease in required number of cells and the increase in attainable resolution, we believe that our framework will pave the way towards comprehensive mapping of genomic rearrangements in primary cells from cancer patients using Hi-C. CNV calling: https://github.com/ay-lab/HiCnvTranslocation calling: https://github.com/ay-lab/HiCtransHi-C simulation: https://github.com/ay-lab/AveSim. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  12. Feature Extraction with GMDH-Type Neural Networks for EEG-Based Person Identification.

    Science.gov (United States)

    Schetinin, Vitaly; Jakaite, Livija; Nyah, Ndifreke; Novakovic, Dusica; Krzanowski, Wojtek

    2018-08-01

    The brain activity observed on EEG electrodes is influenced by volume conduction and functional connectivity of a person performing a task. When the task is a biometric test the EEG signals represent the unique "brain print", which is defined by the functional connectivity that is represented by the interactions between electrodes, whilst the conduction components cause trivial correlations. Orthogonalization using autoregressive modeling minimizes the conduction components, and then the residuals are related to features correlated with the functional connectivity. However, the orthogonalization can be unreliable for high-dimensional EEG data. We have found that the dimensionality can be significantly reduced if the baselines required for estimating the residuals can be modeled by using relevant electrodes. In our approach, the required models are learnt by a Group Method of Data Handling (GMDH) algorithm which we have made capable of discovering reliable models from multidimensional EEG data. In our experiments on the EEG-MMI benchmark data which include 109 participants, the proposed method has correctly identified all the subjects and provided a statistically significant ([Formula: see text]) improvement of the identification accuracy. The experiments have shown that the proposed GMDH method can learn new features from multi-electrode EEG data, which are capable to improve the accuracy of biometric identification.

  13. Management of radiation sources and personal dosimeters based on the optical identification using two-dimensional barcode

    International Nuclear Information System (INIS)

    Takao, Hideaki; Yoshida, Masahiro; Kaneko, Mamoru; Miura, Miwa; Hayashida, Rika; Okumura, Yutaka; Matsuda, Naoki

    2006-01-01

    For accurate and efficient radiation safety management in facilities using radioisotopes, two-dimensional barcode (2-DC) was applied to the optical identification of radiation sources and personal dosimeters. The mobile personal computer (PC) equipped with a barcode reader, which has imported inventory records from the pre-existing radiation management system, enabled us to finish inventory procedures for 170 2-DC-labelled radiation sources in as short as 20min by one person. Identification of 270 personal dosimeters in their monthly replacement procedures also successfully completed within 20 min by incorporating pre-labeled 2-DC to PC installed with inventory records of dosimeters and radiation workers. As equipments and software required for 2-DC are affordable, easy to operate, and potentially expandable, the introduction of 2-DC system may help to establish practically higher level of radiation management. (author)

  14. The Use of Personal Identity Numbers in Sweden and Denmark: A Barrier to Union Citizens' Enjoyment of Free Movement Rights?

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  15. Beyond the numbers : A user-centered design approach for personal reflective healthcare technologies

    NARCIS (Netherlands)

    Jimenez Garcia, J.C.

    2014-01-01

    The current healthcare paradigm shifts towards considering the patients’ home as the primary self-care environment. Health care is changing from being solely delivered by professionals in hospitals, to considering daily-life experiences and patients’ personal contexts. In order to meet this

  16. Identification of persons by means of the Fourier spectra of the optical transmission binary models of the human irises

    Czech Academy of Sciences Publication Activity Database

    Muroň, A.; Koiš, P.; Pospíšil, Jaroslav

    2001-01-01

    Roč. 192, - (2001), s. 161-167 ISSN 0030-4018 Institutional research plan: CEZ:AV0Z1010921 Keywords : human iris * coherent optical Fourier transform * identification of persons Subject RIV: BH - Optics, Masers, Lasers Impact factor: 1.354, year: 2001

  17. Assessment of lip print patterns and its use for personal identification among the populations of Rajnandgaon, Chhattisgarh, India.

    Science.gov (United States)

    Multani, Suraj; Thombre, Vivek; Thombre, Aparna; Surana, Pratik

    2014-09-01

    Personal identification plays an inevitable role in forensic investigation. Lip print is one of the evidences that can be left in the crime scene, which helps in identification purpose. Hence, the present study was undertaken to provide deeper inside view of use of cheiloscopy in personal identification, focusing on sex and age variability of lip print patterns in the population of Rajnandgaon city, Chhattisgarh, India. The cross-sectional study was conducted among 200 (100 males and 100 females) subjects of age 15-55 years, residing in different areas of Rajnandgaon city. The sex of the individual was determined as per the description given by Vahanwala et al. Frequency distribution and Chi-square test were used for data analysis by SPSS 16.0 V software. The most common lip print pattern in entire population was Type I (27.5%). Very highly significant difference was found in the distribution of lip print patterns among males and females in the entire population, group I, and group III, respectively (P prints can be used as one of the important forensic tools for personal identification on the basis of their age and gender variability among the populations.

  18. Constrained dictionary learning and probabilistic hypergraph ranking for person re-identification

    Science.gov (United States)

    He, You; Wu, Song; Pu, Nan; Qian, Li; Xiao, Guoqiang

    2018-04-01

    Person re-identification is a fundamental and inevitable task in public security. In this paper, we propose a novel framework to improve the performance of this task. First, two different types of descriptors are extracted to represent a pedestrian: (1) appearance-based superpixel features, which are constituted mainly by conventional color features and extracted from the supepixel rather than a whole picture and (2) due to the limitation of discrimination of appearance features, the deep features extracted by feature fusion Network are also used. Second, a view invariant subspace is learned by dictionary learning constrained by the minimum negative sample (termed as DL-cMN) to reduce the noise in appearance-based superpixel feature domain. Then, we use deep features and sparse codes transformed by appearancebased features to establish the hyperedges respectively by k-nearest neighbor, rather than jointing different features simply. Finally, a final ranking is performed by probabilistic hypergraph ranking algorithm. Extensive experiments on three challenging datasets (VIPeR, PRID450S and CUHK01) demonstrate the advantages and effectiveness of our proposed algorithm.

  19. Reliability of lip prints in personal identification: An inter-racial pilot study.

    Science.gov (United States)

    Kumar, Laliytha Bijai; Jayaraman, Venkatesh; Mathew, Philips; Ramasamy, S; Austin, Ravi David

    2016-01-01

    Forensic science is a branch of science that deals with the application of science and technology in solving a crime and this requires a multidisciplinary team effort. The word "Forensic" is derived from the Latin word, "Forensis" which means the study of public. Dental professionals should develop interests in contributing to legal issues. To study the lip prints among people of different races. Descriptive study. The present study comprised of ninety subjects of which Group A comprised of Africans, Group B comprised of Dravidian, and Group C of Mongoloid race. Each group was then further divided into 15 males and 15 females for whom the lip prints were recorded and evaluated. ANOVA test. ANOVA statistical analysis was used to compare three races of African, Dravidian, and Mongoloid races. The observed data among male and female were found to be significant with a P = 0.000492. The present study showed a significant difference in lip pattern among the three races. Perhaps future studies with a larger sample size and comparison between many other races may be done for better personal identification.

  20. Identification of candidate genes for dissecting complex branch number trait in chickpea.

    Science.gov (United States)

    Bajaj, Deepak; Upadhyaya, Hari D; Das, Shouvik; Kumar, Vinod; Gowda, C L L; Sharma, Shivali; Tyagi, Akhilesh K; Parida, Swarup K

    2016-04-01

    The present study exploited integrated genomics-assisted breeding strategy for genetic dissection of complex branch number quantitative trait in chickpea. Candidate gene-based association analysis in a branch number association panel was performed by utilizing the genotyping data of 401 SNP allelic variants mined from 27 known cloned branch number gene orthologs of chickpea. The genome-wide association study (GWAS) integrating both genome-wide GBS- (4556 SNPs) and candidate gene-based genotyping information of 4957 SNPs in a structured population of 60 sequenced desi and kabuli accessions (with 350-400 kb LD decay), detected 11 significant genomic loci (genes) associated (41% combined PVE) with branch number in chickpea. Of these, seven branch number-associated genes were further validated successfully in two inter (ICC 4958 × ICC 17160)- and intra (ICC 12299 × ICC 8261)-specific mapping populations. The axillary meristem and shoot apical meristem-specific expression, including differential up- and down-regulation (4-5 fold) of the validated seven branch number-associated genes especially in high branch number as compared to the low branch number-containing parental accessions and homozygous individuals of two aforesaid mapping populations was apparent. Collectively, this combinatorial genomic approach delineated diverse naturally occurring novel functional SNP allelic variants in seven potential known/candidate genes [PIN1 (PIN-FORMED protein 1), TB1 (teosinte branched 1), BA1/LAX1 (BARREN STALK1/LIKE AUXIN1), GRAS8 (gibberellic acid insensitive/GAI, Repressor of ga13/RGA and Scarecrow8/SCR8), ERF (ethylene-responsive element-binding factor), MAX2 (more axillary growth 2) and lipase] governing chickpea branch number. The useful information generated from this study have potential to expedite marker-assisted genetic enhancement by developing high-yielding cultivars with more number of productive (pods and seeds) branches in chickpea. Copyright © 2016 Elsevier

  1. Compelled to Risk: Does Sexual Compulsivity Explain the Connection Between Borderline Personality Disorder Features and Number of Sexual Partners?

    Science.gov (United States)

    Jardin, Charles; Sharp, Carla; Garey, Lorra; Vanwoerden, Salome; Crist, Nic; Elhai, Jon D; Zvolensky, Michael J

    2017-12-01

    Having more sexual partners increases the likelihood of new HIV infections among women. Women with more borderline personality disorder (BPD) features have been known to have greater numbers of sexual partners. However, the mechanisms linking BPD features with more sexual partners remain to be clarified. Sexual compulsivity (lack of control, increased distress over sexual behavior) may be one such explanatory factor, as it overlaps with BPD features (e.g., impulsivity, negative affectivity). The present study examined whether sexual compulsivity explained the relation of BPD features with number of sexual partners among a diverse sample of college females (N = 1,326). Results demonstrated a significant indirect effect of BPD features via sexual compulsivity on number of sexual partners. These findings support the relation between BPD features and sexual compulsivity and suggest sexual compulsivity as a target in the promotion of the sexual health of women with BPD who demonstrate risky sexual practices.

  2. Identification of petroleum hydrocarbons using a reduced number of PAHs selected by Procrustes rotation.

    Science.gov (United States)

    Fernández-Varela, R; Andrade, J M; Muniategui, S; Prada, D; Ramírez-Villalobos, F

    2010-04-01

    Identifying petroleum-related products released into the environment is a complex and difficult task. To achieve this, polycyclic aromatic hydrocarbons (PAHs) are of outstanding importance nowadays. Despite traditional quantitative fingerprinting uses straightforward univariate statistical analyses to differentiate among oils and to assess their sources, a multivariate strategy based on Procrustes rotation (PR) was applied in this paper. The aim of PR is to select a reduced subset of PAHs still capable of performing a satisfactory identification of petroleum-related hydrocarbons. PR selected two subsets of three (C(2)-naphthalene, C(2)-dibenzothiophene and C(2)-phenanthrene) and five (C(1)-decahidronaphthalene, naphthalene, C(2)-phenanthrene, C(3)-phenanthrene and C(2)-fluoranthene) PAHs for each of the two datasets studied here. The classification abilities of each subset of PAHs were tested using principal components analysis, hierarchical cluster analysis and Kohonen neural networks and it was demonstrated that they unraveled the same patterns as the overall set of PAHs. (c) 2009 Elsevier Ltd. All rights reserved.

  3. Identification of a low copy number plasmid in Xylella fastidiosa Strain Stag’s Leap

    Science.gov (United States)

    Xylella fastidiosa (Xf) causes Pierce’s Disease (PD) in grapevine. The Stag’s Leap strain is known for its high virulence level and is a model for PD research. Research on Xf has been difficult due to its nutritional fastidiousness. One difficult research issue is the low copy number plasmid. Plasmi...

  4. Identification of de novo copy number variants associated with human disorders of sexual development.

    Directory of Open Access Journals (Sweden)

    Mounia Tannour-Louet

    Full Text Available Disorders of sexual development (DSD, ranging in severity from genital abnormalities to complete sex reversal, are among the most common human birth defects with incidence rates reaching almost 3%. Although causative alterations in key genes controlling gonad development have been identified, the majority of DSD cases remain unexplained. To improve the diagnosis, we screened 116 children born with idiopathic DSD using a clinically validated array-based comparative genomic hybridization platform. 8951 controls without urogenital defects were used to compare with our cohort of affected patients. Clinically relevant imbalances were found in 21.5% of the analyzed patients. Most anomalies (74.2% evaded detection by the routinely ordered karyotype and were scattered across the genome in gene-enriched subtelomeric loci. Among these defects, confirmed de novo duplication and deletion events were noted on 1p36.33, 9p24.3 and 19q12-q13.11 for ambiguous genitalia, 10p14 and Xq28 for cryptorchidism and 12p13 and 16p11.2 for hypospadias. These variants were significantly associated with genitourinary defects (P = 6.08×10(-12. The causality of defects observed in 5p15.3, 9p24.3, 22q12.1 and Xq28 was supported by the presence of overlapping chromosomal rearrangements in several unrelated patients. In addition to known gonad determining genes including SRY and DMRT1, novel candidate genes such as FGFR2, KANK1, ADCY2 and ZEB2 were encompassed. The identification of risk germline rearrangements for urogenital birth defects may impact diagnosis and genetic counseling and contribute to the elucidation of the molecular mechanisms underlying the pathogenesis of human sexual development.

  5. Characterization of Volume F Trash from Four Recent STS Missions: Microbial Occurrence, Numbers, and Identifications

    Science.gov (United States)

    Strayer, Richard F.; Hummerick, Mary E.; Richards, Jeffrey T.; McCoy, LaShelle E.; Roberts, Michael S.; Wheeler, Raymond M.

    2011-01-01

    The fate of space-generated solid wastes, including trash, for future missions is under consideration by NASA. Several potential treatment options are under active technology development. Potential fates for space-generated solid wastes: Storage without treatment; storage after treatment(s) including volume reduction, water recovery, sterilization, and recovery plus recycling of waste materials. For this study, a microbial characterization was made on trash returned from four recent STS missions. The material analyzed were 'Volume F' trash and other bags of accompanying trash. This is the second of two submitted papers on these wastes. This first one covered trash content, weight and water content. Upon receipt, usually within 2 days of landing, trash contents were catalogued and placed into categories: drink containers, food waste, personal hygiene items, and packaging materials, i.e., plastic film and duct tape. Microbial counts were obtained with cultivatable counts on agar media and direct counts using Acridine Orange fluorescent stain (AODC). Trash bag surfaces, 25 square cm , were also sampled. Direct counts were approximately 1 x 10(exp 6) microbes/square cm and cultivatable counts ranged from 1 x 10 to 1 X 10(exp 4) microbes/ square cm-2. Aerobic microbes, aerobic sporeformers, and yeasts plus molds were common for all four missions. Waste items from each category were placed into sterile ziplock bags and 1.5 L sterile DI water added. These were then dispersed by hand shaking for 2 min. prior to inoculation of count media or determining AODC. In general, cultivatable microbes were found in drinks, food wastes, and personal hygiene items. Direct counts were usually higher than cultivatable counts. Some pathogens were found: Staphylococcus auerus, Escherichia coli (fecal wastes). Count ranges: drink pouches - AODC 2 x 10(exp 6) to 1 X 10(exp 8) g(sub fw) (exp -1); cultivatable counts variable between missions; food wastes: Direct counts were close to aerobic

  6. Denture identification using unique identification authority of India barcode

    OpenAIRE

    Sudhindra Mahoorkar; Anoop Jain

    2013-01-01

    Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.

  7. Denture identification using unique identification authority of India barcode.

    Science.gov (United States)

    Mahoorkar, Sudhindra; Jain, Anoop

    2013-01-01

    Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.

  8. Person-organization fit and organizational identification as predictors of positive and negative work-home interactions

    Directory of Open Access Journals (Sweden)

    Dorota Merecz

    2014-02-01

    Full Text Available Objectives: The aim of the presented research was to explore the links between complementary and supplementary dimensions of Person-Organization fit (P-O fit, organizational identification (OI and negative (WHI- versus positive (WHI+ work-home interactions. It was assumed that both complementary and supplementary P-O fit and OI were positively related to WHI+ and negatively to WHI-. Materials and Methods: The study was conducted on a large sample of Polish blue and white collar workers. The subjects were interviewed by means of questionnaires measuring: supplementary and complementary dimensions of P-O fit, OI and WHI. General work ability and demographic variables were also controlled in the study, and statistical analysis of ANOVA, pairwise comparison as well as regression were performed. Results: P-O fit and OI differentiated the subjects in terms of WHI. For women supplementary fit was a significant predictor of WHI- and explained 12% of its variance, for men it was complementary fit with the number of working days per week and the level of education, which explained 22% of variance. Supplementary fit and OI explained 16% of WHI+ variance in women; OI, tenure at the main place of employment and the level of education explained 8% of WHI+ variance in men. Conclusions: It has been proven that not only are the effects of P-O fit and OI limited to the work environment but they also permeate boundaries between work and home and influence private life - good level of P-O fit and good OI play facilitating role in the positive spillover between work and home. Gender differences in the significance and predictive values of P-O fit and OI for WHI were also found. The innovative aspect of the work is the inclusion of P-O fit and OI in the range of significant predictors of work-home interaction. The results can serve as rationale for employers that improvement of P-O fit and employees' organizational identification should be included in work

  9. Person-organization fit and organizational identification as predictors of positive and negative work-home interactions.

    Science.gov (United States)

    Merecz, Dorota; Andysz, Aleksandra

    2014-01-01

    The aim of the presented research was to explore the links between complementary and supplementary dimensions of Person-Organization fit (P-O fit), organizational identification (OI) and negative (WHI(-)) versus positive (WHI(+)) work-home interactions. It was assumed that both complementary and supplementary P-O fit and OI were positively related to WHI(+) and negatively to WHI(-). The study was conducted on a large sample of Polish blue and white collar workers. The subjects were interviewed by means of questionnaires measuring: supplementary and complementary dimensions of P-O fit, OI and WHI. General work ability and demographic variables were also controlled in the study, and statistical analysis of ANOVA, pairwise comparison as well as regression were performed. P-O fit and OI differentiated the subjects in terms of WHI. For women supplementary fit was a significant predictor of WHI(-) and explained 12% of its variance, for men it was complementary fit with the number of working days per week and the level of education, which explained 22% of variance. Supplementary fit and OI explained 16% of WHI(+) variance in women; OI, tenure at the main place of employment and the level of education explained 8% of WHI(+) variance in men. It has been proven that not only are the effects of P-O fit and OI limited to the work environment but they also permeate boundaries between work and home and influence private life - good level of P-O fit and good OI play facilitating role in the positive spillover between work and home. Gender differences in the significance and predictive values of P-O fit and OI for WHI were also found. The innovative aspect of the work is the inclusion of P-O fit and OI in the range of significant predictors of work-home interaction. The results can serve as rationale for employers that improvement of P-O fit and employees' organizational identification should be included in work-life balance programs.

  10. The role of serotonin in personality inference: tryptophan depletion impairs the identification of neuroticism in the face.

    Science.gov (United States)

    Ward, Robert; Sreenivas, Shubha; Read, Judi; Saunders, Kate E A; Rogers, Robert D

    2017-07-01

    Serotonergic mechanisms mediate the expression of personality traits (such as impulsivity, aggression and anxiety) that are linked to vulnerability to psychological illnesses, and modulate the identification of emotional expressions in the face as well as learning about broader classes of appetitive and aversive signals. Faces with neutral expressions signal a variety of socially relevant information, such that inferences about the big five personality traits, including Neuroticism, Extraversion and Agreeableness, can be accurately made on the basis of emotionally neutral facial photographs. Given the close link between Neuroticism and psychological distress, we investigated the effects of diminished central serotonin activity (achieved by tryptophan depletion) upon the accuracy of 52 healthy (non-clinical) adults' discriminations of personality from facial characteristics. All participants were able to discriminate reliably four of the big five traits. However, the tryptophan-depleted participants were specifically less accurate in discriminating Neuroticism than the matched non-depleted participants. These data suggest that central serotonin activity modulates the identification of not only negative facial emotional expression but also a broader class of signals about personality characteristics linked to psychological distress.

  11. Identification of Functional Single-Nucleotide Polymorphisms Affecting Leaf Hair Number in Brassica rapa.

    Science.gov (United States)

    Zhang, Wenting; Mirlohi, Shirin; Li, Xiaorong; He, Yuke

    2018-06-01

    Leaf traits affect plant agronomic performance; for example, leaf hair number provides a morphological indicator of drought and insect resistance. Brassica rapa crops have diverse phenotypes, and many B. rapa single-nucleotide polymorphisms (SNPs) have been identified and used as molecular markers for plant breeding. However, which SNPs are functional for leaf hair traits and, therefore, effective for breeding purposes remains unknown. Here, we identify a set of SNPs in the B. rapa ssp. pekinenesis candidate gene BrpHAIRY LEAVES1 ( BrpHL1 ) and a number of SNPs of BrpHL1 in a natural population of 210 B. rapa accessions that have hairy, margin-only hairy, and hairless leaves. BrpHL1 genes and their orthologs and paralogs have many SNPs. By intensive mutagenesis and genetic transformation, we selected the functional SNPs for leaf hairs by the exclusion of nonfunctional SNPs and the orthologous and paralogous genes. The residue tryptophan-92 of BrpHL1a was essential for direct interaction with GLABROUS3 and, thus, necessary for the formation of leaf hairs. The accessions with the functional SNP leading to substitution of the tryptophan-92 residue had hairless leaves. The orthologous BrcHL1b from B. rapa ssp. chinensis regulates hair formation on leaf margins rather than leaf surfaces. The selected SNP for the hairy phenotype could be adopted as a molecular marker for insect resistance in Brassica spp. crops. Moreover, the procedures optimized here can be used to explain the molecular mechanisms of natural variation and to facilitate the molecular breeding of many crops. © 2018 American Society of Plant Biologists. All rights reserved.

  12. Identification of genomic copy number variations associated with specific clinical features of head and neck cancer.

    Science.gov (United States)

    Zagradišnik, Boris; Krgović, Danijela; Herodež, Špela Stangler; Zagorac, Andreja; Ćižmarević, Bogdan; Vokač, Nadja Kokalj

    2018-01-01

    Copy number variations (CNSs) of large genomic regions are an important mechanism implicated in the development of head and neck cancer, however, for most changes their exact role is not well understood. The aim of this study was to find possible associations between gains/losses of genomic regions and clinically distinct subgroups of head and neck cancer patients. Array comparative genomic hybridization (aCGH) analysis was performed on DNA samples in 64 patients with cancer in oral cavity, oropharynx or hypopharynx. Overlapping genomic regions created from gains and losses were used for statistical analysis. Following regions were overrepresented: in tumors with stage I or II a gain of 2.98 Mb on 6p21.2-p11 and a gain of 7.4 Mb on 8q11.1-q11.23; in tumors with grade I histology a gain of 1.1 Mb on 8q24.13, a loss of a large part of p arm of chromosome 3, a loss of a 1.24 Mb on 6q14.3, and a loss of terminal 32 Mb region of 8p23.3; in cases with affected lymph nodes a gain of 0.75 Mb on 3q24, and a gain of 0.9 Mb on 3q26.32-q26.33; in cases with unaffected lymph nodes a gain of 1.1 Mb on 8q23.3, in patients not treated with surgery a gain of 12.2 Mb on 7q21.3-q22.3 and a gain of 0.33 Mb on 20q11.22. Our study identified several genomic regions of interest which appear to be associated with various clinically distinct subgroups of head and neck cancer. They represent a potentially important source of biomarkers useful for the clinical management of head and neck cancer. In particular, the PIK3CA and AGTR1 genes could be singled out to predict the lymph node involvement.

  13. A Multilayer Secure Biomedical Data Management System for Remotely Managing a Very Large Number of Diverse Personal Healthcare Devices

    Directory of Open Access Journals (Sweden)

    KeeHyun Park

    2015-01-01

    Full Text Available In this paper, a multilayer secure biomedical data management system for managing a very large number of diverse personal health devices is proposed. The system has the following characteristics: the system supports international standard communication protocols to achieve interoperability. The system is integrated in the sense that both a PHD communication system and a remote PHD management system work together as a single system. Finally, the system proposed in this paper provides user/message authentication processes to securely transmit biomedical data measured by PHDs based on the concept of a biomedical signature. Some experiments, including the stress test, have been conducted to show that the system proposed/constructed in this study performs very well even when a very large number of PHDs are used. For a stress test, up to 1,200 threads are made to represent the same number of PHD agents. The loss ratio of the ISO/IEEE 11073 messages in the normal system is as high as 14% when 1,200 PHD agents are connected. On the other hand, no message loss occurs in the multilayered system proposed in this study, which demonstrates the superiority of the multilayered system to the normal system with regard to heavy traffic.

  14. Finger nail plate shape and size for personal identification – a ...

    African Journals Online (AJOL)

    ... identification – a possible low technology method for the developing world ... The population included 496 consenting individuals, four family units and four sets of ... Examination showed variations within members of the families i.e. no two ...

  15. An investigation of player to player character identification via personal pronouns

    DEFF Research Database (Denmark)

    Hichens, Michael; Drachen, Anders; Richards, Deborah

    2012-01-01

    The player character is an important feature of many games, where it is through the character that the player interacts with game world. There has been considerable interest in the relationship between the player and the player character. Much of this work has examined the identification of players......, third) as an indication of the relationship between player and character. Results indicate that the presence of story and information about the player character had no effect on identification with the plater character. However, characteristics of the players, particularly gender and general experience...... in playing video games, did have a statistically significant affect, indicating that different levels of identification are more dependent on the player than on the game. This indicates that players are not a homogeneous group with respect to player character identification and is an important consideration...

  16. Methods for using a biometric parameter in the identification of persons

    Science.gov (United States)

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  17. Electronic palatal rugae impression: a potentially relevant technology in personal identification

    Directory of Open Access Journals (Sweden)

    Fabrizio Guerra

    2016-06-01

    Full Text Available Forensic medicine is now able to identify people through lots of different systems. Actually, fingerprints identification is the mostused identification method. To avoid identifying, many people alter or erase their fingerprints through chemical and / or abrasivesystems. The study of palatal rugae (palatoscopy is an identification technique today accepted by the international scientificcommunity as an alternative, safe and effective identification system, because of their characteristic feature of immutability andindividuality. Currently, the most used procedure is dental impression through plaster casts or photographs. The difficulties in therecording and cast’s storage limited the use of this identification system in comparison with others techniques. In order to improvethe palatal rugae analysis system, we designed a software, connected to a camera device that allows to acquire the palatal impression,to easily identify the salient palatal features and to store them in a database. This would permit a fast, simple and economicrecognition method that could be used without the need of specific staff training and that could easily be integrated with the existingfingerprint identification systems.

  18. Brute-Force Approach for Mass Spectrometry-Based Variant Peptide Identification in Proteogenomics without Personalized Genomic Data

    Science.gov (United States)

    Ivanov, Mark V.; Lobas, Anna A.; Levitsky, Lev I.; Moshkovskii, Sergei A.; Gorshkov, Mikhail V.

    2018-02-01

    In a proteogenomic approach based on tandem mass spectrometry analysis of proteolytic peptide mixtures, customized exome or RNA-seq databases are employed for identifying protein sequence variants. However, the problem of variant peptide identification without personalized genomic data is important for a variety of applications. Following the recent proposal by Chick et al. (Nat. Biotechnol. 33, 743-749, 2015) on the feasibility of such variant peptide search, we evaluated two available approaches based on the previously suggested "open" search and the "brute-force" strategy. To improve the efficiency of these approaches, we propose an algorithm for exclusion of false variant identifications from the search results involving analysis of modifications mimicking single amino acid substitutions. Also, we propose a de novo based scoring scheme for assessment of identified point mutations. In the scheme, the search engine analyzes y-type fragment ions in MS/MS spectra to confirm the location of the mutation in the variant peptide sequence.

  19. [Biometric method for the description of the head of an unrecognized corpse for the purpose of personality individualization and identification].

    Science.gov (United States)

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    We have determined absolute dimensions of the head and the relationship between the dimensions of its selected parts. The study enrolled adult subjects (mostly of Russian ethnicity) at the age from 17 to 22 years (1108 men and 1153 women). We calculated the normal values for the estimation of real dimensional characteristics and the frequency of their occurrence in the population. The proposed approach makes it possible to reliably identify the dimensional features of human appearance in terms of the quantitative verbal description (categories 1-5) and to reveal its most characteristic features. The results of this biometric study of the heads of unrecognized corpses obtained by the specially developed technology may be used in operational and search investigations, in the procedure of corpse identification, and forensic medical personality identification of a missing subject.

  20. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  1. Estimating the Number of Heterosexual Persons in the United States to Calculate National Rates of HIV Infection.

    Directory of Open Access Journals (Sweden)

    Amy Lansky

    Full Text Available This study estimated the proportions and numbers of heterosexuals in the United States (U.S. to calculate rates of heterosexually acquired human immunodeficiency virus (HIV infection. Quantifying the burden of disease can inform effective prevention planning and resource allocation.Heterosexuals were defined as males and females who ever had sex with an opposite-sex partner and excluded those with other HIV risks: persons who ever injected drugs and males who ever had sex with another man. We conducted meta-analysis using data from 3 national probability surveys that measured lifetime (ever sexual activity and injection drug use among persons aged 15 years and older to estimate the proportion of heterosexuals in the United States population. We then applied the proportion of heterosexual persons to census data to produce population size estimates. National HIV infection rates among heterosexuals were calculated using surveillance data (cases attributable to heterosexual contact in the numerators and the heterosexual population size estimates in the denominators.Adult and adolescent heterosexuals comprised an estimated 86.7% (95% confidence interval: 84.1%-89.3% of the U.S. population. The estimate for males was 84.1% (CI: 81.2%-86.9% and for females was 89.4% (95% CI: 86.9%-91.8%. The HIV diagnosis rate for 2013 was 5.2 per 100,000 heterosexuals and the rate of persons living with diagnosed HIV infection in 2012 was 104 per 100,000 heterosexuals aged 13 years or older. Rates of HIV infection were >20 times as high among black heterosexuals compared to white heterosexuals, indicating considerable disparity. Rates among heterosexual men demonstrated higher disparities than overall population rates for men.The best available data must be used to guide decision-making for HIV prevention. HIV rates among heterosexuals in the U.S. are important additions to cost effectiveness and other data used to make critical decisions about resources for

  2. 78 FR 57001 - Identification of Persons Pursuant to the Iranian Transactions and Sanctions Regulations and...

    Science.gov (United States)

    2013-09-16

    ... in property of the Government of Iran, including the Central Bank of Iran, that are in the United..., or instrumentality thereof, including the Central Bank of Iran, and any person owned or controlled by... instrumentality thereof, including the Central Bank of Iran; (b) Any person owned or controlled, directly or...

  3. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    Science.gov (United States)

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  4. The Influence of the Expression of Subtle and Blatant Sexual Prejudice on Personal Prejudice and Identification With the Expresser.

    Science.gov (United States)

    Krolikowski, Alex M; Rinella, Mark; Ratcliff, Jennifer J

    2016-01-01

    Although the negative consequences of subtle and blatant prejudice for the targets of prejudice are clear in the psychological literature, the impact of exposure to subtle and blatant prejudice on non-targets remains unclear. The current work examines how exposure to blatant and subtle sexual prejudice affects non-targets' personal endorsement of prejudice and their identification with the prejudice expresser. Results suggest that relative to exposure to blatant or neutral expressions of prejudice, exposure to subtle prejudice increased prejudice levels. Individuals were also more likely to distance from the prejudice expresser when exposed to blatant compared to subtle prejudice. The implications are discussed.

  5. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits.

    Science.gov (United States)

    Mehta, S; Rice, D; McIntyre, A; Getty, H; Speechley, M; Sequeira, K; Shapiro, A P; Morley-Forster, P; Teasell, R W

    2016-01-01

    Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  6. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits

    Directory of Open Access Journals (Sweden)

    S. Mehta

    2016-01-01

    Full Text Available Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p<0.05. Significant difference in disability was seen between the subgroups. Conclusions. The study identified a high risk group of CP individuals whose level of personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  7. Identification of genetic loci shared between schizophrenia and the Big Five personality traits.

    Science.gov (United States)

    Smeland, Olav B; Wang, Yunpeng; Lo, Min-Tzu; Li, Wen; Frei, Oleksandr; Witoelar, Aree; Tesli, Martin; Hinds, David A; Tung, Joyce Y; Djurovic, Srdjan; Chen, Chi-Hua; Dale, Anders M; Andreassen, Ole A

    2017-05-22

    Schizophrenia is associated with differences in personality traits, and recent studies suggest that personality traits and schizophrenia share a genetic basis. Here we aimed to identify specific genetic loci shared between schizophrenia and the Big Five personality traits using a Bayesian statistical framework. Using summary statistics from genome-wide association studies (GWAS) on personality traits in the 23andMe cohort (n = 59,225) and schizophrenia in the Psychiatric Genomics Consortium cohort (n = 82,315), we evaluated overlap in common genetic variants. The Big Five personality traits neuroticism, extraversion, openness, agreeableness and conscientiousness were measured using a web implementation of the Big Five Inventory. Applying the conditional false discovery rate approach, we increased discovery of genetic loci and identified two loci shared between neuroticism and schizophrenia and six loci shared between openness and schizophrenia. The study provides new insights into the relationship between personality traits and schizophrenia by highlighting genetic loci involved in their common genetic etiology.

  8. Palatal Rugae Pattern as an Aid for Personal Identification: A Forensic Study

    Directory of Open Access Journals (Sweden)

    R Kamala

    2011-01-01

    Conclusion: No two palates are alike in their configuration and once formed, they do not undergo any changes except in length due to normal growth, remaining in the same position throughout a person′s entire life. Thus, palatal rugae appear to possess the features of an ideal forensic identification parameter, i.e. uniqueness, postmortem resistance and stability, provided antemortem record exists.

  9. Biometric identification of cardiosynchronous waveforms utilizing person specific continuous and discrete wavelet transform features.

    Science.gov (United States)

    Bhagavatula, Chandrasekhar; Venugopalan, Shreyas; Blue, Rebecca; Friedman, Robert; Griofa, Marc O; Savvides, Marios; Kumar, B V K Vijaya

    2012-01-01

    In this paper we explore how a Radio Frequency Impedance Interrogation (RFII) signal may be used as a biometric feature. This could allow the identification of subjects in operational and potentially hostile environments. Features extracted from the continuous and discrete wavelet decompositions of the signal are investigated for biometric identification. In the former case, the most discriminative features in the wavelet space were extracted using a Fisher ratio metric. Comparisons in the wavelet space were done using the Euclidean distance measure. In the latter case, the signal was decomposed at various levels using different wavelet bases, in order to extract both low frequency and high frequency components. Comparisons at each decomposition level were performed using the same distance measure as before. The data set used consists of four subjects, each with a 15 minute RFII recording. The various data samples for our experiments, corresponding to a single heart beat duration, were extracted from these recordings. We achieve identification rates of up to 99% using the CWT approach and rates of up to 100% using the DWT approach. While the small size of the dataset limits the interpretation of these results, further work with larger datasets is expected to develop better algorithms for subject identification.

  10. Acoustic Signals Processing at the Realization of Contact-Difference Method for Person Identification

    Directory of Open Access Journals (Sweden)

    A. N. Golubinskiy

    2011-09-01

    Full Text Available The questions of speech and acoustic (registered on a human body at pronouncing by him of sounds signals processing are examined. The measure of a distinguish ability for identification at parameterization of a biometric image by an amplitude-frequency response of a human body is developed.

  11. Forensic Medicine and the Military Population: International Dental Records and Personal Identification Concerns

    Directory of Open Access Journals (Sweden)

    Maria Inês Guimarães

    2017-02-01

    Conclusion: This article reinforces the need for mandatory quality dental records in all countries, which must be efficiently stored and easily accessible in case dental identification is necessary. For the military population, these requirements are especially important, due to the added risks to which this group is subject.

  12. Design and construction the identification of nitriding plasma process parameters using personal computer based on serial communication

    International Nuclear Information System (INIS)

    Frida Iswinning Diah; Slamet Santosa

    2012-01-01

    Design and construction the identification of process parameters using personal computer based on serial communication PLC M-series has been done. The function of this device is to identify the process parameters of a system (plan), to which then be analyzed and conducted a follow-up given to the plan by the user. The main component of this device is the M-Series T100MD1616 PLC and personal computer (PC). In this device the data plan parameters obtained from the corresponding sensor outputs in the form of voltage or current. While the analog parameter data is adjusted to the ADC analog input of the PLC using a signal conditioning system. Then, as the parameter is processed by the PLC then sent to a PC via RS232 to be displayed in the form of graphs or tables and stored in the database. Software to program the database is created using Visual Basic Programming V-6. The device operation test is performed for the measurement of temperature parameter and vacuum level on the plasma nitriding machine. The results indicate that the device has functioning as an identification device parameters process of plasma nitriding machine. (author)

  13. Exploring the effects of age and delay on children's person identifications: verbal descriptions, lineup performance, and the influence of wildcards.

