WorldWideScience

Sample records for personal identification numbers

  1. Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

    Directory of Open Access Journals (Sweden)

    Mun-Kyu Lee

    2016-01-01

    Full Text Available Passwords and personal identification numbers (PINs are convenient and ubiquitous, but they are quite vulnerable to attackers who stand near the user (“shoulder-surfers”. This problem may be partially resolved by changing the user interface, but previous solutions of this kind still give shoulder-surfing attackers a significant advantage over brute force search. This paper provides a novel solution based on three dimensions, particularly suitable for glasses-free three-dimensional (3D displays found in many smartphones and handheld game consoles. A user at the “3D spot” may log in easily, while nearby shoulder-surfers gain no advantage. A detailed experimental usability analysis is performed to demonstrate the effectiveness of the proposed scheme in comparison to the existing methods.

  2. Person identification from aerial footage by a remote-controlled drone.

    Science.gov (United States)

    Bindemann, Markus; Fysh, Matthew C; Sage, Sophie S K; Douglas, Kristina; Tummon, Hannah M

    2017-10-19

    Remote-controlled aerial drones (or unmanned aerial vehicles; UAVs) are employed for surveillance by the military and police, which suggests that drone-captured footage might provide sufficient information for person identification. This study demonstrates that person identification from drone-captured images is poor when targets are unfamiliar (Experiment 1), when targets are familiar and the number of possible identities is restricted by context (Experiment 2), and when moving footage is employed (Experiment 3). Person information such as sex, race and age is also difficult to access from drone-captured footage (Experiment 4). These findings suggest that such footage provides a particularly poor medium for person identification. This is likely to reflect the sub-optimal quality of such footage, which is subject to factors such as the height and velocity at which drones fly, viewing distance, unfavourable vantage points, and ambient conditions.

  3. BIFOCAL STEREO FOR MULTIPATH PERSON RE-IDENTIFICATION

    Directory of Open Access Journals (Sweden)

    G. Blott

    2017-11-01

    Full Text Available This work presents an approach for the task of person re-identification by exploiting bifocal stereo cameras. Present monocular person re-identification approaches show a decreasing working distance, when increasing the image resolution to obtain a higher reidentification performance. We propose a novel 3D multipath bifocal approach, containing a rectilinear lens with larger focal length for long range distances and a fish eye lens of a smaller focal length for the near range. The person re-identification performance is at least on par with 2D re-identification approaches but the working distance of the approach is increased and on average 10% more re-identification performance can be achieved in the overlapping field of view compared to a single camera. In addition, the 3D information is exploited from the overlapping field of view to solve potential 2D ambiguities.

  4. Adding Personality to Gifted Identification: Relationships among Traditional and Personality-Based Constructs

    Science.gov (United States)

    Carman, Carol A.

    2011-01-01

    One of the underutilized tools in gifted identification is personality-based measures. A multiple confirmatory factor analysis was utilized to examine the relationships between traditional identification methods and personality-based measures. The pattern of correlations indicated this model could be measuring two constructs, one related to…

  5. Fuel number identification method and device

    International Nuclear Information System (INIS)

    Doi, Takami; Seno, Makoto; Kikuchi, Takashi; Sakamoto, Hiromi; Takahashi, Masaki; Tanaka, Keiji.

    1997-01-01

    The present invention provides a method of and a device for automatically identifying fuel numbers impressed on fuel assemblies disposed in a fuel reprocessing facility, power plant and a reactor core at a high speed and at a high identification rate. Namely, three or more character images are photographed for one fuel assembly as an object of the identification under different illumination conditions. As a result, different character images by the number of the illumination directions can be obtained for identical impressed characters. Learning on a neural network system is applied to the images of all of the characters impressed on the fuel assembly obtained under illumination of predetermined directions. Then, result of the identification by the number of the illumination directions can be obtained for each of the characters as an object of the identification. As a result, since the result of the identification is determined based on a theory of decision of majority, highly automatic identification can be realized. (I.S.)

  6. 33 CFR 181.29 - Hull identification number display.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification number... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.29 Hull identification number display. Two identical hull identification numbers are required to be displayed on each...

  7. 33 CFR 181.25 - Hull identification number format.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification number format... (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.25 Hull identification number format. Each of the hull identification numbers required by § 181.23 must consist of twelve...

  8. [Personal identification with biometric and genetic methods].

    Science.gov (United States)

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  9. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  10. 19 CFR 24.5 - Filing identification number.

    Science.gov (United States)

    2010-04-01

    ... TREASURY CUSTOMS FINANCIAL AND ACCOUNTING PROCEDURE § 24.5 Filing identification number. (a) Generally..., the Social Security number. (2) If neither an Internal Revenue Service employer identification number nor a Social Security number has been assigned, the word “None” shall be written on the line provided...

  11. Personal identification and sex determination using cheiloscopy

    Directory of Open Access Journals (Sweden)

    Ravindra Naik Gugulothu

    2015-01-01

    Full Text Available Introduction: Identification of an individual is a prerequisite for certification of death and for personal, social, and legal reasons. The study of lip prints (cheiloscopy was thought of as a method of identification of a person. It is safe to assume that cheiloscopy, in its present stage of development, has become a means of criminal identification dealing with lip prints. Aims and Objectives: To evaluate the lip prints of different individuals in various parts of the lip, to find out the incidence of any particular pattern in relation to specific gender, to ascertain the authenticity of lip prints as a tool for identification of an individual and establish its evidentiary value. Materials and Methods: The study was conducted on 500 subjects, which included 250 males (4 twins and 250 females, in the age group of 18-30 years. After application of lipstick evenly, the lip print of each subject was obtained on a simple bond paper. The lip prints of each individual were scanned using an image scanner set at a resolution of 600 dpi for better interpretation. Results: We had correctly matched the gender of 487 individuals out of 500 samples taken. We also found that no lip prints were similar among the 500 subjects and even in twins. Interpretation and Conclusion: Along with other traditional methods, cheiloscopy can also serve as a very important tool in the identification of a person based on the characteristic arrangement of lines and grooves appearing on the red portion of the lips. It can be used for sex determination and personal identification for forensic purposes.

  12. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Abstract. Reliable person identification is a key factor for any safety measure. Unlike other biometrics such as the palm, retina, gait, face and fingerprints, the characteristic of the iris is stable in a person's lifetime. Iris patterns are chaotically distributed and well suited for recognizing persons throughout their lifetime with.

  13. 33 CFR 181.23 - Hull identification numbers required.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hull identification numbers... SECURITY (CONTINUED) BOATING SAFETY MANUFACTURER REQUIREMENTS Identification of Boats § 181.23 Hull... identify each boat produced or imported with two hull identification numbers that meet the requirements of...

  14. Person Re-Identification by Camera Correlation Aware Feature Augmentation.

    Science.gov (United States)

    Chen, Ying-Cong; Zhu, Xiatian; Zheng, Wei-Shi; Lai, Jian-Huang

    2018-02-01

    The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. While a large number of distance metric/subspace learning models have been developed for re-id, the cross-view transformations they learned are view-generic and thus potentially less effective in quantifying the feature distortion inherent to each camera view. Learning view-specific feature transformations for re-id (i.e., view-specific re-id), an under-studied approach, becomes an alternative resort for this problem. In this work, we formulate a novel view-specific person re-identification framework from the feature augmentation point of view, called Camera coR relation Aware Feature augmenTation (CRAFT). Specifically, CRAFT performs cross-view adaptation by automatically measuring camera correlation from cross-view visual data distribution and adaptively conducting feature augmentation to transform the original features into a new adaptive space. Through our augmentation framework, view-generic learning algorithms can be readily generalized to learn and optimize view-specific sub-models whilst simultaneously modelling view-generic discrimination information. Therefore, our framework not only inherits the strength of view-generic model learning but also provides an effective way to take into account view specific characteristics. Our CRAFT framework can be extended to jointly learn view-specific feature transformations for person re-id across a large network with more than two cameras, a largely under-investigated but realistic re-id setting. Additionally, we present a domain-generic deep person appearance representation which is designed particularly to be towards view invariant for facilitating cross-view adaptation by CRAFT. We conducted extensively comparative experiments to validate the superiority and advantages of our proposed framework over state

  15. 78 FR 26244 - Updating of Employer Identification Numbers

    Science.gov (United States)

    2013-05-06

    ... Number, or EIN. Employers are required to know the identity of their responsible party. The amount of...-BK02 Updating of Employer Identification Numbers AGENCY: Internal Revenue Service (IRS), Treasury... assigned an employer identification number (EIN) to provide updated information to the IRS in the manner...

  16. Constraint Patch Matching for Faster Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, it is of great importance toextract very discriminative features in order to distinguishbetween images of different persons captured in differentcamera views. Features can be extracted globally from theentire or parts of the image, or locally from patches. Inaddition......36ms to compute per person....

  17. Processing of Natural Signals like EMG for Person Identification using NUFB-GMM

    OpenAIRE

    Suresh M; P G Krishnamohan; Mallikarjun S Holi

    2014-01-01

    Physiological signals like Electrocardiogram(ECG) and Electroencephalogram(EEG), including deoxyribonucleic acid(DNA) are person specific and distinct for different persons. The motor unit firing pattern, motor unit recruitment order and characteristics of muscle changing from person to person, and therefore Electromyogram (EMG) can be used for person identification. EMG records obtained from a single channel data acquisition system are used to develop person identification system. Non-unifor...

  18. [Factors related to nurses' patient identification behavior and the moderating effect of person-organization value congruence climate within nursing units].

    Science.gov (United States)

    Kim, Young Mee; Kang, Seung Wan; Kim, Se Young

    2014-04-01

    This research was an empirical study designed to identify precursors and interaction effects related to nurses' patient identification behavior. A multilevel analysis methodology was used. A self-report survey was administered to registered nurses (RNs) of a university hospital in South Korea. Of the questionnaires, 1114 were analyzed. The individual-level factors that had a significantly positive association with patient identification behavior were person-organization value congruence, organizational commitment, occupational commitment, tenure at the hospital, and tenure at the unit. Significantly negative group-level precursors of patient identification behavior were burnout climate and the number of RNs. Two interaction effects of the person-organization value congruence climate were identified. The first was a group-level moderating effect in which the negative relationship between the number of RNs and patient identification behavior was weaker when the nursing unit's value congruence climate was high. The second was a cross-level moderating effect in which the positive relationship between tenure at the unit and patient identification behavior was weaker when value congruence climate was high. This study simultaneously tested both individual-level and group-level factors that potentially influence patient identification behavior and identified the moderating role of person-organization value congruence climate. Implications of these results are discussed.

  19. Multimodal Person Re-identification Using RGB-D Sensors and a Transient Identification Database

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Moeslund, Thomas B.; Nasrollahi, Kamal

    2013-01-01

    This paper describes a system for person re-identification using RGB-D sensors. The system covers the full flow, from detection of subjects, over contour extraction, to re-identification using soft biometrics. The biometrics in question are part-based color histograms and the subjects height...

  20. Role of forensic odontologist in post mortem person identification

    Directory of Open Access Journals (Sweden)

    Jahagirdar B Pramod

    2012-01-01

    Full Text Available The natural teeth are the most durable organs in the bodies of vertebrates, and humankind′s understanding of their own past and evolution relies heavily upon remnant dental evidence found as fossils. The use of features unique to the human dentition as an aid to personal identification is widely accepted within the forensic field. Comparative dental identifications play a major role in identifying the victims of violence, disaster or other mass tragedies. The comparison of ante-mortem and postmortem dental records to determine human identity has long been established. Indeed, it is still a major identification method in criminal investigations, mass disasters, grossly decomposed or traumatized bodies, and in other situations where visual identification is neither possible nor desirable. This article has comprehensively described some of the methods, and additional factors aiding in postmortem person identification.

  1. Late Fusion in Part-based Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, the purpose is to match persons across, typically, non-overlapping cameras. This introduces challenges such as occlusion and changes in view and light- ing. In order to overcome these challenges, discriminative features are extracted and used in combination with a su...

  2. Multi-patch matching for person re-identification

    Science.gov (United States)

    Labidi, Hocine; Luo, Sen-Lin; Boubekeur, Mohamed B.; Benlefki, Tarek

    2015-08-01

    Recognizing a target object across non-overlapping distributed cameras is known in the computer vision community as the problem of person re-identification. In this paper, a multi-patch matching method for person reidentification is presented. Starting from the assumption that: the appearance (clothes) of a person does not change during the time of passing in different cameras field of view , which means the regions with the same color in target image will be identical while crossing cameras. First, we extract distinctive features in the training procedure, where each image target is devised into small patches, the SIFT features and LAB color histograms are computed for each patch. Then we use the KNN approach to detect group of patches with high similarity in the target image and then we use a bi-directional weighted group matching mechanism for the re-identification. Experiments on a challenging VIPeR dataset show that the performances of the proposed method outperform several baselines and state of the art approaches.

  3. Multimodal Neural Network for Overhead Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Krogh, Benjamin

    2017-01-01

    Person re-identification is a topic which has potential to be used for applications within forensics, flow analysis and queue monitoring. It is the process of matching persons across two or more camera views, most often by extracting colour and texture based hand-crafted features, to identify...

  4. Unique Physician Identification Number (UPIN) Directory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Unique Physician Identification Number (UPIN) Directory contains selected information on physicians, doctors of Osteopathy, limited licensed practitioners and...

  5. 24 CFR 200.6 - Employer identification and social security numbers.

    Science.gov (United States)

    2010-04-01

    ... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and... security numbers. 200.6 Section 200.6 Housing and Urban Development Regulations Relating to Housing and...

  6. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  7. 77 FR 59575 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2012-0843] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Request for public comments... requirement to indicate a boat's model year as part of the 12-character Hull Identification Number (HIN...

  8. Fuel number identification method and device therefor

    International Nuclear Information System (INIS)

    Doi, Takami; Seno, Makoto; Tanaka, Keiji

    1998-01-01

    The present invention provides a method of and a device for automatically identifying the number on the upper surface of a fuel of a fuel assembly in a PWR type reactor. Namely, the number on the upper surface of the fuel assembly of the PWR is not arranged in a row, but indent letters are dispersed to predetermined positions of the surface to be indented. Accordingly, the identification of letters is difficult. In the present invention, the letters are identified by the following procedures. Procedure (1): the letters are detected while having a corner portion of the upper surface of a fuel assembly where the number is indented as characteristic points. A procedure (2): a letter region is determined to a relative position based on the characteristic points while determining indent letters having the same direction as one group. A procedure (3): a letter identification treatment is applied to the letter images in the above-mentioned letter region to identify them. A neural network is used for the letter identification treatment. (N.H.)

  9. Retrival experience as an accurate indicator of person identification in line-ups

    Directory of Open Access Journals (Sweden)

    María José Contreras

    2011-07-01

    Full Text Available Responses in eyewitness identification of a person in a line-up may be based on two types of recovery experiences, remember and know experiences. Remember responses involve eyewitness identification of the target person as an episodic memory task, because it implies retrieving information about the target person in the place and at the time of the event. Know responses, in contrast, engage recognition based on familiarity or perceptual facilitation, that is, as a semantic memory task. To explore the relation between retrieval experiences and recognition accuracy, 86 participants took part in a recognition task with two conditions: one with an interpolated target absent line-up and the other only with the target present line-up. Accuracy of recognition and retrieval experience was measured. The results showed that, having previously participated in a target-absent line-up, increased omissions, while the number of hits decreased. Furthermore, participants’ know responses were associated to false recognition, whilst remember responses were associated to hits in recognition. Thus, asking eyewitnesses to inform about the kind of retrieval experience in which they based their recognition responses, may serve as a reliable indicator of accuracy in recognition. Future studies are needed to investigate whether this is also the case in natural settings.

  10. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

    Directory of Open Access Journals (Sweden)

    Atul S. CHAUDHARI

    2014-01-01

    Full Text Available Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, iris or behavioral (e.g., gait, signature characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and its extensive use in forensics. Fingerprint is reliable biometric characteristic as it is unique and persistence. Fingerprint is the pattern of ridges and valleys on the surface of fingertip. However, recognizing fingerprints in poor quality images is still a very complex job, so the fingerprint image must be preprocessed before matching. It is very difficult to extract fingerprint features directly from gray scale fingerprint image. In this paper we have proposed the system which uses minutiae based matching algorithm for fingerprint identification. There are three main phases in proposed algorithm. First phase enhance the input fingerprint image by preprocessing it. The enhanced fingerprint image is converted into thinned binary image and then minutiae are extracted by using Crossing Number Concept in second phase. Third stage compares input fingerprint image (after preprocessing and minutiae extraction with fingerprint images enrolled in database and makes decision whether the input fingerprint is matched with the fingerprint stored in database or not.

  11. The role of patient personality in the identification of depression in older primary care patients.

    Science.gov (United States)

    McCray, Laura W; Bogner, Hillary R; Sammel, Mary D; Gallo, Joseph J

    2007-11-01

    Our aim was to evaluate whether personality factors significantly contribute to the identification of depression in older primary care patients, even after controlling for depressive symptoms. We examined the association between personality factors and the identification of depression among 318 older adults who participated in the Spectrum study. High neuroticism (unadjusted Odds Ratio (OR) 2.36, 95% Confidence Interval (CI) [1.42, 3.93]) and low extraversion (adjusted OR 2.24, CI [1.26, 4.00]) were associated with physician identification of depression. Persons with high conscientiousness were less likely to be identified as depressed by the doctor (adjusted OR 0.45, CI [0.22, 0.91]). Personality factors influence the identification of depression among older persons in primary care over and above the relationship of depressive symptoms with physician identification. Knowledge of personality may influence the diagnosis and treatment of depression in primary care. Copyright 2007 John Wiley & Sons, Ltd.

  12. An automated procedure for identification of a person using gait analysis

    Directory of Open Access Journals (Sweden)

    Alena Galajdová

    2016-10-01

    Full Text Available Different biometric methods are available for identification purpose of a person. The most commonly used are fingerprints, but there are also other biometric methods such as voice, morphology of ears, structure of iris and so on. In some cases, it is required to identify a person according to his/her biomechanical parameters or even his/her gait pattern. Gait is an outstanding biometric behavioural characteristic that is not widely used yet for identification purposes because efficient and proven automated processes are not yet available. Several systems and gait pattern databases have been developed for rapid evaluation and processing of gait. This article describes an original automated evaluation procedure of gait pattern and identification of unique gait parameters for automatic identification purposes.