    Science.gov (United States)

    Karageorge, Aspasia; Zajac, Rachel

    2011-05-01

    We explored the effects of age and retention interval on several measures of children's person identification ability: verbal descriptions, lineup performance, and the success of a 'wildcard'--a photo of a silhouetted figure with a large question mark superimposed--in reducing children's tendency to choose from target-absent lineups. Children aged 5-7 years (N= 101) and 8-11 years (N= 109) were briefly exposed to an experimental confederate during a staged event. Either 1-2 days or 2 weeks later, children described the confederate and were then presented with either a target-present or -absent lineup. Within each group, approximately half of the children were presented with a wildcard and half were not. Target-present lineup performance improved as age increased. Compared to control children, children in the wildcard condition were more likely to correctly reject the target-absent lineup, and less likely to identify the innocent suspect. The wildcard did not influence children's target-present lineup accuracy, nor did delay exert an influence on any of our measures of lineup performance. These findings extend our knowledge of children's person identifications, as well as providing further support for the use of wildcards in photographic lineups. ©2010 The British Psychological Society.

  14. The person in the mirror: using the enfacement illusion to investigate the experiential structure of self-identification.

    Science.gov (United States)

    Tajadura-Jiménez, Ana; Longo, Matthew R; Coleman, Rosie; Tsakiris, Manos

    2012-12-01

    How do we acquire a mental representation of our own face? Recently, synchronous, but not asynchronous, interpersonal multisensory stimulation (IMS) between one's own and another person's face has been used to evoke changes in self-identification (enfacement illusion). We investigated the conscious experience of these changes with principal component analyses (PCA) that revealed that while the conscious experience during synchronous IMS focused on resemblance and similarity with the other's face, during asynchronous IMS it focused on multisensory stimulation. Analyses of the identified common factor structure revealed significant quantitative differences between synchronous and asynchronous IMS on self-identification and perceived similarity with the other's face. Experiment 2 revealed that participants with lower interoceptive sensitivity experienced stronger enfacement illusion. Overall, self-identification and body-ownership rely on similar basic mechanisms of multisensory integration, but the effects of multisensory input on their experience are qualitatively different, possibly underlying the face's unique role as a marker of selfhood. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. Human Identification by Cross-Correlation and Pattern Matching of Personalized Heartbeat: Influence of ECG Leads and Reference Database Size.

    Science.gov (United States)

    Jekova, Irena; Krasteva, Vessela; Schmid, Ramun

    2018-01-27

    Human identification (ID) is a biometric task, comparing single input sample to many stored templates to identify an individual in a reference database. This paper aims to present the perspectives of personalized heartbeat pattern for reliable ECG-based identification. The investigations are using a database with 460 pairs of 12-lead resting electrocardiograms (ECG) with 10-s durations recorded at time-instants T1 and T2 > T1 + 1 year. Intra-subject long-term ECG stability and inter-subject variability of personalized PQRST (500 ms) and QRS (100 ms) patterns is quantified via cross-correlation, amplitude ratio and pattern matching between T1 and T2 using 7 features × 12-leads. Single and multi-lead ID models are trained on the first 230 ECG pairs. Their validation on 10, 20, ... 230 reference subjects (RS) from the remaining 230 ECG pairs shows: (i) two best single-lead ID models using lead II for a small population RS = (10-140) with identification accuracy AccID = (89.4-67.2)% and aVF for a large population RS = (140-230) with AccID = (67.2-63.9)%; (ii) better performance of the 6-lead limb vs. the 6-lead chest ID model-(91.4-76.1)% vs. (90.9-70)% for RS = (10-230); (iii) best performance of the 12-lead ID model-(98.4-87.4)% for RS = (10-230). The tolerable reference database size, keeping AccID > 80%, is RS = 30 in the single-lead ID scenario (II); RS = 50 (6 chest leads); RS = 100 (6 limb leads), RS > 230-maximal population in this study (12-lead ECG).

  16. Kaon identification and Search for Lepton Number Violation in $K^{\\pm}$ decay-in-flight experiments at CERN

    CERN Document Server

    Massri, Karim; Goudzovski, Evgueni

    A search for the Lepton Number Violating decay $K^{\\pm} \\to \\pi^{\\pm} \\mu^{\\pm} \\mu^{\\pm}$ has been performed using the data collected by the NA48/2 experiment in 2003 and 2004. The signal event selection, the background rejection, the evaluation of the muon identifcation efficiency and the statistical methods used for the data interpretation are presented. Based on $1.8 \\times 10 ^{11}$ kaon decays in the fiducial volume and using several models for the signal, upper limits for the branching fraction B($K^{\\pm} \\to \\pi^{\\pm} \\mu^{\\pm} \\mu^{\\pm}$) of the order of $10^{-10} $ have been obtained for 90%, 95% and 99% confidence levels, improving the previous best limit by one order of magnitude. The Cherenkov differential counter used for kaon identification in the NA62 experiment, equipped with approximately 30% of the photo-detectors, was installed and tested during a Technical Run in 2012. The counter's ability of distinguishing between kaons and pions has been validated via pressure scan procedure. The da...

  17. When and which employees feel obliged: A personality perspective of how organizational identification develops

    Directory of Open Access Journals (Sweden)

    Muhammad Ali Asadullah

    2017-07-01

    Full Text Available This paper examines the indirect effect of interpersonal and informational justice on organizational identification through psychological contract fulfillment across different levels of equity sensitivity. The data were collected using self-reported measures from 656 permanent employees working in five commercial banks in Pakistan. The statistical results of the study confirmed that the indirect effect of interpersonal and informational justice on organizational identification through psychological contract fulfillment is significant. However, the statistical results of the study also demonstrated that the indirect effect of interpersonal and informational justice does not differ across different levels of equity sensitivity. This study offers some implications for managers to maintain an effective employment relationship with the employees inside the organizations.

  18. Service workers' job performance: the roles of personality traits, organizational identification, and customer orientation

    OpenAIRE

    He, Hongwei; Wang, Weiyue; Zhu, Weichun; Harris, Lloyd

    2015-01-01

    Purpose– This paper aims to advance the literature by testing the boundary of this relationship with reference to a key construct in employee performance in the service domain: employee customer orientation. Organizational identification refers to employees’ perceived oneness and belongingness to their work organization, and has been argued to be associated with higher employee performance.Design/methodology/approach– Data were collected based on a sample of call center service workers. Emplo...

  19. Analisis heteroplasmy DNA mitokondria pulpa gigi pada identifikasi personal forensik (Heteroplasmy analysis of dental pulp mitochondrial DNA in forensic personal identification

    Directory of Open Access Journals (Sweden)

    Ardyni Febri K

    2013-09-01

    Full Text Available Background: Mitochondrial DNA (mtDNA sequence analysis of the hypervariable control region has been shown to be an effective tool for personal identification. The high copy and maternal mode of inheritance make mtDNA analysis particularly useful when old samples or degradation of biological samples prohibits the detection of nuclear DNA analysis. Dental pulp is covered with hard tissue such as dentin and enamel. It is highly capable of protecting the DNA and thus is extremely useful. One of the diasadvantages of mitochondrial DNA is heteroplasmy. Heteroplasmy is the presence of a mixture of more than one type of an organellar genome within a cell or individual. It can lead to ambiguity in forensic personal identification. Due to that, the evidence of heteroplasmy in dental pulp is needed. Purpose: The study was aimed to determine the heteroplasmy occurance of mitocondrial DNA in dental pulp. Methods: Blood and teeth samples were taken from 6 persons, each samples was extracted with DNAzol. DNA samples were amplified with PCR and sequencing to analyze the nucleotide sequences polymorphism of the hypervariable region 1 in mtDNA and compared with revised Cambridge Reference Sequence (rCRS. results: The dental pulp and blood nucleotide sequence of hypervariable region 1 mitochondrial DNA showed polymorphism when compared with rCRS and heteroplasmy when compared between dental pulp with blood. Conclusion: The study showed that heteroplasmy was found in mithocondrial DNA from dental pulp.latar belakang: Analisis sekuens DNA mitokondria (mtDNA regio kontrol hypervariable telah terbukti menjadi alat efektif untuk identifikasi personal. Kopi DNA yang banyak dan pewarisan maternal membuat analisis mtDNA sangat berguna ketika sampel lama atau sampel biologis yang terdegradasi menghambat deteksi analisis DNA inti. Pulpa gigi terlindung jaringan keras seperti dentin dan enamel. Hal ini membuat pulpa mampu melindungi DNA dan dengan demikian sangat berguna

  20. Solving Person Re-identification in Non-overlapping Camera using Efficient Gibbs Sampling

    NARCIS (Netherlands)

    John, V.; Englebienne, G.; Krose, B.; Burghardt, T.; Damen, D.; Mayol-Cuevas, W.; Mirmehdi, M.

    2013-01-01

    This paper proposes a novel probabilistic approach for appearance-based person reidentification in non-overlapping camera networks. It accounts for varying illumination, varying camera gain and has low computational complexity. More specifically, we present a graphical model where we model the

  1. E-Learning Personalization Based on Hybrid Recommendation Strategy and Learning Style Identification

    Science.gov (United States)

    Klasnja-Milicevic, Aleksandra; Vesin, Boban; Ivanovic, Mirjana; Budimac, Zoran

    2011-01-01

    Personalized learning occurs when e-learning systems make deliberate efforts to design educational experiences that fit the needs, goals, talents, and interests of their learners. Researchers had recently begun to investigate various techniques to help teachers improve e-learning systems. In this paper, we describe a recommendation module of a…

  2. Validating the Alcohol Use Disorders Identification Test with Persons Who Have a Serious Mental Illness

    Science.gov (United States)

    O'Hare, Thomas; Sherrer, Margaret V.; LaButti, Annamaria; Emrick, Kelly

    2004-01-01

    Objective/Method: The use of brief, reliable, valid, and practical measures of substance use is critical for conducting individual assessments and program evaluation for integrated mental health-substance abuse services for persons with serious mental illness. This investigation examines the internal consistency reliability, concurrent validity,…

  3. Identification of the Predictive Power of Five Factor Personality Traits for Individual Instrument Performance Anxiety

    Science.gov (United States)

    Özdemir, Gökhan; Dalkiran, Esra

    2017-01-01

    This study, with the aim of identifying the predictive power of the five-factor personality traits of music teacher candidates on individual instrument performance anxiety, was designed according to the relational screening model. The study population was students attending the Music Education branch of Fine Arts Education Departments in…

  4. Cephalometric Analysis for Gender Determination Using Maxillary Sinus Index: A Novel Dimension in Personal Identification

    Directory of Open Access Journals (Sweden)

    Tanya Khaitan

    2017-01-01

    Full Text Available Purpose. Radiography is important in forensic odontology for the identification of humans. The maxillary sinus is the largest of the paranasal sinuses and first to develop. Sinus radiography has been used for identification of skeletal remains and determination of gender. Hence, the aim and objectives of the present study were to establish a new method for gender determination using maxillary sinus index from lateral cephalometric radiographs and to establish the reliability of maxillary sinus for gender determination. Methods. A total of 50 adult digital lateral cephalometric radiographs (25 males and 25 females were included in the study. The maxillary sinus analysis was performed on these radiographs using the height and width measurement tools of Sidexis XG software. Maxillary sinus index was calculated, discriminant function analysis performed, and discriminant equation derived for determination of gender. Results. The mean maxillary sinus height and width were found to be higher in males, whereas the maxillary sinus index was greater in females. The discriminant function analysis derived in the study was able to differentiate the sex groups with sensitivity of 68% and specificity of 76%. Conclusions. From the results of the present study, it may be concluded that morphometric analysis of maxillary sinus can be used as a reliable tool in gender determination.

  5. Pore sub-features reproducibility in direct microscopic and Livescan images--their reliability in personal identification.

    Science.gov (United States)

    Gupta, Abhishek; Sutton, Raul

    2010-07-01

    Third level features have been reported to have equal discriminatory power as second level details in establishing personal identification. Pore area, as an extended set third level sub-feature, has been studied by minimizing possible factors that could affect pore size. The reproducibility of pore surface area has been studied using direct microscopic and 500 ppi Livescan images. Direct microscopic pore area measurements indicated that the day on which the pore area was measured had a significant impact on the measured pore area. Pore area measurement was shown to be difficult to estimate in 500 ppi Livescan measurements owing to lack of resolution. It is not possible to reliably use pore area as an identifying feature in fingerprint examination.

  6. Molecular formula and METLIN Personal Metabolite Database matching applied to the identification of compounds generated by LC/TOF-MS.

    Science.gov (United States)

    Sana, Theodore R; Roark, Joseph C; Li, Xiangdong; Waddell, Keith; Fischer, Steven M

    2008-09-01

    In an effort to simplify and streamline compound identification from metabolomics data generated by liquid chromatography time-of-flight mass spectrometry, we have created software for constructing Personalized Metabolite Databases with content from over 15,000 compounds pulled from the public METLIN database (http://metlin.scripps.edu/). Moreover, we have added extra functionalities to the database that (a) permit the addition of user-defined retention times as an orthogonal searchable parameter to complement accurate mass data; and (b) allow interfacing to separate software, a Molecular Formula Generator (MFG), that facilitates reliable interpretation of any database matches from the accurate mass spectral data. To test the utility of this identification strategy, we added retention times to a subset of masses in this database, representing a mixture of 78 synthetic urine standards. The synthetic mixture was analyzed and screened against this METLIN urine database, resulting in 46 accurate mass and retention time matches. Human urine samples were subsequently analyzed under the same analytical conditions and screened against this database. A total of 1387 ions were detected in human urine; 16 of these ions matched both accurate mass and retention time parameters for the 78 urine standards in the database. Another 374 had only an accurate mass match to the database, with 163 of those masses also having the highest MFG score. Furthermore, MFG calculated a formula for a further 849 ions that had no match to the database. Taken together, these results suggest that the METLIN Personal Metabolite database and MFG software offer a robust strategy for confirming the formula of database matches. In the event of no database match, it also suggests possible formulas that may be helpful in interpreting the experimental results.

  7. Realtime Observation, Identification and Tracking from dangerous persons in airports - a logistics system ROIT

    Directory of Open Access Journals (Sweden)

    Bernd Hentschel

    2013-09-01

    Full Text Available Background: The aim of this paper is to present and analyze a new method of the logistics disaster management and concentrates particularly on terrorist attacks of CBRN type (C - chemical attack/weapon, B - biological attack/weapon, R - radiological attack/weapon, N - nuclear attack/weapon at the airports. Each of the aforementioned is an issue of great importance and high priority for the airport communication.                                                                   Methods: The research of a ROIT project (Realtime Observation, Identification and Tracking from dangerous people in airports has been conducted in a way that enables the application of the three-step computer system. The program has been configured to identify, observe and protect from undesired actions of people suspected of involvement in CBRN. Results: The main results of applying the device in different scenarios are: enabling reliable automatic identification and classification of potentially hazardous materials and substances, association of the materials with their owners or distributors.                                                                            Conclusion: Simultaneous passing information to the airport security guards, police and expert team guarantees that further purposes involve the independent opportunity to observe in real time the CBRN suspects as well as to eliminate them secretly and quickly from the rest of airport passengers after thorough and credible identification.

  8. Hyper-realistic face masks: a new challenge in person identification.

    Science.gov (United States)

    Sanders, Jet Gabrielle; Ueda, Yoshiyuki; Minemoto, Kazusa; Noyes, Eilidh; Yoshikawa, Sakiko; Jenkins, Rob

    2017-01-01

    We often identify people using face images. This is true in occupational settings such as passport control as well as in everyday social environments. Mapping between images and identities assumes that facial appearance is stable within certain bounds. For example, a person's apparent age, gender and ethnicity change slowly, if at all. It also assumes that deliberate changes beyond these bounds (i.e., disguises) would be easy to spot. Hyper-realistic face masks overturn these assumptions by allowing the wearer to look like an entirely different person. If unnoticed, these masks break the link between facial appearance and personal identity, with clear implications for applied face recognition. However, to date, no one has assessed the realism of these masks, or specified conditions under which they may be accepted as real faces. Herein, we examined incidental detection of unexpected but attended hyper-realistic masks in both photographic and live presentations. Experiment 1 (UK; n = 60) revealed no evidence for overt detection of hyper-realistic masks among real face photos, and little evidence of covert detection. Experiment 2 (Japan; n = 60) extended these findings to different masks, mask-wearers and participant pools. In Experiment 3 (UK and Japan; n = 407), passers-by failed to notice that a live confederate was wearing a hyper-realistic mask and showed limited evidence of covert detection, even at close viewing distance (5 vs. 20 m). Across all of these studies, viewers accepted hyper-realistic masks as real faces. Specific countermeasures will be required if detection rates are to be improved.

  9. Realization of Personalized Services for Intelligent Residential Space based on User Identification Method using Sequential Walking Footprints

    Directory of Open Access Journals (Sweden)

    Jin-Woo Jung

    2005-04-01

    Full Text Available A new human-friendly assistive home environment, Intelligent Sweet Home (ISH, developed at KAIST, Korea for testing advanced concepts for independent living of the elderly/the physically handicapped. The concept of ISH is to consider the home itself as an intelligent robot. ISH always checks the intention or health status of the resident. Therefore, ISH can do actively the most proper services considering the resident's life-style by the detected intention or emergency information. But, when there are more than two residents, ISH cannot consider the residents' characteristics or tastes if ISH cannot identify who he/she is before. To realize a personalized service system in the intelligent residential space like ISH, we deal with a human-friendly user identification method for ubiquitous computing environment, specially focused on dynamic human footprint recognition. And then, we address some case studies of personalized services that have been experienced by Human-friendly Welfare Robot System research center, KAIST.

  10. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    ...) as a primary personal identifier. Originally intended for the very limited purpose of tracking social security benefits, the value of the SSN as a unique identifier was quickly recognized, and its use rapidly grew...

  11. Automatic Identification of the Repolarization Endpoint by Computing the Dominant T-wave on a Reduced Number of Leads.

    Science.gov (United States)

    Giuliani, C; Agostinelli, A; Di Nardo, F; Fioretti, S; Burattini, L

    2016-01-01

    Electrocardiographic (ECG) T-wave endpoint (Tend) identification suffers lack of reliability due to the presence of noise and variability among leads. Tend identification can be improved by using global repolarization waveforms obtained by combining several leads. The dominant T-wave (DTW) is a global repolarization waveform that proved to improve Tend identification when computed using the 15 (I to III, aVr, aVl, aVf, V1 to V6, X, Y, Z) leads usually available in clinics, of which only 8 (I, II, V1 to V6) are independent. The aim of the present study was to evaluate if the 8 independent leads are sufficient to obtain a DTW which allows a reliable Tend identification. To this aim Tend measures automatically identified from 15-dependent-lead DTWs of 46 control healthy subjects (CHS) and 103 acute myocardial infarction patients (AMIP) were compared with those obtained from 8-independent-lead DTWs. Results indicate that Tend distributions have not statistically different median values (CHS: 340 ms vs. 340 ms, respectively; AMIP: 325 ms vs. 320 ms, respectively), besides being strongly correlated (CHS: ρ=0.97, AMIP: 0.88; Pautomatic Tend identification from DTW, the 8 independent leads can be used without a statistically significant loss of accuracy but with a significant decrement of computational effort. The lead dependence of 7 out of 15 leads does not introduce a significant bias in the Tend determination from 15 dependent lead DTWs.

  12. Within-person changes in the structure of emotion: the role of cultural identification and language.

    Science.gov (United States)

    Perunovic, Wei Qi Elaine; Heller, Daniel; Rafaeli, Eshkol

    2007-07-01

    This study explored the within-person dynamic organization of emotion in East-Asian Canadian bicultural individuals as they function in two cultural worlds. Using a diary design, we examined under what conditions their emotional structure resembles that of Westerners or that of East Asians. As predicted, when these bicultural individuals identified with a Western culture or had recently spoken a non-Asian language, their positive and negative affect were inversely associated. When they identified with an Asian culture or interacted in an Asian language, this inverse association disappeared. This study shows that as bicultural individuals identify and communicate with members of one or the other cultural group, they may adopt a culturally congruent phenomenology, including a distinct affective pattern.

  13. Relapse (number of detoxifications) in abstinent male alcohol-dependent patients as related to personality traits and types of tolerance to frustration.

    Science.gov (United States)

    Baars, Melanie Y; Müller, Matthias J; Gallhofer, Bernd; Netter, Petra

    2013-01-01

    Personality traits like depression on the one hand and aggression and impulsivity on the other are assumed to be predisposing factors for different types of alcohol dependence. Both types are associated with sensitivity to frustration, but this may be different for the two types of personality according to whether they are confronted with frustrations caused by withdrawal from positive or infliction of negative events. It has not been shown so far if both types of personality factors and the two different sources of frustration are differently relevant for the propensity of relapse. This was investigated here in a study on 60 abstinent male alcohol-dependent patients. Correlations between the number of previous detoxifications reflecting liability to relapse and questionnaire scores on personality factors and on reactions to frustration were computed. Bonferroni-corrected correlations yielded significant relationships between the number of detoxifications and the personality factor of aggression as well as pronounced depressive reactions to frustrating conditions of non-reward caused by humans. Controlling for impulsivity, aggression and depression revealed that depressive reactions to frustration are genuine predictors for probability of relapse independent of underlying personality factors. Persons particularly sensitive to frustrations from human denial of positive reinforcers are liable to relapse which fits the theory of sensitivity to reward in drug-addicted individuals. Results demonstrate that relapse is clearly more related to aggression than to impulsivity, depression and anxiety and may be facilitated if persons are sensitive to frustrating conditions of non-reward caused by social partners. Copyright © 2013 S. Karger AG, Basel.

  14. Disaggregating Within- and Between-Person Effects of Social Identification on Subjective and Endocrinological Stress Reactions in a Real-Life Stress Situation.

    Science.gov (United States)

    Ketturat, Charlene; Frisch, Johanna U; Ullrich, Johannes; Häusser, Jan A; van Dick, Rolf; Mojzisch, Andreas

    2016-02-01

    Several experimental and cross-sectional studies have established the stress-buffering effect of social identification, yet few longitudinal studies have been conducted within this area of research. This study is the first to make use of a multilevel approach to disaggregate between- and within-person effects of social identification on subjective and endocrinological stress reactions. Specifically, we conducted a study with 85 prospective students during their 1-day aptitude test for a university sports program. Ad hoc groups were formed, in which students completed several tests in various disciplines together. At four points in time, salivary cortisol, subjective strain, and identification with their group were measured. Results of multilevel analyses show a significant within-person effect of social identification: The more students identified with their group, the less stress they experienced and the lower their cortisol response was. Between-person effects were not significant. Advantages of using multilevel approaches within this field of research are discussed. © 2015 by the Society for Personality and Social Psychology, Inc.

  15. The performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in a population of depressed or anxious persons

    NARCIS (Netherlands)

    Boschloo, Lynn; Vogelzangs, Nicole; Smit, Johannes H.; van den Brink, Wim; Veltman, Dick J.; Beekman, Aartjan T. F.; Penninx, Brenda W. J. H.

    2010-01-01

    BACKGROUND: Alcohol use disorders are highly prevalent but often remain unrecognized among depressed and/or anxious persons. This study examines the performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in this high-risk group and compares it

  16. "I'm Just a Numbers Person": The Complexity, Nature and Effects of the Quantification of Education

    Science.gov (United States)

    Hardy, Ian

    2015-01-01

    This paper draws upon the sociology of numbers, particularly work by Theodore Porter, to reveal the multifarious ways in which numbers actively constitute practices in schools. Drawing upon a case study of one low-performing school in a low-performing region in the state of Queensland, Australia, and theorising into the sociology of numbers, the…

  17. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  18. Individualizing characteristics of footprints in Malaysian Malays for person identification from a forensic perspective

    Directory of Open Access Journals (Sweden)

    T. Nataraja Moorthy

    2015-03-01

    Full Text Available One of the valuable physical evidence that a suspect leaves unintentionally at a crime scene is likely to include footprints. Physical evidence needs to be utilized to express individual characteristics. Very keen analysis of footprints can provide useful information to establish personal identity and ease the crime investigation. The present study aims to analyze and describe the individual characteristics of footprints of Malaysian Malays from a forensic perspective in a sample of 400 adult Malay participants consisting of 200 males and 200 females. The footprints were collected using an inkless shoe print kit (Carolina, USA. Various features of the toes, humps in the toe line, phalange marks, flatfoot condition, pits, cracks, corns, etc., were investigated. The frequency of these characteristics was recorded. The frequency of the fibularis-type foot is the highest, followed by the tibialis-type, the intermediate-type and the midularis-type is found to have the least frequency in both the sexes. This sequence is found to be different from the sequence observed in the north Indian population. Two humps have been found most often in male footprints followed by three humps and zero hump is found to be the least frequent. While in female footprints, three humps have been found, most often followed by two humps and zero hump is found to be the least frequent. Other identifying features are also highlighted using illustrations. This trait shows bilateral variation. The morphological length of toes and some other features in this study are found to be different from footprints of Indian Tamils, North Indian Gujjars and the Thai population.

  19. Family Members Identification with Brightness Distribution Sensors to Self-sustaining of Power as Personal Actions

    Directory of Open Access Journals (Sweden)

    Nobuaki Takaoka

    2015-11-01

    Full Text Available There are many attempts to recognize actions using sensors in homes. Some of them aim to keep watching on the elderly living alone, while others try to bring ecological life, scheduling domestic actions consuming energy. We need an inexpensive method to make it prevail in the society. In the meantime, recognition results threaten privacy, if outsiders obtain them. Almost all people mind whether they are used in malicious ways. The sensor should prevent the leak of the privacy of users. This work proposes a method to recognize various domestic actions with a single kind of sensors, which is not only inexpensive, but also safe enough to protect the privacy. The method uses brightness distribution sensors presenting a sequence of cells, each of which indicates the brightness of one direction in the view area of the sensor. The method gets local features along with the persons who conduct domestic actions. The method enables to recognize both of domestic actions and the period in which they are conducted. To evaluate the accuracy of the method, 10 men and women have participated in an experiment, where they take various domestic actions in their own ways with 4 brightness distribution sensors installed on the wall of an actual kitchen. As a result, the method has marked high performance on the recognition of “vacuuming”, “cooking”, and “taking a rest”, along with their periods. The method also identifies all examinees who conduct them in high accuracy. It is possible to recognize domestic actions in actual home spaces.

  20. Index case finding facilitates identification and linkage to care of children and young persons living with HIV/AIDS in Malawi.

    Science.gov (United States)

    Ahmed, Saeed; Sabelli, Rachael A; Simon, Katie; Rosenberg, Nora E; Kavuta, Elijah; Harawa, Mwelura; Dick, Spencer; Linzie, Frank; Kazembe, Peter N; Kim, Maria H

    2017-08-01

    Evaluation of a novel index case finding and linkage-to-care programme to identify and link HIV-infected children (1-15 years) and young persons (>15-24 years) to care. HIV-infected patients enrolled in HIV services were screened and those who reported untested household members (index cases) were offered home- or facility-based HIV testing and counselling (HTC) of their household by a community health worker (CHW). HIV-infected household members identified were enrolled in a follow-up programme offering home and facility-based follow-up by CHWs. Of the 1567 patients enrolled in HIV services, 1030 (65.7%) were screened and 461 (44.8%) identified as index cases; 93.5% consented to HIV testing of their households and of those, 279 (64.7%) reported an untested child or young person. CHWs tested 711 children and young persons, newly diagnosed 28 HIV-infected persons (yield 4.0%; 95% CI: 2.7-5.6), and identified an additional two HIV-infected persons not enrolled in care. Of the 30 HIV-infected persons identified, 23 (76.6%) were linked to HIV services; 18 of the 20 eligible for ART (90.0%) were initiated. Median time (IQR) from identification to enrolment into HIV services was 4 days (1-8) and from identification to ART start was 6 days (1-8). Almost half of HIV-infected patients enrolled in treatment services had untested household members, many of whom were children and young persons. Index case finding, coupled with home-based testing and tracked follow-up, is acceptable, feasible and facilitates the identification and timely linkage to care of HIV-infected children and young persons. © 2017 The Authors. Tropical Medicine & International Health Published by John Wiley & Sons Ltd.

  1. Influence of type of prosthesis on oral environment and the number of missing teeth in elderly persons.

    Science.gov (United States)

    Tanaka, Junko; Tanaka, Masahiro

    2010-01-01

    The purpose of this study was to investigate the relationship between the number of missing teeth (MT) and the statuses of oral environmental factors (the stimulated salivary flow rate, buffering capacity, and the counts of mutans streptococci, lactobacilli, and Candida) in the elderly. The subjects were 64 elderly subjects with fixed prostheses and 49 who wore removable partial dentures aged over 65 years. We used one-way ANOVA to test for overall differences of the number of MT among 5 oral environmental factors. The significant differences were observed in the lactobacilli counts for different number of MT. The number of MT increased with an increase in the lactobacilli counts with removable denture. In conclusion, for the patients wearing removable dentures, increasing number of MT was associated with an increase in the lactobacilli counts in saliva. For the patients with crowns and fixed partial dentures, the number of MT was not significantly affected by salivary mutans streptococci, lactobacilli, and Candida counts.

  2. Improved Palmprint Identification System

    Directory of Open Access Journals (Sweden)

    Harshala C. Salave

    2015-03-01

    Full Text Available Abstract Generally private information is provided by using passwords or Personal Identification Numbers which is easy to implement but it is very easily stolen or forgotten or hack. In Biometrics for individuals identification uses human physiological which are constant throughout life like palm face DNA iris etc. or behavioral characteristicswhich is not constant in life like voice signature keystroke etc.. But mostly gain more attention to palmprint identification and is becoming more popular technique using for identification and promising alternatives to the traditional password or PIN based authentication techniques. In this paper propose palmprint identification using veins on the palm and fingers. Here use fusion of techniques such as Discrete Wavelet transformDWT Canny Edge Detector Gaussian Filter Principle Component AnalysisPCA.

  3. Influence of Type of Prosthesis on Oral Environment and the Number of Missing Teeth in Elderly Persons

    Directory of Open Access Journals (Sweden)

    Junko Tanaka

    2010-01-01

    Full Text Available The purpose of this study was to investigate the relationship between the number of missing teeth (MT and the statuses of oral environmental factors (the stimulated salivary flow rate, buffering capacity, and the counts of mutans streptococci, lactobacilli, and Candida in the elderly. The subjects were 64 elderly subjects with fixed prostheses and 49 who wore removable partial dentures aged over 65 years. We used one-way ANOVA to test for overall differences of the number of MT among 5 oral environmental factors. The significant differences were observed in the lactobacilli counts for different number of MT. The number of MT increased with an increase in the lactobacilli counts with removable denture. In conclusion, for the patients wearing removable dentures, increasing number of MT was associated with an increase in the lactobacilli counts in saliva. For the patients with crowns and fixed partial dentures, the number of MT was not significantly affected by salivary mutans streptococci, lactobacilli, and Candida counts.

  4. [Problems in organization of medical criminological registration and personality identification for subjects occupationally exposed to life risk].

    Science.gov (United States)

    Shcherbakov, V V

    2000-01-01

    The paper discusses problems in organization of identification studies under conditions of mass deaths as exemplified by forensic medical records of medical criminological identification studies of subjects killed during war conflict in Chechnya. The evolution of the organization model of identification studies is shown transformation of organization philosophy, formation of expert algorithms, formalization and technologic realization of expert solutions.

  5. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  6. DNA typing for personal identification of urine after long-term preservation for testing in doping control.

    Science.gov (United States)

    Aoki, Kimiko; Tanaka, Hiroyuki; Ueki, Makoto

    2017-08-01

    When the tampering of a urine sample is suspected in doping control, personal identification of the sample needs to be determined by short tandem repeat (STR) analysis using DNA. We established a method for extracting DNA from urine samples stored at -20 °C without using any additives or procedures, which is consistent with how samples are required to be managed for doping control. The method, using the Puregene® Blood Core kit followed by NucleoSpin® gDNA Clean-up or NucleoSpin® gDNA Clean-up XS kit, does not need any special instrument and can provide a purified extract with high-quality DNA from up to 40 mL of urine suitable for STR analysis using an AmpFlSTR® Identifiler® PCR amplification kit. Storing urine at -20 °C is detrimental to the stability of DNA. The DNA concentration of preserved urine could not be predicted by specific gravity or creatinine level at the time of urine collection. The DNA concentration of a purified extract (10 μL) was required to be >0.06 ng/μL to ensure a successful STR analysis. Thus, the required extraction volumes of urine preserved for 3-7 years at -20 °C were estimated to be 30 mL and 20 mL to succeed in at least 86% of men and 91% of women, respectively. Considering the long half-life of DNA during long-term preservation, our extraction method is applicable to urine samples stored even for 10 years, which is currently the storage duration allowed (increased from 8 years) before re-examination in doping control. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  7. Use of Frontal Sinus and Nasal Septum Pattern as an Aid in Personal Identification and Determination of Gender: A Radiographic Study.

    Science.gov (United States)

    Verma, Kavita; Nahar, Prashant; Singh, Mohit Pal; Mathur, Hemant; Bhuvaneshwari, S

    2017-01-01

    Personal identification and gender determination of unknown person has a vital importance in forensic investigation. Human skull radiography is a useful tool in human identification in natural disaster, in any accidents such as fire accident and road traffic accident where body remains become degraded or severely destroyed. Present study was performed to evaluate the measurement of frontal sinus, uniqueness of various pattern of nasal septum when combined with frontal sinus observed on posterio anterior cephalogram for sex determination as well as personal identification. A total of 80 individuals, 40 males and 40 females, between the age ranges of 18-30 years were selected. The selected individuals had their Posterio Anterior (PA) cephalogram performed after taking their informed consent. Right and left areas and the maximum height and width of the frontal sinus were determined and septum patterns were evaluated and both patterns were also combined and compared. The radiographs were taken on Xtropan 2000 OPG X-ray machine with cephalography attachment and KODAK CR 7400 digital radiography system. Mean and SD values of the greatest height and width of frontal sinus in male and female patients were thus evaluated. The mean values of the frontal sinus were greater in males and the left area was larger than the right area, based on student's t-test at the 5% level of significance. The combination of Frontal Sinus Patterns and Nasal Septum Patterns (FP+NSP) were assessed and found that there were nine classifiable patterns in 26 (32.5%) individuals (12 males and 14 females), each of which had common representations in more than one individual. Besides these patterns, there were unique unclassifiable patterns in 54 (67.5%) individuals. The present study supports the use of radiographic evaluation of frontal sinus dimensions, frontal sinus patterns, nasal septum deviations and the combination FP+NSP patterns for personal identification and gender determination in

  8. [On the use of the spectral speech characteristics for the determination of biometric parameters of the vocal tract in forensic medical identification of the speaker's personality].

    Science.gov (United States)

    Kaganov, A Sh

    2014-01-01

    The objective of the present study was to elucidate the relationship between the spectral speech characteristics and the biometric parameters of the speaker's vocal tract. The secondary objective was to consider the theoretical basis behind the medico-criminalistic personality identification from the biometric parameters of the speaker's vocal tract. The article is based on the results of real forensic medical investigations and the literature data.

  9. [The coordination of the forensic medical service with the medical criminology subdivisions of internal affairs organs in the personal identification of unidentified corpses].

    Science.gov (United States)

    Pashinian, G A; Tuchik, E S

    1997-01-01

    In order to improve the cooperation between medical criminology departments of the organs of home affairs and forensic medical service in personality identification of unidentified corpses, the authors propose amendments to the routine procedure regulated by documents of the Ministry of Home Affairs of the Russian Federation, for these documents are in need of serious correction and revision, so that they conform to the judicial legislation and other documents.

  10. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    Science.gov (United States)

    2007-03-01

    50 million over the 2007-2011 period. However, if the VA were to experience another data breach similar to the recent incident involving 17...compromised in some manner. Excluding the recent incident, the average number of people affected by a data breach has been about 50,000. The...suggests that all of the financial losses to a company that experiences a data breach of privacy information will quickly be reflected in the stock

  11. Correction for phylogeny, small number of observations and data redundancy improves the identification of coevolving amino acid pairs using mutual information

    DEFF Research Database (Denmark)

    Buslje, C.M.; Santos, J.; Delfino, J.M.

    2009-01-01

    Motivation: Mutual information (MI) theory is often applied to predict positional correlations in a multiple sequence alignment (MSA) to make possible the analysis of those positions structurally or functionally important in a given fold or protein family. Accurate identification of coevolving......-weighting techniques to reduce sequence redundancy and low-count corrections to account for small number of observations in limited size sequence families, can significantly improve the predictability of MI. The evaluation is made on large sets of both in silico-generated alignments as well as on biological sequence...

  12. The Identification of Teaching Interactions Used in One-to-One Teaching of Number in the Early Years of Schooling

    Science.gov (United States)

    Ewing, Bronwyn

    2016-01-01

    This research paper reports on phase one of an investigation of video recorded intensive one-to-one teaching interactions with 6-7-year-old students who were in their second year of schooling in Australia and identified by the their teacher as low attaining in early number. The two-phased study from which this paper emerges was originally…

  13. Imported brucellosis in Denmark: Molecular identification and multiple-locus variable number tandem repeat analysis (MLVA) genotyping of the bacteria

    DEFF Research Database (Denmark)

    Aftab, H.; Dargis, R.; Christensen, J. J.

    2011-01-01

    A polymerase chain reaction was used to identify Brucella species isolated from humans in Denmark. Consecutive analysis of referred bacteria and re-examination of historical isolates identified all as Brucella melitensis. Multiple-locus variable number tandem repeat analysis (MLVA) placed...... the isolates in the previously defined 'East Mediterranean' B. melitensis group....