  13. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  14. 33 CFR 101.515 - TWIC/Personal Identification.

    Science.gov (United States)

    2010-07-01

    ....515 Section 101.515 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Other Provisions § 101.515 TWIC/Personal Identification. (a... TWIC must allow his or her TWIC to be read by a reader and must submit his or her reference biometric...

  15. European Unique Hull Identification Number for Inland Navigation

    Directory of Open Access Journals (Sweden)

    Ivica Ružić

    2006-03-01

    Full Text Available To enable efficient management of inland navigation processes,specialized information systems should be developedthrough the application of modern information and communicationtechnology (ICT. For this purpose, individual Europeanwaterway and port authorities have developed their ownlocal information systems and databases. Due to the non-conformityof these databases, their integration at the Europeanlevel is confronted with selious problems (COMPRIS, 2003.One of the major problems is the lack of a common Europeanunique identification number for inland barges. For this reason,in some locally managed databases several different identificationnumbers are attributed to one and the same inlandbarge or certain identification numbers are not available. Thesame problem occurs in the communication between waterwayautholities and between waterway and port authorities. Therefore,a unique identification number for all floating objects onthe European waterways should be introduced. At the momentthere are only two official numbers for vessels. The first, the!MO number, introduced in 1978, is only used by maritimevessels. The second, the OFS number (Official Ship Number,is used only for vessels that have a Rhine patent (issued by theCCNR. The OFS number cannot satisfy all the requirementsof RIS Directive 2005/44/EC and the amendment to Directive82/714/EEC on technical requirements for inland navigationvessels in the enlarged European Union. The fact is that only20% of the ranges of codes are reserved for the non-Rhinecountries. A special Electronic Reporting International group(ER! was appointed to formulate a new system for uniqueidentification of inland vessels and also define a databasemodel for vessel characteristics. The initial suggestion of ERIwas to add one character in front of the OFS number in orderto increase its coding capacity. The intention was to make asfew as possible differences/modifications to the system currentlyused under the regime of

  16. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  17. 33 CFR 181.27 - Information displayed near hull identification number.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Information displayed near hull... displayed near hull identification number. With the exception of the characters “US-”, which constitute the... the 12-character hull identification number (HIN), that information must be separated from the HIN by...

  18. Identification of serial number on bank card using recurrent neural network

    Science.gov (United States)

    Liu, Li; Huang, Linlin; Xue, Jian

    2018-04-01

    Identification of serial number on bank card has many applications. Due to the different number printing mode, complex background, distortion in shape, etc., it is quite challenging to achieve high identification accuracy. In this paper, we propose a method using Normalization-Cooperated Gradient Feature (NCGF) and Recurrent Neural Network (RNN) based on Long Short-Term Memory (LSTM) for serial number identification. The NCGF maps the gradient direction elements of original image to direction planes such that the RNN with direction planes as input can recognize numbers more accurately. Taking the advantages of NCGF and RNN, we get 90%digit string recognition accuracy.

  19. The cognitive neuroscience of person identification.

    Science.gov (United States)

    Biederman, Irving; Shilowich, Bryan E; Herald, Sarah B; Margalit, Eshed; Maarek, Rafael; Meschke, Emily X; Hacker, Catrina M

    2018-02-14

    We compare and contrast five differences between person identification by voice and face. 1. There is little or no cost when a familiar face is to be recognized from an unrestricted set of possible faces, even at Rapid Serial Visual Presentation (RSVP) rates, but the accuracy of familiar voice recognition declines precipitously when the set of possible speakers is increased from one to a mere handful. 2. Whereas deficits in face recognition are typically perceptual in origin, those with normal perception of voices can manifest severe deficits in their identification. 3. Congenital prosopagnosics (CPros) and congenital phonagnosics (CPhon) are generally unable to imagine familiar faces and voices, respectively. Only in CPros, however, is this deficit a manifestation of a general inability to form visual images of any kind. CPhons report no deficit in imaging non-voice sounds. 4. The prevalence of CPhons of 3.2% is somewhat higher than the reported prevalence of approximately 2.0% for CPros in the population. There is evidence that CPhon represents a distinct condition statistically and not just normal variation. 5. Face and voice recognition proficiency are uncorrelated rather than reflecting limitations of a general capacity for person individuation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Attention in Multimodal Neural Networks for Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Krogh, Benjamin; Nasrollahi, Kamal

    2018-01-01

    In spite of increasing interest from the research commu- nity, person re-identification remains an unsolved problem. Correctly deciding on a true match by comparing images of a person, captured by several cameras, requires extrac- tion of discriminative features to counter challenges...... such as changes in lighting, viewpoint and occlusion. Besides de- vising novel feature descriptors, the setup can be changed to capture persons from an overhead viewpoint rather than a horizontal. Furthermore, additional modalities can be considered that are not affected by similar environmental changes as RGB...

  1. Denture identification using unique identification authority of India barcode

    OpenAIRE

    Sudhindra Mahoorkar; Anoop Jain

    2013-01-01

    Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.

  2. Denture identification using unique identification authority of India barcode.

    Science.gov (United States)

    Mahoorkar, Sudhindra; Jain, Anoop

    2013-01-01

    Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.

  3. Identification of Bodies by Unique Serial Numbers on Implanted Medical Devices.

    Science.gov (United States)

    Blessing, Melissa M; Lin, Peter T

    2018-05-01

    Visual identification is the most common identification method used by medical examiners but is not always possible. Alternative methods include X-ray, fingerprint, or DNA comparison, but these methods require additional resources. Comparison of serial numbers on implanted medical devices is a rapid and definitive method of identification. To assess the practicality of using this method, we reviewed 608 consecutive forensic autopsies performed at a regional medical examiner office. Of these, 56 cases required an alternative method of identification due to decomposition (n = 35), gunshot wound (n = 9), blunt trauma (n = 6), or charring (n = 6). Of these 56 cases, eight (14.3%) were known to have an implanted medical device. Of these eight cases, five (63%) could be positively identified by comparing serial numbers. If an implanted medical device is known to be present, and medical records are available, identification by medical device serial number should be a first-line method. © 2017 American Academy of Forensic Sciences.

  4. A Study of Hand Back Skin Texture Patterns for Personal Identification and Gender Classification

    Directory of Open Access Journals (Sweden)

    Jin Xie

    2012-06-01

    Full Text Available Human hand back skin texture (HBST is often consistent for a person and distinctive from person to person. In this paper, we study the HBST pattern recognition problem with applications to personal identification and gender classification. A specially designed system is developed to capture HBST images, and an HBST image database was established, which consists of 1,920 images from 80 persons (160 hands. An efficient texton learning based method is then presented to classify the HBST patterns. First, textons are learned in the space of filter bank responses from a set of training images using the -minimization based sparse representation (SR technique. Then, under the SR framework, we represent the feature vector at each pixel over the learned dictionary to construct a representation coefficient histogram. Finally, the coefficient histogram is used as skin texture feature for classification. Experiments on personal identification and gender classification are performed by using the established HBST database. The results show that HBST can be used to assist human identification and gender classification.

  5. Ensemble of different approaches for a reliable person re-identification system

    Directory of Open Access Journals (Sweden)

    Loris Nanni

    2016-07-01

    Full Text Available An ensemble of approaches for reliable person re-identification is proposed in this paper. The proposed ensemble is built combining widely used person re-identification systems using different color spaces and some variants of state-of-the-art approaches that are proposed in this paper. Different descriptors are tested, and both texture and color features are extracted from the images; then the different descriptors are compared using different distance measures (e.g., the Euclidean distance, angle, and the Jeffrey distance. To improve performance, a method based on skeleton detection, extracted from the depth map, is also applied when the depth map is available. The proposed ensemble is validated on three widely used datasets (CAVIAR4REID, IAS, and VIPeR, keeping the same parameter set of each approach constant across all tests to avoid overfitting and to demonstrate that the proposed system can be considered a general-purpose person re-identification system. Our experimental results show that the proposed system offers significant improvements over baseline approaches. The source code used for the approaches tested in this paper will be available at https://www.dei.unipd.it/node/2357 and http://robotics.dei.unipd.it/reid/.

  6. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  7. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  8. 33 CFR 187.321 - What are the hull identification number (HIN) provisions?

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false What are the hull identification number (HIN) provisions? 187.321 Section 187.321 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... Vessel Titling Systems § 187.321 What are the hull identification number (HIN) provisions? A State must...

  9. 77 FR 15004 - Updating of Employer Identification Numbers

    Science.gov (United States)

    2012-03-14

    ... operation, maintenance, and purchase of services to provide information. The collection of information in... Identification Number. The IRS accepts applications for EINs electronically and by telephone, facsimile, or mail... taxes, Gift taxes, Income taxes, Penalties, Reporting and recordkeeping requirements. Proposed...

  10. Personal Identification by Keystroke Dynamics in Japanese Free Text Typing

    Science.gov (United States)

    Samura, Toshiharu; Nishimura, Haruhiko

    Biometrics is classified into verification and identification. Many researchers on the keystroke dynamics have treated the verification of a fixed short password which is used for the user login. In this research, we pay attention to the identification and investigate several characteristics of the keystroke dynamics in Japanese free text typing. We developed Web-based typing software in order to collect the keystroke data on the Local Area Network and performed experiments on a total of 112 subjects, from which three groups of typing level, the beginner's level and above, the normal level and above and the middle level and above were constructed. Based on the identification methods by the weighted Euclid distance and the neural network for the extracted feature indexes in Japanese texts, we evaluated identification performances for the three groups. As a result, high accuracy of personal identification was confirmed in both methods, in proportion to the typing level of the group.

  11. Personal identification based on blood vessels of retinal fundus images

    Science.gov (United States)

    Fukuta, Keisuke; Nakagawa, Toshiaki; Hayashi, Yoshinori; Hatanaka, Yuji; Hara, Takeshi; Fujita, Hiroshi

    2008-03-01

    Biometric technique has been implemented instead of conventional identification methods such as password in computer, automatic teller machine (ATM), and entrance and exit management system. We propose a personal identification (PI) system using color retinal fundus images which are unique to each individual. The proposed procedure for identification is based on comparison of an input fundus image with reference fundus images in the database. In the first step, registration between the input image and the reference image is performed. The step includes translational and rotational movement. The PI is based on the measure of similarity between blood vessel images generated from the input and reference images. The similarity measure is defined as the cross-correlation coefficient calculated from the pixel values. When the similarity is greater than a predetermined threshold, the input image is identified. This means both the input and the reference images are associated to the same person. Four hundred sixty-two fundus images including forty-one same-person's image pairs were used for the estimation of the proposed technique. The false rejection rate and the false acceptance rate were 9.9×10 -5% and 4.3×10 -5%, respectively. The results indicate that the proposed method has a higher performance than other biometrics except for DNA. To be used for practical application in the public, the device which can take retinal fundus images easily is needed. The proposed method is applied to not only the PI but also the system which warns about misfiling of fundus images in medical facilities.

  12. A person is not a number: discourse involvement in subject-verb agreement computation.

    Science.gov (United States)

    Mancini, Simona; Molinaro, Nicola; Rizzi, Luigi; Carreiras, Manuel

    2011-09-02

    Agreement is a very important mechanism for language processing. Mainstream psycholinguistic research on subject-verb agreement processing has emphasized the purely formal and encapsulated nature of this phenomenon, positing an equivalent access to person and number features. However, person and number are intrinsically different, because person conveys extra-syntactic information concerning the participants in the speech act. To test the person-number dissociation hypothesis we investigated the neural correlates of subject-verb agreement in Spanish, using person and number violations. While number agreement violations produced a left-anterior negativity followed by a P600 with a posterior distribution, the negativity elicited by person anomalies had a centro-posterior maximum and was followed by a P600 effect that was frontally distributed in the early phase and posteriorly distributed in the late phase. These data reveal that the parser is differentially sensitive to the two features and that it deals with the two anomalies by adopting different strategies, due to the different levels of analysis affected by the person and number violations. Copyright © 2011 Elsevier B.V. All rights reserved.

  13. Targeted next-generation sequencing at copy-number breakpoints for personalized analysis of rearranged ends in solid tumors.

    Directory of Open Access Journals (Sweden)

    Hyun-Kyoung Kim

    Full Text Available BACKGROUND: The concept of the utilization of rearranged ends for development of personalized biomarkers has attracted much attention owing to its clinical applicability. Although targeted next-generation sequencing (NGS for recurrent rearrangements has been successful in hematologic malignancies, its application to solid tumors is problematic due to the paucity of recurrent translocations. However, copy-number breakpoints (CNBs, which are abundant in solid tumors, can be utilized for identification of rearranged ends. METHOD: As a proof of concept, we performed targeted next-generation sequencing at copy-number breakpoints (TNGS-CNB in nine colon cancer cases including seven primary cancers and two cell lines, COLO205 and SW620. For deduction of CNBs, we developed a novel competitive single-nucleotide polymorphism (cSNP microarray method entailing CNB-region refinement by competitor DNA. RESULT: Using TNGS-CNB, 19 specific rearrangements out of 91 CNBs (20.9% were identified, and two polymerase chain reaction (PCR-amplifiable rearrangements were obtained in six cases (66.7%. And significantly, TNGS-CNB, with its high positive identification rate (82.6% of PCR-amplifiable rearrangements at candidate sites (19/23, just from filtering of aligned sequences, requires little effort for validation. CONCLUSION: Our results indicate that TNGS-CNB, with its utility for identification of rearrangements in solid tumors, can be successfully applied in the clinical laboratory for cancer-relapse and therapy-response monitoring.

  14. Targeted next-generation sequencing at copy-number breakpoints for personalized analysis of rearranged ends in solid tumors.

    Science.gov (United States)

    Kim, Hyun-Kyoung; Park, Won Cheol; Lee, Kwang Man; Hwang, Hai-Li; Park, Seong-Yeol; Sorn, Sungbin; Chandra, Vishal; Kim, Kwang Gi; Yoon, Woong-Bae; Bae, Joon Seol; Shin, Hyoung Doo; Shin, Jong-Yeon; Seoh, Ju-Young; Kim, Jong-Il; Hong, Kyeong-Man

    2014-01-01

    The concept of the utilization of rearranged ends for development of personalized biomarkers has attracted much attention owing to its clinical applicability. Although targeted next-generation sequencing (NGS) for recurrent rearrangements has been successful in hematologic malignancies, its application to solid tumors is problematic due to the paucity of recurrent translocations. However, copy-number breakpoints (CNBs), which are abundant in solid tumors, can be utilized for identification of rearranged ends. As a proof of concept, we performed targeted next-generation sequencing at copy-number breakpoints (TNGS-CNB) in nine colon cancer cases including seven primary cancers and two cell lines, COLO205 and SW620. For deduction of CNBs, we developed a novel competitive single-nucleotide polymorphism (cSNP) microarray method entailing CNB-region refinement by competitor DNA. Using TNGS-CNB, 19 specific rearrangements out of 91 CNBs (20.9%) were identified, and two polymerase chain reaction (PCR)-amplifiable rearrangements were obtained in six cases (66.7%). And significantly, TNGS-CNB, with its high positive identification rate (82.6%) of PCR-amplifiable rearrangements at candidate sites (19/23), just from filtering of aligned sequences, requires little effort for validation. Our results indicate that TNGS-CNB, with its utility for identification of rearrangements in solid tumors, can be successfully applied in the clinical laboratory for cancer-relapse and therapy-response monitoring.

  15. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  16. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  17. Identification of persons entering through the door from the accelerometers data

    OpenAIRE

    Vodopivec, Tadej

    2013-01-01

    This thesis presents a system for automatic identification of a person who walks through a door based on the information gathered with acceleration sensors, which are mounted on the door. The proccedure for automatic identification consists of four steps. In the first step, data acquisition and coordinate system rotation is performed. Coordinate system rotation is needed in order to match the direction of measured accelerations with the direction of components of the forces acting on the door...

  18. 75 FR 25137 - Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report...

    Science.gov (United States)

    2010-05-07

    ...-2003-14963] RIN 1625-AB45 Changes to Standard Numbering System, Vessel Identification System, and... System (SNS), the Vessel Identification System (VIS), and casualty reporting; require validation of... Standard Numbering System U.S.C. United States Code VIS Vessel Identification System III. Background Coast...

  19. Person re-identification using height-based gait in colour depth camera

    NARCIS (Netherlands)

    John, V.; Englebienne, G.; Kröse, B.

    2013-01-01

    We address the problem of person re-identification in colour-depth camera using the height temporal information of people. Our proposed gait-based feature corresponds to the frequency response of the height temporal information. We demonstrate that the discriminative periodic motion associated with

  20. Identification during imposed change: the roles of personal values, type of change, and anxiety.

    Science.gov (United States)

    Sverdlik, Noga; Oreg, Shaul

    2015-06-01

    Using a person-situation perspective, we explain what happens to individuals' identification with a collective in the context of a change. We propose that given the anxiety that often emerges during change, individuals' personal values (conservation and openness to change) interact with type of change (imposed vs. voluntary) in predicting identification following change. In a pilot, longitudinal field study (N = 61, 67% female) of an imposed university campus relocation, we measured employees' values and identification with the university before and several months after the relocation. In two lab experiments (Study 1: N = 104, 91.3% female; Study 2: N = 113, 75.2% female), we manipulated a change to be either imposed or voluntary and compared the relationships between values and identification across types of change. In Study 2, we also measured anxiety from the change. When change was imposed (all three studies), but not when voluntary (Studies 1 and 2), individuals' conservation was positively, and openness negatively, related to individuals' post-change identification. The effects emerged only for individuals who experienced change-related anxiety (Study 2). Our findings demonstrate that individuals' identification with a changing collective depends on the amount of anxiety change elicits and on the particular combination of their values and type of change. © 2014 Wiley Periodicals, Inc.

  1. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  2. Evaluating common de-identification heuristics for personal health information.