  14. Correlation of number and identification of sentinel nodes during radiographer led lymphoscintigraphy prior to sentinel lymph node biopsy in breast cancer patients

    International Nuclear Information System (INIS)

    Camilleri, Gail; Borg Grima, Karen; Zarb, Francis

    2012-01-01

    Purpose: The sentinel lymph node biopsy (SLNB) concept using the cutaneous (subdermal) peri-areolar approach is rapidly emerging as the technique for axillary staging in breast cancer. The procedure indicates whether axillary lymph node dissection (ALND) is necessary, therefore drastically minimising the invasiveness of surgical treatment. The SLNB concept is based on evidence suggesting that malignant disease primarily affects the sentinel node (SN) before being disseminated into the axillary lymph nodes (ALNs). Objective: This study was to define the role of lymphoscintigraphy in the visualisation of SNs during SLNB and to establish the correlation between the number of SNs identified on lymphoscintigraphy to the number of surgically identified SNs. Method: The study was a non-experimental, correlation study utilising quantitative data. Lymphoscintigraphy reports and histology results of 55 female breast cancer patients who underwent SLNB with partial or total back-up ALND, were retrospectively evaluated. Results: A maximum of 2 and a minimum of 0 sentinel nodes were visualised on lymphoscintigraphy in 52 out of 55 patients. Successful lymphoscintigraphy was highly predictive (p ≤ 0.001) of a successful SLNB as all 52 patients (94.5%) proceeded to have successful SN/s identification. There was a significant association (p ≤ 0.05) between the number of SN/s visualised on lymphoscintigraphy and the number of SN/s identified during SLNB. Lymphoscintigraphy accurately predicted the number of surgically identified SNs in 50.91% of cases (28/55). Conclusion: Considering that successful imaging effectively assures SN identification, the routine use of lymphoscintigraphy using the subdermal peri-areolar approach is fundamental in the reliable performance of SLNB.

  15. The identification of teaching interactions used in one-to-one teaching of number in the early years of schooling

    Directory of Open Access Journals (Sweden)

    Bronwyn Ewing

    2016-12-01

    Full Text Available This research paper reports on phase one of an investigation of video recorded intensive one-to-one teaching interactions with 6–7-year-old students who were in their second year of schooling in Australia and identified by the their teacher as low attaining in early number. The two-phased study from which this paper emerges was originally conducted in 1998 as part of my Bachelor of Teaching Honours (Research program at Southern Cross University Lismore, New South Wales. That study identified teaching interactions particularly suited to one-to-one teaching in the Maths Recovery Program, a program designed for these students who were at risk of failure in early number. Since that time a great deal has not changed with limited literature available that comprehensively reports on teaching interactions in intensive one-to-one settings. Revisiting the original study is considered timely given the increasing number of withdrawal and intensive programs now funded and adopted by schools and yet, rarely reported on in terms of the effectiveness of the teaching interactions that occur in such settings. This paper then presents a discussion of a preliminary series of teaching interactions that either positively and or negatively influence an intensive one-to-one teaching and learning setting.

  16. The identification of teaching interactions used in one-to-one teaching of number in the early years of schooling

    OpenAIRE

    Bronwyn Ewing

    2016-01-01

    This research paper reports on phase one of an investigation of video recorded intensive one-to-one teaching interactions with 6–7-year-old students who were in their second year of schooling in Australia and identified by the their teacher as low attaining in early number. The two-phased study from which this paper emerges was originally conducted in 1998 as part of my Bachelor of Teaching Honours (Research) program at Southern Cross University Lismore, New South Wales. That study identified...

  17. Copy number variation identification and analysis of the chicken genome using a 60K SNP BeadChip.

    Science.gov (United States)

    Rao, Y S; Li, J; Zhang, R; Lin, X R; Xu, J G; Xie, L; Xu, Z Q; Wang, L; Gan, J K; Xie, X J; He, J; Zhang, X Q

    2016-08-01

    Copy number variation (CNV) is an important source of genetic variation in organisms and a main factor that affects phenotypic variation. A comprehensive study of chicken CNV can provide valuable information on genetic diversity and facilitate future analyses of associations between CNV and economically important traits in chickens. In the present study, an F2 full-sib chicken population (554 individuals), established from a cross between Xinghua and White Recessive Rock chickens, was used to explore CNV in the chicken genome. Genotyping was performed using a chicken 60K SNP BeadChip. A total of 1,875 CNV were detected with the PennCNV algorithm, and the average number of CNV was 3.42 per individual. The CNV were distributed across 383 independent CNV regions (CNVR) and covered 41 megabases (3.97%) of the chicken genome. Seven CNVR in 108 individuals were validated by quantitative real-time PCR, and 81 of these individuals (75%) also were detected with the PennCNV algorithm. In total, 274 CNVR (71.54%) identified in the current study were previously reported. Of these, 147 (38.38%) were reported in at least 2 studies. Additionally, 109 of the CNVR (28.46%) discovered here are novel. A total of 709 genes within or overlapping with the CNVR was retrieved. Out of the 2,742 quantitative trait loci (QTL) collected in the chicken QTL database, 43 QTL had confidence intervals overlapping with the CNVR, and 32 CNVR encompassed one or more functional genes. The functional genes located in the CNVR are likely to be the QTG that are associated with underlying economic traits. This study considerably expands our insight into the structural variation in the genome of chickens and provides an important resource for genomic variation, especially for genomic structural variation related to economic traits in chickens. © 2016 Poultry Science Association Inc.

  18. Copy number variants in attention-deficit hyperactive disorder: identification of the 15q13 deletion and its functional role.

    Science.gov (United States)

    Valbonesi, Stefano; Magri, Chiara; Traversa, Michele; Faraone, Stephen V; Cattaneo, Annamaria; Milanesi, Elena; Valenti, Vera; Gennarelli, Massimo; Scassellati, Catia

    2015-04-01

    Evidence has supported a role for rare copy number variants in the etiology of attention-deficit hyperactivity disorder (ADHD), in particular, the region 15q13, which is also a hot spot for several neuropsychiatric disorders. This region spans several genes, but their role and the biological implications remain unclear. We carried out, for the first time, an analysis of the 15q13 region in an Italian cohort of 117 ADHD patients and 77 controls using the MLPA method, confirmed by a genome single-nucleotide polymorphism array. In addition, we probed for downstream effects of the 15q13 deletions on gene expression by carrying out a transcriptomic analysis in blood. We found 15q13 deletions in two ADHD patients and identified 129 genes as significantly dysregulated in the blood of the two ADHD patients carrying 15q13 deletions compared with ADHD patients without 15q13 deletions. As expected, genes in the deleted region (KLF13, MTMR10) were downregulated in the two patients with deletions. Moreover, a pathway analysis identified apoptosis, oxidation reduction, and immune response as the mechanisms that were altered most significantly in the ADHD patients with 15q13 deletions. Interestingly, we showed that deletions in KLF13 and CHRNA7 influenced the expression of genes belonging to the same immune/inflammatory and oxidative stress signaling pathways. Our findings are consistent with the presence of 15q13 deletions in Italian ADHD patients. More interestingly, we show that pathways related to immune/inflammatory response and oxidative stress signaling are affected by the deletion of KFL13 and CHRNA7. Because the phenotypic effects of 15q13 are pleiotropic, our findings suggest that there are shared biologic pathways among multiple neuropsychiatric conditions.

  19. Identification and documentation of persons being in palliative phase regardless of age, diagnosis and places of care, and their use of a sitting service at the end of life.

    Science.gov (United States)

    Wallerstedt, Birgitta; Sahlberg-Blom, Eva; Benzein, Eva; Andershed, Birgitta

    2012-09-01

    Older persons and persons with diseases other than cancer are often discriminated against when applying for palliative care despite growing numbers of both older persons and individuals with chronic diseases. An intention for palliative care in Sweden is that all persons in the final stage of life, irrespective of age, domicile, diagnosis, and care place shall have access to palliative care on equal terms. One way to support these persons in final stage of life and their relatives is to offer sitting service. To describe individuals who were identified and documented as being in a palliative phase in a Swedish municipality, with respect to demographics, use of a sitting service, continuity of care in the last month of life and the place of death. A second aim was to describe and compare the groups who received/did not receive sitting services related to the aforementioned variables. Retrospective data from nursing records and palliative care identification forms were analyzed with descriptive and analytic statistical methods. Among individuals deceased during 2007, 51% were identified and documented as being in palliative phase. The majority was older people (mean 83 years) with a noncancer diagnosis (58%). Twenty-eight individuals (16%) had received a sitting service between 8 and 249 hours (one extreme value = 2211). It is indicated that sitting service significantly increased the possibility of dying at home (p = 0.00004), but did not affect how often the place of care changed during the last month of life. A small sample from a Swedish context must be considered. These results can be related to an awareness in the municipality that led to adopting the concept of palliative care as not only for those with a cancer diagnosis. 2012 The Authors. Scandinavian Journal of Caring Sciences © 2012 Nordic College of Caring Science.

  20. The verbal facilitation effect: re-reading person descriptions as a system variable to improve identification performance.

    Science.gov (United States)

    Sporer, Siegfried L; Kaminski, Kristina S; Davids, Maike C; McQuiston, Dawn

    2016-11-01

    When witnesses report a crime, police usually ask for a description of the perpetrator. Several studies suggested that verbalising faces leads to a detriment in identification performance (verbal overshadowing effect [VOE]) but the effect has been difficult to replicate. Here, we sought to reverse the VOE by inducing context reinstatement as a system variable through re-reading one's own description before an identification task. Participants (N = 208) watched a video film and were then dismissed (control group), only described the perpetrator, or described and later re-read their own descriptions before identification in either target-present or target-absent lineups after a 2-day or a 5-week delay. Identification accuracy was significantly higher after re-reading (85.0%) than in the no description control group (62.5%) irrespective of target presence. Data were internally replicated using a second target and corroborated by several small meta-analyses. Identification accuracy was related to description quality. Moreover, there was a tendency towards a verbal facilitation effect (VFE) rather than a VOE. Receiver operating characteristic (ROC) curve analyses confirm that our findings are not due to a shift in response bias but truly reflect improvement of recognition performance. Differences in the ecological validity of study paradigms are discussed.

  1. THE RELATIONSHIP OF PERSONAL MATURITY OF THE ADOPTIVE PARENTS AND THE PROCESS OF SOCIALIZATIONAND IDENTIFICATION OF PRESCHOOL CHILDREN

    Directory of Open Access Journals (Sweden)

    A N Pronina

    2015-12-01

    Full Text Available The article is devoted to the topic of the development of children from orphanage in a foster home, showing the importance of personal maturity of the adoptive parents. The authors present the results of a study showing that there is a relationship between the individual criteria of personal maturity of the adoptive parents and the process of socialization and individualization of the children from orphanage.

  2. How the human brain goes virtual: distinct cortical regions of the person-processing network are involved in self-identification with virtual agents.

    Science.gov (United States)

    Ganesh, Shanti; van Schie, Hein T; de Lange, Floris P; Thompson, Evan; Wigboldus, Daniël H J

    2012-07-01

    Millions of people worldwide engage in online role-playing with their avatar, a virtual agent that represents the self. Previous behavioral studies have indicated that many gamers identify more strongly with their avatar than with their biological self. Through their avatar, gamers develop social networks and learn new social-cognitive skills. The cognitive neurosciences have yet to identify the neural processes that underlie self-identification with these virtual agents. We applied functional neuroimaging to 22 long-term online gamers and 21 nongaming controls, while they rated personality traits of self, avatar, and familiar others. Strikingly, neuroimaging data revealed greater avatar-referential cortical activity in the left inferior parietal lobe, a region associated with self-identification from a third-person perspective. The magnitude of this brain activity correlated positively with the propensity to incorporate external body enhancements into one's bodily identity. Avatar-referencing furthermore recruited greater activity in the rostral anterior cingulate gyrus, suggesting relatively greater emotional self-involvement with one's avatar. Post-scanning behavioral data revealed superior recognition memory for avatar relative to others. Interestingly, memory for avatar positively covaried with play duration. These findings significantly advance our knowledge about the brain's plasticity to self-identify with virtual agents and the human cognitive-affective potential to live and learn in virtual worlds.

  3. Identification of Individuals with Serious Emotional Disturbance Using the Draw a Person: Screening Procedure for Emotional Disturbance.

    Science.gov (United States)

    McNeish, Timothy J.; Naglieri, Jack A.

    1993-01-01

    Regular education students (n=81) and students with serious emotional disturbance (n=81,) were matched on age (7-13), gender, race, and intelligence. They completed drawings which were scored using the "Draw a Person: Screening Procedure for Emotional Disturbance." Students with emotional disturbance scored significantly higher than did…

  4. Performance of radiant cooling ceiling combined with personalized ventilation in an office room: identification of thermal conditions

    DEFF Research Database (Denmark)

    Lipczynska, Aleksandra; Kaczmarczyk, Jan; Melikov, Arsen Krikor

    2014-01-01

    were performed in a test room arranged as an office with 2 workstations and 2 seating occupants resembled by thermal manikins. Heat gain of 66-72 W/m2 was simulated in the room (occupants, computers, lighting, solar gain). The air temperature in the chamber was maintained at 26°C and 28°C. Personalized...

  5. VOC source identification from personal and residential indoor, outdoor and workplace microenvironment samples in EXPOLIS-Helsinki, Finland

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, Rufus D. [KTL-Finnish National Inst. of Public Health, Dept. of Environmental Hygiene, Kuopio (Finland); California Univ., School of Public Health, Berkeley, CA (United States); Jurvelin, J. [KTL-Finnish National Inst. of Public Health, Dept. of Environmental Hygiene, Kuopio (Finland); Jyvaeskylae Polytechnic, School of Engineering and Technology, Jyvaeskylae (Finland); Koistinen, K. [KTL-Finnish National Inst. of Public Health, Dept. of Environmental Hygiene, Kuopio (Finland); Saarela, K. [VTT, Chemical Technology, Espoo (Finland); Jantunen, M. [EC JRC, Inst. of the Environment, Ispra (Italy)

    2001-07-01

    Principal component analyses (varimax rotation) were used to identify common sources of 30 target volatile organic compounds (VOCs) in residential outdoor, residential indoor and workplace microenvironment and personal 48-h exposure samples, as a component of the EXPOLIS-Helsinki study. Variability in VOC concentrations in residential outdoor microenvironments was dominated by compounds associated with long-range transport of pollutants, followed by traffic emissions, emissions from trees and product emissions. Variability in VOC concentrations in environmental tobacco smoke (ETS) free residential indoor environments was dominated by compounds associated with indoor cleaning products, followed by compounds associated with traffic emissions, long-range transport of pollutants and product emissions. Median indoor/outdoor ratios for compounds typically associated with traffic emissions and long-range transport of pollutants exceeded 1, in some cases quite considerably, indicating substantial indoor source contributions. Changes in the median indoor/outdoor ratios during different seasons reflected different seasonal ventilation patterns as increased ventilation led to dilution of those VOC compounds in the indoor environment that had indoor sources. Variability in workplace VOC concentrations was dominated by compounds associated with traffic emissions followed by product emissions, long-range transport and air fresheners. Variability in VOC concentrations in ETS free personal exposure samples was dominated by compounds associated with traffic emissions, followed by long-range transport, cleaning products and product emissions. VOC sources in personal exposure samples reflected the times spent in different microenvironments, and personal exposure samples were not adequately represented by any one microenvironment, demonstrating the need for personal exposure sampling. (Author)

  6. Limited copy number-high resolution melting (LCN-HRM) enables the detection and identification by sequencing of low level mutations in cancer biopsies.

    Science.gov (United States)

    Do, Hongdo; Dobrovic, Alexander

    2009-10-08

    Mutation detection in clinical tumour samples is challenging when the proportion of tumour cells, and thus mutant alleles, is low. The limited sensitivity of conventional sequencing necessitates the adoption of more sensitive approaches. High resolution melting (HRM) is more sensitive than sequencing but identification of the mutation is desirable, particularly when it is important to discriminate false positives due to PCR errors or template degradation from true mutations.We thus developed limited copy number - high resolution melting (LCN-HRM) which applies limiting dilution to HRM. Multiple replicate reactions with a limited number of target sequences per reaction allow low level mutations to be detected. The dilutions used (based on Ct values) are chosen such that mutations, if present, can be detected by the direct sequencing of amplicons with aberrant melting patterns. Using cell lines heterozygous for mutations, we found that the mutations were not readily detected when they comprised 10% of total alleles (20% tumour cells) by sequencing, whereas they were readily detectable at 5% total alleles by standard HRM. LCN-HRM allowed these mutations to be identified by direct sequencing of those positive reactions.LCN-HRM was then used to review formalin-fixed paraffin-embedded (FFPE) clinical samples showing discordant findings between sequencing and HRM for KRAS exon 2 and EGFR exons 19 and 21. Both true mutations present at low levels and sequence changes due to artefacts were detected by LCN-HRM. The use of high fidelity polymerases showed that the majority of the artefacts were derived from the damaged template rather than replication errors during amplification. LCN-HRM bridges the sensitivity gap between HRM and sequencing and is effective in distinguishing between artefacts and true mutations.

  7. [The application of cybernetic modeling methods for the forensic medical personality identification based on the voice and sounding speech characteristics].

    Science.gov (United States)

    Kaganov, A Sh; Kir'yanov, P A

    2015-01-01

    The objective of the present publication was to discuss the possibility of application of cybernetic modeling methods to overcome the apparent discrepancy between two kinds of the speech records, viz. initial ones (e.g. obtained in the course of special investigation activities) and the voice prints obtained from the persons subjected to the criminalistic examination. The paper is based on the literature sources and the materials of original criminalistics expertises performed by the authors.

  8. Self-identification with another person's face: the time relevant role of multimodal brain areas in the enfacement illusion.

    Science.gov (United States)

    Bufalari, Ilaria; Porciello, Giuseppina; Sperduti, Marco; Minio-Paluello, Ilaria

    2015-04-01

    The illusory subjective experience of looking at one's own face while in fact looking at another person's face can surprisingly be induced by simple synchronized visuotactile stimulation of the two faces. A recent study (Apps MA, Tajadura-Jiménez A, Sereno M, Blanke O, Tsakiris M. Cereb Cortex. First published August 20, 2013; doi:10.1093/cercor/bht199) investigated for the first time the role of visual unimodal and temporoparietal multimodal brain areas in the enfacement illusion and suggested a model in which multisensory mechanisms are crucial to construct and update self-face representation. Copyright © 2015 the American Physiological Society.

  9. Evaluation of dose equivalent and identification of energy rangeby the electronic personal dosemeter for neutron 'Saphydose-N' at different workplaces of nuclear facilities

    International Nuclear Information System (INIS)

    Chau, Q.; Lahaye, T.; Lacoste, V.; Muller, H.; Luszik-Bhadra, M.; Reginatto, M.

    2005-01-01

    Full text: According to the transposition of the Directive 96/29/EURATOM into the French legislation, any worker operating in a controlled area has to be monitored by 'passive' and 'active' dosemeters. Electronic personal dosemeters are especially needed for optimization of workplaces. In nuclear facilities, some of the workers are likely to be exposed to mixed neutron-photon fields. If the dosimetry of the photons is relatively well controlled, the neutron dosimetry raises more difficulties. In this context, the Institute for Radiological Protection and Nuclear Safety (IRSN) has developed an electronic device based on a silicon detector: the 'Saphydose-N' dosemeter. It is composed of several detectors and covers more than eight energy decades. The Saphydose-N device complies with recommendations of standard IEC 1323. As the radiation fields produced in laboratory are not strictly representative to those encountered at workplaces, IRSN evaluated the response of Saphydose-N at various workplaces from nuclear industry. Several campaigns were performed in the framework of the European contract EVIDOS ('Evaluation of Individual Dosimetry in Mixed Neutron and Photon Radiation Fields'). Saphydose-N was carried out at a fuel processing plant, at the Nuclear Power Plant close to the boiling water reactor, near the transport and storage cask and at the Research Reactor. This paper mainly aims at presenting the measurements, the identification of the energy range and the results obtained with the electronic personal neutron Saphydose-N at different facilities. The results are compared with reference values, defined by other partners in EVIDOS project, for ambient and personal dose equivalent. (author)

  10. Identification of Personalized Chemoresistance Genes in Subtypes of Basal-Like Breast Cancer Based on Functional Differences Using Pathway Analysis.

    Directory of Open Access Journals (Sweden)

    Tong Wu

    Full Text Available Breast cancer is a highly heterogeneous disease that is clinically classified into several subtypes. Among these subtypes, basal-like breast cancer largely overlaps with triple-negative breast cancer (TNBC, and these two groups are generally studied together as a single entity. Differences in the molecular makeup of breast cancers can result in different treatment strategies and prognoses for patients with different breast cancer subtypes. Compared with other subtypes, basal-like and other ER+ breast cancer subtypes exhibit marked differences in etiologic factors, clinical characteristics and therapeutic potential. Anthracycline drugs are typically used as the first-line clinical treatment for basal-like breast cancer subtypes. However, certain patients develop drug resistance following chemotherapy, which can lead to disease relapse and death. Even among patients with basal-like breast cancer, there can be significant molecular differences, and it is difficult to identify specific drug resistance proteins in any given patient using conventional variance testing methods. Therefore, we designed a new method for identifying drug resistance genes. Subgroups, personalized biomarkers, and therapy targets were identified using cluster analysis of differentially expressed genes. We found that basal-like breast cancer could be further divided into at least four distinct subgroups, including two groups at risk for drug resistance and two groups characterized by sensitivity to pharmacotherapy. Based on functional differences among these subgroups, we identified nine biomarkers related to drug resistance: SYK, LCK, GAB2, PAWR, PPARG, MDFI, ZAP70, CIITA and ACTA1. Finally, based on the deviation scores of the examined pathways, 16 pathways were shown to exhibit varying degrees of abnormality in the various subgroups, indicating that patients with different subtypes of basal-like breast cancer can be characterized by differences in the functional status of

  11. The effects of gender and age on forensic personal identification from frontal sinus in a Turkish population.

    Science.gov (United States)

    Tatlisumak, Ertugrul; Asirdizer, Mahmut; Bora, Aydin; Hekimoglu, Yavuz; Etli, Yasin; Gumus, Orhan; Keskin, Siddik

    2017-01-01

    To define the dimensions of the frontal sinus in groups standardized for age and gender and to discuss the reasons and the effects of the variations. Methods: Frontal sinus measurements were obtained from paranasal CTscans of 180 males and 180 females in the Radiology Department of Dursun Odabas Medical Center of Yuzuncu Yil University, Van, which is located in Eastern Turkey, between February and March 2016. The width and height of sinuses were measured on a coronal plane, and the anteroposterior length was measured on an axial plane. Volumes were calculated using the Hospital Information Management Systems and Image Archiving and Management Systemprogram. The Statistical Package of the Social Science version 13 was used for statistical analyses.  Results: We determined differences in the frontal sinus measurements of different age groups in a Turkish adult population. Frontal sinus dimensions were usually higher in females and lower in males after 40-49 years of age than their younger counterparts, but the measurements were lower in females and higher in males in 70≤ years of age group than 60-69 years of age. Left frontal sinus was dominant in young age groups but right frontal sinus was dominant in groups 40-49 years of age or older.  Conclusion: We observed crossing of the measurements between the different age groups, which we could not find clear explanations. The results of such studies may affect forensic identification from frontal sinus measurements.

  12. A Study of Correlations within the Dimensions of Lower Limb Parts for Personal Identification in a Sudanese Population

    Directory of Open Access Journals (Sweden)

    Altayeb Abdalla Ahmed

    2014-01-01

    Full Text Available The presence of an isolated limb or limb parts from different individuals presents a major challenge for medicolegal investigators in establishing identification in cases of wars, mass disasters, and criminal assaults because different populations have different sizes and proportions. The measurement of lower limb dimensions showed a high success rate in establishing individual identity in terms of sex and stature in various populations. However, there is a paucity of data concerning the correlation within the lower limb parts. This study aims to assess the existence of relationships within lower limb parts and to develop regression formulae to reconstruct limb parts from one another. The tibial length, bimalleolar breadth, foot length, and foot breadth of 376 right-handed Sudanese adults were measured. The results showed that all variables were significantly larger in males than in females. A significant positive correlation (P<0.001 was found within the lower limb parts. Sex-specific linear equations and multiple regression equations were developed to reconstruct the lower limb parts in the presence of single dimension or multiple dimensions from the same limb. The use of multiple regression equations provided a better reconstruction than simple regression equations. These results are significant in forensics and orthopedic reconstructive surgery.

  13. Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2013-12-01

    Full Text Available Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN. It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs.(see PDF for full technology corner

  14. Concept Identification Strategies. Research Project Number 3 of Project Head Start Research and Evaluation Center, Syracuse University Research Institute, November 1, 1967.

    Science.gov (United States)

    Meyer, William J.; Hultsch, David

    The purpose of this study was to determine the effects of age differences and differences in memory load on concept identification (CI) tasks of varying levels of complexity. Previous studies with young children found increasingly better performance on CI tasks with increasing age. This was in part due to the fact that older subjects categorize…

  15. Recommended Immunization Schedules for Persons Aged 0 through 18 Years--United States, 2010. Morbidity and Mortality Weekly Report QuickGuide. Volume 58, Number 51 & 52

    Science.gov (United States)

    Centers for Disease Control and Prevention, 2010

    2010-01-01

    The Advisory Committee on Immunization Practices (ACIP) annually publishes an immunization schedule for persons aged 0 through 18 years that summarizes recommendations for currently licensed vaccines for children aged 18 years and younger and includes recommendations in effect as of December 15, 2009. The changes to the previous schedule are…

  16. By the numbers: Structure-seeking individuals prefer quantitative over qualitative representations of personal value to compensate for the threat of unclear performance contingencies.

    Science.gov (United States)

    Rothschild, Zachary K; Landau, Mark J; Sullivan, Daniel

    2011-11-01

    What combination of dispositional and situational factors leads people to represent their personal value in quantitative terms (e.g., salary) rather than qualitative terms (e.g., virtue)? Integrating research on quantitative information seeking, dispositional epistemic motivation, and learned helplessness, the current article hypothesized that individuals high, but not low, in uncertainty avoidance (measured with the Personal Need for Structure Scale [PNS]) would prefer quantitative (over qualitative) value representations to compensate for the diminished self-esteem certainty caused by exposure to unclear performance contingencies. Accordingly, in Study 1 high-PNS participants exposed to unclear (vs. clear) performance contingencies in one domain (visual intelligence) preferred a quantitative value representation in another domain (verbal intelligence). Study 2 showed that this effect is mediated by self-esteem certainty, not self-esteem level. Study 3 included a failure feedback condition to further isolate the role of epistemic motivation, as distinct from self-enhancement motivation, in driving the tendency to quantify personal value.

  17. A bimodal biometric identification system

    Science.gov (United States)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  18. Detachable strong cation exchange monolith, integrated with capillary zone electrophoresis and coupled with pH gradient elution, produces improved sensitivity and numbers of peptide identifications during bottom-up analysis of complex proteomes.

    Science.gov (United States)

    Zhang, Zhenbin; Yan, Xiaojing; Sun, Liangliang; Zhu, Guijie; Dovichi, Norman J

    2015-04-21

    A detachable sulfonate-silica hybrid strong cation-exchange monolith was synthesized in a fused silica capillary, and used for solid phase extraction with online pH gradient elution during capillary zone electrophoresis-tandem mass spectrometry (CZE-MS/MS) proteomic analysis. Tryptic digests were prepared in 50 mM formic acid and loaded onto the strong cation-exchange monolith. Fractions were eluted using a series of buffers with lower concentration but higher pH values than the 50 mM formic acid background electrolyte. This combination of elution and background electrolytes results in both sample stacking and formation of a dynamic pH junction and allows use of relatively large elution buffer volumes while maintaining reasonable peak efficiency and resolution. A series of five pH bumps were applied to elute E. coli tryptic peptides from the monolith, followed by analysis using CZE coupled to an LTQ-Orbitrap Velos mass spectrometer; 799 protein groups and 3381 peptides were identified from 50 ng of the digest in a 2.5 h analysis, which approaches the identification rate for this organism that was obtained with an Orbitrap Fusion. We attribute the improved numbers of peptide and protein identifications to the efficient fractionation by the online pH gradient elution, which decreased the complexity of the sample in each elution step and improved the signal intensity of low abundance peptides. We also performed a comparative analysis using a nanoACQUITY UltraPerformance LCH system. Similar numbers of protein and peptide identifications were produced by the two methods. Protein identifications showed significant overlap between the two methods, whereas peptide identifications were complementary.

  19. A sensitivity analysis of a personalized pulse wave propagation model for arteriovenous fistula surgery. Part B: Identification of possible generic model parameters.

    Science.gov (United States)

    Huberts, W; de Jonge, C; van der Linden, W P M; Inda, M A; Passera, K; Tordoir, J H M; van de Vosse, F N; Bosboom, E M H

    2013-06-01

    Decision-making in vascular access surgery for hemodialysis can be supported by a pulse wave propagation model that is able to simulate pressure and flow changes induced by the creation of a vascular access. To personalize such a model, patient-specific input parameters should be chosen. However, the number of input parameters that can be measured in clinical routine is limited. Besides, patient data are compromised with uncertainty. Incomplete and uncertain input data will result in uncertainties in model predictions. In part A, we analyzed how the measurement uncertainty in the input propagates to the model output by means of a sensitivity analysis. Of all 73 input parameters, 16 parameters were identified to be worthwhile to measure more accurately and 51 could be fixed within their measurement uncertainty range, but these latter parameters still needed to be measured. Here, we present a methodology for assessing the model input parameters that can be taken constant and therefore do not need to be measured. In addition, a method to determine the value of this parameter is presented. For the pulse wave propagation model applied to vascular access surgery, six patient-specific datasets were analyzed and it was found that 47 out of 73 parameters can be fixed on a generic value. These model parameters are not important for personalization of the wave propagation model. Furthermore, we were able to determine a generic value for 37 of the 47 fixable model parameters. Copyright © 2012 IPEM. Published by Elsevier Ltd. All rights reserved.

  20. Identification of chloroquine resistance Pfcrt-K76T and determination of Pfmdr1-N86Y copy number by SYBR Green I qPCR

    Directory of Open Access Journals (Sweden)

    Addimas Tajebe

    2015-03-01

    Conclusions: The study showed high prevalence level and fixation of Pfcrt, 76T mutation after chloroquine withdrawal. The prevalence of Pfmdr1 copy number variant suggested that the presence of modulating factor for emergence of Plasmodium falciparum strains with higher copy numbers. However, the prevalence level was not statistically significant.

  1. Identification of Variable-Number Tandem-Repeat (VNTR) Sequences in Legionella pneumophila and Development of an Optimized Multiple-Locus VNTR Analysis Typing Scheme▿

    Science.gov (United States)

    Pourcel, Christine; Visca, Paolo; Afshar, Baharak; D'Arezzo, Silvia; Vergnaud, Gilles; Fry, Norman K.

    2007-01-01

    The utility of a genotypic typing assay for Legionella pneumophila was investigated. A multiple-locus variable number of tandem repeats (VNTR) analysis (MLVA) scheme using PCR and agarose gel electrophoresis is proposed based on eight minisatellite markers. Panels of well-characterized strains were examined in a multicenter analysis to validate the assay and to compare its performance to that of other genotyping assays. Excellent typeability, reproducibility, stability, and epidemiological concordance were observed. The MLVA type or profile is composed of a string of allele numbers, corresponding to the number of repeats at each VNTR locus, separated by commas, in a predetermined order. A database containing information from 99 L. pneumophila serogroup 1 strains and four strains of other serogroups and their MLVA profiles, which can be queried online, is available from http://bacterial-genotyping.igmors.u-psud.fr/. PMID:17251393

  2. Printable UV personal dosimeter: sensitivity as a function of DoD parameters and number of layers of a functional photonic ink

    Science.gov (United States)

    Sousa, Felipe L. N.; Mojica-Sánchez, Lizeth C.; Gavazza, Sávia; Florencio, Lourdinha; Vaz, Elaine C. R.; Santa-Cruz, Petrus A.

    2016-04-01

    This work presents ‘intelligent papers’ obtained by functional inks printed on cellulose-sheets by DoD inkjet technology and their performance as a photonic device for UV-radiation dosimetry. The dosimeter operation is based on the photodegradation of the active part of a photonic ink, btfa (4,4,4-trifluoro-1-phenyl-1,3-butanedione) ligands in Eu(III) complex, as a function of the UV dose (Jcm-2), and the one-way device is read by the luminescence quenching of (5D0 → 7F2) Eu3+ transition after UV exposure of the printed paper. The printed dosimeter presented an exponential behavior, measured here up to 10 Jcm-2 for UV-A, UV-B and UV-C, and it was shown that the number of jetted layers could fit the dosimeter sensitivity.

  3. Printable UV personal dosimeter: sensitivity as a function of DoD parameters and number of layers of a functional photonic ink

    International Nuclear Information System (INIS)

    Sousa, Felipe L N; Mojica-Sánchez, Lizeth C; Vaz, Elaine C R; Santa-Cruz, Petrus A; Gavazza, Sávia; Florencio, Lourdinha

    2016-01-01

    This work presents ‘intelligent papers’ obtained by functional inks printed on cellulose-sheets by DoD inkjet technology and their performance as a photonic device for UV-radiation dosimetry. The dosimeter operation is based on the photodegradation of the active part of a photonic ink, btfa (4,4,4-trifluoro-1-phenyl-1,3-butanedione) ligands in Eu(III) complex, as a function of the UV dose (Jcm −2 ), and the one-way device is read by the luminescence quenching of ( 5 D 0  →  7 F 2 ) Eu 3+ transition after UV exposure of the printed paper. The printed dosimeter presented an exponential behavior, measured here up to 10 Jcm −2 for UV-A, UV-B and UV-C, and it was shown that the number of jetted layers could fit the dosimeter sensitivity. (paper)

  4. Identification of Variable-Number Tandem-Repeat (VNTR) Sequences in Acinetobacter baumannii and Interlaboratory Validation of an Optimized Multiple-Locus VNTR Analysis Typing Scheme▿†

    Science.gov (United States)

    Pourcel, Christine; Minandri, Fabrizia; Hauck, Yolande; D'Arezzo, Silvia; Imperi, Francesco; Vergnaud, Gilles; Visca, Paolo

    2011-01-01

    Acinetobacter baumannii is an important opportunistic pathogen responsible for nosocomial outbreaks, mostly occurring in intensive care units. Due to the multiplicity of infection sources, reliable molecular fingerprinting techniques are needed to establish epidemiological correlations among A. baumannii isolates. Multiple-locus variable-number tandem-repeat analysis (MLVA) has proven to be a fast, reliable, and cost-effective typing method for several bacterial species. In this study, an MLVA assay compatible with simple PCR- and agarose gel-based electrophoresis steps as well as with high-throughput automated methods was developed for A. baumannii typing. Preliminarily, 10 potential polymorphic variable-number tandem repeats (VNTRs) were identified upon bioinformatic screening of six annotated genome sequences of A. baumannii. A collection of 7 reference strains plus 18 well-characterized isolates, including unique types and representatives of the three international A. baumannii lineages, was then evaluated in a two-center study aimed at validating the MLVA assay and comparing it with other genotyping assays, namely, macrorestriction analysis with pulsed-field gel electrophoresis (PFGE) and PCR-based sequence group (SG) profiling. The results showed that MLVA can discriminate between isolates with identical PFGE types and SG profiles. A panel of eight VNTR markers was selected, all showing the ability to be amplified and good amounts of polymorphism in the majority of strains. Independently generated MLVA profiles, composed of an ordered string of allele numbers corresponding to the number of repeats at each VNTR locus, were concordant between centers. Typeability, reproducibility, stability, discriminatory power, and epidemiological concordance were excellent. A database containing information and MLVA profiles for several A. baumannii strains is available from http://mlva.u-psud.fr/. PMID:21147956

  5. Identification of networks of co-occurring, tumor-related DNA copy number changes using a genome-wide scoring approach.

    Directory of Open Access Journals (Sweden)

    Christiaan Klijn

    2010-01-01

    Full Text Available Tumorigenesis is a multi-step process in which normal cells transform into malignant tumors following the accumulation of genetic mutations that enable them to evade the growth control checkpoints that would normally suppress their growth or result in apoptosis. It is therefore important to identify those combinations of mutations that collaborate in cancer development and progression. DNA copy number alterations (CNAs are one of the ways in which cancer genes are deregulated in tumor cells. We hypothesized that synergistic interactions between cancer genes might be identified by looking for regions of co-occurring gain and/or loss. To this end we developed a scoring framework to separate truly co-occurring aberrations from passenger mutations and dominant single signals present in the data. The resulting regions of high co-occurrence can be investigated for between-region functional interactions. Analysis of high-resolution DNA copy number data from a panel of 95 hematological tumor cell lines correctly identified co-occurring recombinations at the T-cell receptor and immunoglobulin loci in T- and B-cell malignancies, respectively, showing that we can recover truly co-occurring genomic alterations. In addition, our analysis revealed networks of co-occurring genomic losses and gains that are enriched for cancer genes. These networks are also highly enriched for functional relationships between genes. We further examine sub-networks of these networks, core networks, which contain many known cancer genes. The core network for co-occurring DNA losses we find seems to be independent of the canonical cancer genes within the network. Our findings suggest that large-scale, low-intensity copy number alterations may be an important feature of cancer development or maintenance by affecting gene dosage of a large interconnected network of functionally related genes.

  6. SAAS-CNV: A Joint Segmentation Approach on Aggregated and Allele Specific Signals for the Identification of Somatic Copy Number Alterations with Next-Generation Sequencing Data.

    Science.gov (United States)

    Zhang, Zhongyang; Hao, Ke

    2015-11-01

    Cancer genomes exhibit profound somatic copy number alterations (SCNAs). Studying tumor SCNAs using massively parallel sequencing provides unprecedented resolution and meanwhile gives rise to new challenges in data analysis, complicated by tumor aneuploidy and heterogeneity as well as normal cell contamination. While the majority of read depth based methods utilize total sequencing depth alone for SCNA inference, the allele specific signals are undervalued. We proposed a joint segmentation and inference approach using both signals to meet some of the challenges. Our method consists of four major steps: 1) extracting read depth supporting reference and alternative alleles at each SNP/Indel locus and comparing the total read depth and alternative allele proportion between tumor and matched normal sample; 2) performing joint segmentation on the two signal dimensions; 3) correcting the copy number baseline from which the SCNA state is determined; 4) calling SCNA state for each segment based on both signal dimensions. The method is applicable to whole exome/genome sequencing (WES/WGS) as well as SNP array data in a tumor-control study. We applied the method to a dataset containing no SCNAs to test the specificity, created by pairing sequencing replicates of a single HapMap sample as normal/tumor pairs, as well as a large-scale WGS dataset consisting of 88 liver tumors along with adjacent normal tissues. Compared with representative methods, our method demonstrated improved accuracy, scalability to large cancer studies, capability in handling both sequencing and SNP array data, and the potential to improve the estimation of tumor ploidy and purity.

  7. A sensitivity analysis of a personalized pulse wave propagation model for arteriovenous fistula surgery. Part A: Identification of most influential model parameters.

    Science.gov (United States)

    Huberts, W; de Jonge, C; van der Linden, W P M; Inda, M A; Tordoir, J H M; van de Vosse, F N; Bosboom, E M H

    2013-06-01

    Previously, a pulse wave propagation model was developed that has potential in supporting decision-making in arteriovenous fistula (AVF) surgery for hemodialysis. To adapt the wave propagation model to personalized conditions, patient-specific input parameters should be available. In clinics, the number of measurable input parameters is limited which results in sparse datasets. In addition, patient data are compromised with uncertainty. These uncertain and incomplete input datasets will result in model output uncertainties. By means of a sensitivity analysis the propagation of input uncertainties into output uncertainty can be studied which can give directions for input measurement improvement. In this study, a computational framework has been developed to perform such a sensitivity analysis with a variance-based method and Monte Carlo simulations. The framework was used to determine the influential parameters of our pulse wave propagation model applied to AVF surgery, with respect to parameter prioritization and parameter fixing. With this we were able to determine the model parameters that have the largest influence on the predicted mean brachial flow and systolic radial artery pressure after AVF surgery. Of all 73 parameters 51 could be fixed within their measurement uncertainty interval without significantly influencing the output, while 16 parameters importantly influence the output uncertainty. Measurement accuracy improvement should thus focus on these 16 influential parameters. The most rewarding are measurement improvements of the following parameters: the mean aortic flow, the aortic windkessel resistance, the parameters associated with the smallest arterial or venous diameters of the AVF in- and outflow tract and the radial artery windkessel compliance. Copyright © 2012 IPEM. Published by Elsevier Ltd. All rights reserved.

  8. Does office space occupation matter? The role of the number of persons per enclosed office space, psychosocial work characteristics, and environmental satisfaction in the physical and mental health of employees.

    Science.gov (United States)

    Herbig, B; Schneider, A; Nowak, D

    2016-10-01

    The study examined the effects of office space occupation, psychosocial work characteristics, and environmental satisfaction on physical and mental health of office workers in small-sized and open-plan offices as well as possible underlying mechanisms. Office space occupation was characterized as number of persons per one enclosed office space. A total of 207 office employees with similar jobs in offices with different space occupation were surveyed regarding their work situation (psychosocial work characteristics, satisfaction with privacy, acoustics, and control) and health (psychosomatic complaints, irritation, mental well-being, and work ability). Binary logistic and linear regression analyses as well as bootstrapped mediation analyses were used to determine associations and underlying mechanisms. Employee health was significantly associated with all work characteristics. Psychosocial work stressors had the strongest relation to physical and mental health (OR range: 1.66-3.72). The effect of office space occupation on employee health was mediated by stressors and environmental satisfaction, but not by psychosocial work resources. As assumed by sociotechnical approaches, a higher number of persons per enclosed office space was associated with adverse health effects. However, the strongest associations were found with psychosocial work stressors. When revising office design, a holistic approach to work (re)design is needed. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  9. [Identification of novel variable number tandem repeat (VNTR) loci in Mycobacterium avium and development of an effective means of VNTR typing].

    Science.gov (United States)

    Kurokawa, Kazuhiro; Uchiya, Kei-Ichi; Yagi, Tetsuya; Takahashi, Hiroyasu; Niimi, Masaki; Ichikawa, Kazuya; Inagaki, Takayuki; Moriyama, Makoto; Nikai, Toshiaki; Hayashi, Yuta; Nakagawa, Taku; Ogawa, Kenji

    2012-07-01

    To make more effective use of variable number tandem repeat (VNTR) typing, we identified novel VNTR loci in Mycobacterium avium and used them for modified M. avium tandem repeat-VNTR (MATR-VNTR) typing. Analysis of a DNA sample extracted from a clinical isolate (strain HN135) with the FLX system genome sequencer (Roche Diagnostic System) led to discovery of several novel VNTR loci. The allelic diversity of the novel VNTR loci was evaluated for 71 clinical isolates and compared with the diversity of the MATR-VNTR loci. To improve efficacy of MATR-VNTR typing, we tested typing using 2 sets of loci selected from the newly identified loci and the MATR loci, i.e., one set containing 7 and another 16 loci. Hunter Gaston's discriminatory index (HGDI) was calculated for these sets. Six VNTR loci were newly identified, of which 5 showed a high diversity. The HGDI was 0.980 for the improved new typing using a set of 7 loci, and 0.995 for another set of 16 loci, while it was 0.992 for the conventional MATR-VNTR typing. VNTR typing with the set of the 7 loci enabled a rapid analysis, and another set of 16 loci enabled a precise analysis, as compared with conventional MATR-VNTR typing. A method that uses only VNTR loci with relatively high allelic diversity is considered to be a useful tool for VNTR typing of MAC isolates.

  10. Identification of Variable-Number Tandem-Repeat (VNTR) Sequences in Acinetobacter pittii and Development of an Optimized Multiple-Locus VNTR Analysis Typing Scheme.

    Science.gov (United States)

    Hu, Yuan; Li, Bo Qing; Jin, Da Zhi; He, Li Hua; Tao, Xiao Xia; Zhang, Jian Zhong

    2015-12-01

    To develop a multiple-locus variable-number tandem-repeat (VNTR) analysis (MLVA) assay for Acinetobacter pittii typing. Polymorphic VNTRs were searched by Tandem Repeats Finder. The distribution and polymorphism of each VNTR locus were analyzed in all the A. pittii genomes deposited in the NCBI genome database by BLAST and were evaluated with a collection of 20 well-characterized clinical A. pittii strains and one reference strain. The MLVA assay was compared with pulsed-field gel electrophoresis (PFGE) for discriminating A. pittii isolates. Ten VNTR loci were identified upon bioinformatic screening of A. pittii genomes, but only five of them showed full amplifiability and good polymorphism. Therefore, an MLVA assay composed of five VNTR loci was developed. The typeability, reproducibility, stability, discriminatory power, and epidemiological concordance were excellent. Compared with PFGE, the new optimized MLVA typing scheme provided the same and even greater discrimination. Compared with PFGE, MLVA typing is a faster and more standardized alternative for studying the genetic relatedness of A. pittii isolates in disease surveillance and outbreak investigation. Copyright © 2015 The Editorial Board of Biomedical and Environmental Sciences. Published by China CDC. All rights reserved.

  11. IDENTIFICATION OF THOSE VARIABLES THAT HAVE A SIGNIFICANT INFLUENCE ON THE EXPECTED NUMBER OF DAYS OF STAYING IN THE CENTRE DEVELOPMENT REGION OF ROMANIA

    Directory of Open Access Journals (Sweden)

    Erika KULCSÁR

    2010-06-01

    Full Text Available I started from the assumption that there are more variables that have a significant influence on the expected number of days of staying in the Centre Development Region. To identify those variables this paper includes the analysis of variance with two variables that are not interacting, in this case the dependent variable is the question "How many days did you plan to stay in Centre Development Region?" and the independent variables are: "What is the purpose of your stay?" "What is the highest level of education?". Given that there are cases when interactions occur between variables, I also analyzed the interaction effects between the two independent variables. The paper also includes an ANOVA analysis with three variables between which interactions relationships occur. After identifying the dependency relations between the variables I found that the inclusion of the third variable, namely the "Marital status" of respondents, adds value to the model. Following the results obtained by ANOVA analysis, I identified those socio-demographic characteristics that, in my opinion, companies that operate on tourist market in the Center Development Region should consider when fundamenting marketing strategies in tourism.

  12. Identification of the first multi-exonic WDR72 deletion in isolated amelogenesis imperfecta, and generation of a WDR72-specific copy number screening tool.

    Science.gov (United States)

    Hentschel, Julia; Tatun, Dana; Parkhomchuk, Dmitri; Kurth, Ingo; Schimmel, Bettina; Heinrich-Weltzien, Roswitha; Bertzbach, Sabine; Peters, Hartmut; Beetz, Christian

    2016-09-15

    Amelogenesis imperfecta (AI) is a clinically and genetically heterogeneous disorder of tooth development which is due to aberrant deposition or composition of enamel. Both syndromic and isolated forms exist; they may be inherited in an X-linked, autosomal recessive, or autosomal dominant manner. WDR72 is one of ten currently known genes for recessive isolated AI; nine WDR72 mutations affecting single nucleotides have been described to date. Based on whole exome sequencing in a large consanguineous AI pedigree, we obtained evidence for presence of a multi-exonic WDR72 deletion. A home-made multiplex ligation-dependent probe amplification assay was used to confirm the aberration, to narrow its extent, and to identify heterozygous carriers. Our study extends the mutational spectrum for WDR72 to include large deletions, and supports a relevance of the previously proposed loss-of-function mechanism. It also introduces an easy-to-use and highly sensitive tool for detecting WDR72 copy number alterations. Copyright © 2016. Published by Elsevier B.V.

  13. Filtering Entities to Optimize Identification of Adverse Drug Reaction From Social Media: How Can the Number of Words Between Entities in the Messages Help?

    Science.gov (United States)

    Abdellaoui, Redhouane; Schück, Stéphane; Texier, Nathalie; Burgun, Anita

    2017-06-22

    With the increasing popularity of Web 2.0 applications, social media has made it possible for individuals to post messages on adverse drug reactions. In such online conversations, patients discuss their symptoms, medical history, and diseases. These disorders may correspond to adverse drug reactions (ADRs) or any other medical condition. Therefore, methods must be developed to distinguish between false positives and true ADR declarations. The aim of this study was to investigate a method for filtering out disorder terms that did not correspond to adverse events by using the distance (as number of words) between the drug term and the disorder or symptom term in the post. We hypothesized that the shorter the distance between the disorder name and the drug, the higher the probability to be an ADR. We analyzed a corpus of 648 messages corresponding to a total of 1654 (drug and disorder) pairs from 5 French forums using Gaussian mixture models and an expectation-maximization (EM) algorithm . The distribution of the distances between the drug term and the disorder term enabled the filtering of 50.03% (733/1465) of the disorders that were not ADRs. Our filtering strategy achieved a precision of 95.8% and a recall of 50.0%. This study suggests that such distance between terms can be used for identifying false positives, thereby improving ADR detection in social media. ©Redhouane Abdellaoui, Stéphane Schück, Nathalie Texier, Anita Burgun. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 22.06.2017.

  14. Identification of rare recurrent copy number variants in high-risk autism families and their prevalence in a large ASD population.

    Directory of Open Access Journals (Sweden)

    Nori Matsunami

    Full Text Available Structural variation is thought to play a major etiological role in the development of autism spectrum disorders (ASDs, and numerous studies documenting the relevance of copy number variants (CNVs in ASD have been published since 2006. To determine if large ASD families harbor high-impact CNVs that may have broader impact in the general ASD population, we used the Affymetrix genome-wide human SNP array 6.0 to identify 153 putative autism-specific CNVs present in 55 individuals with ASD from 9 multiplex ASD pedigrees. To evaluate the actual prevalence of these CNVs as well as 185 CNVs reportedly associated with ASD from published studies many of which are insufficiently powered, we designed a custom Illumina array and used it to interrogate these CNVs in 3,000 ASD cases and 6,000 controls. Additional single nucleotide variants (SNVs on the array identified 25 CNVs that we did not detect in our family studies at the standard SNP array resolution. After molecular validation, our results demonstrated that 15 CNVs identified in high-risk ASD families also were found in two or more ASD cases with odds ratios greater than 2.0, strengthening their support as ASD risk variants. In addition, of the 25 CNVs identified using SNV probes on our custom array, 9 also had odds ratios greater than 2.0, suggesting that these CNVs also are ASD risk variants. Eighteen of the validated CNVs have not been reported previously in individuals with ASD and three have only been observed once. Finally, we confirmed the association of 31 of 185 published ASD-associated CNVs in our dataset with odds ratios greater than 2.0, suggesting they may be of clinical relevance in the evaluation of children with ASDs. Taken together, these data provide strong support for the existence and application of high-impact CNVs in the clinical genetic evaluation of children with ASD.

  15. Person-Centered Transition Planning.

    Science.gov (United States)

    Miner, Craig A.; Bates, Paul E.

    1997-01-01

    Describes a person-centered planning approach for involving students with disabilities and their families in the transition planning process. Components of person-centered planning are discussed, including development of a personal profile, identification of future lifestyle preferences, action steps and responsible parties, and necessary changes…

  16. Personality disorders

    DEFF Research Database (Denmark)

    Simonsen, Sebastian; Heinskou, Torben; Sørensen, Per

    2017-01-01

    BACKGROUND: In this naturalistic study, patients with personality disorders (N = 388) treated at Stolpegaard Psychotherapy Center, Mental Health Services, Capital Region of Denmark were allocated to two different kinds of treatment: a standardized treatment package with a preset number of treatment...... characteristics associated with clinicians' allocation of patients to the two different personality disorder services. METHODS: Patient characteristics across eight domains were collected in order to study whether there were systematic differences between patients allocated to the two different treatments....... Patient characteristics included measures of symptom severity, personality pathology, trauma and socio-demographic characteristics. Significance testing and binary regression analysis were applied to identify important predictors. RESULTS: Patient characteristics on fifteen variables differed...

  17. Türkçede Üçüncü Kişide Kişi ve Sayı Özelliklerinin Onarım Tabanlı İncelenmesi A Repair-Based Investigation Of Person And Number Features Of Third Person In Turkish

    Directory of Open Access Journals (Sweden)

    Mehmet AYGÜNEŞ

    2013-07-01

    Full Text Available In syntactic theory, one line of reasoning holds that [person] and[number] features are in the form of bundle features (Chomsky, 1995,2000, 2004, while there are also views supporting the split featuresargument (Sigurðsson, 2004; Baker, 2008; Nevins, 2011, et al.. Inaddition to this distinction between [person] and [number] features, it isargued that there is also a hierarchical structure within the [person]feature and considering the cross-linguistic perspective, there is a1/2>3 [person] hierarchy (Benveniste, 1966; Silverstein, 1985;Carminati, 2005; Bianchi, 2006. The present study aims to understandwhether [person] and [number] features of third person in Turkish aresplit features or not through the repair strategy. Furthermore, the datacollected in this study have been combined with that of Aygüneş (2012,2013 and a second analysis was performed. The aim of this analysiswas to identify the differences reflected to the repair process in personand number categories of the first and third person. Seventyparticipants took part in the study. The participants were presentedwith three sentence types including person, number, and both personand number mismatches between DP (Determiner Phrase and To head(Tense Head and were asked to correct these sentences. The resultsrevealed that participants repaired sentences containing mismatch onthe basis of the DP at a higher rate and word order did not influence therepair process. Moreover, a difference was observed in the repair ofmismatches in the person and number categories in the third person.This finding is line with the argument that [person] and [number] aresplit features. When the present data were combined with data fromAygüneş (2012, 2013, a difference was observed between first and thirdperson in the repair process, which stems from the number category.While the number category interacted with DP and To head at a similarrate in the first person, it interacted with the DP at a higher rate in

  18. Identification of Hypertension Management-related Errors in a Personal Digital Assistant-based Clinical Log for Nurses in Advanced Practice Nurse Training

    Directory of Open Access Journals (Sweden)

    Nam-Ju Lee, DNSc, RN

    2010-03-01

    Conclusion: The Hypertension Diagnosis and Management Error Taxonomy was useful for identifying errors based on documentation in a clinical log. The results provide an initial understanding of the nature of errors associated with hypertension diagnosis and management of nurses in APN training. The information gained from this study can contribute to educational interventions that promote APN competencies in identification and management of hypertension as well as overall patient safety and informatics competencies.

  19. An Identification and Evaluation of the Various Types and Forms of Personal Relationships within a Sino Foreign University Strategic Alliance Context

    Science.gov (United States)

    Willis, Mike

    2008-01-01

    This article identifies a range of personal relationships observable in Sino foreign strategic alliances. Guanxi relationships remained the key to a successful alliance; and encompassed various levels, stages, and dimensions--making them complex and changeable forms of human behavior. Other types of relationships identified included "basic…

  20. Hupa Numbers.

    Science.gov (United States)

    Bennett, Ruth, Ed.; And Others

    An introduction to the Hupa number system is provided in this workbook, one in a series of numerous materials developed to promote the use of the Hupa language. The book is written in English with Hupa terms used only for the names of numbers. The opening pages present the numbers from 1-10, giving the numeral, the Hupa word, the English word, and…

  1. Triangular Numbers

    Indian Academy of Sciences (India)

    Admin

    Triangular number, figurate num- ber, rangoli, Brahmagupta–Pell equation, Jacobi triple product identity. Figure 1. The first four triangular numbers. Left: Anuradha S Garge completed her PhD from. Pune University in 2008 under the supervision of Prof. S A Katre. Her research interests include K-theory and number theory.

  2. Proth Numbers

    Directory of Open Access Journals (Sweden)

    Schwarzweller Christoph

    2015-02-01

    Full Text Available In this article we introduce Proth numbers and prove two theorems on such numbers being prime [3]. We also give revised versions of Pocklington’s theorem and of the Legendre symbol. Finally, we prove Pepin’s theorem and that the fifth Fermat number is not prime.

  3. Sagan numbers

    OpenAIRE

    Mendonça, J. Ricardo G.

    2012-01-01

    We define a new class of numbers based on the first occurrence of certain patterns of zeros and ones in the expansion of irracional numbers in a given basis and call them Sagan numbers, since they were first mentioned, in a special case, by the North-american astronomer Carl E. Sagan in his science-fiction novel "Contact." Sagan numbers hold connections with a wealth of mathematical ideas. We describe some properties of the newly defined numbers and indicate directions for further amusement.

  4. Eulerian numbers

    CERN Document Server

    Petersen, T Kyle

    2015-01-01

    This text presents the Eulerian numbers in the context of modern enumerative, algebraic, and geometric combinatorics. The book first studies Eulerian numbers from a purely combinatorial point of view, then embarks on a tour of how these numbers arise in the study of hyperplane arrangements, polytopes, and simplicial complexes. Some topics include a thorough discussion of gamma-nonnegativity and real-rootedness for Eulerian polynomials, as well as the weak order and the shard intersection order of the symmetric group. The book also includes a parallel story of Catalan combinatorics, wherein the Eulerian numbers are replaced with Narayana numbers. Again there is a progression from combinatorics to geometry, including discussion of the associahedron and the lattice of noncrossing partitions. The final chapters discuss how both the Eulerian and Narayana numbers have analogues in any finite Coxeter group, with many of the same enumerative and geometric properties. There are four supplemental chapters throughout, ...

  5. Transfinite Numbers

    Indian Academy of Sciences (India)

    Transfinite Numbers. What is Infinity? S M Srivastava. In a series of revolutionary articles written during the last quarter of the nineteenth century, the great Ger- man mathematician Georg Cantor removed the age-old mistrust of infinity and created an exceptionally beau- tiful and useful theory of transfinite numbers. This is.

  6. SU-E-I-74: Image-Matching Technique of Computed Tomography Images for Personal Identification: A Preliminary Study Using Anthropomorphic Chest Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Matsunobu, Y; Shiotsuki, K [Department of Health Sciences, Graduate School of Medical Sciences, Kyushu University, Fukuoka (Japan); Morishita, J [Department of Health Sciences, Faculty of Medical Sciences, Kyushu University, Fukuoka, JP (Japan)

    2015-06-15

    Purpose: Fingerprints, dental impressions, and DNA are used to identify unidentified bodies in forensic medicine. Cranial Computed tomography (CT) images and/or dental radiographs are also used for identification. Radiological identification is important, particularly in the absence of comparative fingerprints, dental impressions, and DNA samples. The development of an automated radiological identification system for unidentified bodies is desirable. We investigated the potential usefulness of bone structure for matching chest CT images. Methods: CT images of three anthropomorphic chest phantoms were obtained on different days in various settings. One of the phantoms was assumed to be an unidentified body. The bone image and the bone image with soft tissue (BST image) were extracted from the CT images. To examine the usefulness of the bone image and/or the BST image, the similarities between the two-dimensional (2D) or threedimensional (3D) images of the same and different phantoms were evaluated in terms of the normalized cross-correlation value (NCC). Results: For the 2D and 3D BST images, the NCCs obtained from the same phantom assumed to be an unidentified body (2D, 0.99; 3D, 0.93) were higher than those for the different phantoms (2D, 0.95 and 0.91; 3D, 0.89 and 0.80). The NCCs for the same phantom (2D, 0.95; 3D, 0.88) were greater compared to those of the different phantoms (2D, 0.61 and 0.25; 3D, 0.23 and 0.10) for the bone image. The difference in the NCCs between the same and different phantoms tended to be larger for the bone images than for the BST images. These findings suggest that the image-matching technique is more useful when utilizing the bone image than when utilizing the BST image to identify different people. Conclusion: This preliminary study indicated that evaluating the similarity of bone structure in 2D and 3D images is potentially useful for identifying of an unidentified body.

  7. SU-E-I-74: Image-Matching Technique of Computed Tomography Images for Personal Identification: A Preliminary Study Using Anthropomorphic Chest Phantoms

    International Nuclear Information System (INIS)

    Matsunobu, Y; Shiotsuki, K; Morishita, J

    2015-01-01

    Purpose: Fingerprints, dental impressions, and DNA are used to identify unidentified bodies in forensic medicine. Cranial Computed tomography (CT) images and/or dental radiographs are also used for identification. Radiological identification is important, particularly in the absence of comparative fingerprints, dental impressions, and DNA samples. The development of an automated radiological identification system for unidentified bodies is desirable. We investigated the potential usefulness of bone structure for matching chest CT images. Methods: CT images of three anthropomorphic chest phantoms were obtained on different days in various settings. One of the phantoms was assumed to be an unidentified body. The bone image and the bone image with soft tissue (BST image) were extracted from the CT images. To examine the usefulness of the bone image and/or the BST image, the similarities between the two-dimensional (2D) or threedimensional (3D) images of the same and different phantoms were evaluated in terms of the normalized cross-correlation value (NCC). Results: For the 2D and 3D BST images, the NCCs obtained from the same phantom assumed to be an unidentified body (2D, 0.99; 3D, 0.93) were higher than those for the different phantoms (2D, 0.95 and 0.91; 3D, 0.89 and 0.80). The NCCs for the same phantom (2D, 0.95; 3D, 0.88) were greater compared to those of the different phantoms (2D, 0.61 and 0.25; 3D, 0.23 and 0.10) for the bone image. The difference in the NCCs between the same and different phantoms tended to be larger for the bone images than for the BST images. These findings suggest that the image-matching technique is more useful when utilizing the bone image than when utilizing the BST image to identify different people. Conclusion: This preliminary study indicated that evaluating the similarity of bone structure in 2D and 3D images is potentially useful for identifying of an unidentified body

  8. [Measures to prevent patient identification errors in blood collection/physiological function testing utilizing a laboratory information system].

    Science.gov (United States)

    Shimazu, Chisato; Hoshino, Satoshi; Furukawa, Taiji

    2013-08-01

    We constructed an integrated personal identification workflow chart using both bar code reading and an all in-one laboratory information system. The information system not only handles test data but also the information needed for patient guidance in the laboratory department. The reception terminals at the entrance, displays for patient guidance and patient identification tools at blood-sampling booths are all controlled by the information system. The number of patient identification errors was greatly reduced by the system. However, identification errors have not been abolished in the ultrasound department. After re-evaluation of the patient identification process in this department, we recognized that the major reason for the errors came from excessive identification workflow. Ordinarily, an ultrasound test requires patient identification 3 times, because 3 different systems are required during the entire test process, i.e. ultrasound modality system, laboratory information system and a system for producing reports. We are trying to connect the 3 different systems to develop a one-time identification workflow, but it is not a simple task and has not been completed yet. Utilization of the laboratory information system is effective, but is not yet perfect for patient identification. The most fundamental procedure for patient identification is to ask a person's name even today. Everyday checks in the ordinary workflow and everyone's participation in safety-management activity are important for the prevention of patient identification errors.

  9. Chocolate Numbers

    OpenAIRE

    Ji, Caleb; Khovanova, Tanya; Park, Robin; Song, Angela

    2015-01-01

    In this paper, we consider a game played on a rectangular $m \\times n$ gridded chocolate bar. Each move, a player breaks the bar along a grid line. Each move after that consists of taking any piece of chocolate and breaking it again along existing grid lines, until just $mn$ individual squares remain. This paper enumerates the number of ways to break an $m \\times n$ bar, which we call chocolate numbers, and introduces four new sequences related to these numbers. Using various techniques, we p...

  10. Number theory

    CERN Document Server

    Andrews, George E

    1994-01-01

    Although mathematics majors are usually conversant with number theory by the time they have completed a course in abstract algebra, other undergraduates, especially those in education and the liberal arts, often need a more basic introduction to the topic.In this book the author solves the problem of maintaining the interest of students at both levels by offering a combinatorial approach to elementary number theory. In studying number theory from such a perspective, mathematics majors are spared repetition and provided with new insights, while other students benefit from the consequent simpl

  11. Mandatory Submission to The Identification of Genetic Profile for Criminal Purpose: A Broach Pursuant to the Right to Privacy and Dignity of the Human Person

    Directory of Open Access Journals (Sweden)

    George Maia Santos

    2015-12-01

    Full Text Available This article aims to demonstrate that the mandatory submission convicted of a crime committed, intentionally, with serious violence against person or heinous crime, to identify the genetic profile by DNA extraction - deoxyribonucleic acid, although by proper and painless technique is offensive to fundamental rights. For this purpose, it is part of the overall concept of the right to privacy, which is configured as a negative right or protection against unlawful state mismanagement, in order to protect a need or a basic right to the free individual self-determination. Then genetic intimacy is defined as an asset able to reveal the physical, psychological, behavioral and disease features, which, if disclosed or accessed without the consent of the accused, may generate stigmatization and discrimination of the subject involved, violating in this way, therefore, the right to privacy. In conclusion, we move towards emphasizing besides the right to privacy, compulsory provision of biological material to identify the genetic profile is offensive to fundamental rights to physical liberty or outpatient; physical integrity; to the freedom of religion or conscience; non-discrimination; the silence and non-production of evidences against himself, and in last instance, the biggest vector of all fundamental rights: the dignity of the human person.

  12. THE CONTRIBUTION OF GESTURES TO PERSONAL BRANDING

    Directory of Open Access Journals (Sweden)

    Brînduşa-Mariana Amălăncei

    2015-07-01

    Full Text Available A form of (self-promotion but also an authentic strategic choice, the personal brand has become a topical preoccupation of marketing specialists. Personal branding or self-marketing represents an innovative concept that associates the efficiency of personal development with the effectiveness of communication and marketing techniques adapted to the individual and that comprises the entire collection of techniques allowing the identification and promotion of the self/individual. The main objective is a clear communication with regard to personal identity, no matter by means of which method, so that it gives uniqueness and offers a competitive advantage. Although online promotion is increasingly gaining ground for the creation of a personal brand, an individual’s verbal and nonverbal behaviour represent very important differentiating elements. Starting from the premise that gestures often complement, anticipate, substitute or contradict the verbal, we will endeavour to highlight a number of significations that can be attributed to the various body movements and that can successfully contribute to the creation of a powerful personal brand.

  13. Nice numbers

    CERN Document Server

    Barnes, John

    2016-01-01

    In this intriguing book, John Barnes takes us on a journey through aspects of numbers much as he took us on a geometrical journey in Gems of Geometry. Similarly originating from a series of lectures for adult students at Reading and Oxford University, this book touches a variety of amusing and fascinating topics regarding numbers and their uses both ancient and modern. The author intrigues and challenges his audience with both fundamental number topics such as prime numbers and cryptography, and themes of daily needs and pleasures such as counting one's assets, keeping track of time, and enjoying music. Puzzles and exercises at the end of each lecture offer additional inspiration, and numerous illustrations accompany the reader. Furthermore, a number of appendices provides in-depth insights into diverse topics such as Pascal’s triangle, the Rubik cube, Mersenne’s curious keyboards, and many others. A theme running through is the thought of what is our favourite number. Written in an engaging and witty sty...

  14. New software for computer-assisted dental-data matching in Disaster Victim Identification and long-term missing persons investigations: "DAVID Web".

    Science.gov (United States)

    Clement, J G; Winship, V; Ceddia, J; Al-Amad, S; Morales, A; Hill, A J

    2006-05-15

    In 1997 an internally supported but unfunded pilot project at the Victorian Institute of Forensic Medicine (VIFM) Australia led to the development of a computer system which closely mimicked Interpol paperwork for the storage, later retrieval and tentative matching of the many AM and PM dental records that are often needed for rapid Disaster Victim Identification. The program was called "DAVID" (Disaster And Victim IDentification). It combined the skills of the VIFM Information Technology systems manager (VW), an experienced odontologist (JGC) and an expert database designer (JC); all current authors on this paper. Students did much of the writing of software to prescription from Monash University. The student group involved won an Australian Information Industry Award in recognition of the contribution the new software could have made to the DVI process. Unfortunately, the potential of the software was never realized because paradoxically the federal nature of Australia frequently thwarts uniformity of systems across the entire country. As a consequence, the final development of DAVID never took place. Given the recent problems encountered post-tsunami by the odontologists who were obliged to use the Plass Data system (Plass Data Software, Holbaek, Denmark) and with the impending risks imposed upon Victoria by the decision to host the Commonwealth Games in Melbourne during March 2006, funding was sought and obtained from the state government to update counter disaster preparedness at the VIFM. Some of these funds have been made available to upgrade and complete the DAVID project. In the wake of discussions between leading expert odontologists from around the world held in Geneva during July 2003 at the invitation of the International Committee of the Red Cross significant alterations to the initial design parameters of DAVID were proposed. This was part of broader discussions directed towards developing instruments which could be used by the ICRC's "The Missing

  15. FPGA Implementation for GMM-Based Speaker Identification

    Directory of Open Access Journals (Sweden)

    Phaklen EhKan

    2011-01-01

    Full Text Available In today's society, highly accurate personal identification systems are required. Passwords or pin numbers can be forgotten or forged and are no longer considered to offer a high level of security. The use of biological features, biometrics, is becoming widely accepted as the next level for security systems. Biometric-based speaker identification is a method of identifying persons from their voice. Speaker-specific characteristics exist in speech signals due to different speakers having different resonances of the vocal tract. These differences can be exploited by extracting feature vectors such as Mel-Frequency Cepstral Coefficients (MFCCs from the speech signal. A well-known statistical modelling process, the Gaussian Mixture Model (GMM, then models the distribution of each speaker's MFCCs in a multidimensional acoustic space. The GMM-based speaker identification system has features that make it promising for hardware acceleration. This paper describes the hardware implementation for classification of a text-independent GMM-based speaker identification system. The aim was to produce a system that can perform simultaneous identification of large numbers of voice streams in real time. This has important potential applications in security and in automated call centre applications. A speedup factor of ninety was achieved compared to a software implementation on a standard PC.

  16. Number names and number understanding

    DEFF Research Database (Denmark)

    Ejersbo, Lisser Rye; Misfeldt, Morten

    2014-01-01

    This paper concerns the results from the first year of a three-year research project involving the relationship between Danish number names and their corresponding digits in the canonical base 10 system. The project aims to develop a system to help the students’ understanding of the base 10 syste...... the Danish number names are more complicated than in other languages. Keywords: A research project in grade 0 and 1th in a Danish school, Base-10 system, two-digit number names, semiotic, cognitive perspectives....

  17. Funny Numbers

    Directory of Open Access Journals (Sweden)

    Theodore M. Porter

    2012-12-01

    Full Text Available The struggle over cure rate measures in nineteenth-century asylums provides an exemplary instance of how, when used for official assessments of institutions, these numbers become sites of contestation. The evasion of goals and corruption of measures tends to make these numbers “funny” in the sense of becoming dis-honest, while the mismatch between boring, technical appearances and cunning backstage manipulations supplies dark humor. The dangers are evident in recent efforts to decentralize the functions of governments and corporations using incen-tives based on quantified targets.

  18. Transcendental numbers

    CERN Document Server

    Murty, M Ram

    2014-01-01

    This book provides an introduction to the topic of transcendental numbers for upper-level undergraduate and graduate students. The text is constructed to support a full course on the subject, including descriptions of both relevant theorems and their applications. While the first part of the book focuses on introducing key concepts, the second part presents more complex material, including applications of Baker’s theorem, Schanuel’s conjecture, and Schneider’s theorem. These later chapters may be of interest to researchers interested in examining the relationship between transcendence and L-functions. Readers of this text should possess basic knowledge of complex analysis and elementary algebraic number theory.

  19. Transfinite Numbers

    Indian Academy of Sciences (India)

    this is a characteristic difference between finite and infinite sets and created an immensely useful branch of mathematics based on this idea which had a great impact on the whole of mathe- matics. For example, the question of what is a number (finite or infinite) is almost a philosophical one. However Cantor's work turned it ...

  20. Personality and Development in Childhood: A Person-Centered Approach.

    Science.gov (United States)

    Hart, Daniel; Atkins, Robert; Fegley, Suzanne

    2003-01-01

    Applied a person-centered approach to childhood personality development in 28 diverse samples of 3- to 6-year-olds studied over 6 years. Identified resilient, overcontrolled, and undercontrolled personality types. Found that the undercontrolled personality type related to intellectual decline over 6 years. The number of family risks predicted…

  1. Identificación de nombres personales por medio de sistemas de codificación fonética Personal name identification through phonetic codification systems

    Directory of Open Access Journals (Sweden)

    Carmen Gálvez

    2006-01-01

    Full Text Available La necesidad de identificar las variantes de los nombres personales es un problema muy conocido en diversas aplicaciones, tales como los sistemas de recuperación de información (SRI, las bibliotecas digitales, las bases de datos de pacientes en un hospital, los sistemas de reservas aéreas, o los sistemas de censo. Los métodos de codificación fonética constituyen uno de los procedimientos para la solución de este problema, permitiendo obtener cadenas canónicas o normalizadas. Estos sistemas se engloban dentro de las técnicas generales de equiparación aproximada de cadenas. En este trabajo se realiza una revisión de los procesos que utilizan los sistemas Soundex, Daitch-Mokotoff Soundex, Phonix, Metaphone y NYSIIS para la asignación de claves fonéticas. La codificación fonética permite reducir a una forma común aquellos nombres personales que son similares en cuanto a su pronunciación, haciendo más sencilla la comparación de una cadena con otra, debido a que se almacena el código generado en lugar del nombre completo. Sin embargo, la principal limitación de estos sistemas es que son dependientes del lenguaje utilizado, lo que hace necesario la realización de modificaciones de acuerdo al idioma que se va a emplear.The need to identify the variants of personal names is a well-known problem in applications such as information retrieval systems (IRS, digital libraries, databases of patients in a hospital, the electronic systems of air reserves, or the systems of census. The phonetic codification methods constitute one of the procedures for the solution of this problem, permitting to obtain canonical or normalized names. These systems are included inside the general techniques of approximate string matching. In this work a revision of the processes is carried out that utilize the Soundex, Daitch-Mokotoff Soundex, Phonix, Metaphone and NYSIIS systems for the assignment of phonetic keys. The phonetic codification permits reduce to a

  2. EDUCATIONAl. RESOURCE IDENTIFICATION IN THE ...

    African Journals Online (AJOL)

    RESOURCE IDENTIFICATION. IN THE ... Identification of educational resources in the local environ- ment is of ... The environment to which a person is exposed and in which, or .... this respect on the re-use of resources - each ele- ment or ...

  3. Really big numbers

    CERN Document Server

    Schwartz, Richard Evan

    2014-01-01

    In the American Mathematical Society's first-ever book for kids (and kids at heart), mathematician and author Richard Evan Schwartz leads math lovers of all ages on an innovative and strikingly illustrated journey through the infinite number system. By means of engaging, imaginative visuals and endearing narration, Schwartz manages the monumental task of presenting the complex concept of Big Numbers in fresh and relatable ways. The book begins with small, easily observable numbers before building up to truly gigantic ones, like a nonillion, a tredecillion, a googol, and even ones too huge for names! Any person, regardless of age, can benefit from reading this book. Readers will find themselves returning to its pages for a very long time, perpetually learning from and growing with the narrative as their knowledge deepens. Really Big Numbers is a wonderful enrichment for any math education program and is enthusiastically recommended to every teacher, parent and grandparent, student, child, or other individual i...