    Science.gov (United States)

    El Emam, Khaled; Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael

    2006-11-21

    With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here. For professional subpopulations with published

  3. Unaware person recognition from the body when face identification fails.

    Science.gov (United States)

    Rice, Allyson; Phillips, P Jonathon; Natu, Vaidehi; An, Xiaobo; O'Toole, Alice J

    2013-11-01

    How does one recognize a person when face identification fails? Here, we show that people rely on the body but are unaware of doing so. State-of-the-art face-recognition algorithms were used to select images of people with almost no useful identity information in the face. Recognition of the face alone in these cases was near chance level, but recognition of the person was accurate. Accuracy in identifying the person without the face was identical to that in identifying the whole person. Paradoxically, people reported relying heavily on facial features over noninternal face and body features in making their identity decisions. Eye movements indicated otherwise, with gaze duration and fixations shifting adaptively toward the body and away from the face when the body was a better indicator of identity than the face. This shift occurred with no cost to accuracy or response time. Human identity processing may be partially inaccessible to conscious awareness.

  4. 40 CFR 91.113 - Requirement of certification-emission control information label and engine identification number.

    Science.gov (United States)

    2010-07-01

    ... control information label and engine identification number. 91.113 Section 91.113 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM... certification—emission control information label and engine identification number. (a) The engine manufacturer...

  5. How do brand personality, identification, and relationship length drive loyalty in sports?

    OpenAIRE

    Karjaluoto, Heikki; Munnukka, Juha; Salmi, Milja

    2016-01-01

    Purpose – The purpose of this paper is to extend brand identification theory to the sports team context by testing the direct and indirect effects of a sports team’s personality, sports fans’ identification with the team, and the effect of the length of fans’ relationship with a team on their loyalty to it. Design/methodology/approach – The authors conducted a quantitative study among ice hockey fans of one Finnish hockey team before play-off games. Data came from an online question...

  6. Tri-modal Person Re-identification with RGB, Depth and Thermal Features

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Bahnsen, Chris; Moeslund, Thomas B.

    2013-01-01

    Person re-identification is about recognizing people who have passed by a sensor earlier. Previous work is mainly based on RGB data, but in this work we for the first time present a system where we combine RGB, depth, and thermal data for re-identification purposes. First, from each of the three...... modalities, we obtain some particular features: from RGB data, we model color information from different regions of the body, from depth data, we compute different soft body biometrics, and from thermal data, we extract local structural information. Then, the three information types are combined in a joined...

  7. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  8. 26 CFR 31.3406(j)-1 - Taxpayer Identification Number (TIN) matching program.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 15 2010-04-01 2010-04-01 false Taxpayer Identification Number (TIN) matching program. 31.3406(j)-1 Section 31.3406(j)-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE... COLLECTION OF INCOME TAX AT SOURCE Collection of Income Tax at Source § 31.3406(j)-1 Taxpayer Identification...

  9. Management of radiation sources and personal dosimeters based on the optical identification using two-dimensional barcode

    International Nuclear Information System (INIS)

    Takao, Hideaki; Yoshida, Masahiro; Kaneko, Mamoru; Miura, Miwa; Hayashida, Rika; Okumura, Yutaka; Matsuda, Naoki

    2006-01-01

    For accurate and efficient radiation safety management in facilities using radioisotopes, two-dimensional barcode (2-DC) was applied to the optical identification of radiation sources and personal dosimeters. The mobile personal computer (PC) equipped with a barcode reader, which has imported inventory records from the pre-existing radiation management system, enabled us to finish inventory procedures for 170 2-DC-labelled radiation sources in as short as 20min by one person. Identification of 270 personal dosimeters in their monthly replacement procedures also successfully completed within 20 min by incorporating pre-labeled 2-DC to PC installed with inventory records of dosimeters and radiation workers. As equipments and software required for 2-DC are affordable, easy to operate, and potentially expandable, the introduction of 2-DC system may help to establish practically higher level of radiation management. (author)

  10. Personal Identification Based on Vectorcardiogram Derived from Limb Leads Electrocardiogram

    Directory of Open Access Journals (Sweden)

    Jongshill Lee

    2012-01-01

    Full Text Available We propose a new method for personal identification using the derived vectorcardiogram (dVCG, which is derived from the limb leads electrocardiogram (ECG. The dVCG was calculated from the standard limb leads ECG using the precalculated inverse transform matrix. Twenty-one features were extracted from the dVCG, and some or all of these 21 features were used in support vector machine (SVM learning and in tests. The classification accuracy was 99.53%, which is similar to the previous dVCG analysis using the standard 12-lead ECG. Our experimental results show that it is possible to identify a person by features extracted from a dVCG derived from limb leads only. Hence, only three electrodes have to be attached to the person to be identified, which can reduce the effort required to connect electrodes and calculate the dVCG.

  11. How brand personality, brand identification and service quality influence service brand equity

    Directory of Open Access Journals (Sweden)

    Sandra Maria Correia Loureiro

    2014-12-01

    Full Text Available During the past couple of decades, brand equity has emerged as one of the key concepts in marketing. Literature concerned with consumer brand relationship is calling for more studies in order to increase understanding of brand equity dimensions. Therefore, this study aims to contribute to the existing body of knowledge by examining the strength of relational variables on brand equity perceived by consumers. Findings support the proposed model in the service industry revealing that brand loyalty, brand identification, trust, brand personality and brand awareness are the variables that have a greatest impact on brand equity. Thus, this study is the first to measure the strength of assorted relational variables, and variables related with identification and personality on brand equity for brands in the service industry. In this vein, brand managers should be aware of the importance of building a brand regarding the way they communicate the features of the brand.

  12. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban... REQUIREMENTS; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security...

  13. The PDD-MRS : An instrument for identification of autism spectrum disorders in persons with mental retardation

    NARCIS (Netherlands)

    Kraijer, D; de Bildt, A

    The Scale of Pervasive Developmental Disorder in Mentally Retarded Persons (PDD-MRS) is described. The PDD-MRS is a simple classification and screening instrument devised for identification of autistic disorders (of the entire spectrum) in persons with mental retardation from mild to profound

  14. Disaggregating Within- and Between-Person Effects of Social Identification on Subjective and Endocrinological Stress Reactions in a Real-Life Stress Situation.

    Science.gov (United States)

    Ketturat, Charlene; Frisch, Johanna U; Ullrich, Johannes; Häusser, Jan A; van Dick, Rolf; Mojzisch, Andreas

    2016-02-01

    Several experimental and cross-sectional studies have established the stress-buffering effect of social identification, yet few longitudinal studies have been conducted within this area of research. This study is the first to make use of a multilevel approach to disaggregate between- and within-person effects of social identification on subjective and endocrinological stress reactions. Specifically, we conducted a study with 85 prospective students during their 1-day aptitude test for a university sports program. Ad hoc groups were formed, in which students completed several tests in various disciplines together. At four points in time, salivary cortisol, subjective strain, and identification with their group were measured. Results of multilevel analyses show a significant within-person effect of social identification: The more students identified with their group, the less stress they experienced and the lower their cortisol response was. Between-person effects were not significant. Advantages of using multilevel approaches within this field of research are discussed. © 2015 by the Society for Personality and Social Psychology, Inc.

  15. Algorithm for personal identification in distance learning system based on registration of keyboard rhythm

    Science.gov (United States)

    Nikitin, P. V.; Savinov, A. N.; Bazhenov, R. I.; Sivandaev, S. V.

    2018-05-01

    The article describes the method of identifying a person in distance learning systems based on a keyboard rhythm. An algorithm for the organization of access control is proposed, which implements authentication, identification and verification of a person using the keyboard rhythm. Authentication methods based on biometric personal parameters, including those based on the keyboard rhythm, due to the inexistence of biometric characteristics without a particular person, are able to provide an advanced accuracy and inability to refuse authorship and convenience for operators of automated systems, in comparison with other methods of conformity checking. Methods of permanent hidden keyboard monitoring allow detecting the substitution of a student and blocking the key system.

  16. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    Science.gov (United States)

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  17. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    Science.gov (United States)

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  18. Improved Palmprint Identification System

    Directory of Open Access Journals (Sweden)

    Harshala C. Salave

    2015-03-01

    Full Text Available Abstract Generally private information is provided by using passwords or Personal Identification Numbers which is easy to implement but it is very easily stolen or forgotten or hack. In Biometrics for individuals identification uses human physiological which are constant throughout life like palm face DNA iris etc. or behavioral characteristicswhich is not constant in life like voice signature keystroke etc.. But mostly gain more attention to palmprint identification and is becoming more popular technique using for identification and promising alternatives to the traditional password or PIN based authentication techniques. In this paper propose palmprint identification using veins on the palm and fingers. Here use fusion of techniques such as Discrete Wavelet transformDWT Canny Edge Detector Gaussian Filter Principle Component AnalysisPCA.

  19. Blind identification of the number of sub-carriers for orthogonal frequency division multiplexing-based elastic optical networking

    Science.gov (United States)

    Zhao, Lei; Xu, Hengying; Bai, Chenglin

    2018-03-01

    In orthogonal frequency division multiplexing (OFDM)-based elastic optical networking (EON), it is imperative to identify unknown parameters of OFDM-based EON signals quickly, intelligently and robustly. Because the number of sub-carriers determines the size of the sub-carriers spacing and then affects the symbol period of the OFDM and the anti-dispersion capability of the system, the identification of the number of sub-carriers has a profound effect on the identification of other key parameters of the system. In this paper, we proposed a method of number identification for sub-carriers of OFDM-based EON signals with help of high-order cyclic cumulant. The specific fourth-order cyclic cumulant exists only at the location of its sub-carriers frequencies. So the identification of the number of sub-carriers can be implemented by detecting the cyclic-frequencies. The proposed scheme in our study can be divided into three sub-stages, i.e. estimating the spectral range, calculating the high-order cyclic cumulant and identifying the number of sub-carriers. When the optical signal-to-noise ratios (OSNR) varied from 16dB to 22dB, the number of sub-carriers (64-512) was successfully identified in the experiment, and from the statistical point of view, the average identification absolute accuracy (IAAs) exceeded 94%.

  20. Assessment of lip print patterns and its use for personal identification among the populations of Rajnandgaon, Chhattisgarh, India.

    Science.gov (United States)

    Multani, Suraj; Thombre, Vivek; Thombre, Aparna; Surana, Pratik

    2014-09-01

    Personal identification plays an inevitable role in forensic investigation. Lip print is one of the evidences that can be left in the crime scene, which helps in identification purpose. Hence, the present study was undertaken to provide deeper inside view of use of cheiloscopy in personal identification, focusing on sex and age variability of lip print patterns in the population of Rajnandgaon city, Chhattisgarh, India. The cross-sectional study was conducted among 200 (100 males and 100 females) subjects of age 15-55 years, residing in different areas of Rajnandgaon city. The sex of the individual was determined as per the description given by Vahanwala et al. Frequency distribution and Chi-square test were used for data analysis by SPSS 16.0 V software. The most common lip print pattern in entire population was Type I (27.5%). Very highly significant difference was found in the distribution of lip print patterns among males and females in the entire population, group I, and group III, respectively (P prints can be used as one of the important forensic tools for personal identification on the basis of their age and gender variability among the populations.

  1. Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2013-12-01

    Full Text Available Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN. It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs.(see PDF for full technology corner

  2. Assessment of the stability of morphological ECG features and their potential for person verification/identification

    Directory of Open Access Journals (Sweden)

    Matveev Mikhail

    2017-01-01

    Full Text Available This study investigates the potential of a set of ECG morphological features for person verification/identification. The measurements are done over 145 pairs of ECG recordings from healthy subjects, acquired 5 years apart (T1, T2 = T1+5 years. Time, amplitude, area and slope descriptors of the QRS-T pattern are analysed in 4 ECG leads, forming quasi-orthogonal lead system (II&III, V1, V5. The correspondence between feature values in T1 and T2 is verified via factor analysis by principal components extraction method; correlation analysis applied over the measurements in T1 and T2; synthesis of regression equations for prediction of features’ values in T2 based on T1 measurements; and cluster analysis for assessment of the correspondence between measured and predicted feature values. Thus, 11 amplitude descriptors of the QRS complex are highlighted as stable, i.e. keeping their strong correlation (≥0.7 within a certain factor, weak correlation (<0.3 with the features from the remaining factors and presenting high correlation in the two measurement periods that is a sign for their person verification/identification potential. The observed coincidence between feature values measured in T2 and predicted via the designed regression models (r=0.93 suggests about the confidence of person identification via the proposed morphological features.

  3. FPGA Implementation for GMM-Based Speaker Identification

    Directory of Open Access Journals (Sweden)

    Phaklen EhKan

    2011-01-01

    Full Text Available In today's society, highly accurate personal identification systems are required. Passwords or pin numbers can be forgotten or forged and are no longer considered to offer a high level of security. The use of biological features, biometrics, is becoming widely accepted as the next level for security systems. Biometric-based speaker identification is a method of identifying persons from their voice. Speaker-specific characteristics exist in speech signals due to different speakers having different resonances of the vocal tract. These differences can be exploited by extracting feature vectors such as Mel-Frequency Cepstral Coefficients (MFCCs from the speech signal. A well-known statistical modelling process, the Gaussian Mixture Model (GMM, then models the distribution of each speaker's MFCCs in a multidimensional acoustic space. The GMM-based speaker identification system has features that make it promising for hardware acceleration. This paper describes the hardware implementation for classification of a text-independent GMM-based speaker identification system. The aim was to produce a system that can perform simultaneous identification of large numbers of voice streams in real time. This has important potential applications in security and in automated call centre applications. A speedup factor of ninety was achieved compared to a software implementation on a standard PC.

  4. A robust estimate of the number and characteristics of persons released from prison in Australia.

    Science.gov (United States)

    Avery, Alex; Kinner, Stuart A

    2015-08-01

    To estimate the number and characteristics of adults released from prison in Australia. We calculated ratios, stratified by age, sex and Indigenous status, by comparing the number of persons released from prison in New South Wales (NSW), with the number in NSW prisons on 30 June of the corresponding year. These stratified ratios were applied to Australia-wide prison data to estimate the number and characteristics of persons released annually. We estimated that in 2013, 38,576 persons were released from prison in Australia - 25.3% more than the daily prison population. Young people, Indigenous people and women were over-represented among those released. We estimated that 3.69 Indigenous women aged 18-24 were released annually for each equivalent person in prison; and 2.75 non-Indigenous women aged 18-24 were released annually for each equivalent person in prison. The annual 'flow' through Australia's prisons is well in excess of the daily number, but information on those moving through prison systems is not yet publicly available. The characteristics of those released from prison differ meaningfully from those of people in prison. Routine, national reporting of prison separations is critical to informing upscaling and targeting of Throughcare services for this profoundly vulnerable population. © 2015 Public Health Association of Australia.

  5. The Use of Personal Projects Analysis to Enhance Occupational Therapy Goal Identification

    Directory of Open Access Journals (Sweden)

    Mary Egan

    2016-01-01

    Full Text Available Background: Client-centered occupational therapy begins with the identification of personally-relevant patient goals. This study aimed to determine whether the elicitation module of Personal Projects Analysis (PPA could help patients in an acquired brain injury day hospital program identify more meaningful goals than those identified using the Canadian Occupational Performance Measure (COPM alone. Method: Ten patients completed the COPM. They rated the importance of each goal and their confidence that they could attain each goal. During the next session, using the elicitation module of PPA, they identified personal projects just prior to their brain injuries, current personal projects, and future desired personal projects. They were then invited to revise their COPM goals and re-rate them for importance and confidence. Results: Following completion of the elicitation module of PPA, seven participants changed at least one goal. Of the goals that were changed, half were revised to include the mention of another person. There were no significant changes in average goal importance or perceived attainability. Occupational therapists reported that the elicitation module of PPA helped them get to know their patients better and identify potential therapeutic occupations. Discussion: The elicitation module of PPA may help people develop goals that are more embedded in their social contexts.

  6. Enhancing Person Re-identification by Late Fusion of Low-, Mid-, and High-Level Features

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2018-01-01

    Person re-identification is the process of finding people across different cameras. In this process, focus often lies in developing strong feature descriptors or a robust metric learning algorithm. While the two aspects are the most important steps in order to secure a high performance, a less...

  7. Accurate identification of layer number for few-layer WS2 and WSe2 via spectroscopic study.

    Science.gov (United States)

    Li, Yuanzheng; Li, Xinshu; Yu, Tong; Yang, Guochun; Chen, Heyu; Zhang, Cen; Feng, Qiushi; Ma, Jiangang; Liu, Weizhen; Xu, Haiyang; Liu, Yichun; Liu, Xinfeng

    2018-03-23

    Transition metal dichalcogenides (TMDs) with a typical layered structure are highly sensitive to their layer number in optical and electronic properties. Seeking a simple and effective method for layer number identification is very important to low-dimensional TMD samples. Herein, a rapid and accurate layer number identification of few-layer WS 2 and WSe 2 is proposed via locking their photoluminescence (PL) peak-positions. As the layer number of WS 2 /WSe 2 increases, it is found that indirect transition emission is more thickness-sensitive than direct transition emission, and the PL peak-position differences between the indirect and direct transitions can be regarded as fingerprints to identify their layer number. Theoretical calculation confirms that the notable thickness-sensitivity of indirect transition derives from the variations of electron density of states of W atom d-orbitals and chalcogen atom p-orbitals. Besides, the PL peak-position differences between the indirect and direct transitions are almost independent of different insulating substrates. This work not only proposes a new method for layer number identification via PL studies, but also provides a valuable insight into the thickness-dependent optical and electronic properties of W-based TMDs.

  8. A bimodal biometric identification system

    Science.gov (United States)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  9. The role of serotonin in personality inference: tryptophan depletion impairs the identification of neuroticism in the face.

    Science.gov (United States)

    Ward, Robert; Sreenivas, Shubha; Read, Judi; Saunders, Kate E A; Rogers, Robert D

    2017-07-01

    Serotonergic mechanisms mediate the expression of personality traits (such as impulsivity, aggression and anxiety) that are linked to vulnerability to psychological illnesses, and modulate the identification of emotional expressions in the face as well as learning about broader classes of appetitive and aversive signals. Faces with neutral expressions signal a variety of socially relevant information, such that inferences about the big five personality traits, including Neuroticism, Extraversion and Agreeableness, can be accurately made on the basis of emotionally neutral facial photographs. Given the close link between Neuroticism and psychological distress, we investigated the effects of diminished central serotonin activity (achieved by tryptophan depletion) upon the accuracy of 52 healthy (non-clinical) adults' discriminations of personality from facial characteristics. All participants were able to discriminate reliably four of the big five traits. However, the tryptophan-depleted participants were specifically less accurate in discriminating Neuroticism than the matched non-depleted participants. These data suggest that central serotonin activity modulates the identification of not only negative facial emotional expression but also a broader class of signals about personality characteristics linked to psychological distress.