  4. Biometric identification using local iterated function

    Science.gov (United States)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  5. Person Recognition in Social Media Photos

    OpenAIRE

    Oh, Seong Joon; Benenson, Rodrigo; Fritz, Mario; Schiele, Bernt

    2017-01-01

    People nowadays share large parts of their personal lives through social media. Being able to automatically recognise people in personal photos may greatly enhance user convenience by easing photo album organisation. For human identification task, however, traditional focus of computer vision has been face recognition and pedestrian re-identification. Person recognition in social media photos sets new challenges for computer vision, including non-cooperative subjects (e.g. backward viewpoints...

  6. Systems biology of personalized nutrition

    NARCIS (Netherlands)

    Ommen, B. van; Broek, T. van den; Hoogh, I. de; Erk, M. van; Someren, E. van; Rouhani-Rankouhi, T.; Anthony, J.C.; Hogenelst, K.; Pasman, W.; Boorsma, A.; Wopereis, S.

    2017-01-01

    Personalized nutrition is fast becoming a reality due to a number of technological, scientific, and societal developments that complement and extend current public health nutrition recommendations. Personalized nutrition tailors dietary recommendations to specific biological requirements on the

  7. Sociogenomic Personality Psychology

    Science.gov (United States)

    Roberts, Brent W.; Jackson, Joshua J.

    2009-01-01

    In this article, we address a number of issues surrounding biological models of personality traits. Most traditional and many contemporary biological models of personality traits assume that biological systems underlying personality traits are causal and immutable. In contrast, sociogenomic biology, which we introduce to readers in this article, directly contradicts the widely held assumption that something that is biological, heritable, or temperamental, is unchangeable. We provide examples of how seemingly unchanging biological systems, such as DNA, are both dependent on environments for elicitation and can be modified by environmental changes. Finally, we synthesize sociogenomic biology with personality psychology in a model of personality traits that integrates this more modern perspective on biology, physiology, and environment that we term sociogenomic personality psychology. We end the article with a discussion of the future directions of sociogenomic personality psychology. PMID:19012657

  8. Personal Virtual Libraries

    Science.gov (United States)

    Pappas, Marjorie L.

    2004-01-01

    Virtual libraries are becoming more and more common. Most states have a virtual library. A growing number of public libraries have a virtual presence on the Web. Virtual libraries are a growing addition to school library media collections. The next logical step would be personal virtual libraries. A personal virtual library (PVL) is a collection…

  9. Brand Personality Creation through Advertising

    OpenAIRE

    Ouwersloot Hans; Tudorica Anamaria

    2001-01-01

    Brand Personality is one of the core dimensions of brand equity. Brand personality refers to the emotional side of a brand image. It is created by all experiences of consumers with a brand, but advertising plays a dominant role in personality creation. In this paper we explore the mechanism that builds brand personality with the help of advertising. We integrate advertising models with the theory of brand personality. Our integrated framework leads to a number of propositions that set an agen...

  10. Diamond identification

    International Nuclear Information System (INIS)

    Lang, A.R.

    1979-01-01

    Methods of producing sets of records of the internal defects of diamonds as a means of identification of the gems by x-ray topography are described. To obtain the records one can either use (a) monochromatic x-radiation reflected at the Bragg angle from crystallographically equivalent planes of the diamond lattice structure, Bragg reflections from each such plane being recorded from a number of directions of view, or (b) white x-radiation incident upon the diamond in directions having a constant angular relationship to each equivalent axis of symmetry of the diamond lattice structure, Bragg reflections being recorded for each direction of the incident x-radiation. By either method an overall point-to-point three dimensional representation of the diamond is produced. (U.K.)

  11. The Algebra of Complex Numbers.

    Science.gov (United States)

    LePage, Wilbur R.

    This programed text is an introduction to the algebra of complex numbers for engineering students, particularly because of its relevance to important problems of applications in electrical engineering. It is designed for a person who is well experienced with the algebra of real numbers and calculus, but who has no experience with complex number…

  12. PERSONALITY TRAITS AND BORDERLINE PERSONALITY DISORDER

    Directory of Open Access Journals (Sweden)

    Senija TAHIROVIC

    2016-12-01

    Full Text Available The people with Borderline Personality Disorder (BPD show pathological personality traits in three of the five domains (APA 2013. In addition to diagnostic criteria for BPD, described by Diagnostic and Statistical Manual of Mental Disorders (DSM-5, the dimensional model of personality disorder, based on five-factor model of personality, seems to gain interest as it promisses to eliminate problems associated with poor-fit, co-morbidity and unclear diagnosis. The purpose of this study is to identify the personality traits by people who are already diagnosed with BPD using the DSM-5 categorical criteria. Based on the theoretical concepts and existing research findings as well as increased interest in the dimensional personality theory, we assume that people diagnosed with BPD will show high levels of pathology on three trait domains: negative affectivity, disinhibition and antagonism. This study was conducted in Germany in psychiatric clinic. Fifteen participants represented a convenience sample, of patients already diagnosed with BPD. For this study Personality Inventory for DSM-5 (PID-5 was used. The findings supported the assumptions that people with BPD show some degree of anxiousness, emotional lability, hostility, impulsivity, risk taking and separation anxiety. The study also found that traits such as distractibility, withdrawal and submissiveness were also present in this participant group. Even though, study was conducted with small number of participants it has provided contribution to the already existing knowledge and understanding in regards to common personality treats for people diagnosed with BPD.

  13. Banner prints social security numbers

    OpenAIRE

    Robbins RA

    2014-01-01

    No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1). The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pion...

  14. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  15. Person identification by gait analysis and photogrammetry

    DEFF Research Database (Denmark)

    Lynnerup, Niels; Vedel, Jens

    2005-01-01

    Surveillance images from a bank robbery were analyzed and compared with images of a suspect. Based on general bodily features, gait and anthropometric measurements, we were able to conclude that one of the perpetrators showed strong resemblance to the suspect. Both exhibited a gait characterized...... by hyperextension of the leg joints, and bodily measurements did not differ by more than 6 mm on average. The latter was quantified by photogrammetry: i.e., measuring by using images of the perpetrator as captured by surveillance cameras. Using the computer software Photomodeler Pro, synchronous images from...

  16. Personality Disorders

    Science.gov (United States)

    Personality disorders are a group of mental illnesses. They involve long-term patterns of thoughts and behaviors ... serious problems with relationships and work. People with personality disorders have trouble dealing with everyday stresses and ...

  17. Personality Disorders

    Science.gov (United States)

    ... Disorders in Adults Data Sources Share Personality Disorders Definitions Personality disorders represent “an enduring pattern of inner ... MSC 9663 Bethesda, MD 20892-9663 Follow Us Facebook Twitter YouTube Google Plus NIMH Newsletter NIMH RSS ...

  18. What Is a Personal Health Record (PHR)?

    Science.gov (United States)

    ... patient identification number, address, phone number, and social security number. Your health insurance company receives your health information through the claims provided by the patient accounts/billing department at your healthcare facility. The ...

  19. Personal Branding

    OpenAIRE

    Climent i Martí, Jordi

    2017-01-01

    Proyecto Fin de Grado leído en la Universidad Rey Juan Carlos en el curso académico 2013/2014. Director: Cristina Ayala del Pino Con este Trabajo Fin de Grado he querido aproximar el concepto del Personal Branding y de marca personal como la herramienta para diferenciarse en el entorno profesional. Partiendo con la definición del concepto, su construcción, el panorama actual, compaginar empleo con marca personal y acabando con la visión personal de un gurú de la Marca Person...

  20. Personality and personal network type

    NARCIS (Netherlands)

    Doeven-Eggens, Lilian; De Fruyt, Filip; Hendriks, A. A. Jolijn; Bosker, Roel J.; Van der Werf, Margaretha P. C.

    2008-01-01

    The association between personality and personal relationships is mostly studied within dyadic relationships. We examined these variables within the context of personal network types. We used Latent Class Analysis to identify groups Of Students with similar role relationships with three focal

  1. Show me your friends and I will tell you what type of person you are: how own profile, number of friends, and type of friends influence impression formation on social network sites

    NARCIS (Netherlands)

    Utz, S.

    2010-01-01

    This experiment examines how far extraversion of the target (self-generated information), extraversion of the target's friends (friends-generated information), and number of friends (system-generated information) influence the perceived popularity, communal orientation, and social attractiveness of

  2. Personality Development

    Directory of Open Access Journals (Sweden)

    Osman Ozdemir

    2012-12-01

    Full Text Available Personality is the integration of characteristics acquired or brought by birth which separate the individual from others. Personality involves aspects of the individual's mental, emotional, social, and physical features in continuum. Several theories were suggested to explain developmental processes of personality. Each theory concentrates on one feature of human development as the focal point, then integrates with other areas of development in general. Most theories assume that childhood, especially up to 5-6 years, has essential influence on development of personality. The interaction between genetic and environmental factors reveals a unique personality along growth and developmental process. It could be said that individual who does not have any conflict between his/her basic needs and society's, has well-developed and psychologically healthy personality.

  3. Perceived Personality Traits of Individuals with Anorexia Nervosa

    Science.gov (United States)

    Watters, Jessica E.; Malouff, John M.

    2012-01-01

    Background: Prior research has found evidence of a general negative personality stereotype for individuals who have anorexia nervosa (AN). Methods: This study examined the expected personality characteristics of individuals with AN using the Five-Factor Model of personality to allow identification of specific personality traits that are part of…

  4. 20 CFR 422.103 - Social security numbers.

    Science.gov (United States)

    2010-04-01

    ... personal interview with the dependent is not required. Form SS-5 may be obtained at: (i) Any local social... previously assigned social security number(s), if any, of the applicant. A personal interview may be required... sponsoring agency of a refugee, if no personal mailing address is available). (d) Social security number...

  5. Personal Reflections

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education. Personal Reflections. Articles in Resonance – Journal of Science Education. Volume 6 Issue 3 March 2001 pp 90-93 Personal Reflections. Why did I opt for Career in Science? Jayant V Narlikar · More Details Fulltext PDF. Volume 9 Issue 8 August 2004 pp 89-89 ...

  6. Identification of Intellectually Able Disadvantaged Filipino Children.

    Science.gov (United States)

    Naval-Severino, Teresita

    1992-01-01

    Preschool Filipino children from disadvantaged urban communities were assessed for giftedness. This article describes the identification procedures and tools used and presents a profile of the children in terms of socioeconomic, intellectual, and personality variables. (Author/JDD)

  7. 25 CFR 249.3 - Identification cards.

    Science.gov (United States)

    2010-04-01

    ... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...

  8. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  9. The dynamics of female self-identification conceptions: from modernism to postmodernist feminism

    OpenAIRE

    Е Е Agafonova

    2009-01-01

    A number of new contradictions between the personality and society, including the accentuation of the problem of human being's identity and self-identification have been engendered by globalization. Whereas formerly the individual enjoyed a stable set of norms, values, and motivations determining his identity structure, nowadays social institutions bearing responsibility for the stable identity development are experiencing transformations and fail to accomplish their functions to the full ext...

  10. Error-Detecting Identification Codes for Algebra Students.

    Science.gov (United States)

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  11. Personal dosimetry and information platforms

    International Nuclear Information System (INIS)

    Sanchez Hidalgo, M.; Galan Montenegro, P.; Bodineau Gil, C.; Hernandez Rodriguez, R.; Jimenez Nartin, A.; Cano Sanchez, J. J.

    2011-01-01

    One question often raised by the hospital personnel dosimetry is the high incidence in the no monthly turnover of dosimeters, which is currently a high number of administrative dose assignments. The high number of workers with personal dosimetry and in many cases, the dispersion of workplaces makes it impossible to personalized management. To make a more direct and personal, and transmit information quickly and with guaranteed reception, has developed and implemented a system of personalized dosimetric information through messaging Short Message Service (SMS) and access to the history of dosimetric dosimetric and management through web space Service Hospital Radio physics.

  12. Antisocial personalities: Measuring prevalence among offenders in ...

    African Journals Online (AJOL)

    The identification of offenders who meet the criteria for psychopathy, antisocial personality disorder or dissocial personality disorder could be of significant value to help address the violent crime crisis in South Africa. A sample of 500 male maximum security offenders was selected to determine the prevalence of these ...

  13. Cortical mechanisms of person representation: recognition of famous and personally familiar names.

    Science.gov (United States)

    Sugiura, Motoaki; Sassa, Yuko; Watanabe, Jobu; Akitsuki, Yuko; Maeda, Yasuhiro; Matsue, Yoshihiko; Fukuda, Hiroshi; Kawashima, Ryuta

    2006-06-01

    Personally familiar people are likely to be represented more richly in episodic, emotional, and behavioral contexts than famous people, who are usually represented predominantly in semantic context. To reveal cortical mechanisms supporting this differential person representation, we compared cortical activation during name recognition tasks between personally familiar and famous names, using an event-related functional magnetic resonance imaging (fMRI). Normal subjects performed familiar- or unfamiliar-name detection tasks during visual presentation of personally familiar (Personal), famous (Famous), and unfamiliar (Unfamiliar) names. The bilateral temporal poles and anterolateral temporal cortices, as well as the left temporoparietal junction, were activated in the contrasts Personal-Unfamiliar and Famous-Unfamiliar to a similar extent. The bilateral occipitotemporoparietal junctions, precuneus, and posterior cingulate cortex showed activation in the contrasts Personal-Unfamiliar and Personal-Famous. Together with previous findings, differential activation in the occipitotemporoparietal junction, precuneus, and posterior cingulate cortex between personally familiar and famous names is considered to reflect differential person representation. The similar extent of activation for personally familiar and famous names in the temporal pole and anterolateral temporal cortex is consistent with the associative role of the anterior temporal cortex in person identification, which has been conceptualized as a person identity node in many models of person identification. The left temporoparietal junction was considered to process familiar written names. The results illustrated the neural correlates of the person representation as a network of discrete regions in the bilateral posterior cortices, with the anterior temporal cortices having a unique associative role.

  14. Suicide and Personality

    Directory of Open Access Journals (Sweden)

    K. Nahit Ozmenler

    2009-07-01

    suicide are important clues as to presence of suicidality. Several studies have been conducted on the relationship between suicide attempts and personality features. However, there is not sufficient number of studies conducted on the completed suicide victims. The only methodology that could be used among this group of patients is psychological autopsy which is quite hard to implement because of inherent methodological problems. These factors prevent accumulation of sufficient data on the relationships between completed suicide and personality. However, we should evaluate suicidal behavior comprehensively in order to treat and to prevent its occurrence. Personality features are important in choosing the method of treatment, for social arrangements, and predicting possible new attempts. Our knowledge, about relationship between personality and suicide, will reach a better level by accelerating studies on completed suicide, and investigating suicide, personality, temperament, character relationship more thoroughly.

  15. Moral Personality Growth

    Directory of Open Access Journals (Sweden)

    Jana Kalin

    1998-12-01

    Full Text Available Learning in terms of personality growth is a life-long process, just as personality growth itself is a life-long process. Kalin presents a number of psychological theories and their impact on moral development - which is an integral part of personality growth. The paper further treats the formation and changing of beliefs, and the role of education in the two processes. Great emphasis is put on cognitive theories; Kalin explains those formulated by L. Kohlberg and J. Rest. In discussing the process of shaping and changing one's views, special emphasis is put on the environment, or rather the social group an individual belongs to, and on the influence of personality traits and experience. The paper juxtaposes the influence - strengths and weaknesses - of the psychology of persuasion and education on forming and changing one's views, taken into consideration that views consist of cognitive, emotive and conative dimensions.

  16. Identification of drug resistance and immune-driven variations in hepatitis C virus (HCV) NS3/4A, NS5A and NS5B regions reveals a new approach toward personalized medicine.

    Science.gov (United States)

    Ikram, Aqsa; Obaid, Ayesha; Awan, Faryal Mehwish; Hanif, Rumeza; Naz, Anam; Paracha, Rehan Zafar; Ali, Amjad; Janjua, Hussnain Ahmed

    2017-01-01

    Cellular immune responses (T cell responses) during hepatitis C virus (HCV) infection are significant factors for determining the outcome of infection. HCV adapts to host immune responses by inducing mutations in its genome at specific sites that are important for HLA processing/presentation. Moreover, HCV also adapts to resist potential drugs that are used to restrict its replication, such as direct-acting antivirals (DAAs). Although DAAs have significantly reduced disease burden, resistance to these drugs is still a challenge for the treatment of HCV infection. Recently, drug resistance mutations (DRMs) observed in HCV proteins (NS3/4A, NS5A and NS5B) have heightened concern that the emergence of drug resistance may compromise the effectiveness of DAAs. Therefore, the NS3/4A, NS5A and NS5B drug resistance variations were investigated in this study, and their prevalence was examined in a large number of protein sequences from all HCV genotypes. Furthermore, potential CD4 + and CD8 + T cell epitopes were predicted and their overlap with genetic variations was explored. The findings revealed that many reported DRMs within NS3/4A, NS5A and NS5B are not drug-induced; rather, they are already present in HCV strains, as they were also detected in HCV-naïve patients. This study highlights several hot spots in which HLA and drug selective pressure overlap. Interestingly, these overlapping mutations were frequently observed among many HCV genotypes. This study implicates that knowledge of the host HLA type and HCV subtype/genotype can provide important information in defining personalized therapy. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Personal Computers.

    Science.gov (United States)

    Toong, Hoo-min D.; Gupta, Amar

    1982-01-01

    Describes the hardware, software, applications, and current proliferation of personal computers (microcomputers). Includes discussions of microprocessors, memory, output (including printers), application programs, the microcomputer industry, and major microcomputer manufacturers (Apple, Radio Shack, Commodore, and IBM). (JN)

  18. Borderline Personality Disorder

    Science.gov (United States)

    ... of a mood disorder—not borderline personality disorder Self-harming behavior, such as cutting Recurring thoughts of suicidal ... symptoms and reduce the number of suicidal or self-harming behaviors. Read more on NIMH’s Psychotherapies health topic ...

  19. Isotope Identification

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-18

    The objective of this training modules is to examine the process of using gamma spectroscopy for radionuclide identification; apply pattern recognition to gamma spectra; identify methods of verifying energy calibration; and discuss potential causes of isotope misidentification.

  20. Number Sense on the Number Line

    Science.gov (United States)

    Woods, Dawn Marie; Ketterlin Geller, Leanne; Basaraba, Deni

    2018-01-01

    A strong foundation in early number concepts is critical for students' future success in mathematics. Research suggests that visual representations, like a number line, support students' development of number sense by helping them create a mental representation of the order and magnitude of numbers. In addition, explicitly sequencing instruction…

  1. Integrating personality structure, personality process, and personality development

    NARCIS (Netherlands)

    Baumert, Anna; Schmitt, Manfred; Perugini, Marco; Johnson, Wendy; Blum, Gabriela; Borkenau, Peter; Costantini, Giulio; Denissen, J.J.A.; Fleeson, William; Grafton, Ben; Jayawickreme, Eranda; Kurzius, Elena; MacLeod, Colin; Miller, Lynn C.; Read, Stephen J.; Robinson, Michael D.; Wood, Dustin; Wrzus, Cornelia

    2017-01-01

    In this target article, we argue that personality processes, personality structure, and personality development have to be understood and investigated in integrated ways in order to provide comprehensive responses to the key questions of personality psychology. The psychological processes and

  2. Personal factors and personality characteristics as predictors of ...

    African Journals Online (AJOL)

    The study set to investigate personal factors and personality characteristics as Predictors of customers satisfaction with health care services. The study utilized Ex-Post Facto design. A total number of 100 participants took part in the study which were made up of 57 (57%) males and 48 (48%) females, with a mean age of ...

  3. The Super Patalan Numbers

    OpenAIRE

    Richardson, Thomas M.

    2014-01-01

    We introduce the super Patalan numbers, a generalization of the super Catalan numbers in the sense of Gessel, and prove a number of properties analagous to those of the super Catalan numbers. The super Patalan numbers generalize the super Catalan numbers similarly to how the Patalan numbers generalize the Catalan numbers.

  4. Personality disorder

    DEFF Research Database (Denmark)

    Tyrer, Peter; Mulder, Roger; Crawford, Mike

    2010-01-01

    and to society, and interferes, usually negatively, with progress in the treatment of other mental disorders. We now have evidence that personality disorder, as currently classified, affects around 6% of the world population, and the differences between countries show no consistent variation. We are also getting......Personality disorder is now being accepted as an important condition in mainstream psychiatry across the world. Although it often remains unrecognized in ordinary practice, research studies have shown it is common, creates considerable morbidity, is associated with high costs to services...... increasing evidence that some treatments, mainly psychological, are of value in this group of disorders. What is now needed is a new classification that is of greater value to clinicians, and the WPA Section on Personality Disorders is currently undertaking this task....

  5. Dynamics of person-to-person interactions from distributed RFID sensor networks.

    Directory of Open Access Journals (Sweden)

    Ciro Cattuto

    Full Text Available BACKGROUND: Digital networks, mobile devices, and the possibility of mining the ever-increasing amount of digital traces that we leave behind in our daily activities are changing the way we can approach the study of human and social interactions. Large-scale datasets, however, are mostly available for collective and statistical behaviors, at coarse granularities, while high-resolution data on person-to-person interactions are generally limited to relatively small groups of individuals. Here we present a scalable experimental framework for gathering real-time data resolving face-to-face social interactions with tunable spatial and temporal granularities. METHODS AND FINDINGS: We use active Radio Frequency Identification (RFID devices that assess mutual proximity in a distributed fashion by exchanging low-power radio packets. We analyze the dynamics of person-to-person interaction networks obtained in three high-resolution experiments carried out at different orders of magnitude in community size. The data sets exhibit common statistical properties and lack of a characteristic time scale from 20 seconds to several hours. The association between the number of connections and their duration shows an interesting super-linear behavior, which indicates the possibility of defining super-connectors both in the number and intensity of connections. CONCLUSIONS: Taking advantage of scalability and resolution, this experimental framework allows the monitoring of social interactions, uncovering similarities in the way individuals interact in different contexts, and identifying patterns of super-connector behavior in the community. These results could impact our understanding of all phenomena driven by face-to-face interactions, such as the spreading of transmissible infectious diseases and information.

  6. Personalized ventilation

    DEFF Research Database (Denmark)

    Melikov, Arsen Krikor

    2004-01-01

    microenvironment. Furthermore, HVAC systems should be designed to protect occupants from airborne transmission of infectious agents that may be present in exhaled air. Personalized ventilation is a new development in the field of HVAC and has the potential to fulfill the above requirements. This paper reviews...... existing knowledge on performance of personalized ventilation (PV) and on human response to it. The airflow interaction in the vicinity of the human body is analyzed and its impact on thermal comfort and inhaled air quality is discussed together with control strategies and the application of PV in practice...

  7. Drugs and the older person

    African Journals Online (AJOL)

    2007-09-14

    Sep 14, 2007 ... Sebastiana Kalula is Head of Geriatric Medicine and Acting Director of The Albertina and Walter .... performance of cognitive and physical .... Older persons may need multiple drug therapy for an increased number of chronic.

  8. World Epidemiology Review, Number 109.

    Science.gov (United States)

    1978-10-11

    infantilism, "lung color," monale, followed by cardiac deficiency, cyanosis, intestinal stenosis ; glomerulonephritis and neurological symptoms. Many...Bursa were infected by rabid dogs and cats. The following breakdown was given for the number of persons infected during the succeeding 7 months of...area it is much more difficult to save his life. One of the six dogs taken into custody under the suspicion of being rabid during the past 8 months

  9. [Person-organization fit and work ability].

    Science.gov (United States)

    Merecz, Dorota; Andysz, Aleksandra

    2011-01-01

    Person-environment issue has long been in focus of researchers who explore the area of human labor. It is known that the level of fit is a predictor of many phenomena related to health and attitude to work. The aim of this study was to explore the association between the level of person- organization fit (P-O fit) and work ability, including indicators of somatic and mental health. Research was conducted on a representative sample of 600 Polish men and women at working age. The Person-Organization Fit Questionnaire was used to assess three dimensions of P-O fit (supplementary fit, complementary fit and identification with organization); mental health status was measured by GHQ-28; the number of diagnosed diseases was taken as an index of somatic health; work ability, ability to physical and mental efforts were measured by three items from the Work Ability Index. A significant relationship between P-O fit level and work ability was found. In men, work ability predictors were: age, supplementary fit and mental health status, which explained 25% of the variance in work ability. In women, work ability predictors were: the number of diagnosed somatic diseases, supplementary fit, age and complementary fit, which explained 27% of the variance in work ability. Some gender-related differences in the predictive value of variables under the study were also found. The results of this study indicate the importance of P-O fit in shaping the sense of work ability, a recognized predictor of workers' occupational activity and the frequency of taking sick leave in subsequent years. Therefore, this result may be a useful argument to motivate employers to employ workers adequately to their abilities and preferences.

  10. [The power of numbers].

    Science.gov (United States)

    van Gijn, J

    2000-01-01

    The round figure for the current year has stirred people's minds in anticipation. Numbers have acquired great significance also in today's medical science. The Paris physician Pierre Charles Alexandre Louis (1787-1872) is considered the founding father of the numerical method in medicine. At first the principle of aggregating data from different individuals aroused much resistance and even disgust: Claude Bernard was a leading figure among those who warned that one will never find a mean in nature, and that grouping findings together obscures the true relationship between biological phenomena. True enough, statistical significance is not a characteristic of nature itself. Significant differences or risk reductions do not necessarily imply clinical relevance, and results obtained in a group of patients are rarely applicable to an individual patient in the consultation room. Likewise, the health of a human being cannot be captured in biochemical, radiological or other technical measures, nor in disease-specific scales that reduce well-being to one or two digits. The editors of this journal will remain keen on publishing numerical studies that contribute to evidence-based medicine, but at the same time they will continue to foster the art of reporting illness from the point of view of the sick person.

  11. 30 CFR 77.215-1 - Refuse piles; identification.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Refuse piles; identification. 77.215-1 Section... COAL MINES Surface Installations § 77.215-1 Refuse piles; identification. A permanent identification marker, at least six feet high and showing the refuse pile identification number as assigned by the...

  12. Personality disorders

    NARCIS (Netherlands)

    van den Bosch, L.M.C.; Verheul, R.; Verster, J.C.; Brady, K.; Galanter, M.; Conrod, P.

    2012-01-01

    Subject of this chapter is the often found combination of personality disorders and ­substance abuse disorders. The serious nature of this comorbidity is shown through the discussion of prevalence and epidemiological data. Literature shows that the comorbidity, hampering the diagnostic process, is

  13. Personalized nanomedicine

    NARCIS (Netherlands)

    Lammers, Twan Gerardus Gertudis Maria; Rizzo, L.Y.; Storm, Gerrit; Kiessling, F.

    2012-01-01

    Abstract Personalized medicine aims to individualize chemotherapeutic interventions on the basis of ex vivo and in vivo information on patient- and disease-specific characteristics. By noninvasively visualizing how well image-guided nanomedicines-that is, submicrometer-sized drug delivery systems

  14. Identification of a multifunctional protein, PhaM, that determines number, surface to volume ratio, subcellular localization and distribution to daughter cells of poly(3-hydroxybutyrate), PHB, granules in Ralstonia eutropha H16.

    Science.gov (United States)

    Pfeiffer, Daniel; Wahl, Andreas; Jendrossek, Dieter

    2011-11-01

    A two-hybrid approach was applied to screen for proteins with the ability to interact with PHB synthase (PhaC1) of Ralstonia eutropha. The H16_A0141 gene (phaM) was identified in the majority of positive clones. PhaM (26.6 kDa) strongly interacted with PhaC1 and with phasin PhaP5 but not with PhaP1 or other PHB granule-associated proteins. A ΔphaM mutant accumulated only one or two large PHB granules instead of three to six medium-sized PHB granules of the wild type, and distribution of granules to daughter cells was disordered. All three phenotypes (number, size and distribution of PHB granules) were reversed by reintroduction of phaM. Purified PhaM revealed DNA-binding properties in gel mobility shift experiments. Expression of a fusion of the yellow fluorescent protein (eYfp) with PhaM resulted in formation of many small fluorescent granules that were bound to the nucleoid region. Remarkably, an eYfp-PhaP5 fusion localized at the cell poles in a PHB-negative background and overexpression of eYfp-PhaP5 in the wild type conferred binding of PHB granules to the cell poles. In conclusion, subcellular localization of PHB granules in R. eutropha depends on a concerted expression of at least three PHB granule-associated proteins, namely PhaM, PhaP5 and PHB synthase PhaC1. © 2011 Blackwell Publishing Ltd.

  15. Premortal data in the process of skeletal remains identification

    Directory of Open Access Journals (Sweden)

    Marinković Nadica

    2012-01-01

    Full Text Available Background/Aim. The basic task of a forensic examiner during the exhumation of mass graves or in mass accidents is to establish identity of a person. The results obtained through these procedures depend on the level of perceptibility of post mortal changes and they are compared with premortal data obtained from family members of those missing or killed. Experience with exhumations has shown significant differences between the results obtained through exhumation and the premortal data. The aim of the study was to suggest the existance of the difference between premortal data and the results obtained by exhumation regarding the some parameters, as well as to direct premortal data colection to the specific skeletal forms. Methods. We performed comparative analysis of the results of exhumation of skeletal remains in a mass grave and the premortal data concerning the identified persons. The least number of individuals in this mass grave was calculated according to the upper parts of the right femur and it helped in calculating the smallest number of individuals in mass graves to be 48. A total of 27 persons were identified. Sex was determined by metrics and morphology of the pelvis. Personal age in the moment of death was determined by morphology features of groin symphisis and morphology of sternal edge of ribs and other parts of scelets observations. The hight was calculated as average results of length of long bones and Rollet coefficients. Results. There was a complete match in terms of sex and age matched within an interval that could be established based on the skeletal remains. All the other parameters were different, however, which made identification significantly more difficult. Conclusion. The premortal data is an important element of identification process and it should be obtained by the forensic doctor and directed towards more detailed examination of the skeletal system.

  16. Personal Beacon

    Science.gov (United States)

    2000-01-01

    The MicroPLB (personal locator beacon) is a search and rescue satellite-aided tracking (SARSAT) transmitter. When activated it emits a distress signal to a constellation of internationally operated satellites. The endangered person's identity and location anywhere on Earth is automatically forwarded to central monitoring stations around the world. It is accurate to within just a few meters. The user uses the device to download navigation data from a global positioning satellite receiver. After the download is complete, the MicroPLB functions as a self-locating beacon. Also, it is the only PLB to use a safe battery. In the past, other PLB devices have used batteries that have enough volatility to explode with extreme force. It was developed by Microwave Monolithic, Inc. through SBIR funding from Glenn Research Center and Goddard Space Flight Center.

  17. Personalized Search

    CERN Document Server

    AUTHOR|(SzGeCERN)749939

    2015-01-01

    As the volume of electronically available information grows, relevant items become harder to find. This work presents an approach to personalizing search results in scientific publication databases. This work focuses on re-ranking search results from existing search engines like Solr or ElasticSearch. This work also includes the development of Obelix, a new recommendation system used to re-rank search results. The project was proposed and performed at CERN, using the scientific publications available on the CERN Document Server (CDS). This work experiments with re-ranking using offline and online evaluation of users and documents in CDS. The experiments conclude that the personalized search result outperform both latest first and word similarity in terms of click position in the search result for global search in CDS.

  18. Personality Projections. The Montessori Observer. Volume 32, Number 1

    Science.gov (United States)

    International Montessori Society (NJ3), 2011

    2011-01-01

    "The Montessori Observer" is mailed four times each year, in March, May, September and November, to Society members throughout the world. The purpose is to provide news and information about the Society's work in Montessori education, and to extend awareness of Montessori principles throughout the world. This issue contains a feature…

  19. The dynamics of female self-identification conceptions: from modernism to postmodernist feminism

    Directory of Open Access Journals (Sweden)

    Е Е Agafonova

    2009-09-01

    Full Text Available A number of new contradictions between the personality and society, including the accentuation of the problem of human being's identity and self-identification have been engendered by globalization. Whereas formerly the individual enjoyed a stable set of norms, values, and motivations determining his identity structure, nowadays social institutions bearing responsibility for the stable identity development are experiencing transformations and fail to accomplish their functions to the full extent or are actually in complete collapse. The social, economic and political status of woman has undergone the most drastic transformations resulting in pivotal changes of her identity structure and identification processes. Under the contemporary circumstances the old-fashioned modernist views and ideas about the role, status, and position of women, the traditional patterns of behaviour and value judgments turn out to be inappropriate. One can state that the classical ideas of women's self-identification are old and tired version and now it is time for a new apprehension of this significant process. The problem of identity and self-identification has been handled in a particular way both in the framework of postmodernist theories and in terms of contemporary feminist conceptions. The theorists of postmodernist feminism have put forward a sufficiently interesting and important project reconsidering female/gender identity structure as well as female identification/self-identification processes.

  20. [Circulating tumor cells: cornerstone of personalized medicine].

    Science.gov (United States)

    Rafii, A; Vidal, F; Rathat, G; Alix-Panabières, C

    2014-11-01

    Cancer treatment has evolved toward personalized medicine. It is mandatory for clinicians to ascertain tumor biological features in order to optimize patients' treatment. Identification and characterization of circulating tumor cells demonstrated a prognostic value in many solid tumors. Here, we describe the main technologies for identification and characterization of circulating tumor cells and their clinical application in gynecologic and breast cancers. Copyright © 2014. Published by Elsevier Masson SAS.

  1. The Effect of Personality on Occupational Stress in Veterinary Surgeons.

    Science.gov (United States)

    Dawson, Briony F Y; Thompson, Neill J

    Statistics show that veterinary surgeons are in one of the professions with the highest suicide rates. This indicates the sector has significant well-being issues, with high levels of occupational stress and burnout. Previous research has focused on environmental factors in isolation, overlooking the influence of personality. This study aimed to establish that personality is a better predictor of occupational stress than environment. UK veterinary surgeons (n=311) completed an online survey composed of three questionnaires; the NEO Five-Factor Inventory, the Maslach Burnout Inventory, and the Job Stress Survey. Multiple regression analysis revealed that personality is a better predictor of occupational stress than environment (poccupational stress (pstress are depression (p=.002) and anger hostility (p=.005). Demographic factors such as the number of years the veterinarian has been qualified acted as a mediator between depression and occupational stress (poccupational stress (p=.028). Overall findings suggest that newly qualified veterinarians are at greater risk of suffering from high levels of occupational stress than those well established in the profession, and that veterinarians with higher levels of depression and anger hostility are likely to experience greater levels of occupational stress. Implications highlight the need for greater awareness of potentially susceptible personality traits in the veterinary admissions process. This would allow for the identification of those at risk and the implementation of interventions.

  2. 42 CFR 435.910 - Use of social security number.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Use of social security number. 435.910 Section 435... of social security number. (a) The agency must require, as a condition of eligibility, that each... religious objections, refuses to obtain a Social Security Number (SSN). The identification number may be...

  3. Number words and number symbols a cultural history of numbers

    CERN Document Server

    Menninger, Karl

    1992-01-01

    Classic study discusses number sequence and language and explores written numerals and computations in many cultures. "The historian of mathematics will find much to interest him here both in the contents and viewpoint, while the casual reader is likely to be intrigued by the author's superior narrative ability.

  4. 78 FR 913 - IRS Truncated Taxpayer Identification Numbers

    Science.gov (United States)

    2013-01-07

    ...). SUPPLEMENTARY INFORMATION: Background This document contains proposed amendments to the Income Tax Regulations... returns might hamper state income tax processing. Treasury and the IRS gave serious consideration to the... 301 are proposed to be amended as follows: PART 1--INCOME TAXES 0 Paragraph 1. The general authority...

  5. Supplementary data: Table 1. Identification numbers of sequences ...

    Indian Academy of Sciences (India)

    Lenovo

    . -. -. SP1. Stimulating protein 1, ubiquitous zinc finger transcription factor. +. +. GSH2. Homeodomain transcription factor Gsh-2. -. +. RUSH. SWI/SNF related nucleophosphoproteins with a RING finger DNA binding motif. +. +. TAL1. T-cell acute ...

  6. Analysing the Effectiveness of the Personality Symbols/Icons

    OpenAIRE

    Halim, İpek

    2012-01-01

    Personality symbol can cover all the identifications of the brand. It can be the face or the soul of the company. Their effect on the brand image is huge. The research focuses on calculating the roles and effectives of the personality symbols. It aims to bring in suggestions for developing a successful personality symbols and lists advantages and disadvantages of different types of personality symbols. It does a detailed copy testing. Apart from conducting focus groups to analyse how the targ...

  7. Diamond Fuzzy Number

    Directory of Open Access Journals (Sweden)

    T. Pathinathan

    2015-01-01

    Full Text Available In this paper we define diamond fuzzy number with the help of triangular fuzzy number. We include basic arithmetic operations like addition, subtraction of diamond fuzzy numbers with examples. We define diamond fuzzy matrix with some matrix properties. We have defined Nested diamond fuzzy number and Linked diamond fuzzy number. We have further classified Right Linked Diamond Fuzzy number and Left Linked Diamond Fuzzy number. Finally we have verified the arithmetic operations for the above mentioned types of Diamond Fuzzy Numbers.