  10. The Use of Personal Identity Numbers in Sweden and Denmark

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  11. Personal suicidality in reception and identification with suicidal film characters.

    Science.gov (United States)

    Till, Benedikt; Vitouch, Peter; Herberth, Arno; Sonneck, Gernot; Niederkrotenthaler, Thomas

    2013-04-01

    The authors investigated the impact of suicidality on identity work during film exposure. Adults with low suicidality (n = 150) watched either It's My Party or The Fire Within, censored versions of these films not depicting the suicide, or the control film that concluded with a non-suicidal death. Baseline suicidality was measured with questionnaires before the movie. Identity work and identification with the protagonist were measured after the movie. Suicidality was directly associated with identity work during film dramas depicting suicide methods. The reception of suicide-related media content seems to partially depend on personal suicidality. Potential implications for suicide prevention are discussed.

  12. Significance of Dental Records in Personal Identification in Forensic Sciences

    Directory of Open Access Journals (Sweden)

    Vagish Kumar L Shanbhag

    2016-01-01

    Full Text Available Forensic odontology is a branch that connects dentistry and the legal profession. One of the members in the forensic investigation team is a dentist. Dentists play an important and significant role in various aspects of the identification of persons in various forensic circumstances. However, several dentists and legal professionals are quite ignorant of this fascinating aspect of forensic odontology. A need was felt to fill this gap. The dental record is a legal document possessed by the dentist and it contains subjective and objective information about the patient. A PubMed search and Google search were done for articles highlighting the importance of dental records in forensic sciences using the key words "forensic odontology, forensic dentistry, forensic dentists, identification, dental records, and dental chart". A total of 42 articles relevant to the title of the article were found and reviewed. The present article highlights the role of dentists in forensic sciences, their possible contributions to forensics, and the various aspects of forensic dentistry, thus bridging the gap of knowledge between the legal and the dental fraternities.

  13. Index case finding facilitates identification and linkage to care of children and young persons living with HIV/AIDS in Malawi.

    Science.gov (United States)

    Ahmed, Saeed; Sabelli, Rachael A; Simon, Katie; Rosenberg, Nora E; Kavuta, Elijah; Harawa, Mwelura; Dick, Spencer; Linzie, Frank; Kazembe, Peter N; Kim, Maria H

    2017-08-01

    Evaluation of a novel index case finding and linkage-to-care programme to identify and link HIV-infected children (1-15 years) and young persons (>15-24 years) to care. HIV-infected patients enrolled in HIV services were screened and those who reported untested household members (index cases) were offered home- or facility-based HIV testing and counselling (HTC) of their household by a community health worker (CHW). HIV-infected household members identified were enrolled in a follow-up programme offering home and facility-based follow-up by CHWs. Of the 1567 patients enrolled in HIV services, 1030 (65.7%) were screened and 461 (44.8%) identified as index cases; 93.5% consented to HIV testing of their households and of those, 279 (64.7%) reported an untested child or young person. CHWs tested 711 children and young persons, newly diagnosed 28 HIV-infected persons (yield 4.0%; 95% CI: 2.7-5.6), and identified an additional two HIV-infected persons not enrolled in care. Of the 30 HIV-infected persons identified, 23 (76.6%) were linked to HIV services; 18 of the 20 eligible for ART (90.0%) were initiated. Median time (IQR) from identification to enrolment into HIV services was 4 days (1-8) and from identification to ART start was 6 days (1-8). Almost half of HIV-infected patients enrolled in treatment services had untested household members, many of whom were children and young persons. Index case finding, coupled with home-based testing and tracked follow-up, is acceptable, feasible and facilitates the identification and timely linkage to care of HIV-infected children and young persons. © 2017 The Authors. Tropical Medicine & International Health Published by John Wiley & Sons Ltd.

  14. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  15. Morphological Variations and Biometrics of Ear: An Aid to Personal Identification.

    Science.gov (United States)

    Verma, Pradhuman; Sandhu, Harpreet Kaur; Verma, Kanika Gupta; Goyal, Sharry; Sudan, Madhu; Ladgotra, Amit

    2016-05-01

    The morphological characteristics and dimensions of external ear vary in different human ethnic races which can be utilized in forensics for personal identification of living or deceased. To determine uniqueness of morphological and biometric variations of both ears for individualization among North East (NE) and North West (NW) subpopulation of India. The study was conducted on randomly selected 80 students, 40 from each subgroup. Nine ear parameters were recorded twice using digital Vernier's caliper by single investigator and two indices (Ear Index and Lobule Index) were calculated for both the ears. Morphological ear shapes and lobule attachment were also noted. Pearson's coefficient correlation test was performed on cross-tabulations to evaluate significant relationship between different variables. Of the total 35% free and 65% attached ear lobes were noted in both population groups. Oval ear shape was most commonly noted followed by triangular, rectangular and round in both populations. On comparing anthropometric measurements of ears in two populations it was found that except the tragus length and lobule index all other values were noted more in NW population. No statistical difference was found in ear and lobular indices of males and females although the left ear index and lobule index were found to be higher than right in both populations except in NW females where right lobule index was recorded more than left. The results obtained can be used in anthropological and forensic sciences for the inclusion and exclusion of persons for identification on the basis of ear variations.

  16. Preschoolers' Person Description and Identification Accuracy: A Comparison of the Simultaneous and Elimination Lineup Procedures

    Science.gov (United States)

    Pozzulo, Joanna D.; Dempsey, Julie; Crescini, Charmagne

    2009-01-01

    Preschoolers' (3- to 6-year-olds) person description and identification abilities were examined using the simultaneous and elimination lineup procedures. Participants (N = 100) were exposed to a 20-minute mask-making session conducted by a female confederate who acted as the mask-making teacher. After a brief delay (20 min), participants were…

  17. Evaluation of 13 short tandem repeated loci for use in personal identification applications

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, H.A.; Caskey, C.T. (Baylor College of Medicine, Houston, TX (United States)); Jin, L.; Zhong, Y.; Chakraborty, R. (Univ. of Texas Graduate School of Biomedical Sciences, Houston, TX (United States))

    1994-07-01

    Personal identification by using DNA typing methodologies has been an issue in the popular and scientific press for several years. The authors present a PCR-based DNA-typing method using 13 unlinked short tandem repeat (STR) loci. Validation of the loci and methodology has been performed to meet standards set by the forensic community and the accrediting organization for parentage testing. Extensive statistical analysis has addressed the issues surrounding the presentation of [open quotes]match[close quotes] statistics. The authors have found STR loci to provide a rapid, sensitive, and reliable method of DNA typing for parentage testing, forensic identification, and medical diagnostics. Valid statistical analysis is generally simpler than similar analysis of RFLP-VNTR results and provides powerful statistical evidence of the low frequency of random multilocus genotype matching. 54 refs., 4 figs., 6 tabs.

  18. Developing a personal computer based expert system for radionuclide identification

    International Nuclear Information System (INIS)

    Aarnio, P.A.; Hakulinen, T.T.

    1990-01-01

    Several expert system development tools are available for personal computers today. We have used one of the LISP-based high end tools for nearly two years in developing an expert system for identification of gamma sources. The system contains a radionuclide database of 2055 nuclides and 48000 gamma transitions with a knowledge base of about sixty rules. This application combines a LISP-based inference engine with database management and relatively heavy numerical calculations performed using C-language. The most important feature needed has been the possibility to use LISP and C together with the more advanced object oriented features of the development tool. Main difficulties have been long response times and the big amount (10-16 MB) of computer memory required

  19. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy

    Directory of Open Access Journals (Sweden)

    Irena Jekova

    2015-01-01

    Full Text Available Traditional means for identity validation (PIN codes, passwords, and physiological and behavioral biometric characteristics (fingerprint, iris, and speech are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (rI, II (rII, calculated from them first principal ECG component (rPCA, linear and nonlinear combinations between rI, rII, and rPCA. For the verification task, the one-to-one scenario is applied and threshold values for rI, rII, and rPCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension has been considered. In addition a common reference PTB dataset (14 healthy individuals with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%.

  20. Use of Frontal Sinus and Nasal Septum Pattern as an Aid in Personal Identification and Determination of Gender: A Radiographic Study.

    Science.gov (United States)

    Verma, Kavita; Nahar, Prashant; Singh, Mohit Pal; Mathur, Hemant; Bhuvaneshwari, S

    2017-01-01

    Personal identification and gender determination of unknown person has a vital importance in forensic investigation. Human skull radiography is a useful tool in human identification in natural disaster, in any accidents such as fire accident and road traffic accident where body remains become degraded or severely destroyed. Present study was performed to evaluate the measurement of frontal sinus, uniqueness of various pattern of nasal septum when combined with frontal sinus observed on posterio anterior cephalogram for sex determination as well as personal identification. A total of 80 individuals, 40 males and 40 females, between the age ranges of 18-30 years were selected. The selected individuals had their Posterio Anterior (PA) cephalogram performed after taking their informed consent. Right and left areas and the maximum height and width of the frontal sinus were determined and septum patterns were evaluated and both patterns were also combined and compared. The radiographs were taken on Xtropan 2000 OPG X-ray machine with cephalography attachment and KODAK CR 7400 digital radiography system. Mean and SD values of the greatest height and width of frontal sinus in male and female patients were thus evaluated. The mean values of the frontal sinus were greater in males and the left area was larger than the right area, based on student's t-test at the 5% level of significance. The combination of Frontal Sinus Patterns and Nasal Septum Patterns (FP+NSP) were assessed and found that there were nine classifiable patterns in 26 (32.5%) individuals (12 males and 14 females), each of which had common representations in more than one individual. Besides these patterns, there were unique unclassifiable patterns in 54 (67.5%) individuals. The present study supports the use of radiographic evaluation of frontal sinus dimensions, frontal sinus patterns, nasal septum deviations and the combination FP+NSP patterns for personal identification and gender determination in

  1. Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination

    Science.gov (United States)

    Bouma, Henri; Borsboom, Sander; den Hollander, Richard J. M.; Landsmeer, Sander H.; Worring, Marcel

    2012-06-01

    The capability to track individuals in CCTV cameras is important for surveillance and forensics alike. However, it is laborious to do over multiple cameras. Therefore, an automated system is desirable. In literature several methods have been proposed, but their robustness against varying viewpoints and illumination is limited. Hence performance in realistic settings is also limited. In this paper, we present a novel method for the automatic re-identification of persons in video from surveillance cameras in a realistic setting. The method is computationally efficient, robust to a wide variety of viewpoints and illumination, simple to implement and it requires no training. We compare the performance of our method to several state-of-the-art methods on a publically available dataset that contains the variety of viewpoints and illumination to allow benchmarking. The results indicate that our method shows good performance and enables a human operator to track persons five times faster.

  2. Large data analysis: automatic visual personal identification in a demography of 1.2 billion persons

    Science.gov (United States)

    Daugman, John

    2014-05-01

    The largest biometric deployment in history is now underway in India, where the Government is enrolling the iris patterns (among other data) of all 1.2 billion citizens. The purpose of the Unique Identification Authority of India (UIDAI) is to ensure fair access to welfare benefits and entitlements, to reduce fraud, and enhance social inclusion. Only a minority of Indian citizens have bank accounts; only 4 percent possess passports; and less than half of all aid money reaches its intended recipients. A person who lacks any means of establishing their identity is excluded from entitlements and does not officially exist; thus the slogan of UIDAI is: To give the poor an identity." This ambitious program enrolls a million people every day, across 36,000 stations run by 83 agencies, with a 3-year completion target for the entire national population. The halfway point was recently passed with more than 600 million persons now enrolled. In order to detect and prevent duplicate identities, every iris pattern that is enrolled is first compared against all others enrolled so far; thus the daily workflow now requires 600 trillion (or 600 million-million) iris cross-comparisons. Avoiding identity collisions (False Matches) requires high biometric entropy, and achieving the tremendous match speed requires phase bit coding. Both of these requirements are being delivered operationally by wavelet methods developed by the author for encoding and comparing iris patterns, which will be the focus of this Large Data Award" presentation.

  3. Identification of persons by means of the Fourier spectra of the optical transmission binary models of the human irises

    Czech Academy of Sciences Publication Activity Database

    Muroň, A.; Koiš, P.; Pospíšil, Jaroslav

    2001-01-01

    Roč. 192, - (2001), s. 161-167 ISSN 0030-4018 Institutional research plan: CEZ:AV0Z1010921 Keywords : human iris * coherent optical Fourier transform * identification of persons Subject RIV: BH - Optics, Masers, Lasers Impact factor: 1.354, year: 2001

  4. Greater number of group identifications is associated with healthier behaviour: Evidence from a Scottish community sample.

    Science.gov (United States)

    Sani, Fabio; Madhok, Vishnu; Norbury, Michael; Dugard, Pat; Wakefield, Juliet R H

    2015-09-01

    This paper investigates the interplay between group identification (i.e., the extent to which one has a sense of belonging to a social group, coupled with a sense of commonality with in-group members) and four types of health behaviour, namely physical exercise, smoking, drinking, and diet. Specifically, we propose a positive relationship between one's number of group identifications and healthy behaviour. This study is based on the Scottish portion of the data obtained for Wave 1 of the two-wave cross-national Health in Groups project. Totally 1,824 patients from five Scottish general practitioner (GP) surgeries completed the Wave 1 questionnaire in their homes. Participants completed measures of group identification, group contact, health behaviours, and demographic variables. Results demonstrate that the greater the number of social groups with which one identifies, the healthier one's behaviour on any of the four health dimensions considered. We believe our results are due to the fact that group identification will generally (1) enhance one's sense of meaning in life, thereby leading one to take more care of oneself, (2) increase one's sense of responsibility towards other in-group members, thereby enhancing one's motivation to be healthy in order to fulfil those responsibilities, and (3) increase compliance with healthy group behavioural norms. Taken together, these processes amply overcompensate for the fact that some groups with which people may identify can actually prescribe unhealthy behaviours. © 2014 The British Psychological Society.

  5. Design and construction the identification of nitriding plasma process parameters using personal computer based on serial communication

    International Nuclear Information System (INIS)

    Frida Iswinning Diah; Slamet Santosa

    2012-01-01

    Design and construction the identification of process parameters using personal computer based on serial communication PLC M-series has been done. The function of this device is to identify the process parameters of a system (plan), to which then be analyzed and conducted a follow-up given to the plan by the user. The main component of this device is the M-Series T100MD1616 PLC and personal computer (PC). In this device the data plan parameters obtained from the corresponding sensor outputs in the form of voltage or current. While the analog parameter data is adjusted to the ADC analog input of the PLC using a signal conditioning system. Then, as the parameter is processed by the PLC then sent to a PC via RS232 to be displayed in the form of graphs or tables and stored in the database. Software to program the database is created using Visual Basic Programming V-6. The device operation test is performed for the measurement of temperature parameter and vacuum level on the plasma nitriding machine. The results indicate that the device has functioning as an identification device parameters process of plasma nitriding machine. (author)

  6. The person in the mirror: using the enfacement illusion to investigate the experiential structure of self-identification.

    Science.gov (United States)

    Tajadura-Jiménez, Ana; Longo, Matthew R; Coleman, Rosie; Tsakiris, Manos

    2012-12-01

    How do we acquire a mental representation of our own face? Recently, synchronous, but not asynchronous, interpersonal multisensory stimulation (IMS) between one's own and another person's face has been used to evoke changes in self-identification (enfacement illusion). We investigated the conscious experience of these changes with principal component analyses (PCA) that revealed that while the conscious experience during synchronous IMS focused on resemblance and similarity with the other's face, during asynchronous IMS it focused on multisensory stimulation. Analyses of the identified common factor structure revealed significant quantitative differences between synchronous and asynchronous IMS on self-identification and perceived similarity with the other's face. Experiment 2 revealed that participants with lower interoceptive sensitivity experienced stronger enfacement illusion. Overall, self-identification and body-ownership rely on similar basic mechanisms of multisensory integration, but the effects of multisensory input on their experience are qualitatively different, possibly underlying the face's unique role as a marker of selfhood. Copyright © 2012 Elsevier Inc. All rights reserved.

  7. Person Recognition in Social Media Photos

    OpenAIRE

    Oh, Seong Joon; Benenson, Rodrigo; Fritz, Mario; Schiele, Bernt

    2017-01-01

    People nowadays share large parts of their personal lives through social media. Being able to automatically recognise people in personal photos may greatly enhance user convenience by easing photo album organisation. For human identification task, however, traditional focus of computer vision has been face recognition and pedestrian re-identification. Person recognition in social media photos sets new challenges for computer vision, including non-cooperative subjects (e.g. backward viewpoints...

  8. Dynamics of person-to-person interactions from distributed RFID sensor networks.

    Directory of Open Access Journals (Sweden)

    Ciro Cattuto

    Full Text Available BACKGROUND: Digital networks, mobile devices, and the possibility of mining the ever-increasing amount of digital traces that we leave behind in our daily activities are changing the way we can approach the study of human and social interactions. Large-scale datasets, however, are mostly available for collective and statistical behaviors, at coarse granularities, while high-resolution data on person-to-person interactions are generally limited to relatively small groups of individuals. Here we present a scalable experimental framework for gathering real-time data resolving face-to-face social interactions with tunable spatial and temporal granularities. METHODS AND FINDINGS: We use active Radio Frequency Identification (RFID devices that assess mutual proximity in a distributed fashion by exchanging low-power radio packets. We analyze the dynamics of person-to-person interaction networks obtained in three high-resolution experiments carried out at different orders of magnitude in community size. The data sets exhibit common statistical properties and lack of a characteristic time scale from 20 seconds to several hours. The association between the number of connections and their duration shows an interesting super-linear behavior, which indicates the possibility of defining super-connectors both in the number and intensity of connections. CONCLUSIONS: Taking advantage of scalability and resolution, this experimental framework allows the monitoring of social interactions, uncovering similarities in the way individuals interact in different contexts, and identifying patterns of super-connector behavior in the community. These results could impact our understanding of all phenomena driven by face-to-face interactions, such as the spreading of transmissible infectious diseases and information.

  9. Feature Extraction with GMDH-Type Neural Networks for EEG-Based Person Identification.

    Science.gov (United States)

    Schetinin, Vitaly; Jakaite, Livija; Nyah, Ndifreke; Novakovic, Dusica; Krzanowski, Wojtek

    2018-08-01

    The brain activity observed on EEG electrodes is influenced by volume conduction and functional connectivity of a person performing a task. When the task is a biometric test the EEG signals represent the unique "brain print", which is defined by the functional connectivity that is represented by the interactions between electrodes, whilst the conduction components cause trivial correlations. Orthogonalization using autoregressive modeling minimizes the conduction components, and then the residuals are related to features correlated with the functional connectivity. However, the orthogonalization can be unreliable for high-dimensional EEG data. We have found that the dimensionality can be significantly reduced if the baselines required for estimating the residuals can be modeled by using relevant electrodes. In our approach, the required models are learnt by a Group Method of Data Handling (GMDH) algorithm which we have made capable of discovering reliable models from multidimensional EEG data. In our experiments on the EEG-MMI benchmark data which include 109 participants, the proposed method has correctly identified all the subjects and provided a statistically significant ([Formula: see text]) improvement of the identification accuracy. The experiments have shown that the proposed GMDH method can learn new features from multi-electrode EEG data, which are capable to improve the accuracy of biometric identification.

  10. Person-Centered Transition Planning.

    Science.gov (United States)

    Miner, Craig A.; Bates, Paul E.

    1997-01-01

    Describes a person-centered planning approach for involving students with disabilities and their families in the transition planning process. Components of person-centered planning are discussed, including development of a personal profile, identification of future lifestyle preferences, action steps and responsible parties, and necessary changes…

  11. THE CONTRIBUTION OF GESTURES TO PERSONAL BRANDING

    Directory of Open Access Journals (Sweden)

    Brînduşa-Mariana Amălăncei

    2015-07-01

    Full Text Available A form of (self-promotion but also an authentic strategic choice, the personal brand has become a topical preoccupation of marketing specialists. Personal branding or self-marketing represents an innovative concept that associates the efficiency of personal development with the effectiveness of communication and marketing techniques adapted to the individual and that comprises the entire collection of techniques allowing the identification and promotion of the self/individual. The main objective is a clear communication with regard to personal identity, no matter by means of which method, so that it gives uniqueness and offers a competitive advantage. Although online promotion is increasingly gaining ground for the creation of a personal brand, an individual’s verbal and nonverbal behaviour represent very important differentiating elements. Starting from the premise that gestures often complement, anticipate, substitute or contradict the verbal, we will endeavour to highlight a number of significations that can be attributed to the various body movements and that can successfully contribute to the creation of a powerful personal brand.

  12. Analisis heteroplasmy DNA mitokondria pulpa gigi pada identifikasi personal forensik (Heteroplasmy analysis of dental pulp mitochondrial DNA in forensic personal identification

    Directory of Open Access Journals (Sweden)

    Ardyni Febri K

    2013-09-01

    Full Text Available Background: Mitochondrial DNA (mtDNA sequence analysis of the hypervariable control region has been shown to be an effective tool for personal identification. The high copy and maternal mode of inheritance make mtDNA analysis particularly useful when old samples or degradation of biological samples prohibits the detection of nuclear DNA analysis. Dental pulp is covered with hard tissue such as dentin and enamel. It is highly capable of protecting the DNA and thus is extremely useful. One of the diasadvantages of mitochondrial DNA is heteroplasmy. Heteroplasmy is the presence of a mixture of more than one type of an organellar genome within a cell or individual. It can lead to ambiguity in forensic personal identification. Due to that, the evidence of heteroplasmy in dental pulp is needed. Purpose: The study was aimed to determine the heteroplasmy occurance of mitocondrial DNA in dental pulp. Methods: Blood and teeth samples were taken from 6 persons, each samples was extracted with DNAzol. DNA samples were amplified with PCR and sequencing to analyze the nucleotide sequences polymorphism of the hypervariable region 1 in mtDNA and compared with revised Cambridge Reference Sequence (rCRS. results: The dental pulp and blood nucleotide sequence of hypervariable region 1 mitochondrial DNA showed polymorphism when compared with rCRS and heteroplasmy when compared between dental pulp with blood. Conclusion: The study showed that heteroplasmy was found in mithocondrial DNA from dental pulp.latar belakang: Analisis sekuens DNA mitokondria (mtDNA regio kontrol hypervariable telah terbukti menjadi alat efektif untuk identifikasi personal. Kopi DNA yang banyak dan pewarisan maternal membuat analisis mtDNA sangat berguna ketika sampel lama atau sampel biologis yang terdegradasi menghambat deteksi analisis DNA inti. Pulpa gigi terlindung jaringan keras seperti dentin dan enamel. Hal ini membuat pulpa mampu melindungi DNA dan dengan demikian sangat berguna

  13. Identification of copy number variants defining genomic differences among major human groups.

    Directory of Open Access Journals (Sweden)

    Lluís Armengol

    Full Text Available BACKGROUND: Understanding the genetic contribution to phenotype variation of human groups is necessary to elucidate differences in disease predisposition and response to pharmaceutical treatments in different human populations. METHODOLOGY/PRINCIPAL FINDINGS: We have investigated the genome-wide profile of structural variation on pooled samples from the three populations studied in the HapMap project by comparative genome hybridization (CGH in different array platforms. We have identified and experimentally validated 33 genomic loci that show significant copy number differences from one population to the other. Interestingly, we found an enrichment of genes related to environment adaptation (immune response, lipid metabolism and extracellular space within these regions and the study of expression data revealed that more than half of the copy number variants (CNVs translate into gene-expression differences among populations, suggesting that they could have functional consequences. In addition, the identification of single nucleotide polymorphisms (SNPs that are in linkage disequilibrium with the copy number alleles allowed us to detect evidences of population differentiation and recent selection at the nucleotide variation level. CONCLUSIONS: Overall, our results provide a comprehensive view of relevant copy number changes that might play a role in phenotypic differences among major human populations, and generate a list of interesting candidates for future studies.

  14. Cortical mechanisms of person representation: recognition of famous and personally familiar names.

    Science.gov (United States)

    Sugiura, Motoaki; Sassa, Yuko; Watanabe, Jobu; Akitsuki, Yuko; Maeda, Yasuhiro; Matsue, Yoshihiko; Fukuda, Hiroshi; Kawashima, Ryuta

    2006-06-01

    Personally familiar people are likely to be represented more richly in episodic, emotional, and behavioral contexts than famous people, who are usually represented predominantly in semantic context. To reveal cortical mechanisms supporting this differential person representation, we compared cortical activation during name recognition tasks between personally familiar and famous names, using an event-related functional magnetic resonance imaging (fMRI). Normal subjects performed familiar- or unfamiliar-name detection tasks during visual presentation of personally familiar (Personal), famous (Famous), and unfamiliar (Unfamiliar) names. The bilateral temporal poles and anterolateral temporal cortices, as well as the left temporoparietal junction, were activated in the contrasts Personal-Unfamiliar and Famous-Unfamiliar to a similar extent. The bilateral occipitotemporoparietal junctions, precuneus, and posterior cingulate cortex showed activation in the contrasts Personal-Unfamiliar and Personal-Famous. Together with previous findings, differential activation in the occipitotemporoparietal junction, precuneus, and posterior cingulate cortex between personally familiar and famous names is considered to reflect differential person representation. The similar extent of activation for personally familiar and famous names in the temporal pole and anterolateral temporal cortex is consistent with the associative role of the anterior temporal cortex in person identification, which has been conceptualized as a person identity node in many models of person identification. The left temporoparietal junction was considered to process familiar written names. The results illustrated the neural correlates of the person representation as a network of discrete regions in the bilateral posterior cortices, with the anterior temporal cortices having a unique associative role.

  15. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    .... This functionality creep has led to the SSN becoming an almost de facto national ID number. Employers, universities, credit agencies and financial institutions began using the SSN as a unique personal identifier...

  16. Brute-Force Approach for Mass Spectrometry-Based Variant Peptide Identification in Proteogenomics without Personalized Genomic Data

    Science.gov (United States)

    Ivanov, Mark V.; Lobas, Anna A.; Levitsky, Lev I.; Moshkovskii, Sergei A.; Gorshkov, Mikhail V.

    2018-02-01

    In a proteogenomic approach based on tandem mass spectrometry analysis of proteolytic peptide mixtures, customized exome or RNA-seq databases are employed for identifying protein sequence variants. However, the problem of variant peptide identification without personalized genomic data is important for a variety of applications. Following the recent proposal by Chick et al. (Nat. Biotechnol. 33, 743-749, 2015) on the feasibility of such variant peptide search, we evaluated two available approaches based on the previously suggested "open" search and the "brute-force" strategy. To improve the efficiency of these approaches, we propose an algorithm for exclusion of false variant identifications from the search results involving analysis of modifications mimicking single amino acid substitutions. Also, we propose a de novo based scoring scheme for assessment of identified point mutations. In the scheme, the search engine analyzes y-type fragment ions in MS/MS spectra to confirm the location of the mutation in the variant peptide sequence.

  17. [Measures to prevent patient identification errors in blood collection/physiological function testing utilizing a laboratory information system].

    Science.gov (United States)

    Shimazu, Chisato; Hoshino, Satoshi; Furukawa, Taiji

    2013-08-01

    We constructed an integrated personal identification workflow chart using both bar code reading and an all in-one laboratory information system. The information system not only handles test data but also the information needed for patient guidance in the laboratory department. The reception terminals at the entrance, displays for patient guidance and patient identification tools at blood-sampling booths are all controlled by the information system. The number of patient identification errors was greatly reduced by the system. However, identification errors have not been abolished in the ultrasound department. After re-evaluation of the patient identification process in this department, we recognized that the major reason for the errors came from excessive identification workflow. Ordinarily, an ultrasound test requires patient identification 3 times, because 3 different systems are required during the entire test process, i.e. ultrasound modality system, laboratory information system and a system for producing reports. We are trying to connect the 3 different systems to develop a one-time identification workflow, but it is not a simple task and has not been completed yet. Utilization of the laboratory information system is effective, but is not yet perfect for patient identification. The most fundamental procedure for patient identification is to ask a person's name even today. Everyday checks in the ordinary workflow and everyone's participation in safety-management activity are important for the prevention of patient identification errors.

  18. Person-organization fit and organizational identification as predictors of positive and negative work-home interactions

    Directory of Open Access Journals (Sweden)

    Dorota Merecz

    2014-02-01

    Full Text Available Objectives: The aim of the presented research was to explore the links between complementary and supplementary dimensions of Person-Organization fit (P-O fit, organizational identification (OI and negative (WHI- versus positive (WHI+ work-home interactions. It was assumed that both complementary and supplementary P-O fit and OI were positively related to WHI+ and negatively to WHI-. Materials and Methods: The study was conducted on a large sample of Polish blue and white collar workers. The subjects were interviewed by means of questionnaires measuring: supplementary and complementary dimensions of P-O fit, OI and WHI. General work ability and demographic variables were also controlled in the study, and statistical analysis of ANOVA, pairwise comparison as well as regression were performed. Results: P-O fit and OI differentiated the subjects in terms of WHI. For women supplementary fit was a significant predictor of WHI- and explained 12% of its variance, for men it was complementary fit with the number of working days per week and the level of education, which explained 22% of variance. Supplementary fit and OI explained 16% of WHI+ variance in women; OI, tenure at the main place of employment and the level of education explained 8% of WHI+ variance in men. Conclusions: It has been proven that not only are the effects of P-O fit and OI limited to the work environment but they also permeate boundaries between work and home and influence private life - good level of P-O fit and good OI play facilitating role in the positive spillover between work and home. Gender differences in the significance and predictive values of P-O fit and OI for WHI were also found. The innovative aspect of the work is the inclusion of P-O fit and OI in the range of significant predictors of work-home interaction. The results can serve as rationale for employers that improvement of P-O fit and employees' organizational identification should be included in work

  19. Person-organization fit and organizational identification as predictors of positive and negative work-home interactions.

    Science.gov (United States)

    Merecz, Dorota; Andysz, Aleksandra

    2014-01-01

    The aim of the presented research was to explore the links between complementary and supplementary dimensions of Person-Organization fit (P-O fit), organizational identification (OI) and negative (WHI(-)) versus positive (WHI(+)) work-home interactions. It was assumed that both complementary and supplementary P-O fit and OI were positively related to WHI(+) and negatively to WHI(-). The study was conducted on a large sample of Polish blue and white collar workers. The subjects were interviewed by means of questionnaires measuring: supplementary and complementary dimensions of P-O fit, OI and WHI. General work ability and demographic variables were also controlled in the study, and statistical analysis of ANOVA, pairwise comparison as well as regression were performed. P-O fit and OI differentiated the subjects in terms of WHI. For women supplementary fit was a significant predictor of WHI(-) and explained 12% of its variance, for men it was complementary fit with the number of working days per week and the level of education, which explained 22% of variance. Supplementary fit and OI explained 16% of WHI(+) variance in women; OI, tenure at the main place of employment and the level of education explained 8% of WHI(+) variance in men. It has been proven that not only are the effects of P-O fit and OI limited to the work environment but they also permeate boundaries between work and home and influence private life - good level of P-O fit and good OI play facilitating role in the positive spillover between work and home. Gender differences in the significance and predictive values of P-O fit and OI for WHI were also found. The innovative aspect of the work is the inclusion of P-O fit and OI in the range of significant predictors of work-home interaction. The results can serve as rationale for employers that improvement of P-O fit and employees' organizational identification should be included in work-life balance programs.

  20. 31 CFR 351.68 - Are taxpayer identification numbers (TINs) required for registration of book-entry Series EE...

    Science.gov (United States)

    2010-07-01

    ... (TINs) required for registration of book-entry Series EE savings bonds? 351.68 Section 351.68 Money and... TREASURY BUREAU OF THE PUBLIC DEBT OFFERING OF UNITED STATES SAVINGS BONDS, SERIES EE Book-Entry Series EE Savings Bonds § 351.68 Are taxpayer identification numbers (TINs) required for registration of book-entry...

  1. Biometric identification using local iterated function

    Science.gov (United States)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  2. Problems of the processing of nuclear magnetic logging signals (identification of fluid-containing strata from a number of measurements)

    International Nuclear Information System (INIS)

    Aliev, T.M.; Orlov, G.L.; Lof, V.M.; Mityushin, E.M.; Ragimova, E.K.

    1978-01-01

    Problems of the processing of nuclear magnetic logging signals to identification of fluid-containing strata from a number of measurements. Problems of application statistical decision theory to discovery of fluid-containing beds from a number of measurements are considered. Using the technique possibilities of nuclear magnetic logging method the necessary volume of samples is motivated, the rational algorithm for processing of sequential measurements is obtained

  3. Constrained dictionary learning and probabilistic hypergraph ranking for person re-identification

    Science.gov (United States)

    He, You; Wu, Song; Pu, Nan; Qian, Li; Xiao, Guoqiang

    2018-04-01

    Person re-identification is a fundamental and inevitable task in public security. In this paper, we propose a novel framework to improve the performance of this task. First, two different types of descriptors are extracted to represent a pedestrian: (1) appearance-based superpixel features, which are constituted mainly by conventional color features and extracted from the supepixel rather than a whole picture and (2) due to the limitation of discrimination of appearance features, the deep features extracted by feature fusion Network are also used. Second, a view invariant subspace is learned by dictionary learning constrained by the minimum negative sample (termed as DL-cMN) to reduce the noise in appearance-based superpixel feature domain. Then, we use deep features and sparse codes transformed by appearancebased features to establish the hyperedges respectively by k-nearest neighbor, rather than jointing different features simply. Finally, a final ranking is performed by probabilistic hypergraph ranking algorithm. Extensive experiments on three challenging datasets (VIPeR, PRID450S and CUHK01) demonstrate the advantages and effectiveness of our proposed algorithm.

  4. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  5. EDUCATIONAl. RESOURCE IDENTIFICATION IN THE ...

    African Journals Online (AJOL)

    RESOURCE IDENTIFICATION. IN THE ... Identification of educational resources in the local environ- ment is of ... The environment to which a person is exposed and in which, or .... this respect on the re-use of resources - each ele- ment or ...

  6. Premortal data in the process of skeletal remains identification

    Directory of Open Access Journals (Sweden)

    Marinković Nadica

    2012-01-01

    Full Text Available Background/Aim. The basic task of a forensic examiner during the exhumation of mass graves or in mass accidents is to establish identity of a person. The results obtained through these procedures depend on the level of perceptibility of post mortal changes and they are compared with premortal data obtained from family members of those missing or killed. Experience with exhumations has shown significant differences between the results obtained through exhumation and the premortal data. The aim of the study was to suggest the existance of the difference between premortal data and the results obtained by exhumation regarding the some parameters, as well as to direct premortal data colection to the specific skeletal forms. Methods. We performed comparative analysis of the results of exhumation of skeletal remains in a mass grave and the premortal data concerning the identified persons. The least number of individuals in this mass grave was calculated according to the upper parts of the right femur and it helped in calculating the smallest number of individuals in mass graves to be 48. A total of 27 persons were identified. Sex was determined by metrics and morphology of the pelvis. Personal age in the moment of death was determined by morphology features of groin symphisis and morphology of sternal edge of ribs and other parts of scelets observations. The hight was calculated as average results of length of long bones and Rollet coefficients. Results. There was a complete match in terms of sex and age matched within an interval that could be established based on the skeletal remains. All the other parameters were different, however, which made identification significantly more difficult. Conclusion. The premortal data is an important element of identification process and it should be obtained by the forensic doctor and directed towards more detailed examination of the skeletal system.

  7. Human Identification by Cross-Correlation and Pattern Matching of Personalized Heartbeat: Influence of ECG Leads and Reference Database Size.