  8. Those fascinating numbers

    CERN Document Server

    Koninck, Jean-Marie De

    2009-01-01

    Who would have thought that listing the positive integers along with their most remarkable properties could end up being such an engaging and stimulating adventure? The author uses this approach to explore elementary and advanced topics in classical number theory. A large variety of numbers are contemplated: Fermat numbers, Mersenne primes, powerful numbers, sublime numbers, Wieferich primes, insolite numbers, Sastry numbers, voracious numbers, to name only a few. The author also presents short proofs of miscellaneous results and constantly challenges the reader with a variety of old and new n

  9. Forensic radiology: An emerging tool in identification

    Directory of Open Access Journals (Sweden)

    Raghav Kumar

    2015-01-01

    Full Text Available In any mass disaster condition, identification of the person is most important. For this purpose, the forensic investigators use different methods for identifying the dead. They consider skeletal remains of the dead as the initial step in identification. Radiographs carry great evidence to act as antemortem records and also assist in identifying the person, age, gender, race, etc. Forensic dentistry is also emerging as a new branch in forensics. So, the forensic dentist must be aware of different techniques, developments, and resources to incorporate the technology in order to achieve success in human identification. So, our aim of the present review is to focus on different radiological techniques and new developments available for successful identification of the dead.

  10. Phalanx. Volume 47, Number 4

    Science.gov (United States)

    2014-12-01

    at $23,200 an hour. So that’s another $1.2M a day. Pete: Don’t they shoot at you? Joe: Well, we usually wire together a bunch of microwave ovens we...Officer, to break his vow never to sail on a “ bird farm.” MORS welcomes Kevin Williams as the new AF sponsor. He became the Director of...person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number

  11. Personality as a Subject of Managerial Activity

    Directory of Open Access Journals (Sweden)

    Tytova Kateryna V.

    2014-01-01

    Full Text Available Psychological science, along with many other natural and social sciences, studies a person and personality, but it allocates in them its own specific aspect. The psychological science has a big number of approaches to understanding essence of the personality. Professionally important qualities are individual qualities of a subject of activity, which influence efficiency of activity and success of its mastering. The considered concepts are efforts to put in order various sociological and psychological knowledge about the personality and unite the personality theory with the theory of professional choice. The problem of professional formation of the personality belongs to actively developed psychological problems.

  12. Piping stress analysis with personal computers

    International Nuclear Information System (INIS)

    Revesz, Z.

    1987-01-01

    The growing market of the personal computers is providing an increasing number of professionals with unprecedented and surprisingly inexpensive computing capacity, which if using with powerful software, can enhance immensely the engineers capabilities. This paper focuses on the possibilities which opened in piping stress analysis by the widespread distribution of personal computers, on the necessary changes in the software and on the limitations of using personal computers for engineering design and analysis. Reliability and quality assurance aspects of using personal computers for nuclear applications are also mentioned. The paper resumes with personal views of the author and experiences gained during interactive graphic piping software development for personal computers. (orig./GL)

  13. Microbiological risk assessment for personal care products.

    Science.gov (United States)

    Stewart, S E; Parker, M D; Amézquita, A; Pitt, T L

    2016-12-01

    Regulatory decisions regarding microbiological safety of cosmetics and personal care products are primarily hazard-based, where the presence of a potential pathogen determines decision-making. This contrasts with the Food industry where it is a commonplace to use a risk-based approach for ensuring microbiological safety. A risk-based approach allows consideration of the degree of exposure to assess unacceptable health risks. As there can be a number of advantages in using a risk-based approach to safety, this study explores the Codex Alimentarius (Codex) four-step Microbiological Risk Assessment (MRA) framework frequently used in the Food industry and examines how it can be applied to the safety assessment of personal care products. The hazard identification and hazard characterization steps (one and two) of the Codex MRA framework consider the main microorganisms of concern. These are addressed by reviewing the current industry guidelines for objectionable organisms and analysing reports of contaminated products notified by government agencies over a recent 5-year period, together with examples of reported outbreaks. Data related to estimation of exposure (step three) are discussed, and examples of possible calculations and references are included. The fourth step, performed by the risk assessor (risk characterization), is specific to each assessment and brings together the information from the first three steps to assess the risk. Although there are very few documented uses of the MRA approach for personal care products, this study illustrates that it is a practicable and sound approach for producing products that are safe by design. It can be helpful in the context of designing products and processes going to market and with setting of microbiological specifications. Additionally, it can be applied reactively to facilitate decision-making when contaminated products are released on to the marketplace. Currently, the knowledge available may only allow a

  14. Personal reputation

    DEFF Research Database (Denmark)

    Foste, Elizabeth; Botero, Isabel C.

    2012-01-01

    the importance of supervisor perceptions for the future of employees in the organization, this study uses principles of language expectancy theory (LET) to explore how message content (benefit organization vs. no benefit) and delivery style (aggressive vs. nonaggressive) in upward communication situations affect......One of the pitfalls of past research in upward influence communication is that messages are often categorized using more than one characteristic. This categorization has made it difficult to understand how different message characteristics affect supervisors’ perceptions about employees. Given...... perceptions of personal reputation and work competence. Participants, acting in the role of supervisors, read one of four scenarios and evaluated a new employee. Results suggest that delivery style and message content independently influence the supervisor’s willingness to grant a request as well as influence...

  15. Personal monitoring

    International Nuclear Information System (INIS)

    1995-01-01

    Sources of ionizing radiation have innumerable applications in the workplace. The potential exposures of the individual workers involved may need to be routinely monitored and records kept of their cumulative radiation doses. There are also occasions when it is necessary to retrospectively determine a dose which may have been received by a worker. This Module explains the basic terminology associated with personal monitoring and describes the principal types of dosimeters and other related techniques and their application in the workplace. The Manual will be of most benefit if it forms part of more comprehensive training or is supplemented by the advice of a qualified expert in radiation protection. Most of the dosimeters and techniques described in this Module can only be provided by qualified experts

  16. Defense Horizons. Number 79, April 2015

    Science.gov (United States)

    2015-04-01

    law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB...79, April 2015 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...aggression. Even more issues emerged following the downing of Malaysian Airlines Flight 17 over Ukraine in July 2014, and cross-border ar- tillery renewed

  17. Building Numbers from Primes

    Science.gov (United States)

    Burkhart, Jerry

    2009-01-01

    Prime numbers are often described as the "building blocks" of natural numbers. This article shows how the author and his students took this idea literally by using prime factorizations to build numbers with blocks. In this activity, students explore many concepts of number theory, including the relationship between greatest common factors and…

  18. Introduction to number theory

    CERN Document Server

    Vazzana, Anthony; Garth, David

    2007-01-01

    One of the oldest branches of mathematics, number theory is a vast field devoted to studying the properties of whole numbers. Offering a flexible format for a one- or two-semester course, Introduction to Number Theory uses worked examples, numerous exercises, and two popular software packages to describe a diverse array of number theory topics.

  19. [Collage work characteristics and personality].

    Science.gov (United States)

    Sato, Shizuka

    2002-06-01

    The purpose of this study was to investigate the relationship between personality and characteristics in collage work. Seventy undergraduates filled the Yatabe-Guilford (YG) personality test and produced a piece of collage work. The YG personality types were not different in terms of collage work characteristics. However, emotional adaptation and introvert/extrovert scores were reflected in the number of cuttings used in the piece. General activity score was reflected in the number of vehicle pictures used. Those who used an eye picture had a tendency to be depressed and lacking in confidence. Those who used a "stone circle" picture tended to be more emotionally adapted and extroverted. The results suggested a possibility that personality traits were reflected in specific characteristics in collage work.

  20. Twin Research and the Arts: Interconnections / Twin Research: Twin Studies of Sexual Orientation; A Historical Biological Twin Gem; GWAS Approach to Who Has Twins / Newsworthy: Twins on College Campuses; 'Brainprint': Personal Identification by Brain Waves.

    Science.gov (United States)

    Segal, Nancy L

    2016-08-01

    The interrelatedness between twin research and the arts is explored via a new play about a famous case. In the 1960s, identical twin David Bruce Reimer was accidentally castrated as an infant during circumcision to correct a urinary problem. The decision to raise him as a girl, and the consequences of that decision, are explored in the new theatrical production of Boy. Other examples of the arts mirroring science, and vice versa, are described. Next, brief reviews and summaries of twin research on sexual orientation, 1860s' knowledge of placental arrangements and twinning mechanisms, and genes underlying multiple birth conception and fertility related measures are provided. This article concludes with a look at twins on college campuses and the identification of individuals by their brain waves. A correction and clarification regarding my article on the Brazilian Twin Registry in the last issue of THG (Segal, 2016) is also provided.

  1. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  2. Whale Identification

    Science.gov (United States)

    1991-01-01

    R:BASE for DOS, a computer program developed under NASA contract, has been adapted by the National Marine Mammal Laboratory and the College of the Atlantic to provide and advanced computerized photo matching technique for identification of humpback whales. The program compares photos with stored digitized descriptions, enabling researchers to track and determine distribution and migration patterns. R:BASE is a spinoff of RIM (Relational Information Manager), which was used to store data for analyzing heat shielding tiles on the Space Shuttle Orbiter. It is now the world's second largest selling line of microcomputer database management software.

  3. On the number of special numbers

    Indian Academy of Sciences (India)

    without loss of any generality to be the first k primes), then the equation a + b = c has .... This is an elementary exercise in partial summation (see [12]). Thus ... This is easily done by inserting a stronger form of the prime number theorem into the.

  4. The Role of Defense Mechanisms, Personality and Demographical Factors on Complicated Grief following Death of a loved one by Cancer

    Directory of Open Access Journals (Sweden)

    Isaac Rahimian-Boogar

    2015-10-01

    Full Text Available Objective: Identification of the risk factors and psychological correlates of prolonged grief disorder is vital for health promotions in relatives of persons who died of cancer. The aim of this research was to investigate the role of defense mechanisms, character dimension of personality and demographic factors on complicated grief following a loss of a family member to cancer .Method: A number of 226 persons who had lost a family member to cancer in a cancer institute at Tehran University of Medical Science were selected through compliance sampling and completed the Inventory of complicated Grief-Revised (ICG-R, the Defense Styles Questionnaire (DSQ, the Character dimension of Temperament and Character Inventory (TCI, and the Demographical questionnaire. Data were analyzed by stepwise multiple regression analysis, using the PASW version 18 .Results: Findings revealed that neurotic defense style had a significant positive predictive role in the complicated grief; and cooperativeness, age of the deceased person, self-transcendence and mature defense style had a significant negative predictive role in complicated grief (p<0.001. R2 was 0.73 for the final model (p<.001.Conclusion: The results revealed that two character dimensions (low cooperativeness and self-transcendence, high neurotic defense style and young age of the deceased person were involved in the psychopathological course of the complicated and prolonged grief. It was concluded that personality characteristics of the grieving persons and demographics of the deceased person should be addressed in designing tailored interventions for complicated grief.

  5. Personalized biochemistry and biophysics.

    Science.gov (United States)

    Kroncke, Brett M; Vanoye, Carlos G; Meiler, Jens; George, Alfred L; Sanders, Charles R

    2015-04-28

    Whole human genome sequencing of individuals is becoming rapid and inexpensive, enabling new strategies for using personal genome information to help diagnose, treat, and even prevent human disorders for which genetic variations are causative or are known to be risk factors. Many of the exploding number of newly discovered genetic variations alter the structure, function, dynamics, stability, and/or interactions of specific proteins and RNA molecules. Accordingly, there are a host of opportunities for biochemists and biophysicists to participate in (1) developing tools to allow accurate and sometimes medically actionable assessment of the potential pathogenicity of individual variations and (2) establishing the mechanistic linkage between pathogenic variations and their physiological consequences, providing a rational basis for treatment or preventive care. In this review, we provide an overview of these opportunities and their associated challenges in light of the current status of genomic science and personalized medicine, the latter often termed precision medicine.

  6. Personalized Biochemistry and Biophysics

    Science.gov (United States)

    2016-01-01

    Whole human genome sequencing of individuals is becoming rapid and inexpensive, enabling new strategies for using personal genome information to help diagnose, treat, and even prevent human disorders for which genetic variations are causative or are known to be risk factors. Many of the exploding number of newly discovered genetic variations alter the structure, function, dynamics, stability, and/or interactions of specific proteins and RNA molecules. Accordingly, there are a host of opportunities for biochemists and biophysicists to participate in (1) developing tools to allow accurate and sometimes medically actionable assessment of the potential pathogenicity of individual variations and (2) establishing the mechanistic linkage between pathogenic variations and their physiological consequences, providing a rational basis for treatment or preventive care. In this review, we provide an overview of these opportunities and their associated challenges in light of the current status of genomic science and personalized medicine, the latter often termed precision medicine. PMID:25856502

  7. [Projective identification in human relations].

    Science.gov (United States)

    Göka, Erol; Yüksel, Fatih Volkan; Göral, F Sevinç

    2006-01-01

    Melanie Klein, one of the pioneers of Object Relations Theory, first defined "projective identification", which is regarded as one of the most efficacious psychoanalytic concepts after the discovery of the "unconscious". Examination of the literature on "projective identification" shows that there are various perspectives and theories suggesting different uses of this concept. Some clinicians argue that projective identification is a primitive defense mechanism observed in severe psychopathologies like psychotic disorder and borderline personality disorder, where the intra-psychic structure has been damaged severely. Others suggest it to be an indispensable part of the transference and counter-transference between the therapist and the patient during psychotherapy and it can be used as a treatment material in the therapy by a skillful therapist. The latter group expands the use of the concept through normal daily relationships by stating that projective identification is one type of communication and part of the main human relation mechanism operating in all close relationships. Therefore, they suggest that projective identification has benign forms experienced in human relations as well as malign forms seen in psychopathologies. Thus, discussions about the definition of the concept appear complex. In order to clarify and overcome the complexity of the concept, Melanie Klein's and other most important subsequent approaches are discussed in this review article. Thereby, the article aims to explain its important function in understanding the psychopathologies, psychotherapeutic relationships and different areas of normal human relations.

  8. Body identification, biometrics and medicine: ethical and social considerations.

    Science.gov (United States)

    Mordini, Emilio; Ottolini, Corinna

    2007-01-01

    Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny.

  9. p-adic numbers

    OpenAIRE

    Grešak, Rozalija

    2015-01-01

    The field of real numbers is usually constructed using Dedekind cuts. In these thesis we focus on the construction of the field of real numbers using metric completion of rational numbers using Cauchy sequences. In a similar manner we construct the field of p-adic numbers, describe some of their basic and topological properties. We follow by a construction of complex p-adic numbers and we compare them with the ordinary complex numbers. We conclude the thesis by giving a motivation for the int...

  10. On the number of special numbers

    Indian Academy of Sciences (India)

    We now apply the theory of the Thue equation to obtain an effective bound on m. Indeed, by Lemma 3.2, we can write m2 = ba3 and m2 − 4 = cd3 with b, c cubefree. By the above, both b, c are bounded since they are cubefree and all their prime factors are less than e63727. Now we have a finite number of. Thue equations:.

  11. Personality traits in learning and education

    NARCIS (Netherlands)

    De Raad, B.

    Personality traits judged relevant for the context of learning and education are identified as a subset of a comprehensive set of 1203 trait descriptive adjectives, constructed by Brokken (1979). The identification procedure is described and relevant statistics are provided. Self- and peer-ratings

  12. Number projection method

    International Nuclear Information System (INIS)

    Kaneko, K.

    1987-01-01

    A relationship between the number projection and the shell model methods is investigated in the case of a single-j shell. We can find a one-to-one correspondence between the number projected and the shell model states

  13. Numbers and brains.

    Science.gov (United States)

    Gallistel, C R

    2017-12-01

    The representation of discrete and continuous quantities appears to be ancient and pervasive in animal brains. Because numbers are the natural carriers of these representations, we may discover that in brains, it's numbers all the way down.

  14. 49 CFR 229.105 - Steam generator number.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Steam generator number. 229.105 Section 229.105..., DEPARTMENT OF TRANSPORTATION RAILROAD LOCOMOTIVE SAFETY STANDARDS Safety Requirements Steam Generators § 229.105 Steam generator number. An identification number shall be marked on the steam generator's...

  15. Number in Dinka

    DEFF Research Database (Denmark)

    Andersen, Torben

    2014-01-01

    had a marked singular and an unmarked plural. Synchronically, however, the singular is arguably the basic member of the number category as revealed by the use of the two numbers. In addition, some nouns have a collective form, which is grammatically singular. Number also plays a role...

  16. Safety-in-numbers

    DEFF Research Database (Denmark)

    Elvik, Rune; Bjørnskau, Torkel

    2017-01-01

    Highlights •26 studies of the safety-in-numbers effect are reviewed. •The existence of a safety-in-numbers effect is confirmed. •Results are consistent. •Causes of the safety-in-numbers effect are incompletely known....

  17. Discovery: Prime Numbers

    Science.gov (United States)

    de Mestre, Neville

    2008-01-01

    Prime numbers are important as the building blocks for the set of all natural numbers, because prime factorisation is an important and useful property of all natural numbers. Students can discover them by using the method known as the Sieve of Eratosthenes, named after the Greek geographer and astronomer who lived from c. 276-194 BC. Eratosthenes…

  18. Guidelines to facilitate self-care among older persons in South Africa

    Directory of Open Access Journals (Sweden)

    Tinda Rabie

    2015-10-01

    Full Text Available Background: The number of older persons is growing at an alarming rate, yet the South African healthcare sector is not giving this issue the required attention. Moreover, the healthcare sector serves four-fifths of the country's population and primary healthcare (PHC facilities are overcrowded, and thus professional nurses are prevented from providing sufficient self-care health education to older persons. Aim: To develop guidelines for the three role players — the public health sector, professional nurse and older person — to facilitate self-care among older persons in South Africa. Design: Quantitative, descriptive, explorative and contextual research design. Methods: A literature review followed by a self-care assessment of a sample of older persons using the Appraisal of Self-care Agency (ASA-A and Exercise of Self-care Agency (ESCA questionnaires which led to the identification of conclusions and self-care deficits. Results: Based on Menon's psychological health empowerment model, and from the conclusions and self-care deficits, nine self-care guidelines were developed for the public health sector, professional nurses and older persons. Conclusion: This is the first systematic development of guidelines to facilitate self-care among older persons in South Africa. Implications for practice: The implementation of the self-care guidelines by the public health sector, professional nurses and older persons will improve the healthcare of older persons at home which will in turn improve their quality of life, reduce unintentional self-neglect, as well as assist in alleviating overcrowding in clinics because unnecessary visits to the clinic will drop.

  19. Asymptotic numbers: Pt.1

    International Nuclear Information System (INIS)

    Todorov, T.D.

    1980-01-01

    The set of asymptotic numbers A as a system of generalized numbers including the system of real numbers R, as well as infinitely small (infinitesimals) and infinitely large numbers, is introduced. The detailed algebraic properties of A, which are unusual as compared with the known algebraic structures, are studied. It is proved that the set of asymptotic numbers A cannot be isomorphically embedded as a subspace in any group, ring or field, but some particular subsets of asymptotic numbers are shown to be groups, rings, and fields. The algebraic operation, additive and multiplicative forms, and the algebraic properties are constructed in an appropriate way. It is shown that the asymptotic numbers give rise to a new type of generalized functions quite analogous to the distributions of Schwartz allowing, however, the operation multiplication. A possible application of these functions to quantum theory is discussed

  20. Applied number theory

    CERN Document Server

    Niederreiter, Harald

    2015-01-01

    This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interrelations between these areas.  Number theory, which Carl-Friedrich Gauss famously dubbed the queen of mathematics, has always been considered a very beautiful field of mathematics, producing lovely results and elegant proofs. While only very few real-life applications were known in the past, today number theory can be found in everyday life: in supermarket bar code scanners, in our cars’ GPS systems, in online banking, etc.  Starting with a brief introductory course on number theory in Chapter 1, which makes the book more accessible for undergraduates, the authors describe the four main application areas in Chapters...

  1. Numbers and other math ideas come alive

    CERN Document Server

    Pappas, Theoni

    2012-01-01

    Most people don't think about numbers, or take them for granted. For the average person numbers are looked upon as cold, clinical, inanimate objects. Math ideas are viewed as something to get a job done or a problem solved. Get ready for a big surprise with Numbers and Other Math Ideas Come Alive. Pappas explores mathematical ideas by looking behind the scenes of what numbers, points, lines, and other concepts are saying and thinking. In each story, properties and characteristics of math ideas are entertainingly uncovered and explained through the dialogues and actions of its math

  2. Status, Numbers and Influence

    Science.gov (United States)

    Melamed, David; Savage, Scott V.

    2013-01-01

    We develop a theoretical model of social influence in n-person groups. We argue that disagreement between group members introduces uncertainty into the social situation, and this uncertainty motivates people to use status characteristics to evaluate the merits of a particular opinion. Our model takes the numerical distribution of opinions and the…

  3. Research of brand personality concept in marketing

    Directory of Open Access Journals (Sweden)

    Starčević Slađana

    2013-01-01

    Full Text Available Brand personality is a set of personal traits by which consumers describe brands. Today, the brand personality is a particular and very popular area of research in marketing. Well designed brand personality can be an excellent tool that differentiates a brand on the market. The main objective of this paper is a comprehensive presentation of the brand personality subject in domestic Serbian literature. We reviewed a large number of previous studies in this area, in order to show how the brand personality has become an integral part of marketing theory and practice, how it is formed, how to measure brand personality and what impact brand personality has on marketing results. In particular we dealt with methodological shortcomings of previous studies. The paper also presents the basic results of the study we conducted on the Serbian market, which main concern was the measurement of brand personality of mobile operators. This author of this study concluded that the three mobile phone operators in Serbia (mt:s, Telenor and Vip Mobile, differ fundamentaly in the basic dimensions of the brand personality. Furthermore, the research showed that the perception of brand personality depends on the perception of the personality of brand category and advertising. Exploring brand personality is very important and useful in practice. Determining personality traits of a brand provides far more accurate picture of the current state of the brand image and of improvement capabilities of individual features of the brand, than the classic brand image research models.

  4. Multiple independent identification decisions: a method of calibrating eyewitness identifications.

    Science.gov (United States)

    Pryke, Sean; Lindsay, R C L; Dysart, Jennifer E; Dupuis, Paul

    2004-02-01

    Two experiments (N = 147 and N = 90) explored the use of multiple independent lineups to identify a target seen live. In Experiment 1, simultaneous face, body, and sequential voice lineups were used. In Experiment 2, sequential face, body, voice, and clothing lineups were used. Both studies demonstrated that multiple identifications (by the same witness) from independent lineups of different features are highly diagnostic of suspect guilt (G. L. Wells & R. C. L. Lindsay, 1980). The number of suspect and foil selections from multiple independent lineups provides a powerful method of calibrating the accuracy of eyewitness identification. Implications for use of current methods are discussed. ((c) 2004 APA, all rights reserved)

  5. Metabolomics and Personalized Medicine.

    Science.gov (United States)

    Koen, Nadia; Du Preez, Ilse; Loots, Du Toit

    2016-01-01

    Current clinical practice strongly relies on the prognosis, diagnosis, and treatment of diseases using methods determined and averaged for the specific diseased cohort/population. Although this approach complies positively with most patients, misdiagnosis, treatment failure, relapse, and adverse drug effects are common occurrences in many individuals, which subsequently hamper the control and eradication of a number of diseases. These incidences can be explained by individual variation in the genome, transcriptome, proteome, and metabolome of a patient. Various "omics" approaches have investigated the influence of these factors on a molecular level, with the intention of developing personalized approaches to disease diagnosis and treatment. Metabolomics, the newest addition to the "omics" domain and the closest to the observed phenotype, reflects changes occurring at all molecular levels, as well as influences resulting from other internal and external factors. By comparing the metabolite profiles of two or more disease phenotypes, metabolomics can be applied to identify biomarkers related to the perturbation being investigated. These biomarkers can, in turn, be used to develop personalized prognostic, diagnostic, and treatment approaches, and can also be applied to the monitoring of disease progression, treatment efficacy, predisposition to drug-related side effects, and potential relapse. In this review, we discuss the contributions that metabolomics has made, and can potentially still make, towards the field of personalized medicine. © 2016 Elsevier Inc. All rights reserved.

  6. Personalized Medicine and Cancer

    Directory of Open Access Journals (Sweden)

    Mukesh Verma

    2012-01-01

    Full Text Available Cancer is one of the leading causes of death in the United States, and more than 1.5 million new cases and more than 0.5 million deaths were reported during 2010 in the United States alone. Following completion of the sequencing of the human genome, substantial progress has been made in characterizing the human epigenome, proteome, and metabolome; a better understanding of pharmacogenomics has been developed, and the potential for customizing health care for the individual has grown tremendously. Recently, personalized medicine has mainly involved the systematic use of genetic or other information about an individual patient to select or optimize that patient’s preventative and therapeutic care. Molecular profiling in healthy and cancer patient samples may allow for a greater degree of personalized medicine than is currently available. Information about a patient’s proteinaceous, genetic, and metabolic profile could be used to tailor medical care to that individual’s needs. A key attribute of this medical model is the development of companion diagnostics, whereby molecular assays that measure levels of proteins, genes, or specific mutations are used to provide a specific therapy for an individual’s condition by stratifying disease status, selecting the proper medication, and tailoring dosages to that patient’s specific needs. Additionally, such methods can be used to assess a patient’s risk factors for a number of conditions and to tailor individual preventative treatments. Recent advances, challenges, and future perspectives of personalized medicine in cancer are discussed.

  7. Predicting Lotto Numbers

    DEFF Research Database (Denmark)

    Jørgensen, Claus Bjørn; Suetens, Sigrid; Tyran, Jean-Robert

    numbers based on recent drawings. While most players pick the same set of numbers week after week without regards of numbers drawn or anything else, we find that those who do change, act on average in the way predicted by the law of small numbers as formalized in recent behavioral theory. In particular......We investigate the “law of small numbers” using a unique panel data set on lotto gambling. Because we can track individual players over time, we can measure how they react to outcomes of recent lotto drawings. We can therefore test whether they behave as if they believe they can predict lotto......, on average they move away from numbers that have recently been drawn, as suggested by the “gambler’s fallacy”, and move toward numbers that are on streak, i.e. have been drawn several weeks in a row, consistent with the “hot hand fallacy”....

  8. Invitation to number theory

    CERN Document Server

    Ore, Oystein

    2017-01-01

    Number theory is the branch of mathematics concerned with the counting numbers, 1, 2, 3, … and their multiples and factors. Of particular importance are odd and even numbers, squares and cubes, and prime numbers. But in spite of their simplicity, you will meet a multitude of topics in this book: magic squares, cryptarithms, finding the day of the week for a given date, constructing regular polygons, pythagorean triples, and many more. In this revised edition, John Watkins and Robin Wilson have updated the text to bring it in line with contemporary developments. They have added new material on Fermat's Last Theorem, the role of computers in number theory, and the use of number theory in cryptography, and have made numerous minor changes in the presentation and layout of the text and the exercises.

  9. Inclusive education and personal development.

    Science.gov (United States)

    Leigh, I

    1999-01-01

    Open-ended questionnaires covering mainstream educational experiences and personal development of deaf and hard-of-hearing adults were analyzed. Half of the 34 deaf and hard-of-hearing respondents altered self-labels based on changes in personal definitions rather than audiological changes. Supportive school environments and coping skills contributed to positive perceptions; nonsupportive school environments and being treated as 'different' were viewed negatively. Everyone valued contact with hearing peers. Contact with deaf peers depended on finding those with similar values. Identification with Deaf culture was nonexistent. Most noteworthy, 24 of 34 participants felt caught between the deaf and hearing worlds, indicating the need for niches in both. Implications for educators are that development of self-confidence and comfort with identity may be enhanced by validating the deafness dimension through opportunities for contact with deaf adults and positive relationships with both deaf and hearing peers.

  10. Banner prints social security numbers

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-02-01

    Full Text Available No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1. The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pioneer Accountable Care Organization, a government health-care plan that Banner serves. Banner generated its mailing list from information it received from the U.S. Centers for Medicare & Medicaid Services, which is an agency within the U.S. Department of Health & Human Services (HHS responsible for administration of several federal health-care programs. Although medical information has been protected by the Health Insurance Portability and Accountability Act (HIPAA since 1996, penalties were recently increased. Civil monetary penalties were increased from a maximum of $100 ...

  11. Optimal Number of Questionnaire Response Categories

    Directory of Open Access Journals (Sweden)

    W. Paul Jones

    2013-05-01

    Full Text Available Two multi-instrument investigations in a university clinic/lab provided an opportunity to explore the impact of reducing the number of response alternatives in a scale measuring vocational personality traits. In a simulation study, a standard computer-based administration provided a numeric scale for each item ranging from 0 to 10. The tests were then rescored to simulate the effect of only three choices. For the follow-up study, two versions of the scale were created, one with two response options and the other with six response options, and were randomly assigned to participants. Typical relationships were evident between the vocational personality traits and scores on standard measures of core personality traits with negligible impact from reducing the number of response alternatives. Neither the ability of the participants nor the self-reported distress had a measurable impact on the utility of the results with the reduction in response alternatives.

  12. The adventure of numbers

    CERN Document Server

    Godefroy, Gilles

    2004-01-01

    Numbers are fascinating. The fascination begins in childhood, when we first learn to count. It continues as we learn arithmetic, algebra, geometry, and so on. Eventually, we learn that numbers not only help us to measure the world, but also to understand it and, to some extent, to control it. In The Adventure of Numbers, Gilles Godefroy follows the thread of our expanding understanding of numbers to lead us through the history of mathematics. His goal is to share the joy of discovering and understanding this great adventure of the mind. The development of mathematics has been punctuated by a n

  13. Predicting Lotto Numbers

    DEFF Research Database (Denmark)

    Suetens, Sigrid; Galbo-Jørgensen, Claus B.; Tyran, Jean-Robert Karl

    2016-01-01

    We investigate the ‘law of small numbers’ using a data set on lotto gambling that allows us to measure players’ reactions to draws. While most players pick the same set of numbers week after week, we find that those who do change react on average as predicted by the law of small numbers...... as formalized in recent behavioral theory. In particular, players tend to bet less on numbers that have been drawn in the preceding week, as suggested by the ‘gambler’s fallacy’, and bet more on a number if it was frequently drawn in the recent past, consistent with the ‘hot-hand fallacy’....

  14. Beurling generalized numbers

    CERN Document Server

    Diamond, Harold G; Cheung, Man Ping

    2016-01-01

    "Generalized numbers" is a multiplicative structure introduced by A. Beurling to study how independent prime number theory is from the additivity of the natural numbers. The results and techniques of this theory apply to other systems having the character of prime numbers and integers; for example, it is used in the study of the prime number theorem (PNT) for ideals of algebraic number fields. Using both analytic and elementary methods, this book presents many old and new theorems, including several of the authors' results, and many examples of extremal behavior of g-number systems. Also, the authors give detailed accounts of the L^2 PNT theorem of J. P. Kahane and of the example created with H. L. Montgomery, showing that additive structure is needed for proving the Riemann hypothesis. Other interesting topics discussed are propositions "equivalent" to the PNT, the role of multiplicative convolution and Chebyshev's prime number formula for g-numbers, and how Beurling theory provides an interpretation of the ...

  15. Intuitive numbers guide decisions

    Directory of Open Access Journals (Sweden)

    Ellen Peters

    2008-12-01

    Full Text Available Measuring reaction times to number comparisons is thought to reveal a processing stage in elementary numerical cognition linked to internal, imprecise representations of number magnitudes. These intuitive representations of the mental number line have been demonstrated across species and human development but have been little explored in decision making. This paper develops and tests hypotheses about the influence of such evolutionarily ancient, intuitive numbers on human decisions. We demonstrate that individuals with more precise mental-number-line representations are higher in numeracy (number skills consistent with previous research with children. Individuals with more precise representations (compared to those with less precise representations also were more likely to choose larger, later amounts over smaller, immediate amounts, particularly with a larger proportional difference between the two monetary outcomes. In addition, they were more likely to choose an option with a larger proportional but smaller absolute difference compared to those with less precise representations. These results are consistent with intuitive number representations underlying: a perceived differences between numbers, b the extent to which proportional differences are weighed in decisions, and, ultimately, c the valuation of decision options. Human decision processes involving numbers important to health and financial matters may be rooted in elementary, biological processes shared with other species.

  16. Numbers, sequences and series

    CERN Document Server

    Hirst, Keith

    1994-01-01

    Number and geometry are the foundations upon which mathematics has been built over some 3000 years. This book is concerned with the logical foundations of number systems from integers to complex numbers. The author has chosen to develop the ideas by illustrating the techniques used throughout mathematics rather than using a self-contained logical treatise. The idea of proof has been emphasised, as has the illustration of concepts from a graphical, numerical and algebraic point of view. Having laid the foundations of the number system, the author has then turned to the analysis of infinite proc

  17. SnapVideo: Personalized Video Generation for a Sightseeing Trip.

    Science.gov (United States)

    Zhang, Luming; Jing, Peiguang; Su, Yuting; Zhang, Chao; Shaoz, Ling

    2017-11-01

    Leisure tourism is an indispensable activity in urban people's life. Due to the popularity of intelligent mobile devices, a large number of photos and videos are recorded during a trip. Therefore, the ability to vividly and interestingly display these media data is a useful technique. In this paper, we propose SnapVideo, a new method that intelligently converts a personal album describing of a trip into a comprehensive, aesthetically pleasing, and coherent video clip. The proposed framework contains three main components. The scenic spot identification model first personalizes the video clips based on multiple prespecified audience classes. We then search for some auxiliary related videos from YouTube 1 according to the selected photos. To comprehensively describe a scenery, the view generation module clusters the crawled video frames into a number of views. Finally, a probabilistic model is developed to fit the frames from multiple views into an aesthetically pleasing and coherent video clip, which optimally captures the semantics of a sightseeing trip. Extensive user studies demonstrated the competitiveness of our method from an aesthetic point of view. Moreover, quantitative analysis reflects that semantically important spots are well preserved in the final video clip. 1 https://www.youtube.com/.

  18. Visual Analysis in Traffic & Re-identification

    DEFF Research Database (Denmark)

    Møgelmose, Andreas

    and analysis, and person re-identification. In traffic sign detection, the work comprises a thorough survey of the state of the art, assembly of the worlds largest public dataset with U.S. traffic signs, and work in machine learning based detection algorithms. It was shown that detection of U.S. traffic signs...

  19. Identification as a Mediator of Celebrity Effects.

    Science.gov (United States)

    Basil, Michael D.

    1996-01-01

    This study examined personal concern, perceived risk, and sexual behavior of 147 college students a year after Magic Johnson announced he tested positive for HIV (Human Immunodeficiency Virus). It found that identification mediates message effects, suggesting that a spokesperson with whom an audience can identify insures the greatest likelihood of…

  20. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  1. Stroke genetics: prospects for personalized medicine

    Directory of Open Access Journals (Sweden)

    Markus Hugh S

    2012-09-01

    Full Text Available Abstract Epidemiologic evidence supports a genetic predisposition to stroke. Recent advances, primarily using the genome-wide association study approach, are transforming what we know about the genetics of multifactorial stroke, and are identifying novel stroke genes. The current findings are consistent with different stroke subtypes having different genetic architecture. These discoveries may identify novel pathways involved in stroke pathogenesis, and suggest new treatment approaches. However, the already identified genetic variants explain only a small proportion of overall stroke risk, and therefore are not currently useful in predicting risk for the individual patient. Such risk prediction may become a reality as identification of a greater number of stroke risk variants that explain the majority of genetic risk proceeds, and perhaps when information on rare variants, identified by whole-genome sequencing, is also incorporated into risk algorithms. Pharmacogenomics may offer the potential for earlier implementation of 'personalized genetic' medicine. Genetic variants affecting clopidogrel and warfarin metabolism may identify non-responders and reduce side-effects, but these approaches have not yet been widely adopted in clinical practice.

  2. Collection, Use, Disclosure and Protection of Personal Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    whoskin

    addresses, personal and/or work email addresses, personal and/or work or cell telephone numbers); and. • language testing and language assessment results. How Do We Use Your Personal Information? We use the personal information you provide exclusively for the purposes of processing, screening, assessing ...

  3. Biometric identification using knee X-rays.

    Science.gov (United States)

    Shamir, Lior; Ling, Shari; Rahimi, Salim; Ferrucci, Luigi; Goldberg, Ilya G

    2009-01-01

    Identification of people often makes use of unique features of the face, fingerprints and retina. Beyond this, a similar identifying process can be applied to internal parts of the body that are not visible to the unaided eye. Here we show that knee X-rays can be used for the identification of individual persons. The image analysis method is based on the wnd-charm algorithm, which has been found effective for the diagnosis of clinical conditions of knee joints. Experimental results show that the rank-10 identification accuracy using a dataset of 425 individuals is ~56%, and the rank-1 accuracy is ~34%. The dataset contained knee X-rays taken several years apart from each other, showing that the identifiable features correspond to specific persons, rather than the present clinical condition of the joint.

  4. Templates, Numbers & Watercolors.

    Science.gov (United States)

    Clemesha, David J.

    1990-01-01

    Describes how a second-grade class used large templates to draw and paint five-digit numbers. The lesson integrated artistic knowledge and vocabulary with their mathematics lesson in place value. Students learned how draftspeople use templates, and they studied number paintings by Charles Demuth and Jasper Johns. (KM)

  5. Analysis of personality characteristics of intellectually gifted students, causing difficulties in their process of preschool and school education

    Directory of Open Access Journals (Sweden)

    Ermakov S.S.