    Science.gov (United States)

    Jekova, Irena; Krasteva, Vessela; Schmid, Ramun

    2018-01-27

    Human identification (ID) is a biometric task, comparing single input sample to many stored templates to identify an individual in a reference database. This paper aims to present the perspectives of personalized heartbeat pattern for reliable ECG-based identification. The investigations are using a database with 460 pairs of 12-lead resting electrocardiograms (ECG) with 10-s durations recorded at time-instants T1 and T2 > T1 + 1 year. Intra-subject long-term ECG stability and inter-subject variability of personalized PQRST (500 ms) and QRS (100 ms) patterns is quantified via cross-correlation, amplitude ratio and pattern matching between T1 and T2 using 7 features × 12-leads. Single and multi-lead ID models are trained on the first 230 ECG pairs. Their validation on 10, 20, ... 230 reference subjects (RS) from the remaining 230 ECG pairs shows: (i) two best single-lead ID models using lead II for a small population RS = (10-140) with identification accuracy AccID = (89.4-67.2)% and aVF for a large population RS = (140-230) with AccID = (67.2-63.9)%; (ii) better performance of the 6-lead limb vs. the 6-lead chest ID model-(91.4-76.1)% vs. (90.9-70)% for RS = (10-230); (iii) best performance of the 12-lead ID model-(98.4-87.4)% for RS = (10-230). The tolerable reference database size, keeping AccID > 80%, is RS = 30 in the single-lead ID scenario (II); RS = 50 (6 chest leads); RS = 100 (6 limb leads), RS > 230-maximal population in this study (12-lead ECG).

  8. 20 CFR 404.1220 - Identification numbers.

    Science.gov (United States)

    2010-04-01

    .... The special number will also be assigned to an interstate instrumentality if pre-1987 coverage is obtained and SSA will send a Form SSA-214-CD to the interstate instrumentality to notify it of the number.... SSA will send the State a Form SSA-214-CD, “Notice of Identifying Number,” to inform the State of the...

  9. Pore sub-features reproducibility in direct microscopic and Livescan images--their reliability in personal identification.

    Science.gov (United States)

    Gupta, Abhishek; Sutton, Raul

    2010-07-01

    Third level features have been reported to have equal discriminatory power as second level details in establishing personal identification. Pore area, as an extended set third level sub-feature, has been studied by minimizing possible factors that could affect pore size. The reproducibility of pore surface area has been studied using direct microscopic and 500 ppi Livescan images. Direct microscopic pore area measurements indicated that the day on which the pore area was measured had a significant impact on the measured pore area. Pore area measurement was shown to be difficult to estimate in 500 ppi Livescan measurements owing to lack of resolution. It is not possible to reliably use pore area as an identifying feature in fingerprint examination.

  10. The performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in a population of depressed or anxious persons

    NARCIS (Netherlands)

    Boschloo, Lynn; Vogelzangs, Nicole; Smit, Johannes H.; van den Brink, Wim; Veltman, Dick J.; Beekman, Aartjan T. F.; Penninx, Brenda W. J. H.

    2010-01-01

    BACKGROUND: Alcohol use disorders are highly prevalent but often remain unrecognized among depressed and/or anxious persons. This study examines the performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in this high-risk group and compares it

  11. Forensic radiology: An emerging tool in identification

    Directory of Open Access Journals (Sweden)

    Raghav Kumar

    2015-01-01

    Full Text Available In any mass disaster condition, identification of the person is most important. For this purpose, the forensic investigators use different methods for identifying the dead. They consider skeletal remains of the dead as the initial step in identification. Radiographs carry great evidence to act as antemortem records and also assist in identifying the person, age, gender, race, etc. Forensic dentistry is also emerging as a new branch in forensics. So, the forensic dentist must be aware of different techniques, developments, and resources to incorporate the technology in order to achieve success in human identification. So, our aim of the present review is to focus on different radiological techniques and new developments available for successful identification of the dead.

  12. Realization of Personalized Services for Intelligent Residential Space based on User Identification Method using Sequential Walking Footprints

    Directory of Open Access Journals (Sweden)

    Jin-Woo Jung

    2005-04-01

    Full Text Available A new human-friendly assistive home environment, Intelligent Sweet Home (ISH, developed at KAIST, Korea for testing advanced concepts for independent living of the elderly/the physically handicapped. The concept of ISH is to consider the home itself as an intelligent robot. ISH always checks the intention or health status of the resident. Therefore, ISH can do actively the most proper services considering the resident's life-style by the detected intention or emergency information. But, when there are more than two residents, ISH cannot consider the residents' characteristics or tastes if ISH cannot identify who he/she is before. To realize a personalized service system in the intelligent residential space like ISH, we deal with a human-friendly user identification method for ubiquitous computing environment, specially focused on dynamic human footprint recognition. And then, we address some case studies of personalized services that have been experienced by Human-friendly Welfare Robot System research center, KAIST.

  13. A self-checking identification formula for radiation workers in India

    International Nuclear Information System (INIS)

    Srivastava, D.N.; Srivastava, M.K.; Gohel, Chetna; Kher, R.K.; Awari, J.M.; Joshi, V.D.

    1998-01-01

    Accurate monitoring of radiation exposure of workers in any nuclear installation, institution or laboratory handling radiation sources forms an integral part of the radiation protection programme. This requires a system of unique identification of each radiation worker. When the radiation monitoring service started in India in 1953, the first identification formula of six digits was allotted to each radiation worker. This formula remained in use till 1970. With more number of institutions coming up, in the due course a second identification formula of eight digits was introduced which was in use during the period 1971-1978. For better data processing, a third identification formula of the same number of digits was introduced in 1978 with specific information about the category and location of the institution. To account for increasing number of institutions, a fourth formula consisting of 10 digits was started in 1995 which is currently in use. However, none of these formulas contained personal information about the radiation worker. Moreover, they were not self-checking type. Self-checking ability is extremely important for the preparation of a systematic data base and error free flow of information. With these considerations, a new 14 digit self-checking formula is being proposed in this report. Besides being less prone to error, it gives information in respect of date of birth, sex, institution category, location etc.. It does not suffer from the problem of millennium at the turn of century. It has enough capacity to account for a large number of institutions of different categories that might come up in future, and very large number of radiation workers in each institution. The inclusion of date of birth in a suitable format makes the capacity of the system virtually limitless and perpetual. (author)

  14. Exploring the effects of age and delay on children's person identifications: verbal descriptions, lineup performance, and the influence of wildcards.

    Science.gov (United States)

    Karageorge, Aspasia; Zajac, Rachel

    2011-05-01

    We explored the effects of age and retention interval on several measures of children's person identification ability: verbal descriptions, lineup performance, and the success of a 'wildcard'--a photo of a silhouetted figure with a large question mark superimposed--in reducing children's tendency to choose from target-absent lineups. Children aged 5-7 years (N= 101) and 8-11 years (N= 109) were briefly exposed to an experimental confederate during a staged event. Either 1-2 days or 2 weeks later, children described the confederate and were then presented with either a target-present or -absent lineup. Within each group, approximately half of the children were presented with a wildcard and half were not. Target-present lineup performance improved as age increased. Compared to control children, children in the wildcard condition were more likely to correctly reject the target-absent lineup, and less likely to identify the innocent suspect. The wildcard did not influence children's target-present lineup accuracy, nor did delay exert an influence on any of our measures of lineup performance. These findings extend our knowledge of children's person identifications, as well as providing further support for the use of wildcards in photographic lineups. ©2010 The British Psychological Society.

  15. Electronic palatal rugae impression: a potentially relevant technology in personal identification

    Directory of Open Access Journals (Sweden)

    Fabrizio Guerra

    2016-06-01

    Full Text Available Forensic medicine is now able to identify people through lots of different systems. Actually, fingerprints identification is the mostused identification method. To avoid identifying, many people alter or erase their fingerprints through chemical and / or abrasivesystems. The study of palatal rugae (palatoscopy is an identification technique today accepted by the international scientificcommunity as an alternative, safe and effective identification system, because of their characteristic feature of immutability andindividuality. Currently, the most used procedure is dental impression through plaster casts or photographs. The difficulties in therecording and cast’s storage limited the use of this identification system in comparison with others techniques. In order to improvethe palatal rugae analysis system, we designed a software, connected to a camera device that allows to acquire the palatal impression,to easily identify the salient palatal features and to store them in a database. This would permit a fast, simple and economicrecognition method that could be used without the need of specific staff training and that could easily be integrated with the existingfingerprint identification systems.

  16. The dynamics of female self-identification conceptions: from modernism to postmodernist feminism

    OpenAIRE

    Е Е Agafonova

    2009-01-01

    A number of new contradictions between the personality and society, including the accentuation of the problem of human being's identity and self-identification have been engendered by globalization. Whereas formerly the individual enjoyed a stable set of norms, values, and motivations determining his identity structure, nowadays social institutions bearing responsibility for the stable identity development are experiencing transformations and fail to accomplish their functions to the full ext...

  17. Perceived Personality Traits of Individuals with Anorexia Nervosa

    Science.gov (United States)

    Watters, Jessica E.; Malouff, John M.

    2012-01-01

    Background: Prior research has found evidence of a general negative personality stereotype for individuals who have anorexia nervosa (AN). Methods: This study examined the expected personality characteristics of individuals with AN using the Five-Factor Model of personality to allow identification of specific personality traits that are part of…

  18. [Biometric method for the description of the head of an unrecognized corpse for the purpose of personality individualization and identification].

    Science.gov (United States)

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    We have determined absolute dimensions of the head and the relationship between the dimensions of its selected parts. The study enrolled adult subjects (mostly of Russian ethnicity) at the age from 17 to 22 years (1108 men and 1153 women). We calculated the normal values for the estimation of real dimensional characteristics and the frequency of their occurrence in the population. The proposed approach makes it possible to reliably identify the dimensional features of human appearance in terms of the quantitative verbal description (categories 1-5) and to reveal its most characteristic features. The results of this biometric study of the heads of unrecognized corpses obtained by the specially developed technology may be used in operational and search investigations, in the procedure of corpse identification, and forensic medical personality identification of a missing subject.

  19. Reliability of lip prints in personal identification: An inter-racial pilot study.

    Science.gov (United States)

    Kumar, Laliytha Bijai; Jayaraman, Venkatesh; Mathew, Philips; Ramasamy, S; Austin, Ravi David

    2016-01-01

    Forensic science is a branch of science that deals with the application of science and technology in solving a crime and this requires a multidisciplinary team effort. The word "Forensic" is derived from the Latin word, "Forensis" which means the study of public. Dental professionals should develop interests in contributing to legal issues. To study the lip prints among people of different races. Descriptive study. The present study comprised of ninety subjects of which Group A comprised of Africans, Group B comprised of Dravidian, and Group C of Mongoloid race. Each group was then further divided into 15 males and 15 females for whom the lip prints were recorded and evaluated. ANOVA test. ANOVA statistical analysis was used to compare three races of African, Dravidian, and Mongoloid races. The observed data among male and female were found to be significant with a P = 0.000492. The present study showed a significant difference in lip pattern among the three races. Perhaps future studies with a larger sample size and comparison between many other races may be done for better personal identification.

  20. Relapse (number of detoxifications) in abstinent male alcohol-dependent patients as related to personality traits and types of tolerance to frustration.

    Science.gov (United States)

    Baars, Melanie Y; Müller, Matthias J; Gallhofer, Bernd; Netter, Petra

    2013-01-01

    Personality traits like depression on the one hand and aggression and impulsivity on the other are assumed to be predisposing factors for different types of alcohol dependence. Both types are associated with sensitivity to frustration, but this may be different for the two types of personality according to whether they are confronted with frustrations caused by withdrawal from positive or infliction of negative events. It has not been shown so far if both types of personality factors and the two different sources of frustration are differently relevant for the propensity of relapse. This was investigated here in a study on 60 abstinent male alcohol-dependent patients. Correlations between the number of previous detoxifications reflecting liability to relapse and questionnaire scores on personality factors and on reactions to frustration were computed. Bonferroni-corrected correlations yielded significant relationships between the number of detoxifications and the personality factor of aggression as well as pronounced depressive reactions to frustrating conditions of non-reward caused by humans. Controlling for impulsivity, aggression and depression revealed that depressive reactions to frustration are genuine predictors for probability of relapse independent of underlying personality factors. Persons particularly sensitive to frustrations from human denial of positive reinforcers are liable to relapse which fits the theory of sensitivity to reward in drug-addicted individuals. Results demonstrate that relapse is clearly more related to aggression than to impulsivity, depression and anxiety and may be facilitated if persons are sensitive to frustrating conditions of non-reward caused by social partners. Copyright © 2013 S. Karger AG, Basel.

  1. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  2. Body identification, biometrics and medicine: ethical and social considerations.

    Science.gov (United States)

    Mordini, Emilio; Ottolini, Corinna

    2007-01-01

    Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny.

  3. The number of persons with alcohol problems in the Danish population

    DEFF Research Database (Denmark)

    Hansen, Anders B.G.; Hvidtfeldt, Ulla Arthur; Grønbæk, Morten

    2011-01-01

    , which included a personal interview of 14,566 individuals (response rate 66.7 %), and of 5,552 individuals who completed a self-administered questionnaire containing the Alcohol Use Disorder Test (AUDIT) (response rate 50.9%). Heavy drinkers were defined as consuming >14/21 drinks/week (women....... Results: In the Danish population, 20% were heavy drinkers (862,876 persons 95% confidence interval (95% CI): 672,002—1,195,069), 14% had harmful alcohol use (620,301 persons 95% CI: 439,221—944,992), 3% were dependent drinkers (147,528 persons 95% CI: 118,196—188,384). Being male was associated...

  4. Exploiting Multiple Detections for Person Re-Identification

    Directory of Open Access Journals (Sweden)

    Amran Bhuiyan

    2018-01-01

    Full Text Available Re-identification systems aim at recognizing the same individuals in multiple cameras, and one of the most relevant problems is that the appearance of same individual varies across cameras due to illumination and viewpoint changes. This paper proposes the use of cumulative weighted brightness transfer functions (CWBTFs to model these appearance variations. Different from recently proposed methods which only consider pairs of images to learn a brightness transfer function, we exploit such a multiple-frame-based learning approach that leverages consecutive detections of each individual to transfer the appearance. We first present a CWBTF framework for the task of transforming appearance from one camera to another. We then present a re-identification framework where we segment the pedestrian images into meaningful parts and extract features from such parts, as well as from the whole body. Jointly, both of these frameworks contribute to model the appearance variations more robustly. We tested our approach on standard multi-camera surveillance datasets, showing consistent and significant improvements over existing methods on three different datasets without any other additional cost. Our approach is general and can be applied to any appearance-based method.

  5. The Fregoli delusion: a disorder of person identification and tracking.

    Science.gov (United States)

    Langdon, Robyn; Connaughton, Emily; Coltheart, Max

    2014-10-01

    Fregoli delusion is the mistaken belief that some person currently present in the deluded person's environment (typically a stranger) is a familiar person in disguise. The stranger is believed to be psychologically identical to this known person (who is not present) even though the deluded person perceives the physical appearance of the stranger as being different from the known person's typical appearance. To gain a deeper understanding of this contradictory error in the normal system for tracking and identifying known persons, we conducted a detailed survey of all the Fregoli cases reported in the literature since the seminal Courbon and Fail (1927) paper. Our preliminary reading of these cases revealed a notable lack of definitional clarity. So, we first formulated a classification scheme of different person misidentification delusions so as to identify those cases that qualified as instances of Fregoli according to the above characterization: the mistaken belief that a known person is present in the environment in a different guise to his or her typical appearance. We identified 38 clear cases of this type and set out to answer a series of questions motivated by current hypotheses about the origin of the Fregoli delusion. We asked whether the patients misidentified particular strangers, made reference to the misidentified known persons using wigs or plastic surgery (or other techniques to disguise their appearance), misidentified many different strangers or only one, showed other symptoms (in particular, other misidentification delusions), and made inferences about the motives of the known persons in disguise. We conclude by discussing the implications of our findings for current hypotheses concerning the origin of the Fregoli delusion. Copyright © 2014 Cognitive Science Society, Inc.

  6. Biometric identification using knee X-rays.

    Science.gov (United States)

    Shamir, Lior; Ling, Shari; Rahimi, Salim; Ferrucci, Luigi; Goldberg, Ilya G

    2009-01-01

    Identification of people often makes use of unique features of the face, fingerprints and retina. Beyond this, a similar identifying process can be applied to internal parts of the body that are not visible to the unaided eye. Here we show that knee X-rays can be used for the identification of individual persons. The image analysis method is based on the wnd-charm algorithm, which has been found effective for the diagnosis of clinical conditions of knee joints. Experimental results show that the rank-10 identification accuracy using a dataset of 425 individuals is ~56%, and the rank-1 accuracy is ~34%. The dataset contained knee X-rays taken several years apart from each other, showing that the identifiable features correspond to specific persons, rather than the present clinical condition of the joint.

  7. An investigation of player to player character identification via personal pronouns

    DEFF Research Database (Denmark)

    Hichens, Michael; Drachen, Anders; Richards, Deborah

    2012-01-01

    The player character is an important feature of many games, where it is through the character that the player interacts with game world. There has been considerable interest in the relationship between the player and the player character. Much of this work has examined the identification of players......, third) as an indication of the relationship between player and character. Results indicate that the presence of story and information about the player character had no effect on identification with the plater character. However, characteristics of the players, particularly gender and general experience...... in playing video games, did have a statistically significant affect, indicating that different levels of identification are more dependent on the player than on the game. This indicates that players are not a homogeneous group with respect to player character identification and is an important consideration...

  8. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  9. How the human brain goes virtual: distinct cortical regions of the person-processing network are involved in self-identification with virtual agents.

    Science.gov (United States)

    Ganesh, Shanti; van Schie, Hein T; de Lange, Floris P; Thompson, Evan; Wigboldus, Daniël H J

    2012-07-01

    Millions of people worldwide engage in online role-playing with their avatar, a virtual agent that represents the self. Previous behavioral studies have indicated that many gamers identify more strongly with their avatar than with their biological self. Through their avatar, gamers develop social networks and learn new social-cognitive skills. The cognitive neurosciences have yet to identify the neural processes that underlie self-identification with these virtual agents. We applied functional neuroimaging to 22 long-term online gamers and 21 nongaming controls, while they rated personality traits of self, avatar, and familiar others. Strikingly, neuroimaging data revealed greater avatar-referential cortical activity in the left inferior parietal lobe, a region associated with self-identification from a third-person perspective. The magnitude of this brain activity correlated positively with the propensity to incorporate external body enhancements into one's bodily identity. Avatar-referencing furthermore recruited greater activity in the rostral anterior cingulate gyrus, suggesting relatively greater emotional self-involvement with one's avatar. Post-scanning behavioral data revealed superior recognition memory for avatar relative to others. Interestingly, memory for avatar positively covaried with play duration. These findings significantly advance our knowledge about the brain's plasticity to self-identify with virtual agents and the human cognitive-affective potential to live and learn in virtual worlds.