    2016-09-01

    Full Text Available Talented and intellectually gifted students often have difficulties in emotional and personal spheres in their learning process at school. Social maladjustment, emotional instability, increased anxiety and a number of other problems in the development of the personal sphere are common to students with a conventional development of intellectual abilities, but in the case of gifted students they are more frequent and intensive. If these problems are ignored by school teachers, psychologists and parents of gifted students, they can lead to a decrease in the ability of these children and even to a certain delay in the development of their academic abilities. The article provides an overview of contemporary foreign works aimed at identification and analysis of personal problems in gifted students. It describes different types of gifted students, their psychological characteristics that must be considered in the process of organizing their schooling with the aim of support to and development of their learning skills.

  6. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  7. Monitoring personal budgets and restrictions

    NARCIS (Netherlands)

    Ab van der Torre; Ingrid Ooms; Mirjam de Klerk

    2013-01-01

    The personal budget is a sum of money which recipients can use to arrange and pay for their own care provider. Since its introduction, demand for this provision, which is funded through the Exceptional Medical Expenses Act (AWBZ) has grown rapidly, prompting the Dutch government to take a number

  8. A self-checking identification formula for radiation workers in India

    International Nuclear Information System (INIS)

    Srivastava, D.N.; Srivastava, M.K.; Gohel, Chetna; Kher, R.K.; Awari, J.M.; Joshi, V.D.

    1998-01-01

    Accurate monitoring of radiation exposure of workers in any nuclear installation, institution or laboratory handling radiation sources forms an integral part of the radiation protection programme. This requires a system of unique identification of each radiation worker. When the radiation monitoring service started in India in 1953, the first identification formula of six digits was allotted to each radiation worker. This formula remained in use till 1970. With more number of institutions coming up, in the due course a second identification formula of eight digits was introduced which was in use during the period 1971-1978. For better data processing, a third identification formula of the same number of digits was introduced in 1978 with specific information about the category and location of the institution. To account for increasing number of institutions, a fourth formula consisting of 10 digits was started in 1995 which is currently in use. However, none of these formulas contained personal information about the radiation worker. Moreover, they were not self-checking type. Self-checking ability is extremely important for the preparation of a systematic data base and error free flow of information. With these considerations, a new 14 digit self-checking formula is being proposed in this report. Besides being less prone to error, it gives information in respect of date of birth, sex, institution category, location etc.. It does not suffer from the problem of millennium at the turn of century. It has enough capacity to account for a large number of institutions of different categories that might come up in future, and very large number of radiation workers in each institution. The inclusion of date of birth in a suitable format makes the capacity of the system virtually limitless and perpetual. (author)

  9. Two-component network model in voice identification technologies

    Directory of Open Access Journals (Sweden)

    Edita K. Kuular

    2018-03-01

    Full Text Available Among the most important parameters of biometric systems with voice modalities that determine their effectiveness, along with reliability and noise immunity, a speed of identification and verification of a person has been accentuated. This parameter is especially sensitive while processing large-scale voice databases in real time regime. Many research studies in this area are aimed at developing new and improving existing algorithms for presentation and processing voice records to ensure high performance of voice biometric systems. Here, it seems promising to apply a modern approach, which is based on complex network platform for solving complex massive problems with a large number of elements and taking into account their interrelationships. Thus, there are known some works which while solving problems of analysis and recognition of faces from photographs, transform images into complex networks for their subsequent processing by standard techniques. One of the first applications of complex networks to sound series (musical and speech analysis are description of frequency characteristics by constructing network models - converting the series into networks. On the network ontology platform a previously proposed technique of audio information representation aimed on its automatic analysis and speaker recognition has been developed. This implies converting information into the form of associative semantic (cognitive network structure with amplitude and frequency components both. Two speaker exemplars have been recorded and transformed into pertinent networks with consequent comparison of their topological metrics. The set of topological metrics for each of network models (amplitude and frequency one is a vector, and together  those combine a matrix, as a digital "network" voiceprint. The proposed network approach, with its sensitivity to personal conditions-physiological, psychological, emotional, might be useful not only for person identification

  10. Personality in culture, culture in personality

    Directory of Open Access Journals (Sweden)

    I I Kvasova

    2009-12-01

    Full Text Available Personality is a dialectical interconnection between the social and the individual realized via activity, socializing, responsibility towards others, communication. The sense of self-actualization of the personality takes shape in the framework of the given process manifesting itself in various cultural phenomena, especially in art which is to the most extent personalized.

  11. Personality in culture, culture in personality

    OpenAIRE

    I I Kvasova

    2009-01-01

    Personality is a dialectical interconnection between the social and the individual realized via activity, socializing, responsibility towards others, communication. The sense of self-actualization of the personality takes shape in the framework of the given process manifesting itself in various cultural phenomena, especially in art which is to the most extent personalized.

  12. Tumor Slice Culture: A New Avatar in Personalized Oncology

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0149 TITLE: Tumor Slice Culture: A New Avatar in Personalized Oncology PRINCIPAL INVESTIGATOR: Raymond Yeung...CONTRACT NUMBER Tumor Slice Culture: A New Avatar in Personalized Oncology 5b. GRANT NUMBER W81XWH-16-1-0149 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...10 Annual Report 2017: Tumor Slice Culture: A new avatar for personalized oncology 1. INTRODUCTION: The goal of this research is to advance our

  13. Random number generation

    International Nuclear Information System (INIS)

    Coveyou, R.R.

    1974-01-01

    The subject of random number generation is currently controversial. Differing opinions on this subject seem to stem from implicit or explicit differences in philosophy; in particular, from differing ideas concerning the role of probability in the real world of physical processes, electronic computers, and Monte Carlo calculations. An attempt is made here to reconcile these views. The role of stochastic ideas in mathematical models is discussed. In illustration of these ideas, a mathematical model of the use of random number generators in Monte Carlo calculations is constructed. This model is used to set up criteria for the comparison and evaluation of random number generators. (U.S.)

  14. Algebraic number theory

    CERN Document Server

    Weiss, Edwin

    1998-01-01

    Careful organization and clear, detailed proofs characterize this methodical, self-contained exposition of basic results of classical algebraic number theory from a relatively modem point of view. This volume presents most of the number-theoretic prerequisites for a study of either class field theory (as formulated by Artin and Tate) or the contemporary treatment of analytical questions (as found, for example, in Tate's thesis).Although concerned exclusively with algebraic number fields, this treatment features axiomatic formulations with a considerable range of applications. Modem abstract te

  15. Advanced number theory

    CERN Document Server

    Cohn, Harvey

    1980-01-01

    ""A very stimulating book ... in a class by itself."" - American Mathematical MonthlyAdvanced students, mathematicians and number theorists will welcome this stimulating treatment of advanced number theory, which approaches the complex topic of algebraic number theory from a historical standpoint, taking pains to show the reader how concepts, definitions and theories have evolved during the last two centuries. Moreover, the book abounds with numerical examples and more concrete, specific theorems than are found in most contemporary treatments of the subject.The book is divided into three parts

  16. The emergence of number

    CERN Document Server

    Crossley, John N

    1987-01-01

    This book presents detailed studies of the development of three kinds of number. In the first part the development of the natural numbers from Stone-Age times right up to the present day is examined not only from the point of view of pure history but also taking into account archaeological, anthropological and linguistic evidence. The dramatic change caused by the introduction of logical theories of number in the 19th century is also treated and this part ends with a non-technical account of the very latest developments in the area of Gödel's theorem. The second part is concerned with the deve

  17. Professor Stewart's incredible numbers

    CERN Document Server

    Stewart, Ian

    2015-01-01

    Ian Stewart explores the astonishing properties of numbers from 1 to10 to zero and infinity, including one figure that, if you wrote it out, would span the universe. He looks at every kind of number you can think of - real, imaginary, rational, irrational, positive and negative - along with several you might have thought you couldn't think of. He explains the insights of the ancient mathematicians, shows how numbers have evolved through the ages, and reveals the way numerical theory enables everyday life. Under Professor Stewart's guidance you will discover the mathematics of codes,

  18. Fundamentals of number theory

    CERN Document Server

    LeVeque, William J

    1996-01-01

    This excellent textbook introduces the basics of number theory, incorporating the language of abstract algebra. A knowledge of such algebraic concepts as group, ring, field, and domain is not assumed, however; all terms are defined and examples are given - making the book self-contained in this respect.The author begins with an introductory chapter on number theory and its early history. Subsequent chapters deal with unique factorization and the GCD, quadratic residues, number-theoretic functions and the distribution of primes, sums of squares, quadratic equations and quadratic fields, diopha

  19. Numbers and computers

    CERN Document Server

    Kneusel, Ronald T

    2015-01-01

    This is a book about numbers and how those numbers are represented in and operated on by computers. It is crucial that developers understand this area because the numerical operations allowed by computers, and the limitations of those operations, especially in the area of floating point math, affect virtually everything people try to do with computers. This book aims to fill this gap by exploring, in sufficient but not overwhelming detail, just what it is that computers do with numbers. Divided into two parts, the first deals with standard representations of integers and floating point numb

  20. Elementary theory of numbers

    CERN Document Server

    Sierpinski, Waclaw

    1988-01-01

    Since the publication of the first edition of this work, considerable progress has been made in many of the questions examined. This edition has been updated and enlarged, and the bibliography has been revised.The variety of topics covered here includes divisibility, diophantine equations, prime numbers (especially Mersenne and Fermat primes), the basic arithmetic functions, congruences, the quadratic reciprocity law, expansion of real numbers into decimal fractions, decomposition of integers into sums of powers, some other problems of the additive theory of numbers and the theory of Gaussian

  1. On powerful numbers

    Directory of Open Access Journals (Sweden)

    R. A. Mollin

    1986-01-01

    Full Text Available A powerful number is a positive integer n satisfying the property that p2 divides n whenever the prime p divides n; i.e., in the canonical prime decomposition of n, no prime appears with exponent 1. In [1], S.W. Golomb introduced and studied such numbers. In particular, he asked whether (25,27 is the only pair of consecutive odd powerful numbers. This question was settled in [2] by W.A. Sentance who gave necessary and sufficient conditions for the existence of such pairs. The first result of this paper is to provide a generalization of Sentance's result by giving necessary and sufficient conditions for the existence of pairs of powerful numbers spaced evenly apart. This result leads us naturally to consider integers which are representable as a proper difference of two powerful numbers, i.e. n=p1−p2 where p1 and p2 are powerful numbers with g.c.d. (p1,p2=1. Golomb (op.cit. conjectured that 6 is not a proper difference of two powerful numbers, and that there are infinitely many numbers which cannot be represented as a proper difference of two powerful numbers. The antithesis of this conjecture was proved by W.L. McDaniel [3] who verified that every non-zero integer is in fact a proper difference of two powerful numbers in infinitely many ways. McDaniel's proof is essentially an existence proof. The second result of this paper is a simpler proof of McDaniel's result as well as an effective algorithm (in the proof for explicitly determining infinitely many such representations. However, in both our proof and McDaniel's proof one of the powerful numbers is almost always a perfect square (namely one is always a perfect square when n≢2(mod4. We provide in §2 a proof that all even integers are representable in infinitely many ways as a proper nonsquare difference; i.e., proper difference of two powerful numbers neither of which is a perfect square. This, in conjunction with the odd case in [4], shows that every integer is representable in

  2. Brief history of numbers

    CERN Document Server

    Corry, Leo

    2015-01-01

    The world around us is saturated with numbers. They are a fundamental pillar of our modern society, and accepted and used with hardly a second thought. But how did this state of affairs come to be? In this book, Leo Corry tells the story behind the idea of number from the early days of the Pythagoreans, up until the turn of the twentieth century. He presents an overview of how numbers were handled and conceived in classical Greek mathematics, in the mathematics of Islam, in European mathematics of the middle ages and the Renaissance, during the scientific revolution, all the way through to the

  3. Elementary number theory

    CERN Document Server

    Dudley, Underwood

    2008-01-01

    Ideal for a first course in number theory, this lively, engaging text requires only a familiarity with elementary algebra and the properties of real numbers. Author Underwood Dudley, who has written a series of popular mathematics books, maintains that the best way to learn mathematics is by solving problems. In keeping with this philosophy, the text includes nearly 1,000 exercises and problems-some computational and some classical, many original, and some with complete solutions. The opening chapters offer sound explanations of the basics of elementary number theory and develop the fundamenta

  4. Free DICOM de-identification tools in clinical research : functioning and safety of patient privacy

    NARCIS (Netherlands)

    Aryanto, K. Y. E.; Oudkerk, M.; van Ooijen, P. M. A.

    2015-01-01

    To compare non-commercial DICOM toolkits for their de-identification ability in removing a patient's personal health information (PHI) from a DICOM header. Ten DICOM toolkits were selected for de-identification tests. Tests were performed by using the system's default de-identification profile and,

  5. Volume 9 Number 1

    African Journals Online (AJOL)

    OLUWOLE

    Agro-Science Journal of Tropical Agriculture, Food, Environment and Extension. Volume 9 Number 1 ... of persistent dumping of cheap subsidized food imports from developed ... independence of the inefficiency effects in the two estimation ...

  6. High Reynolds Number Turbulence

    National Research Council Canada - National Science Library

    Smits, Alexander J

    2007-01-01

    The objectives of the grant were to provide a systematic study to fill the gap between existing research on low Reynolds number turbulent flows to the kinds of turbulent flows encountered on full-scale vehicles...

  7. Crunching the Numbers

    International Development Research Centre (IDRC) Digital Library (Canada)

    Operating a Demographic Surveillance System (DSS) like this one requires a blend of high-tech number-crunching ability and .... views follow a standardized format that takes several ... general levels of health and to the use of health services.

  8. Quantum random number generator

    Science.gov (United States)

    Pooser, Raphael C.

    2016-05-10

    A quantum random number generator (QRNG) and a photon generator for a QRNG are provided. The photon generator may be operated in a spontaneous mode below a lasing threshold to emit photons. Photons emitted from the photon generator may have at least one random characteristic, which may be monitored by the QRNG to generate a random number. In one embodiment, the photon generator may include a photon emitter and an amplifier coupled to the photon emitter. The amplifier may enable the photon generator to be used in the QRNG without introducing significant bias in the random number and may enable multiplexing of multiple random numbers. The amplifier may also desensitize the photon generator to fluctuations in power supplied thereto while operating in the spontaneous mode. In one embodiment, the photon emitter and amplifier may be a tapered diode amplifier.

  9. Solar Indices - Sunspot Numbers

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Collection includes a variety of indices related to solar activity contributed by a number of national and private solar observatories located worldwide. This...

  10. The Congruent Number Problem

    Indian Academy of Sciences (India)

    One could endlessly churn out congruent numbers following the method in Box 1 without being certain when a given number n (or n x m 2, for some integer m) will ap- pear on the list. Continuing in this way ·would exhaust one's computing resources, not to mention one's patience! Also, this procedure is of no avail if n is not ...

  11. Antipatterns identification, refactoring, and management

    CERN Document Server

    Neill, Colin J

    2005-01-01

    AntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful practices, you will be able to correctly identify problems in your own work environment, and take action to correct them. The authors apply their extensive work and consultative experience, as well as the experience of the many professionals that t

  12. Facial image identification using Photomodeler

    DEFF Research Database (Denmark)

    Lynnerup, Niels; Andersen, Marie; Lauritsen, Helle Petri

    2003-01-01

    consist of many images of the same person taken from different angles. We wanted to see if it was possible to combine such a suite of images in useful 3-D renderings of facial proportions.Fifteen male adults were photographed from four different angles. Based on these photographs, a 3-D wireframe model......We present the results of a preliminary study on the use of 3-D software (Photomodeler) for identification purposes. Perpetrators may be photographed or filmed by surveillance systems. The police may wish to have these images compared to photographs of suspects. The surveillance imagery will often...

  13. The Brothel Phone Number

    DEFF Research Database (Denmark)

    Korsby, Trine Mygind

    2017-01-01

    Taking a point of departure in negotiations for access to a phone number for a brothel abroad, the article demonstrates how a group of pimps in Eastern Romania attempt to extend their local business into the rest of the EU. The article shows how the phone number works as a micro-infrastructure in......Taking a point of departure in negotiations for access to a phone number for a brothel abroad, the article demonstrates how a group of pimps in Eastern Romania attempt to extend their local business into the rest of the EU. The article shows how the phone number works as a micro...... in turn cultivate and maximize uncertainty about themselves in others. When making the move to go abroad into unknown terrains, accessing the infrastructure generated by the phone number can provide certainty and consolidate one’s position within criminal networks abroad. However, at the same time......, mishandling the phone number can be dangerous and in that sense produce new doubts and uncertainties....

  14. The Brain Derived Neurotrophic Factor and Personality

    OpenAIRE

    Christian Montag

    2014-01-01

    The study of the biological basis of personality is a timely research endeavor, with the aim of deepening our understanding of human nature. In recent years, a growing body of research has investigated the role of the brain derived neurotrophic factor (BDNF) in the context of individual differences across human beings, with a focus on personality traits. A large number of different approaches have been chosen to illuminate the role of BDNF for personality, ranging from the measurement of BDNF...

  15. Prospective Teachers' Personal Characteristics to Multicultural Education

    Science.gov (United States)

    Eskici, Menekse

    2016-01-01

    The aim of this paper is to determine prospective teachers' personal characteristics to multicultural education. It is also aimed to reveal whether there are meaningful differences in prospective teachers' personal characteristics to multicultural education according to their genders, age and number of siblings. The descriptive model was chosen to…

  16. Resolving person names in web people search

    NARCIS (Netherlands)

    Balog, K.; Azzopardi, L.; de Rijke, M.; King, I.; Baeza-Yates, R.

    2009-01-01

    Disambiguating person names in a set of documents (such as a set of web pages returned in response to a person name) is a key task for the presentation of results and the automatic profiling of experts. With largely unstructured documents and an unknown number of people with the same name the

  17. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  18. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  19. Figuration of tourist personality and tourist travels

    Directory of Open Access Journals (Sweden)

    Đorđević Saša

    2013-01-01

    Full Text Available Quality of tourist travel is a relative category, because its success depends on the subjective perception of the personality of tourists on a tourist trip. For this reason, any tourist trip can be treated from the perspective of different types of figurative forms of tourists' personality, which also determine different quality of tourist travel, which, in turn, makes them different. Thus, any tourist trip, unto itself, has its own uniqueness, taking on the forms and content created, for the most part, by the tourists themselves, along with all other tourism stakeholders involved in this process. These forms and contents are primarily conditioned by the spiritual profile of tourists' personality and their psychological and motivational preferences, which is symbolically represented in the figurative context of a chess game. In addition to this, identification of essential characteristics of different spiritual profiles of tourist's personality, must be a starting point for the programming of overall content and especially of animation and cultural content.

  20. A third generation personality test

    OpenAIRE

    Sjöberg, Lennart

    2010-01-01

    The development of personality testing in the workplace has undergone three phases. The first generation of tests, such as Cattell’s 16 PF and the British test OPQ, was characterized by complex systems for the description of the personality. These systems were simplified in part by the following generation of the test, which was based on the five factor model but that model was simple only at the horizontal level. Beneath the five main factors were a large number of ancillary factors, usually...

  1. A Numbers Game

    DEFF Research Database (Denmark)

    Levin, Bruce R; McCall, Ingrid C.; Perrot, Veronique

    2017-01-01

    We postulate that the inhibition of growth and low rates of mortality of bacteria exposed to ribosome-binding antibiotics deemed bacteriostatic can be attributed almost uniquely to these drugs reducing the number of ribosomes contributing to protein synthesis, i.e., the number of effective......-targeting bacteriostatic antibiotics, the time before these bacteria start to grow again when the drugs are removed, referred to as the post-antibiotic effect (PAE), is markedly greater for constructs with fewer rrn operons than for those with more rrn operons. We interpret the results of these other experiments reported...... here as support for the hypothesis that the reduction in the effective number of ribosomes due to binding to these structures provides a sufficient explanation for the action of bacteriostatic antibiotics that target these structures....

  2. Quantum random number generator

    Science.gov (United States)

    Soubusta, Jan; Haderka, Ondrej; Hendrych, Martin

    2001-03-01

    Since reflection or transmission of a quantum particle on a beamsplitter is inherently random quantum process, a device built on this principle does not suffer from drawbacks of neither pseudo-random computer generators or classical noise sources. Nevertheless, a number of physical conditions necessary for high quality random numbers generation must be satisfied. Luckily, in quantum optics realization they can be well controlled. We present an easy random number generator based on the division of weak light pulses on a beamsplitter. The randomness of the generated bit stream is supported by passing the data through series of 15 statistical test. The device generates at a rate of 109.7 kbit/s.

  3. The LHC in numbers

    CERN Multimedia

    Alizée Dauvergne

    2010-01-01

    What makes the LHC the biggest particle accelerator in the world? Here are some of the numbers that characterise the LHC, and their equivalents in terms that are easier for us to imagine.   Feature Number Equivalent Circumference ~ 27 km   Distance covered by beam in 10 hours ~ 10 billion km a round trip to Neptune Number of times a single proton travels around the ring each second 11 245   Speed of protons first entering the LHC 299 732 500 m/s 99.9998 % of the speed of light Speed of protons when they collide 299 789 760 m/s 99.9999991 % of the speed of light Collision temperature ~ 1016 °C ove...

  4. Algebraic theory of numbers

    CERN Document Server

    Samuel, Pierre

    2008-01-01

    Algebraic number theory introduces students not only to new algebraic notions but also to related concepts: groups, rings, fields, ideals, quotient rings and quotient fields, homomorphisms and isomorphisms, modules, and vector spaces. Author Pierre Samuel notes that students benefit from their studies of algebraic number theory by encountering many concepts fundamental to other branches of mathematics - algebraic geometry, in particular.This book assumes a knowledge of basic algebra but supplements its teachings with brief, clear explanations of integrality, algebraic extensions of fields, Gal

  5. Analytic number theory

    CERN Document Server

    Iwaniec, Henryk

    2004-01-01

    Analytic Number Theory distinguishes itself by the variety of tools it uses to establish results, many of which belong to the mainstream of arithmetic. One of the main attractions of analytic number theory is the vast diversity of concepts and methods it includes. The main goal of the book is to show the scope of the theory, both in classical and modern directions, and to exhibit its wealth and prospects, its beautiful theorems and powerful techniques. The book is written with graduate students in mind, and the authors tried to balance between clarity, completeness, and generality. The exercis

  6. CONFUSION WITH TELEPHONE NUMBERS

    CERN Multimedia

    Telecom Service

    2002-01-01

    he area code is now required for all telephone calls within Switzerland. Unfortunately this is causing some confusion. CERN has received complaints that incoming calls intended for CERN mobile phones are being directed to private subscribers. This is caused by mistakenly dialing the WRONG code (e.g. 022) in front of the mobile number. In order to avoid these problems, please inform your correspondents that the correct numbers are: 079 201 XXXX from Switzerland; 0041 79 201 XXXX from other countries. Telecom Service

  7. CONFUSION WITH TELEPHONE NUMBERS

    CERN Multimedia

    Telecom Service

    2002-01-01

    The area code is now required for all telephone calls within Switzerland. Unfortunately this is causing some confusion. CERN has received complaints that incoming calls intended for CERN mobile phones are being directed to private subscribers. This is caused by mistakenly dialing the WRONG code (e.g. 022) in front of the mobile number. In order to avoid these problems, please inform your correspondents that the correct numbers are: 079 201 XXXX from Switzerland; 0041 79 201 XXXX from other countries. Telecom Service  

  8. Earthquake number forecasts testing

    Science.gov (United States)

    Kagan, Yan Y.

    2017-10-01

    We study the distributions of earthquake numbers in two global earthquake catalogues: Global Centroid-Moment Tensor and Preliminary Determinations of Epicenters. The properties of these distributions are especially required to develop the number test for our forecasts of future seismic activity rate, tested by the Collaboratory for Study of Earthquake Predictability (CSEP). A common assumption, as used in the CSEP tests, is that the numbers are described by the Poisson distribution. It is clear, however, that the Poisson assumption for the earthquake number distribution is incorrect, especially for the catalogues with a lower magnitude threshold. In contrast to the one-parameter Poisson distribution so widely used to describe earthquake occurrences, the negative-binomial distribution (NBD) has two parameters. The second parameter can be used to characterize the clustering or overdispersion of a process. We also introduce and study a more complex three-parameter beta negative-binomial distribution. We investigate the dependence of parameters for both Poisson and NBD distributions on the catalogue magnitude threshold and on temporal subdivision of catalogue duration. First, we study whether the Poisson law can be statistically rejected for various catalogue subdivisions. We find that for most cases of interest, the Poisson distribution can be shown to be rejected statistically at a high significance level in favour of the NBD. Thereafter, we investigate whether these distributions fit the observed distributions of seismicity. For this purpose, we study upper statistical moments of earthquake numbers (skewness and kurtosis) and compare them to the theoretical values for both distributions. Empirical values for the skewness and the kurtosis increase for the smaller magnitude threshold and increase with even greater intensity for small temporal subdivision of catalogues. The Poisson distribution for large rate values approaches the Gaussian law, therefore its skewness

  9. Space for personal hygiene

    DEFF Research Database (Denmark)

    Bech-Danielsen, Claus

    2010-01-01

    This paper focuses on spaces used for personal hygiene in housing over the last hundred years. The paper begins with a description of the hygienic movement in the late 19th century. At that time urinating took place in semi-public spaces outside the dwelling. Today, the WC has moved well...... into the dwelling, and in many dwellings the bathroom has developed into being the most private space. Thus, the bathroom can be regarded as the last domain of privacy in today's housing, and in a number of new dwellings this quality is exploited in new ways. The development of ‘space for hygiene’ in the 20th...... century will be studied by analysing the spatial organisation of dwellings: Where and how has the space for hygiene been situated and designed in housing in different periods over the last hundred years?...

  10. PERSONAL VERSUS MASS COMMUNICATION

    OpenAIRE

    Girboveanu Sorina

    2007-01-01

    From the comparison of the various aspects of advertising and personal selling, it can be seen that personal selling is a more effective and powerful communication tool than advertising, but advertising is more time and cost efficient than personal selling. Thus advertising and personal selling are tools at the disposal of a marketer and subjects to a firm’s overall objectives.

  11. Managing Your Personal Brand

    Science.gov (United States)

    Gander, Michelle

    2014-01-01

    Everyone has a personal brand. To ensure success at work you need to manage your personal brand which is made up of your tangible and intangible attributes. This paper reviews the literature around personal branding, looks at some of the attributes and discusses ways you can reflect and begin to build your personal brand in a higher education…

  12. Personality traits in persons with manganese poisoning

    Energy Technology Data Exchange (ETDEWEB)

    Platonov, A A

    1976-10-01

    Results of studies with the Minnesota Multiphasic Personality Inventory (MMPI) in 3 groups of arc welders with various degrees of manganese poisoning (22 symptom-free, 23 with functional disturbances, 55 with organic symptoms) and 50 controls were discussed. There was a close relation between the severity of the poisoning and quantitative and qualitative personality changes. Personality tests are considered a useful addition to the clinical diagnosis of chronic manganese poisoning.

  13. Colour by Numbers

    Science.gov (United States)

    Wetherell, Chris

    2017-01-01

    This is an edited extract from the keynote address given by Dr. Chris Wetherell at the 26th Biennial Conference of the Australian Association of Mathematics Teachers Inc. The author investigates the surprisingly rich structure that exists within a simple arrangement of numbers: the times tables.

  14. The magic of numbers

    CERN Document Server

    Bell, Eric Temple

    1991-01-01

    From one of the foremost interpreters for lay readers of the history and meaning of mathematics: a stimulating account of the origins of mathematical thought and the development of numerical theory. It probes the work of Pythagoras, Galileo, Berkeley, Einstein, and others, exploring how ""number magic"" has influenced religion, philosophy, science, and mathematics

  15. ALARA notes, Number 8

    International Nuclear Information System (INIS)

    Khan, T.A.; Baum, J.W.; Beckman, M.C.

    1993-10-01

    This document contains information dealing with the lessons learned from the experience of nuclear plants. In this issue the authors tried to avoid the 'tyranny' of numbers and concentrated on the main lessons learned. Topics include: filtration devices for air pollution abatement, crack repair and inspection, and remote handling equipment

  16. Uniform random number generators

    Science.gov (United States)

    Farr, W. R.

    1971-01-01

    Methods are presented for the generation of random numbers with uniform and normal distributions. Subprogram listings of Fortran generators for the Univac 1108, SDS 930, and CDC 3200 digital computers are also included. The generators are of the mixed multiplicative type, and the mathematical method employed is that of Marsaglia and Bray.

  17. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  18. The numbers game

    Directory of Open Access Journals (Sweden)

    Oli Brown

    2008-10-01

    Full Text Available Estimates of the potential number of ‘climate changemigrants’ vary hugely. In order to persuade policymakers ofthe need to act and to provide a sound basis for appropriateresponses, there is an urgent need for better analysis, betterdata and better predictions.

  19. Introducing Complex Numbers

    Science.gov (United States)

    Trudgian, Timothy

    2009-01-01

    One of the difficulties in any teaching of mathematics is to bridge the divide between the abstract and the intuitive. Throughout school one encounters increasingly abstract notions, which are more and more difficult to relate to everyday experiences. This article examines a familiar approach to thinking about negative numbers, that is an…

  20. Typical Complexity Numbers

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Typical Complexity Numbers. Say. 1000 tones,; 100 Users,; Transmission every 10 msec. Full Crosstalk cancellation would require. Full cancellation requires a matrix multiplication of order 100*100 for all the tones. 1000*100*100*100 operations every second for the ...

  1. Littlewood and Number Theory

    Indian Academy of Sciences (India)

    IAS Admin

    improved by Selberg [4] in 1941 who showed that a pos- ... be seen by entries of his first letter to G H Hardy in ... tary in the technical sense of the word, employed com- ..... III: On the expression of a number as a sum of primes, Acta Math.,.

  2. Balancing personalized medicine and personalized care.

    Science.gov (United States)

    Cornetta, Kenneth; Brown, Candy Gunther

    2013-03-01

    The current description of personalized medicine by the National Institutes of Health is "the science of individualized prevention and therapy." Although physicians are beginning to see the promise of genetic medicine coming to fruition, the rapid pace of sequencing technology, informatics, and computer science predict a revolution in the ability to care for patients in the near future. The enthusiasm expressed by researchers is well founded, but the expectations voiced by the public do not center on advancing technology. Rather, patients are asking for personalized care: a holistic approach that considers physical, mental, and spiritual well-being. This perspective considers psychological, religious, and ethical challenges that may arise as the precision of preventive medicine improves. Psychological studies already highlight the barriers to single gene testing and suggest significant barriers to the predictive testing envisioned by personalized medicine. Certain religious groups will likely mount opposition if they believe personalized medicine encourages embryo selection. If the technology prompts cost-containment discussions, those concerned about the sanctity of life may raise ethical objections. Consequently, the availability of new scientific developments does not guarantee advances in treatment because patients may prove unwilling to receive and act on personalized genetic information. This perspective highlights current efforts to incorporate personalized medicine and personalized care into the medical curriculum, genetic counseling, and other aspects of clinical practice. Because these efforts are generally independent, the authors offer recommendations for physicians and educators so that personalized medicine can be implemented in a manner that meets patient expectations for personalized care.

  3. Using personality neuroscience to study personality disorder.

    Science.gov (United States)

    Abram, Samantha V; DeYoung, Colin G

    2017-01-01

    Personality neuroscience integrates techniques from personality psychology and neuroscience to elucidate the neural basis of individual differences in cognition, emotion, motivation, and behavior. This endeavor is pertinent not only to our understanding of healthy personality variation, but also to the aberrant trait manifestations present in personality disorders and severe psychopathology. In the current review, we focus on the advances and limitations of neuroimaging methods with respect to personality neuroscience. We discuss the value of personality theory as a means to link specific neural mechanisms with various traits (e.g., the neural basis of the "Big Five"). Given the overlap between dimensional models of normal personality and psychopathology, we also describe how researchers can reconceptualize psychopathological disorders along key dimensions, and, in turn, formulate specific neural hypotheses, extended from personality theory. Examples from the borderline personality disorder literature are used to illustrate this approach. We provide recommendations for utilizing neuroimaging methods to capture the neural mechanisms that underlie continuous traits across the spectrum from healthy to maladaptive. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. John Locke on persons and personal identity

    OpenAIRE

    Boeker, Ruth

    2013-01-01

    John Locke claims both that ‘person’ is a forensic term and that personal identity consists in sameness of consciousness. The aim of my dissertation is to explain and critically assess how Locke links his moral and legal account of personhood to his account of personal identity in terms of sameness of consciousness. My interpretation of Locke’s account of persons and personal identity is embedded in Locke’s sortal-dependent account of identity. Locke’s sortal-dependent ac...

  5. Eyewitness identification: Bayesian information gain, base-rate effect equivalency curves, and reasonable suspicion.

    Science.gov (United States)

    Wells, Gary L; Yang, Yueran; Smalarz, Laura

    2015-04-01

    We provide a novel Bayesian treatment of the eyewitness identification problem as it relates to various system variables, such as instruction effects, lineup presentation format, lineup-filler similarity, lineup administrator influence, and show-ups versus lineups. We describe why eyewitness identification is a natural Bayesian problem and how numerous important observations require careful consideration of base rates. Moreover, we argue that the base rate in eyewitness identification should be construed as a system variable (under the control of the justice system). We then use prior-by-posterior curves and information-gain curves to examine data obtained from a large number of published experiments. Next, we show how information-gain curves are moderated by system variables and by witness confidence and we note how information-gain curves reveal that lineups are consistently more proficient at incriminating the guilty than they are at exonerating the innocent. We then introduce a new type of analysis that we developed called base rate effect-equivalency (BREE) curves. BREE curves display how much change in the base rate is required to match the impact of any given system variable. The results indicate that even relatively modest changes to the base rate can have more impact on the reliability of eyewitness identification evidence than do the traditional system variables that have received so much attention in the literature. We note how this Bayesian analysis of eyewitness identification has implications for the question of whether there ought to be a reasonable-suspicion criterion for placing a person into the jeopardy of an identification procedure. (c) 2015 APA, all rights reserved).

  6. A study on association and correlation of lip and finger print pattern analysis for gender identification

    Directory of Open Access Journals (Sweden)

    Surapaneni Ratheesh Kumar Nandan

    2015-01-01

    Conclusion: Lip print analysis is a challenging area in the personal identification during forensic dentistry examination. The study revealed the weaker correlation and approachable significance of lip and finger print pattern in gender identification. Future studies should be encouraged in the direction of software based identification for lip and finger print analysis in gender identification. Such studies may benefit this study pattern in more accurate way.

  7. Adaptive Robot to Person Encounter by Motion Patterns

    DEFF Research Database (Denmark)

    Andersen, Hans Jørgen; Bak, Thomas; Svenstrup, Mikael

    2009-01-01

    This paper introduces a new method for adaptive control of a robot approaching a person controlled by the person's interest in interaction. For adjustment of the robot behavior a cost function centered in the person is adapted according to an introduced person evaluator method relying on the three...... variables: the distance between the person and the robot, the relative velocity between the two, and position of the person. The person evaluator method determine the person's interest by evaluating the spatial relationship between robot and person in a Case Based Reasoning (CBR) system that is trained...... to determine to which degree the person is interested in interaction. The outcome of the CBR system is used to adapt the cost function around the person, so that the robot's behavior is adapted to the expressed interest. The proposed methods are evaluated by a number of physical experiments that demonstrate...

  8. Highly dominating, highly authoritarian personalities.

    Science.gov (United States)

    Altemeyer, Bob

    2004-08-01

    The author considered the small part of the population whose members score highly on both the Social Dominance Orientation scale and the Right-Wing Authoritarianism scale. Studies of these High SDO-High RWAs, culled from samples of nearly 4000 Canadian university students and over 2600 of their parents and reported in the present article, reveal that these dominating authoritarians are among the most prejudiced persons in society. Furthermore, they seem to combine the worst elements of each kind of personality, being power-hungry, unsupportive of equality, manipulative, and amoral, as social dominators are in general, while also being religiously ethnocentric and dogmatic, as right-wing authoritarians tend to be. The author suggested that, although they are small in number, such persons can have considerable impact on society because they are well-positioned to become the leaders of prejudiced right-wing political movements.

  9. Electro-optical fuel pin identification system

    International Nuclear Information System (INIS)

    Kirchner, T.L.

    1978-09-01

    A prototype Electro-Optical Fuel Pin Identification System referred to as the Fuel Pin Identification System (FPIS) has been developed by the Hanford Engineering Development Laboratory (HEDL) in support of the Fast Flux Test Facility (FFTF) presently under construction at HEDL. The system is designed to remotely read an alpha-numeric identification number that is roll stamped on the top of the fuel pin end cap. The prototype FPIS consists of four major subassemblies: optical read head, digital compression electronics, video display, and line printer

  10. Low Reynolds Number Vehicles

    Science.gov (United States)

    1985-02-01

    of the blade. The Darrieus VAWT has more complex aerodynamics. This type of wind turbine produces power as a result of the tangential thrust as...Horizontal Axis Propeller-Type b) Verticle Axis Darrieus -Type Figure 78. Wind Turbine Configurations 0 6 Q K [_ 2 -, C 4 UJ UJ...Sailplanes 23 5.2 Wind Turbines 23 6. CONCLUDING REMARKS 24 7. RECOMMENDATIONS FOR FUTURE RESEARCH 24 REFERENCES 25 FIGURES 32 yv/ LOW REYNOLDS NUMBER

  11. Muon identification in JADE

    International Nuclear Information System (INIS)

    Allison, J.; Armitage, J.C.M.; Baines, J.T.M.; Ball, A.H.; Bamford, G.; Barlow, R.J.; Bowdery, C.K.; Chrin, J.T.M.; Duerdoth, I.P.; Glendinning, I.; Greenshaw, T.; Hassard, J.F.; Hill, P.; King, B.T.; Loebinger, F.K.; Macbeth, A.A.; McCann, H.; Mercer, D.; Mills, H.E.; Murphy, P.G.; Prosper, H.B.; Rowe, P.; Stephens, K.