  10. Personality and Development in Childhood: A Person-Centered Approach.

    Science.gov (United States)

    Hart, Daniel; Atkins, Robert; Fegley, Suzanne

    2003-01-01

    Applied a person-centered approach to childhood personality development in 28 diverse samples of 3- to 6-year-olds studied over 6 years. Identified resilient, overcontrolled, and undercontrolled personality types. Found that the undercontrolled personality type related to intellectual decline over 6 years. The number of family risks predicted…

  11. 20 CFR 422.103 - Social security numbers.

    Science.gov (United States)

    2010-04-01

    ... personal interview with the dependent is not required. Form SS-5 may be obtained at: (i) Any local social... previously assigned social security number(s), if any, of the applicant. A personal interview may be required... sponsoring agency of a refugee, if no personal mailing address is available). (d) Social security number...

  12. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  13. The Influence of the Expression of Subtle and Blatant Sexual Prejudice on Personal Prejudice and Identification With the Expresser.

    Science.gov (United States)

    Krolikowski, Alex M; Rinella, Mark; Ratcliff, Jennifer J

    2016-01-01

    Although the negative consequences of subtle and blatant prejudice for the targets of prejudice are clear in the psychological literature, the impact of exposure to subtle and blatant prejudice on non-targets remains unclear. The current work examines how exposure to blatant and subtle sexual prejudice affects non-targets' personal endorsement of prejudice and their identification with the prejudice expresser. Results suggest that relative to exposure to blatant or neutral expressions of prejudice, exposure to subtle prejudice increased prejudice levels. Individuals were also more likely to distance from the prejudice expresser when exposed to blatant compared to subtle prejudice. The implications are discussed.

  14. Antisocial personalities: Measuring prevalence among offenders in ...

    African Journals Online (AJOL)

    The identification of offenders who meet the criteria for psychopathy, antisocial personality disorder or dissocial personality disorder could be of significant value to help address the violent crime crisis in South Africa. A sample of 500 male maximum security offenders was selected to determine the prevalence of these ...

  15. [The coordination of the forensic medical service with the medical criminology subdivisions of internal affairs organs in the personal identification of unidentified corpses].

    Science.gov (United States)

    Pashinian, G A; Tuchik, E S

    1997-01-01

    In order to improve the cooperation between medical criminology departments of the organs of home affairs and forensic medical service in personality identification of unidentified corpses, the authors propose amendments to the routine procedure regulated by documents of the Ministry of Home Affairs of the Russian Federation, for these documents are in need of serious correction and revision, so that they conform to the judicial legislation and other documents.

  16. Identification and documentation of persons being in palliative phase regardless of age, diagnosis and places of care, and their use of a sitting service at the end of life.

    Science.gov (United States)

    Wallerstedt, Birgitta; Sahlberg-Blom, Eva; Benzein, Eva; Andershed, Birgitta

    2012-09-01

    Older persons and persons with diseases other than cancer are often discriminated against when applying for palliative care despite growing numbers of both older persons and individuals with chronic diseases. An intention for palliative care in Sweden is that all persons in the final stage of life, irrespective of age, domicile, diagnosis, and care place shall have access to palliative care on equal terms. One way to support these persons in final stage of life and their relatives is to offer sitting service. To describe individuals who were identified and documented as being in a palliative phase in a Swedish municipality, with respect to demographics, use of a sitting service, continuity of care in the last month of life and the place of death. A second aim was to describe and compare the groups who received/did not receive sitting services related to the aforementioned variables. Retrospective data from nursing records and palliative care identification forms were analyzed with descriptive and analytic statistical methods. Among individuals deceased during 2007, 51% were identified and documented as being in palliative phase. The majority was older people (mean 83 years) with a noncancer diagnosis (58%). Twenty-eight individuals (16%) had received a sitting service between 8 and 249 hours (one extreme value = 2211). It is indicated that sitting service significantly increased the possibility of dying at home (p = 0.00004), but did not affect how often the place of care changed during the last month of life. A small sample from a Swedish context must be considered. These results can be related to an awareness in the municipality that led to adopting the concept of palliative care as not only for those with a cancer diagnosis. 2012 The Authors. Scandinavian Journal of Caring Sciences © 2012 Nordic College of Caring Science.

  17. The role of identification in dynamic psychiatry and psychotherapy.

    Science.gov (United States)

    Corradi, Richard B

    2011-01-01

    Identification-a psychic process in which a person takes on characteristics of another-is a concept important to the understanding of human nature. It plays an important role in how our personalities develop, in our ability to deal with life's stresses, and in how we interact with other people. Knowledge of its manifestations is essential to dynamic psychiatry and to its applications in psychotherapy. This article defines identification and reviews its role in development and as a defense. It discusses its role in the psychopathology of disorders commonly encountered in psychotherapy practice-depression and anxiety states reactive to losses in life, and borderline states. Clinical vignettes illustrate how identification functions in these conditions, and also how identifications reveal themselves in the transference and are utilized in psychotherapy. A teaching vignette illustrates how important it is that residents learning the art of psychotherapy appreciate the therapeutic potential of identification. The article maintains that, although it often goes unrecognized, identification with the therapist is one of the most effective therapeutic devices in the transference.

  18. SnapVideo: Personalized Video Generation for a Sightseeing Trip.

    Science.gov (United States)

    Zhang, Luming; Jing, Peiguang; Su, Yuting; Zhang, Chao; Shaoz, Ling

    2017-11-01

    Leisure tourism is an indispensable activity in urban people's life. Due to the popularity of intelligent mobile devices, a large number of photos and videos are recorded during a trip. Therefore, the ability to vividly and interestingly display these media data is a useful technique. In this paper, we propose SnapVideo, a new method that intelligently converts a personal album describing of a trip into a comprehensive, aesthetically pleasing, and coherent video clip. The proposed framework contains three main components. The scenic spot identification model first personalizes the video clips based on multiple prespecified audience classes. We then search for some auxiliary related videos from YouTube 1 according to the selected photos. To comprehensively describe a scenery, the view generation module clusters the crawled video frames into a number of views. Finally, a probabilistic model is developed to fit the frames from multiple views into an aesthetically pleasing and coherent video clip, which optimally captures the semantics of a sightseeing trip. Extensive user studies demonstrated the competitiveness of our method from an aesthetic point of view. Moreover, quantitative analysis reflects that semantically important spots are well preserved in the final video clip. 1 https://www.youtube.com/.

  19. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  20. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana; Volume 31; Issue 3. New methodology for a person identification system. R Bremananth A Chitra. Volume 31 Issue 3 June 2006 pp 259-276 ... Experimental results illustrate that the proposed method has been easily espoused in elections, bank transactions and other security applications.

  1. Methods for using a biometric parameter in the identification of persons

    Science.gov (United States)

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  2. The dynamics of female self-identification conceptions: from modernism to postmodernist feminism

    Directory of Open Access Journals (Sweden)

    Е Е Agafonova

    2009-09-01

    Full Text Available A number of new contradictions between the personality and society, including the accentuation of the problem of human being's identity and self-identification have been engendered by globalization. Whereas formerly the individual enjoyed a stable set of norms, values, and motivations determining his identity structure, nowadays social institutions bearing responsibility for the stable identity development are experiencing transformations and fail to accomplish their functions to the full extent or are actually in complete collapse. The social, economic and political status of woman has undergone the most drastic transformations resulting in pivotal changes of her identity structure and identification processes. Under the contemporary circumstances the old-fashioned modernist views and ideas about the role, status, and position of women, the traditional patterns of behaviour and value judgments turn out to be inappropriate. One can state that the classical ideas of women's self-identification are old and tired version and now it is time for a new apprehension of this significant process. The problem of identity and self-identification has been handled in a particular way both in the framework of postmodernist theories and in terms of contemporary feminist conceptions. The theorists of postmodernist feminism have put forward a sufficiently interesting and important project reconsidering female/gender identity structure as well as female identification/self-identification processes.

  3. Analysing the Effectiveness of the Personality Symbols/Icons

    OpenAIRE

    Halim, İpek

    2012-01-01

    Personality symbol can cover all the identifications of the brand. It can be the face or the soul of the company. Their effect on the brand image is huge. The research focuses on calculating the roles and effectives of the personality symbols. It aims to bring in suggestions for developing a successful personality symbols and lists advantages and disadvantages of different types of personality symbols. It does a detailed copy testing. Apart from conducting focus groups to analyse how the targ...

  4. Molecular formula and METLIN Personal Metabolite Database matching applied to the identification of compounds generated by LC/TOF-MS.

    Science.gov (United States)

    Sana, Theodore R; Roark, Joseph C; Li, Xiangdong; Waddell, Keith; Fischer, Steven M

    2008-09-01

    In an effort to simplify and streamline compound identification from metabolomics data generated by liquid chromatography time-of-flight mass spectrometry, we have created software for constructing Personalized Metabolite Databases with content from over 15,000 compounds pulled from the public METLIN database (http://metlin.scripps.edu/). Moreover, we have added extra functionalities to the database that (a) permit the addition of user-defined retention times as an orthogonal searchable parameter to complement accurate mass data; and (b) allow interfacing to separate software, a Molecular Formula Generator (MFG), that facilitates reliable interpretation of any database matches from the accurate mass spectral data. To test the utility of this identification strategy, we added retention times to a subset of masses in this database, representing a mixture of 78 synthetic urine standards. The synthetic mixture was analyzed and screened against this METLIN urine database, resulting in 46 accurate mass and retention time matches. Human urine samples were subsequently analyzed under the same analytical conditions and screened against this database. A total of 1387 ions were detected in human urine; 16 of these ions matched both accurate mass and retention time parameters for the 78 urine standards in the database. Another 374 had only an accurate mass match to the database, with 163 of those masses also having the highest MFG score. Furthermore, MFG calculated a formula for a further 849 ions that had no match to the database. Taken together, these results suggest that the METLIN Personal Metabolite database and MFG software offer a robust strategy for confirming the formula of database matches. In the event of no database match, it also suggests possible formulas that may be helpful in interpreting the experimental results.

  5. Employees' responses to an organizational merger: Intraindividual change in organizational identification, attachment, and turnover.

    Science.gov (United States)

    Sung, Wookje; Woehler, Meredith L; Fagan, Jesse M; Grosser, Travis J; Floyd, Theresa M; Labianca, Giuseppe Joe

    2017-06-01

    The authors used pre-post merger data from 599 employees experiencing a major corporate merger to compare 3 conceptual models based on the logic of social identity theory (SIT) and exchange theory to explain employees' merger responses. At issue is how perceived change in employees' own jobs and roles (i.e., personal valence) and perceived change in their organization's status and merger appropriateness (i.e., organizational valence) affect their changing organizational identification, attachment attitudes, and voluntary turnover. The first model suggests that organizational identification and organizational attachment develop independently and have distinct antecedents. The second model posits that organizational identification mediates the relationships between change in organizational and personal valence and change in attachment and turnover. The third model posits that change in personal valence moderates the relationship between changes in organizational valence and in organizational identification and attachment. Using latent difference score (LDS) modeling in an SEM framework and survival analysis, the results suggest an emergent fourth model that integrates the first and second models: Although change in organizational identification during the merger mediates the relationship between change in personal status and organizational valence and change in attachment, there is a direct and unmediated relationship between change in personal valence and attachment. This integrated model has implications for M&A theory and practice. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. The Use of Personal Identity Numbers in Sweden and Denmark: A Barrier to Union Citizens' Enjoyment of Free Movement Rights?

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  7. Experimental studies of forensic odontology to aid in the identification process.

    Science.gov (United States)

    Saxena, Susmita; Sharma, Preeti; Gupta, Nitin

    2010-07-01

    The importance of dental identification is on the increase year after year. With the passage of time, the role of forensic odontology has increased as very often teeth and dental restorations are the only means of identification. Forensic odontology has played a key role in identification of persons in mass disasters (aviation, earthquakes, Tsunamis), in crime investigations, in ethnic studies, and in identification of decomposed and disfigured bodies like that of drowned persons, fire victims, and victims of motor vehicle accidents. The various methods employed in forensic odontology include tooth prints, radiographs, photographic study, rugoscopy, cheiloscopy and molecular methods. Investigative methods applied in forensic odontology are reasonably reliable, yet the shortcomings must be accounted for to make it a more meaningful and relevant procedure. This paper gives an overview of the various experimental studies to aid in the identification processes, discussing their feasibilities and limitations in day-to-day practice.

  8. 25 CFR 249.3 - Identification cards.

    Science.gov (United States)

    2010-04-01

    ... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...

  9. [Person-organization fit and work ability].

    Science.gov (United States)

    Merecz, Dorota; Andysz, Aleksandra

    2011-01-01

    Person-environment issue has long been in focus of researchers who explore the area of human labor. It is known that the level of fit is a predictor of many phenomena related to health and attitude to work. The aim of this study was to explore the association between the level of person- organization fit (P-O fit) and work ability, including indicators of somatic and mental health. Research was conducted on a representative sample of 600 Polish men and women at working age. The Person-Organization Fit Questionnaire was used to assess three dimensions of P-O fit (supplementary fit, complementary fit and identification with organization); mental health status was measured by GHQ-28; the number of diagnosed diseases was taken as an index of somatic health; work ability, ability to physical and mental efforts were measured by three items from the Work Ability Index. A significant relationship between P-O fit level and work ability was found. In men, work ability predictors were: age, supplementary fit and mental health status, which explained 25% of the variance in work ability. In women, work ability predictors were: the number of diagnosed somatic diseases, supplementary fit, age and complementary fit, which explained 27% of the variance in work ability. Some gender-related differences in the predictive value of variables under the study were also found. The results of this study indicate the importance of P-O fit in shaping the sense of work ability, a recognized predictor of workers' occupational activity and the frequency of taking sick leave in subsequent years. Therefore, this result may be a useful argument to motivate employers to employ workers adequately to their abilities and preferences.

  10. Correlation of number and identification of sentinel nodes during radiographer led lymphoscintigraphy prior to sentinel lymph node biopsy in breast cancer patients

    International Nuclear Information System (INIS)

    Camilleri, Gail; Borg Grima, Karen; Zarb, Francis

    2012-01-01

    Purpose: The sentinel lymph node biopsy (SLNB) concept using the cutaneous (subdermal) peri-areolar approach is rapidly emerging as the technique for axillary staging in breast cancer. The procedure indicates whether axillary lymph node dissection (ALND) is necessary, therefore drastically minimising the invasiveness of surgical treatment. The SLNB concept is based on evidence suggesting that malignant disease primarily affects the sentinel node (SN) before being disseminated into the axillary lymph nodes (ALNs). Objective: This study was to define the role of lymphoscintigraphy in the visualisation of SNs during SLNB and to establish the correlation between the number of SNs identified on lymphoscintigraphy to the number of surgically identified SNs. Method: The study was a non-experimental, correlation study utilising quantitative data. Lymphoscintigraphy reports and histology results of 55 female breast cancer patients who underwent SLNB with partial or total back-up ALND, were retrospectively evaluated. Results: A maximum of 2 and a minimum of 0 sentinel nodes were visualised on lymphoscintigraphy in 52 out of 55 patients. Successful lymphoscintigraphy was highly predictive (p ≤ 0.001) of a successful SLNB as all 52 patients (94.5%) proceeded to have successful SN/s identification. There was a significant association (p ≤ 0.05) between the number of SN/s visualised on lymphoscintigraphy and the number of SN/s identified during SLNB. Lymphoscintigraphy accurately predicted the number of surgically identified SNs in 50.91% of cases (28/55). Conclusion: Considering that successful imaging effectively assures SN identification, the routine use of lymphoscintigraphy using the subdermal peri-areolar approach is fundamental in the reliable performance of SLNB.

  11. Error-Detecting Identification Codes for Algebra Students.

    Science.gov (United States)

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  12. [Circulating tumor cells: cornerstone of personalized medicine].

    Science.gov (United States)

    Rafii, A; Vidal, F; Rathat, G; Alix-Panabières, C

    2014-11-01

    Cancer treatment has evolved toward personalized medicine. It is mandatory for clinicians to ascertain tumor biological features in order to optimize patients' treatment. Identification and characterization of circulating tumor cells demonstrated a prognostic value in many solid tumors. Here, we describe the main technologies for identification and characterization of circulating tumor cells and their clinical application in gynecologic and breast cancers. Copyright © 2014. Published by Elsevier Masson SAS.

  13. Guidelines to facilitate self-care among older persons in South Africa

    Directory of Open Access Journals (Sweden)

    Tinda Rabie

    2015-10-01

    Full Text Available Background: The number of older persons is growing at an alarming rate, yet the South African healthcare sector is not giving this issue the required attention. Moreover, the healthcare sector serves four-fifths of the country's population and primary healthcare (PHC facilities are overcrowded, and thus professional nurses are prevented from providing sufficient self-care health education to older persons. Aim: To develop guidelines for the three role players — the public health sector, professional nurse and older person — to facilitate self-care among older persons in South Africa. Design: Quantitative, descriptive, explorative and contextual research design. Methods: A literature review followed by a self-care assessment of a sample of older persons using the Appraisal of Self-care Agency (ASA-A and Exercise of Self-care Agency (ESCA questionnaires which led to the identification of conclusions and self-care deficits. Results: Based on Menon's psychological health empowerment model, and from the conclusions and self-care deficits, nine self-care guidelines were developed for the public health sector, professional nurses and older persons. Conclusion: This is the first systematic development of guidelines to facilitate self-care among older persons in South Africa. Implications for practice: The implementation of the self-care guidelines by the public health sector, professional nurses and older persons will improve the healthcare of older persons at home which will in turn improve their quality of life, reduce unintentional self-neglect, as well as assist in alleviating overcrowding in clinics because unnecessary visits to the clinic will drop.

  14. [On the use of the spectral speech characteristics for the determination of biometric parameters of the vocal tract in forensic medical identification of the speaker's personality].