    1985-01-01

    The method of identification of high energy muons in the JADE detector is described in detail. The performance of the procedure is discussed in detail for the case of prompt identification in multihadronic final states. (orig.)

  12. Identification for Control

    DEFF Research Database (Denmark)

    Tøffner-Clausen, S.

    1995-01-01

    Identification of model error bounds for robust control design has recently achieved much attention.......Identification of model error bounds for robust control design has recently achieved much attention....

  13. The role of personality traits in posttraumatic stress disorder (PTSD).

    Science.gov (United States)

    Jakšić, Nenad; Brajković, Lovorka; Ivezić, Ena; Topić, Radmila; Jakovljević, Miro

    2012-09-01

    A number of studies have shown that although exposure to potentially traumatic events is common, development of PTSD is relatively rare, which is one of the reasons PTSD still remains a controversial psychiatric entity. The aim of this article was to provide an overview of the research on the role of personality traits in the vulnerability, resilience, posttraumatic growth and expressions associated with PTSD. Personality based approach represents a dimensional aspect of the transdisciplinary integrative model of PTSD. We conducted a systematic search on PubMed, PsycINFO, and Academic Search Complete from 1980 (the year PTSD was first included in the DSM) and 2012 (the year the literature search was performed). Manual examination of secondary sources such as the reference sections of selected articles and book chapters were also conducted. Most of the reviewed studies dealing with personality traits as vulnerability and protective factors for PTSD examined the relationship between basic personality dimensions and severity of symptoms of PTSD. These studies have applied three types of methodological designs: cross-sectional, post-trauma and pre-trauma longitudinal studies, with latter being the least common option. Finding that appears relatively consistent is that PTSD is positively related to negative emotionality, neuroticism, harm avoidance, novelty-seeking and self-transcendence, as well as to trait hostility/anger and trait anxiety. On the other hand, PTSD symptoms are negatively associated with extraversion, conscientiousness, self-directedness, the combination of high positive and low negative emotionality, as well as with hardiness and optimism, while posttraumatic growth shows inverse relation to most of these traits. Furthermore, a number of studies have confirmed the existence of three distinct personality-based subtypes of PTSD: internalizing, externalizing and low pathology PTSD. These findings may help in further uncovering etiological mechanisms and

  14. Position coincidence optical identifications using Texas interferometer radio positions

    International Nuclear Information System (INIS)

    Bozyan, E.P.

    1979-01-01

    1048 radio source positions measured with the Texas Interferometer were searched for optical identifications on glass copies of the Palomar Sky Survey E and O plates, resulting in 242 identifications and 806 blank fields. Finding charts are presented for 124 of the 125 new identifications not previously reported in the literature, and for 73 blank fields containing nearby optical objects which may be real identifications. This brings the cumulative number of Texas radio positions searched to 2015, producing 864 optical identifications and 1151 blank fields

  15. Genetic identification of children of the disappeared in Argentina.

    Science.gov (United States)

    Penchaszadeh, V B

    1997-01-01

    During the military dictatorship that ruled Argentina between 1976 and 1983, the security forces engaged in well-planned repression that included the abduction, torture, and disappearance of thousands of dissidents. Repression spared neither children nor pregnant women. Approximately 220 babies and children of the disappeared victims were abducted and kept mostly by families with connections with the military. After the restoration of democracy, attempts to find and identify the missing children were made, with the goal of restoring their personal and familial identities and returning them to their surviving relatives. The Association of Grandmothers of Plaza de Mayo and a number of geneticists who developed and applied methods of genetic identification to this human rights cause were instrumental in this quest. Initial use of histocompatibility (HLA) typing for genetic identification was later followed by nuclear DNA typing and mitochondrial DNA sequencing. Of 56 children found and identified, 30 were returned to their legitimate families, 13 remained with the families who had adopted them in good faith, 6 are still the subject of custody litigation in the courts, and 7 were found dead. Psychological and ethical guidelines protecting the best interests of the children were followed in all proceedings.

  16. INMARSAT's personal communicator system

    Science.gov (United States)

    Hart, Nick; Haugli, Hans-C.; Poskett, Peter; Smith, K.

    Inmarsat has been providing near global mobile satellite communications since 1982 and Inmarsat terminals are currently being used in more than 130 countries. The terminals have been reduced in size and cost over the years and new technology has enabled the recent introduction of briefcase sized personal telephony terminals (Inmarsat-M). This trend continues and we are likely to see Inmarsat handheld terminals by the end of the decade. These terminals are called Inmarsat-P and this paper focuses on the various elements required to support a high quality service to handheld terminals. The main system elements are: the handheld terminals; the space segment with the associated orbits; and the gateways to terrestrial networks. It is both likely and desirable that personal handheld satellite communications will be offered by more than one system provider and this competition will ensure strong emphasis on service quality and cost of ownership. The handheld terminals also have to be attractive to a large number of potential users, and this means that the terminals must be small enough to fit in a pocket. Battery lifetime is another important consideration, and this coupled with radiation safety requirements limits the maximum radiated EIRP. The terminal G/T is mainly constrained by the gain of the omnidirectional antenna and the noise figure of the RF front end (including input losses). Inmarsat has examined, with the support of industry, a number of Geosynchronous (GSO), Medium Earth Orbit (MEO) and Low Earth Orbit (LEO) satellite options for the provision of a handheld mobile satellite service. This paper describes the key satellite and orbit parameters and tradeoffs which affect the overall quality of service and the space segment costing. The paper also stresses not only the importance of using and sharing the available mobile frequency band allocations efficiently, but also the key considerations affecting the choice of feeder link bands. The design of the gateways

  17. Personality expression in Chinese language use.

    Science.gov (United States)

    Qiu, Lin; Lu, Jiahui; Ramsay, Jonathan; Yang, Shanshan; Qu, Weina; Zhu, Tingshao

    2017-12-01

    To date, little research has investigated personality expressions in languages other than English. Given that the Chinese language has the largest number of native speakers in the world, it is vitally important to examine the associations between personality and Chinese language use. In this research, we analysed Chinese microblogs and identified word categories and factorial structures associated with personality traits. We also compared our results with previous findings in English and showed that linguistic expression of personality has both universal- and language-specific aspects. Expression of personality via content words is more likely to be consistent across languages than expression via function words. This makes an important step towards uncovering universal patterns of personality expression in language. © 2016 International Union of Psychological Science.

  18. Topics in number theory

    CERN Document Server

    LeVeque, William J

    2002-01-01

    Classic two-part work now available in a single volume assumes no prior theoretical knowledge on reader's part and develops the subject fully. Volume I is a suitable first course text for advanced undergraduate and beginning graduate students. Volume II requires a much higher level of mathematical maturity, including a working knowledge of the theory of analytic functions. Contents range from chapters on binary quadratic forms to the Thue-Siegel-Roth Theorem and the Prime Number Theorem. Includes numerous problems and hints for their solutions. 1956 edition. Supplementary Reading. List of Symb

  19. Drawing a random number

    DEFF Research Database (Denmark)

    Wanscher, Jørgen Bundgaard; Sørensen, Majken Vildrik

    2006-01-01

    Random numbers are used for a great variety of applications in almost any field of computer and economic sciences today. Examples ranges from stock market forecasting in economics, through stochastic traffic modelling in operations research to photon and ray tracing in graphics. The construction...... distributions into others with most of the required characteristics. In essence, a uniform sequence which is transformed into a new sequence with the required distribution. The subject of this article is to consider the well known highly uniform Halton sequence and modifications to it. The intent is to generate...

  20. Individual identification via electrocardiogram analysis.

    Science.gov (United States)

    Fratini, Antonio; Sansone, Mario; Bifulco, Paolo; Cesarelli, Mario

    2015-08-14

    During last decade the use of ECG recordings in biometric recognition studies has increased. ECG characteristics made it suitable for subject identification: it is unique, present in all living individuals, and hard to forge. However, in spite of the great number of approaches found in literature, no agreement exists on the most appropriate methodology. This study aimed at providing a survey of the techniques used so far in ECG-based human identification. Specifically, a pattern recognition perspective is here proposed providing a unifying framework to appreciate previous studies and, hopefully, guide future research. We searched for papers on the subject from the earliest available date using relevant electronic databases (Medline, IEEEXplore, Scopus, and Web of Knowledge). The following terms were used in different combinations: electrocardiogram, ECG, human identification, biometric, authentication and individual variability. The electronic sources were last searched on 1st March 2015. In our selection we included published research on peer-reviewed journals, books chapters and conferences proceedings. The search was performed for English language documents. 100 pertinent papers were found. Number of subjects involved in the journal studies ranges from 10 to 502, age from 16 to 86, male and female subjects are generally present. Number of analysed leads varies as well as the recording conditions. Identification performance differs widely as well as verification rate. Many studies refer to publicly available databases (Physionet ECG databases repository) while others rely on proprietary recordings making difficult them to compare. As a measure of overall accuracy we computed a weighted average of the identification rate and equal error rate in authentication scenarios. Identification rate resulted equal to 94.95 % while the equal error rate equal to 0.92 %. Biometric recognition is a mature field of research. Nevertheless, the use of physiological signals

  1. Antroponimia y reconstrucción histórica: consideraciones sobre la identificación personal en el paso de la Edad Media a la Moderna en la Corona de Castilla = Anthroponymy and Historical Reconstruction: Thoughts on Personal Identification from the Late...

    Directory of Open Access Journals (Sweden)

    Jaime de Hoz Onrubia

    2016-06-01

    characteristic medieval formulas of vassalage. This nomenclature was used in the kingdom of Castile to relate people of a same family group, be they genetically bonded or otherwise, using traditional procedures such as the avunculato, in order to include an individual under the protection of another person or institution capable of providing for him and transmitting his rights and privileges. Based on this nominal reference and often coupled with a patronymic, every individual who possessed a legal status would receive a name that would define him legally via association with a specific place to which he would be ascribed, or to a corporation, definitively constituting the modern surname when its referential and ascriptive meaning was finally lost. Especially after the Council of Trent, the surname came to be no more than a nominal indicator of an individual with no further classificatory value, devoid of its semantic and descriptive content.

  2. Person identification based on multiscale matching of cortical images

    NARCIS (Netherlands)

    Kruizinga, P; Petkov, N; Hertzberger, B; Serazzi, G

    1995-01-01

    A set of so-called cortical images, motivated by the function of simple cells in the primary visual cortex of mammals, is computed from each of two input images and an image pyramid is constructed for each cortical image. The two sets of cortical image pyramids are matched synchronously and an

  3. Personal Suicidality in Reception and Identification with Suicidal Film Characters

    Science.gov (United States)

    Till, Benedikt; Vitouch, Peter; Herberth, Arno; Sonneck, Gernot; Niederkrotenthaler, Thomas

    2013-01-01

    The authors investigated the impact of suicidality on identity work during film exposure. Adults with low suicidality ("n" = 150) watched either "It's My Party" or "The Fire Within," censored versions of these films not depicting the suicide, or the control film that concluded with a non-suicidal death. Baseline…

  4. Automatic personality assessment through social media language.

    Science.gov (United States)

    Park, Gregory; Schwartz, H Andrew; Eichstaedt, Johannes C; Kern, Margaret L; Kosinski, Michal; Stillwell, David J; Ungar, Lyle H; Seligman, Martin E P

    2015-06-01

    Language use is a psychologically rich, stable individual difference with well-established correlations to personality. We describe a method for assessing personality using an open-vocabulary analysis of language from social media. We compiled the written language from 66,732 Facebook users and their questionnaire-based self-reported Big Five personality traits, and then we built a predictive model of personality based on their language. We used this model to predict the 5 personality factors in a separate sample of 4,824 Facebook users, examining (a) convergence with self-reports of personality at the domain- and facet-level; (b) discriminant validity between predictions of distinct traits; (c) agreement with informant reports of personality; (d) patterns of correlations with external criteria (e.g., number of friends, political attitudes, impulsiveness); and (e) test-retest reliability over 6-month intervals. Results indicated that language-based assessments can constitute valid personality measures: they agreed with self-reports and informant reports of personality, added incremental validity over informant reports, adequately discriminated between traits, exhibited patterns of correlations with external criteria similar to those found with self-reported personality, and were stable over 6-month intervals. Analysis of predictive language can provide rich portraits of the mental life associated with traits. This approach can complement and extend traditional methods, providing researchers with an additional measure that can quickly and cheaply assess large groups of participants with minimal burden. (c) 2015 APA, all rights reserved).

  5. Biosignal-guided personalized therapy

    Directory of Open Access Journals (Sweden)

    von Stülpnagel Lukas

    2017-09-01

    Full Text Available Sudden cardiac death (SCD is the leading single cause of death in the industrialized world. Current guidelines recommend a prophylactic implantation of an implantable cardioverter-defibrillator (ICD in patients with reduced left-ventricular ejection fraction (LVEF ≤ 35%. However, most deaths after myocardial infarction (MI occur in patients with normal or moderately reduced LVEF (>35%. There is a large body of evidence that cardiac autonomic dysfunction after MI is linked to increased susceptibility to malignant arrhythmias. Deceleration capacity of heart rate (DC and periodic repolarization dynamics (PRD are novel ECG-based risk markers, which capture different facets of cardiac autonomic dysfunction. Both parameters are strong and independent predictors of mortality and SCD after MI. Previous studies indicated that combined assessment of DC and PRD allows identification of a new high-risk group among post-infarction patients that is not addressed by current guidelines, thus opening new perspectives for biosignal-guided personalized therapies.

  6. [Prenatal diagnosis. Review, personal and prospective studies].

    Science.gov (United States)

    Engel, E; Empson, J; DeLozier, D; McGee, B; da Costa Woodson, E; Engel-de Montmollin, M; Carter, T; Lorber, C; Cassidy, S B; Millis, J; Heller, R M; Boehm, F; Vanhooydonk, J

    1979-07-07

    1. In a review of methods developed for the identification of fetal malformations, the technique, risks and results of amniocentesis are presented. 2. Large series already published have demonstrated the relative simplicity and feasibility of the procedure as well as current indications for its utilization. These include the detection of chromosomal anomalies, the determination of sex (in certain sex-linked disorders), documentation of enzymatic and metabolic deficiencies, and the demonstration of open lesions of the neural tube by appropriate techniques. 3. Experience with over 500 cases personally tested by the authors entirely confirms the major indications for and benefits of this modern method for the detection and prevention of severe congenital anomalies during early pregnancy. 4. The identification of chromosomal alterations is currently the major objective of the method. Increased risks are associated with pregnancies involving a maternal age of 35 years or older (which account for 1-3% of aneuploidies), the birth of a previous infant with free trisomy 21 (1% recurrence risk) or secondary to a parental chromosome translocation (as much as 10% risk of aneuploidy). Fetal karyotyping for determination of sex, in cases where the mother is a carrier of an X-linked recessive gene (on average, 50% of male offspring will be affected), is an inadequate method of diagnosis to be utilized only until alternative techniques render possible specific diagnosis of the anomalies under consideration (hemophilias A and B, muscular dystrophy, etc). 5. Several of these techniques are now nearing development through the advent of fetoscopy and advanced ultrasound methodology, and have already been applied to the detection of certain sex-linked disorders and also for diagnosis of hemoglobinopathies (thalassemias, sickel cell anemia) and other conditions requiring the obtaining of fetal blood for diagnosis. Technology allowing direct examination of fetal parts by means of optical

  7. Personal Wellness Tools

    Science.gov (United States)

    ... of Personal Stories Peers Celebrating Art Peers Celebrating Music Be Vocal Support Locator DBSA In-Person Support ... With this tool, you can track key health trends related to the following: Overall mood Mood disorder ...

  8. A parallel process growth model of avoidant personality disorder symptoms and personality traits.

    Science.gov (United States)

    Wright, Aidan G C; Pincus, Aaron L; Lenzenweger, Mark F

    2013-07-01

    Avoidant personality disorder (AVPD), like other personality disorders, has historically been construed as a highly stable disorder. However, results from a number of longitudinal studies have found that the symptoms of AVPD demonstrate marked change over time. Little is known about which other psychological systems are related to this change. Although cross-sectional research suggests a strong relationship between AVPD and personality traits, no work has examined the relationship of their change trajectories. The current study sought to establish the longitudinal relationship between AVPD and basic personality traits using parallel process growth curve modeling. Parallel process growth curve modeling was applied to the trajectories of AVPD and basic personality traits from the Longitudinal Study of Personality Disorders (Lenzenweger, M. F., 2006, The longitudinal study of personality disorders: History, design considerations, and initial findings. Journal of Personality Disorders, 20, 645-670. doi:10.1521/pedi.2006.20.6.645), a naturalistic, prospective, multiwave, longitudinal study of personality disorder, temperament, and normal personality. The focus of these analyses is on the relationship between the rates of change in both AVPD symptoms and basic personality traits. AVPD symptom trajectories demonstrated significant negative relationships with the trajectories of interpersonal dominance and affiliation, and a significant positive relationship to rates of change in neuroticism. These results provide some of the first compelling evidence that trajectories of change in PD symptoms and personality traits are linked. These results have important implications for the ways in which temporal stability is conceptualized in AVPD specifically, and PD in general.

  9. Multimethod, contextualized personality assessment

    OpenAIRE

    Hopwood, CJ; Bleidorn, W

    2017-01-01

    © 2017 European Association of Personality Psychology. Lievens asserted that personality researchers should (a) use multiple methods, in contrast to traditional over-reliance on self-report and (b) move past highly general and context-free assessments to more careful consideration of the situations within which personality predictions are made. These points are with reference to personnel selection settings using the broader framework of Trait Activation Theory. Like most personality research...

  10. Personality Psychology and Economics

    OpenAIRE

    Almlund, Mathilde; Duckworth, Angela Lee; Heckman, James J.; Kautz, Tim

    2011-01-01

    This paper explores the power of personality traits both as predictors and as causes of academic and economic success, health, and criminal activity. Measured personality is interpreted as a construct derived from an economic model of preferences, constraints, and information. Evidence is reviewed about the "situational specificity" of personality traits and preferences. An extreme version of the situationist view claims that there are no stable personality traits or preference parameters tha...

  11. Gambling and Personality Dimensions

    DEFF Research Database (Denmark)

    Odlaug, Brian Lawrence; Chamberlain, Samuel

    2014-01-01

    , which has further catalyzed a debate over the contribution of personality traits (rather than just personality disorders) to the manifestation and maintenance of psychiatric conditions such as Gambling Disorder. This selective review considers relationships between gambling and personality traits....... The possible existence of distinct subtypes of Gambling Disorder, defined via personality traits, is highlighted, along with consideration of whether objective neurocognitive markers could serve as proxy markers of ‘personality’ more amenable to scientific dissection rather than relying on questionnaire...

  12. Personal anticipated information need

    OpenAIRE

    H. Bruce

    2005-01-01

    Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...

  13. Personality, personnel selection, and job performance

    NARCIS (Netherlands)

    D. van der Linden (Dimitri); D.H.M. Pelt (Dirk); C.S. Dunkel (Curtis); M.Ph. Born (Marise)

    2017-01-01

    markdownabstractJob Performance: The term job performance can either refer to the objective or subjective outcomes one achieves in a specific job (e.g., the profit of a sales persons, the number of publications of a scientist, the number of successful operations of a surgeon) or to work-related

  14. Personality and Sexual Orientation

    Science.gov (United States)

    Harris, Charles M.

    2004-01-01

    Bases for individual acceptance and cultural integration of gays and lesbians were investigated by assessing qualities of personality among four participant groups: Heterosexual females, heterosexual males, homosexual females, and homosexual males. Personality was operationally defined as personal qualities and characteristics associated with…

  15. Methods of Studying Persons.

    Science.gov (United States)

    Heinemann, Allen W.; Shontz, Franklin C.

    Conventional research strategies typically emphasize behavior-determining tendencies so strongly that the person as a whole is ignored. Research strategies for studying whole persons focus on symbolic structures, formulate specific questions in advance, study persons one at a time, use individualized measures, and regard participants as expert…

  16. Personal, Anticipated Information Need

    Science.gov (United States)

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  17. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  18. Nosewitness Identification: Effects of Negative Emotion

    Science.gov (United States)

    Ferreira, Jacqueline; Rocha, Marta; Silva, Carlos F.; Olsson, Mats J.

    2015-01-01

    Every individual has a unique body odor (BO), similar to a fingerprint. In forensic research, identification of culprit BOs has been performed by trained dogs, but not by humans. We introduce the concept of nosewitness identification and present the first experimental results on BO memory in witness situations involving violent crimes. Two experiments indicated that BO associated with male characters in authentic videos could later be identified in BO lineup tests well above chance. Moreover, culprit BO in emotional crime videos could be identified considerably better than the BO of a male person in neutral videos. This indicates that nosewitness identification benefits from emotional encoding. Altogether, the study testifies to the virtue of body odor as a cue to identify individuals observed under negative emotion. PMID:25612211

  19. Personality Facets and RIASEC Interests: An Integrated Model

    Science.gov (United States)

    Armstrong, Patrick Ian; Anthoney, Sarah Fetter

    2009-01-01

    Research examining links between personality and interest have typically focused on links between measures of the five factor model and Holland's RIASEC types. However, the five factor model of personality can be divided in to a larger set of narrow domain personality scales measuring facets of the "big five" traits. Research in a number of fields…

  20. Person Recognition in Personal Photo Collections

    OpenAIRE

    Oh, Seong Joon; Benenson, Rodrigo; Fritz, Mario; Schiele, Bernt

    2015-01-01

    Recognising persons in everyday photos presents major challenges (occluded faces, different clothing, locations, etc.) for machine vision. We propose a convnet based person recognition system on which we provide an in-depth analysis of informativeness of different body cues, impact of training data, and the common failure modes of the system. In addition, we discuss the limitations of existing benchmarks and propose more challenging ones. Our method is simple and is built on open source and o...

  1. The internet of things for personalized health.

    Science.gov (United States)

    Schreier, Günter

    2014-01-01

    Advances in information and communications technologies (ICT) enable new personalized health care concepts which are often characterized by four "P" terms, i.e. personalized, predictive, preventive and participatory. However, real world implementations of the complete 4P spectrum hardly exist today. The Internet of Things (IoT) has been defined as an extension to the current Internet that enables pervasive communication between the physical and the virtual world. Smart devices and enabling elements like Near Field Communication (NFC) and Radio Frequency Identification (RFID) technology already exist and increasingly will be a mainstream element of our lives. This future vision paper attempts to assess if and how the Internet of Things for personalized health (IoT4pH) can help to facilitate the 4P healthcare paradigm and discusses related challenges and opportunities.

  2. Hearing Aid Personalization

    DEFF Research Database (Denmark)

    Nielsen, Jens Brehm; Nielsen, Jakob; Jensen, Bjørn Sand

    2013-01-01

    Modern digital hearing aids require and offer a great level of personalization. Today, this personalization is not performed based directly on what the user actually perceives, but on a hearing-care professional’s interpretation of what the user explains about what is perceived. In this paper......, an interactive personalization system based on Gaussian process regression and active learning is proposed, which personalize the hearing aids based directly on what the user perceives. Preliminary results demonstrate a significant difference between a truly personalized setting obtained with the proposed system...

  3. Personalized professional content recommendation

    Science.gov (United States)

    Xu, Songhua

    2015-10-27

    A personalized content recommendation system includes a client interface configured to automatically monitor a user's information data stream transmitted on the Internet. A hybrid contextual behavioral and collaborative personal interest inference engine resident to a non-transient media generates automatic predictions about the interests of individual users of the system. A database server retains the user's personal interest profile based on a plurality of monitored information. The system also includes a server programmed to filter items in an incoming information stream with the personal interest profile and is further programmed to identify only those items of the incoming information stream that substantially match the personal interest profile.

  4. Personality and Euroscepticism

    DEFF Research Database (Denmark)

    Nielsen, Julie Hassing

    2016-01-01

    and openness positively correlate with positive EU attitudes, while people scoring high on neuroticism tend to support the EU less. Furthermore, I find that personality moderates different EU frames. Individuals with certain personality traits are more influenced by framing effects than others, while positive......Attitudes towards EU integration are widely studied, yet we know only little about the role of personality for EU attitudes. Utilizing a framing experiment encompassing positive and negative frames of EU integration, this article reports on how personality influences attitudes towards EU...... integration, and how personal predispositions moderate framing effects, impacting EU attitude formation. The study relies on Danish and Swedish data (N = 1808). I test both the direct impact of personality on EU attitudes and personality's moderating impact on framing effects. I find that extraversion...

  5. Personal anticipated information need

    Directory of Open Access Journals (Sweden)

    H. Bruce

    2005-01-01

    Full Text Available Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. These propositions draw upon concepts such as uncertainty, predictability, sensitivity and the valuation of information sources. Conclusion. An individual's understanding of personal, anticipated information need and how this understanding guides the acquisition and management of personal information will determine the effectiveness of that collection.

  6. Lineup member similarity effects on children's eyewitness identification

    OpenAIRE

    Fitzgerald, Ryan J.; Whiting, Brittany F.; Therrien, Natalie M.; Price, Heather L.

    2014-01-01

    To date, research investigating the similarity among lineup members has focused on adult eyewitnesses. In the present research, children made identifications from lineups containing members of lower or higher similarity to a target person. In Experiment 1, following a live interaction, children's (6–14 years) correct identification rate was reduced in higher-similarity relative to lower-similarity lineups. In Experiment 2, children (6–12 years) and adults watched a video containing a target p...

  7. Personality disorder symptoms are differentially related to divorce frequency.

    Science.gov (United States)

    Disney, Krystle L; Weinstein, Yana; Oltmanns, Thomas F

    2012-12-01

    Divorce is associated with a multitude of outcomes related to health and well-being. Data from a representative community sample (N = 1,241) of St. Louis residents (ages 55-64) were used to examine associations between personality pathology and divorce in late midlife. Symptoms of the 10 DSM-IV personality disorders were assessed with the Structured Interview for DSM-IV Personality and the Multisource Assessment of Personality Pathology (both self and informant versions). Multiple regression analyses showed Paranoid and Histrionic personality disorder symptoms to be consistently and positively associated with number of divorces across all three sources of personality assessment. Conversely, Avoidant personality disorder symptoms were negatively associated with number of divorces. The present paper provides new information about the relationship between divorce and personality pathology at a developmental stage that is understudied in both domains. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  8. Lepton family number violation

    International Nuclear Information System (INIS)

    Herczeg, P.

    1999-01-01

    At present there is evidence from neutrino oscillation searches that the neutrinos are in fact massive particles and that they mix. If confirmed, this would imply that the conservation of LFN is not exact. Lepton family number violation (LFNV) has been searched for with impressive sensitivities in many processes involving charged leptons. The present experimental limits on some of them (those which the author shall consider here) are shown in Table 1. These stringent limits are not inconsistent with the neutrino oscillation results since, given the experimental bounds on the masses of the known neutrinos and the neutrino mass squared differences required by the oscillation results, the effects of LFNV from neutrino mixing would be too small to be seen elsewhere (see Section 2). The purpose of experiments searching for LFNV involving the charged leptons is to probe the existence of other sources of LFNV. Such sources are present in many extensions of the SM. In this lecture the author shall discuss some of the possibilities, focusing on processes that require muon beams. Other LFNV processes, such as the decays of the kaons and of the τ, provide complementary information. In the next Section he shall consider some sources of LFNV that do not require an extension of the gauge group of the SM (the added leptons or Higgs bosons may of course originate from models with extended gauge groups). In Section 3 he discusses LFNV in left-right symmetric models. In Section 4 he considers LFNV in supersymmetric models, first in R-parity conserving supersymmetric grand unified models, and then in the minimal supersymmetric standard model with R-parity violation. The last section is a brief summary of the author's conclusions

  9. Additional approaches to DNA typing of skeletal remains: the search for "missing" persons killed during the last dictatorship in Argentina.

    Science.gov (United States)

    Corach, D; Sala, A; Penacino, G; Iannucci, N; Bernardi, P; Doretti, M; Fondebrider, L; Ginarte, A; Inchaurregui, A; Somigliana, C; Turner, S; Hagelberg, E

    1997-08-01

    DNA typing techniques are among the most advanced tools for human identification and can contribute to the identification of poorly preserved skeletal remains. Ten thousand people are thought to have been killed during the last dictatorship in Argentina (1976-1983) and there are few official records on the identity of the victims or the location of burials. A mass grave containing 340 skeletons was excavated using archeological methods. A small number of individuals was identified by traditional forensic methods and one family group by mitochondrial DNA (mtDNA) analysis. Due to the lack of antemortem physical information on many of the victims, the application of molecular methods is imperative to speed up the identification process. We have tested two molecular screening methods, Y chromosome-specific short tandem repeats (DYS19, DYS385, DYS389 I, DYS389 II, DYS390, DYS391, DYS392, DYS393) and amplification of autosomal microsatellites using nested primers. These methods can complement solely matrilineal mtDNA sequence data in the identification of "missing" persons.

  10. Straight flavor of Binary Number in Decimal Number System

    OpenAIRE

    MD. Abdul Awal Ansary; Sushanta Acharjee

    2012-01-01

    Different number systems are available on the basis of their base numbers. For instance, decimal number system is of base 10, hexadecimal number system which base is 16 and, Binary number system which base is 2 etc. Some numbers systems are easy to understand by the human being and some are easy to understand by electronics machine for instance digital computers. Computers only can understand data and instructions that are stored in binary form, though we input the data and instruction in dec...

  11. Personalized Regenerative Medicine

    Directory of Open Access Journals (Sweden)

    Babak Arjmand

    2017-03-01

    Full Text Available Personalized medicine as a novel field of medicine refers to the prescription of specific therapeutics procedure for an individual. This approach has established based on pharmacogenetic and pharmacogenomic information and data. The terms precision and personalized medicines are sometimes applied interchangeably. However, there has been a shift from “personalized medicine” towards “precision medicine”. Although personalized medicine emerged from pharmacogenetics, nowadays it covers many fields of healthcare. Accordingly, regenerative medicine and cellular therapy as the new fields of medicine use cell-based products in order to develop personalized treatments. Different sources of stem cells including mesenchymal stem cells, embryonic stem cells and induced pluripotent stem cells (iPSCs have been considered in targeted therapies which could give many advantages. iPSCs as the novel and individual pluripotent stem cells have been introduced as the appropriate candidates for personalized cell therapies. Cellular therapies can provide a personalized approach. Because of person-to-person and population differences in the result of stem cell therapy, individualized cellular therapy must be adjusted according to the patient specific profile, in order to achieve best therapeutic results and outcomes. Several factors should be considered to achieve personalized stem cells therapy such as, recipient factors, donor factors, and the overall body environment in which the stem cells could be active and functional. In addition to these factors, the source of stem cells must be carefully chosen based on functional and physical criteria that lead to optimal outcomes.

  12. Professional competence of the person in the Smart-society

    Directory of Open Access Journals (Sweden)

    Nina V. Komleva

    2017-01-01

    Full Text Available Now, there are processes of formation of a knowledge society – the Smart-society – are all the new features, which are characterized by obtaining a new effect from the use of information and communication technologies. The development of computers and communications creates the preconditions for moving the place of work out of the office space in the digital home. In these circumstances, more and more importance is given to the individual skills of the person, its ability to absorb a huge amount of diverse information, generate and innovate. Therefore, empowerment process for every professional who wants to be popular, it becomes continuous, becomes a constant need to learn and lifelong learning. In addition, requirements for the employees are changing, and the person must evaluate its relevance to society. This raises the question: how to evaluate the relevance? What is necessary for the Smart-society?What to learn or re-learn? Focus shifts from classical training to personal development. Traditional methods and approaches to learning have stopped covering the needs of the knowledge. Instead of selecting a limited number of the templates, each person is faced with the necessity to configure your own unique personality, to increasingly use informal learning, providing the individual development.The professional competence of the person in the Smart-society is formed in an interactive learning environment, using content from around the world, which is in the public domain. The assessment level of competence, identifying the need for professional development, early learning with the use of technology, provided by the Smart-education, are essential components of the formation process of professional competence of the person in the Smart-society. It is important to provide the compliance of the business metrics of employees to the content of the assessment test at the stage of internal validation for the purpose of timely identification of those

  13. 26 CFR 301.6109-1 - Identifying numbers.

    Science.gov (United States)

    2010-04-01

    ... §§ 1.671-4(b)(4) of this chapter. (6) Effective date. Paragraphs (a)(3), (4), and (5) of this section...) of this chapter, any college or university that is an educational organization as defined in § 1.501... must have an employer identification number for use in any communication with the Internal Revenue...

  14. Back to the Future: Personality and Assessment and Personality Development

    OpenAIRE

    Roberts, Brent W.

    2009-01-01

    In this essay I consider the future of personality development in light of the past effects of Personality and Assessment on the field of personality in general and personality development in particular. The essay is organized around 1) the effect of Mischel's book on the foundational theories informing personality development; 2) definitions of personality traits; 3) an alternative model of personality traits, described as the sociogenomic model of personality traits, that can bridge the div...

  15. Rapid Methods for the Laboratory Identification of Pathogenic Microorganisms.

    Science.gov (United States)

    1982-09-01

    coli Hemophilus influenzae Bacillus anthracis Bacillus circulans Bacillus coagulans Bacillus cereus T Candida albicans Cryptococcus neoformans Legionel...reveree aide If neceeeary and Identify by block number) Lectins: Rapid Identification, Bacillus anthracisjCryptococcus " neoformans. Neisseria...field-type kit for the rapid identification of Bacillus anthracis. We have shown that certain lectins will selectively interact with B. anthracis

  16. Assessing nonchoosers' eyewitness identification accuracy from photographic showups by using confidence and response times.

    Science.gov (United States)

    Sauerland, Melanie; Sagana, Anna; Sporer, Siegfried L

    2012-10-01

    While recent research has shown that the accuracy of positive identification decisions can be assessed via confidence and decision times, gauging lineup rejections has been less successful. The current study focused on 2 different aspects which are inherent in lineup rejections. First, we hypothesized that decision times and confidence ratings should be postdictive of identification rejections if they refer to a single lineup member only. Second, we hypothesized that dividing nonchoosers according to the reasons they provided for their decisions can serve as a useful postdictor for nonchoosers' accuracy. To test these assumptions, we used (1) 1-person lineups (showups) in order to obtain confidence and response time measures referring to a single lineup member, and (2) asked nonchoosers about their reasons for making a rejection. Three hundred and eighty-four participants were asked to identify 2 different persons after watching 1 of 2 stimulus films. The results supported our hypotheses. Nonchoosers' postdecision confidence ratings were well-calibrated. Likewise, we successfully established optimum time and confidence boundaries for nonchoosers. Finally, combinations of postdictors increased the number of accurate classifications compared with individual postdictors. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  17. Automatic system for localization and recognition of vehicle plate numbers

    OpenAIRE

    Vázquez, N.; Nakano, M.; Pérez-Meana, H.

    2003-01-01

    This paper proposes a vehicle numbers plate identification system, which extracts the characters features of a plate from a captured image by a digital camera. Then identify the symbols of the number plate using a multilayer neural network. The proposed recognition system consists of two processes: The training process and the recognition process. During the training process, a database is created using 310 vehicular plate images. Then using this database a multilayer neural network is traine...

  18. Personal exposure control using TLD

    International Nuclear Information System (INIS)

    Ishiguro, Hideharu; Takeda, Shinso

    1979-01-01

    In the Tokai Works of the Power Reactor and Nuclear Fuel Development Corporation (PNC), for personal exposure control, the switching from film badges to TLD badges (and also finger-ring type local dosimeters) was made in fiscal 1974. The facilities involved are a fuel reprocessing plant, a PuO 2 -UO 2 mixed fuel production facility, and a centrifugal uranium enrichment development facility. The types of radiation concerned are various, such as γ(x), β and n. The situation of personal exposure control with TLD and the dose evaluation methods for respective radiations are explained. The number of personnel subject to exposure control, including transient people, is about 2500 - 3000 per three months. The TLD badges used are a special PNC type with TLDs to measure separately γ(x), β and n. With casings made of ABS resin, the external dimensions are 76 mm x 46 mm. (J.P.N.)

  19. RI management by personal computer

    International Nuclear Information System (INIS)

    Ono, Isamu; Hiyoshi, Katsunori; Ono, Kazuhiko; Morimitsu, Wataru

    1983-01-01

    For RI-handling facilities up to medium scale, it has been studied whether a personal computer is applicable to the practical management of radioisotopes. In the present system, the number of writing in mini floppy disks is 1280 articles per diskette, which is the sufficient capacity for a storage medium for one year in variety of books. The correction of radioactivity decay as well as various totalizations can be made easily, so that the state of RI storage and use for the whole RI-handling facility can be grasped. Further, by the improvement of the output formats, the transfer to the books as obligated to write is possible. From the above reason, a personal computer is practically applicable with the management system and also leads to labor saving in RI management personnel. (Mori, K.)

  20. Neutrino number of the universe

    International Nuclear Information System (INIS)

    Kolb, E.W.

    1981-01-01

    The influence of grand unified theories on the lepton number of the universe is reviewed. A scenario is presented for the generation of a large (>> 1) lepton number and a small (<< 1) baryon number. 15 references