    Science.gov (United States)

    Kaganov, A Sh

    2014-01-01

    The objective of the present study was to elucidate the relationship between the spectral speech characteristics and the biometric parameters of the speaker's vocal tract. The secondary objective was to consider the theoretical basis behind the medico-criminalistic personality identification from the biometric parameters of the speaker's vocal tract. The article is based on the results of real forensic medical investigations and the literature data.

  15. Person-Environment Mergence and Separation: Otto Rank's Psychology of Emotion, Personality, and Culture.

    Science.gov (United States)

    Sullivan, Daniel

    2016-12-01

    Between 1924 and 1939 Otto Rank put forward three major elements of a comprehensive theoretical edifice that has yet to be fully articulated. These are conceptually linked by the fundamental importance of person-environment mergence and separation. Rank's theory of emotions highlights anxiety as the affect of separation, and guilt as the feeling that binds the individual to others. His personality theory distinguishes between the partialist, who responds to life fear with identification, and the totalist, who responds to death fear with projection. His cultural psychology contrasts primal collectivism with contemporary individualism, which orients the person toward individual immortality striving. Individualism has produced problematic self-consciousness and neuroticism, in the face of which Rank struggled to find a new psychology.

  16. Two-component network model in voice identification technologies

    Directory of Open Access Journals (Sweden)

    Edita K. Kuular

    2018-03-01

    Full Text Available Among the most important parameters of biometric systems with voice modalities that determine their effectiveness, along with reliability and noise immunity, a speed of identification and verification of a person has been accentuated. This parameter is especially sensitive while processing large-scale voice databases in real time regime. Many research studies in this area are aimed at developing new and improving existing algorithms for presentation and processing voice records to ensure high performance of voice biometric systems. Here, it seems promising to apply a modern approach, which is based on complex network platform for solving complex massive problems with a large number of elements and taking into account their interrelationships. Thus, there are known some works which while solving problems of analysis and recognition of faces from photographs, transform images into complex networks for their subsequent processing by standard techniques. One of the first applications of complex networks to sound series (musical and speech analysis are description of frequency characteristics by constructing network models - converting the series into networks. On the network ontology platform a previously proposed technique of audio information representation aimed on its automatic analysis and speaker recognition has been developed. This implies converting information into the form of associative semantic (cognitive network structure with amplitude and frequency components both. Two speaker exemplars have been recorded and transformed into pertinent networks with consequent comparison of their topological metrics. The set of topological metrics for each of network models (amplitude and frequency one is a vector, and together  those combine a matrix, as a digital "network" voiceprint. The proposed network approach, with its sensitivity to personal conditions-physiological, psychological, emotional, might be useful not only for person identification

  17. Suspect/foil identification in actual crimes and in the laboratory: a reality monitoring analysis.

    Science.gov (United States)

    Behrman, Bruce W; Richards, Regina E

    2005-06-01

    Four reality monitoring variables were used to discriminate suspect from foil identifications in 183 actual criminal cases. Four hundred sixty-one identification attempts based on five and six-person lineups were analyzed. These identification attempts resulted in 238 suspect identifications and 68 foil identifications. Confidence, automatic processing, eliminative processing and feature use comprised the set of reality monitoring variables. Thirty-five verbal confidence phrases taken from police reports were assigned numerical values on a 10-point confidence scale. Automatic processing identifications were those that occurred "immediately" or "without hesitation." Eliminative processing identifications occurred when witnesses compared or eliminated persons in the lineups. Confidence, automatic processing and eliminative processing were significant predictors, but feature use was not. Confidence was the most effective discriminator. In cases that involved substantial evidence extrinsic to the identification 43% of the suspect identifications were made with high confidence, whereas only 10% of the foil identifications were made with high confidence. The results of a laboratory study using the same predictors generally paralleled the archival results. Forensic implications are discussed.

  18. Systems and methods for remote long standoff biometric identification using microwave cardiac signals

    Science.gov (United States)

    McGrath, William R. (Inventor); Talukder, Ashit (Inventor)

    2012-01-01

    Systems and methods for remote, long standoff biometric identification using microwave cardiac signals are provided. In one embodiment, the invention relates to a method for remote biometric identification using microwave cardiac signals, the method including generating and directing first microwave energy in a direction of a person, receiving microwave energy reflected from the person, the reflected microwave energy indicative of cardiac characteristics of the person, segmenting a signal indicative of the reflected microwave energy into a waveform including a plurality of heart beats, identifying patterns in the microwave heart beats waveform, and identifying the person based on the identified patterns and a stored microwave heart beats waveform.

  19. The Chiasmus of Mourning and Identification in Jean Genet

    Directory of Open Access Journals (Sweden)

    Peter Benson

    2000-06-01

    Full Text Available The theories of psychological identification proposed by Sigmund Freud and Kaja Silverman are explored in relation to Jean Genet's Funeral Rites and his later essay on Rembrandt. Genet can be seen to separate mourning (which for Freud lies at the basis of identification from a process of generalized identification in which his difference from other people dissolves. A narcissistic formation of personality, evident in the symbolism of mirrors in Funeral Rites , gives to this process an added impetus. But the fundamental condition of possibility for such generalized identification is the void it reveals at the center of all personality. This void not only makes possible the different kinds of identification (heteropathic and idiopathic described by Silverman, it also disturbs any clear distinction between them. It is for these reasons that the glamorization of Nazism in Funeral Rites is coextensive with a demystification of its power, and the often brutal eroticism of the book is suffused with an ineradicable dimension of tenderness. Taken further in the essay on Rembrandt, these themes lead to an ambiguous mysticism in which the source of creativity is revealed as inseparable from its ultimate obliteration.

  20. Assessing nonchoosers' eyewitness identification accuracy from photographic showups by using confidence and response times.

    Science.gov (United States)

    Sauerland, Melanie; Sagana, Anna; Sporer, Siegfried L

    2012-10-01

    While recent research has shown that the accuracy of positive identification decisions can be assessed via confidence and decision times, gauging lineup rejections has been less successful. The current study focused on 2 different aspects which are inherent in lineup rejections. First, we hypothesized that decision times and confidence ratings should be postdictive of identification rejections if they refer to a single lineup member only. Second, we hypothesized that dividing nonchoosers according to the reasons they provided for their decisions can serve as a useful postdictor for nonchoosers' accuracy. To test these assumptions, we used (1) 1-person lineups (showups) in order to obtain confidence and response time measures referring to a single lineup member, and (2) asked nonchoosers about their reasons for making a rejection. Three hundred and eighty-four participants were asked to identify 2 different persons after watching 1 of 2 stimulus films. The results supported our hypotheses. Nonchoosers' postdecision confidence ratings were well-calibrated. Likewise, we successfully established optimum time and confidence boundaries for nonchoosers. Finally, combinations of postdictors increased the number of accurate classifications compared with individual postdictors. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  1. Personality traits in learning and education

    NARCIS (Netherlands)

    De Raad, B.

    Personality traits judged relevant for the context of learning and education are identified as a subset of a comprehensive set of 1203 trait descriptive adjectives, constructed by Brokken (1979). The identification procedure is described and relevant statistics are provided. Self- and peer-ratings

  2. Personal factors and personality characteristics as predictors of ...

    African Journals Online (AJOL)

    The study set to investigate personal factors and personality characteristics as Predictors of customers satisfaction with health care services. The study utilized Ex-Post Facto design. A total number of 100 participants took part in the study which were made up of 57 (57%) males and 48 (48%) females, with a mean age of ...

  3. Detection and Identification of People at a Critical Infrastructure Facilities of Trafic Buildings

    Directory of Open Access Journals (Sweden)

    Rastislav PIRNÍK

    2014-12-01

    Full Text Available This paper focuses on identification of persons entering objects of crucial infrastructure and subsequent detection of movement in parts of objects. It explains some of the technologies and approaches to processing specific image information within existing building apparatus. The article describes the proposed algorithm for detection of persons. It brings a fresh approach to detection of moving objects (groups of persons involved in enclosed areas focusing on securing freely accessible places in buildings. Based on the designed algorithm of identification with presupposed utilisation of 3D application, motion trajectory of persons in delimited space can be automatically identified. The application was created in opensource software tool using the OpenCV library.

  4. An exploration study to find important factors influencing on brand identification

    Directory of Open Access Journals (Sweden)

    Naser Azad

    2013-09-01

    Full Text Available Building a famous brand often makes it possible to have sustainable growth in competitive market. A good brand name plays an important role on increasing word of mouth advertisement, the number of loyal customers and repurchase habits. However, in order to build a good brand, we need to create sustainable brand identification and to do this we need to determine influential factors. This paper presents an empirical investigation to find important factors influencing brand identification. The proposed study designs a questionnaire in Likert scale consists of 23 questions, distributes it among 400 people who purchase regularly from hyperstar and collects 400 filled ones. Cronbach alpha is calculated as 0.735. In addition, Kaiser-Meyer-Olkin Measure of Sampling Adequacy and Approx. Chi-Square are 0.784 and 2300.022, respectively. Based on the results of our survey, we have derived five factors including sense of brand, brand community, trust to brand, value of brand and personality of brand.

  5. Different groups, different motives: identity motives underlying changes in identification with novel groups.

    Science.gov (United States)

    Easterbrook, Matt; Vignoles, Vivian L

    2012-08-01

    Social identification is known to have wide-reaching implications, but theorists disagree about the underlying motives. Integrating motivated identity construction theory with recent social identity research, the authors predicted which motives underlie identification with two types of groups: interpersonal networks and social categories. In a five-wave longitudinal study of social identity processes among 268 new university residents, multilevel analyses showed that motives involved in identity enactment processes--self-esteem, belonging, and efficacy--significantly predicted within-person changes in identification with flatmates (an interpersonal network group), whereas motives involved in identity definition processes--meaning, self-esteem, and distinctiveness--significantly predicted within-person changes in identification with halls of residence (an abstract social category). This article discusses implications for research into identity motives and social identity.

  6. 49 CFR 229.105 - Steam generator number.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Steam generator number. 229.105 Section 229.105..., DEPARTMENT OF TRANSPORTATION RAILROAD LOCOMOTIVE SAFETY STANDARDS Safety Requirements Steam Generators § 229.105 Steam generator number. An identification number shall be marked on the steam generator's...

  7. Identification of copy number variants in horses

    KAUST Repository

    Doan, R.

    2012-03-01

    Copy number variants (CNVs) represent a substantial source of genetic variation in mammals. However, the occurrence of CNVs in horses and their subsequent impact on phenotypic variation is unknown. We performed a study to identify CNVs in 16 horses representing 15 distinct breeds (Equus caballus) and an individual gray donkey (Equus asinus) using a whole-exome tiling array and the array comparative genomic hybridization methodology. We identified 2368 CNVs ranging in size from 197 bp to 3.5 Mb. Merging identical CNVs from each animal yielded 775 CNV regions (CNVRs), involving 1707 protein- and RNA-coding genes. The number of CNVs per animal ranged from 55 to 347, with median and mean sizes of CNVs of 5.3 kb and 99.4 kb, respectively. Approximately 6% of the genes investigated were affected by a CNV. Biological process enrichment analysis indicated CNVs primarily affected genes involved in sensory perception, signal transduction, and metabolism. CNVs also were identified in genes regulating blood group antigens, coat color, fecundity, lactation, keratin formation, neuronal homeostasis, and height in other species. Collectively, these data are the first report of copy number variation in horses and suggest that CNVs are common in the horse genome and may modulate biological processes underlying different traits observed among horses and horse breeds.

  8. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  9. Estimating Between-Person and Within-Person Subscore Reliability with Profile Analysis.

    Science.gov (United States)

    Bulut, Okan; Davison, Mark L; Rodriguez, Michael C

    2017-01-01

    Subscores are of increasing interest in educational and psychological testing due to their diagnostic function for evaluating examinees' strengths and weaknesses within particular domains of knowledge. Previous studies about the utility of subscores have mostly focused on the overall reliability of individual subscores and ignored the fact that subscores should be distinct and have added value over the total score. This study introduces a profile reliability approach that partitions the overall subscore reliability into within-person and between-person subscore reliability. The estimation of between-person reliability and within-person reliability coefficients is demonstrated using subscores from number-correct scoring, unidimensional and multidimensional item response theory scoring, and augmented scoring approaches via a simulation study and a real data study. The effects of various testing conditions, such as subtest length, correlations among subscores, and the number of subtests, are examined. Results indicate that there is a substantial trade-off between within-person and between-person reliability of subscores. Profile reliability coefficients can be useful in determining the extent to which subscores provide distinct and reliable information under various testing conditions.

  10. Free DICOM de-identification tools in clinical research : functioning and safety of patient privacy

    NARCIS (Netherlands)

    Aryanto, K. Y. E.; Oudkerk, M.; van Ooijen, P. M. A.

    2015-01-01

    To compare non-commercial DICOM toolkits for their de-identification ability in removing a patient's personal health information (PHI) from a DICOM header. Ten DICOM toolkits were selected for de-identification tests. Tests were performed by using the system's default de-identification profile and,

  11. 19 CFR 24.26 - Automated Clearinghouse credit.

    Science.gov (United States)

    2010-04-01

    ...; payer identification number (importer number or Social Security number or Customs assigned number); and... its financial institution when originating its payments: Company name; company contact person name and telephone number; company identification number (coded Internal Revenue Service employer identification...

  12. Model of competence: a conceptual framework for understanding the person-environment interaction for persons with motor disabilities.

    Science.gov (United States)

    Rousseau, Jacqueline; Potvin, Louise; Dutil, Elisabeth; Falta, Patricia

    2002-01-01

    The "Model of Competence" has been recently elaborated to help expand our understanding relating to a person's interaction with the environment. Specifically, it seeks to deal with the issues related to the home adaptation (the home layout and equipment) for a person living with motor disabilities. This theoretical model takes into account various characteristics of the person as well as of the environment, by re-grouping six concepts: person, environment, activity, role, competence and handicap situation. The "Model of Competence" is distinct because it includes: (1) both the human and the nonhuman dimension of the environment; (2) personal characteristics other than the strictly physical ones; (3) a clear identification of the interaction between the person and the environment; and (4) a means of operationalizing it via an assessment instrument. This model proposes an innovative approach to the person-environment relation in terms of personalizing accessibility, and thereby offers a new approach to understanding the concept of universal access. It has been developed for research and application, and addresses several disciplines.

  13. Compelled to Risk: Does Sexual Compulsivity Explain the Connection Between Borderline Personality Disorder Features and Number of Sexual Partners?

    Science.gov (United States)

    Jardin, Charles; Sharp, Carla; Garey, Lorra; Vanwoerden, Salome; Crist, Nic; Elhai, Jon D; Zvolensky, Michael J

    2017-12-01

    Having more sexual partners increases the likelihood of new HIV infections among women. Women with more borderline personality disorder (BPD) features have been known to have greater numbers of sexual partners. However, the mechanisms linking BPD features with more sexual partners remain to be clarified. Sexual compulsivity (lack of control, increased distress over sexual behavior) may be one such explanatory factor, as it overlaps with BPD features (e.g., impulsivity, negative affectivity). The present study examined whether sexual compulsivity explained the relation of BPD features with number of sexual partners among a diverse sample of college females (N = 1,326). Results demonstrated a significant indirect effect of BPD features via sexual compulsivity on number of sexual partners. These findings support the relation between BPD features and sexual compulsivity and suggest sexual compulsivity as a target in the promotion of the sexual health of women with BPD who demonstrate risky sexual practices.

  14. The Effect of Personality on Occupational Stress in Veterinary Surgeons.

    Science.gov (United States)

    Dawson, Briony F Y; Thompson, Neill J

    Statistics show that veterinary surgeons are in one of the professions with the highest suicide rates. This indicates the sector has significant well-being issues, with high levels of occupational stress and burnout. Previous research has focused on environmental factors in isolation, overlooking the influence of personality. This study aimed to establish that personality is a better predictor of occupational stress than environment. UK veterinary surgeons (n=311) completed an online survey composed of three questionnaires; the NEO Five-Factor Inventory, the Maslach Burnout Inventory, and the Job Stress Survey. Multiple regression analysis revealed that personality is a better predictor of occupational stress than environment (poccupational stress (pstress are depression (p=.002) and anger hostility (p=.005). Demographic factors such as the number of years the veterinarian has been qualified acted as a mediator between depression and occupational stress (poccupational stress (p=.028). Overall findings suggest that newly qualified veterinarians are at greater risk of suffering from high levels of occupational stress than those well established in the profession, and that veterinarians with higher levels of depression and anger hostility are likely to experience greater levels of occupational stress. Implications highlight the need for greater awareness of potentially susceptible personality traits in the veterinary admissions process. This would allow for the identification of those at risk and the implementation of interventions.

  15. Personalized gesture interactions for cyber-physical smart-home environments

    Institute of Scientific and Technical Information of China (English)

    Yihua LOU; Wenjun WU; Radu-Daniel VATAVU; Wei-Tek TSAI

    2017-01-01

    A gesture-based interaction system for smart homes is a part of a complex cyber-physical environment,for which researchers and developers need to address major challenges in providing personalized gesture interactions.However,current research efforts have not tackled the problem of personalized gesture recognition that often involves user identification.To address this problem,we propose in this work a new event-driven service-oriented framework called gesture services for cyber-physical environments (GS-CPE) that extends the architecture of our previous work gesture profile for web services (GPWS).To provide user identification functionality,GS-CPE introduces a two-phase cascading gesture password recognition algorithm for gesture-based user identification using a two-phase cascading classifier with the hidden Markov model and the Golden Section Search,which achieves an accuracy rate of 96.2% with a small training dataset.To support personalized gesture interaction,an enhanced version of the Dynamic Time Warping algorithm with multiple gestural input sources and dynamic template adaptation support is implemented.Our experimental results demonstrate the performance of the algorithm can achieve an average accuracy rate of 98.5% in practical scenarios.Comparison results reveal that GS-CPE has faster response time and higher accuracy rate than other gesture interaction systems designed for smart-home environments.

  16. Phonetic physical feature formula for identification of radiation auxiliary workers and security applications

    International Nuclear Information System (INIS)

    Srivastava, D.N.; Srivastava, M.K.; Kher, R.K.

    1997-08-01

    This report gives a review of human physical features with the aim of evolving a simple and practical formula which can be used to identify radiation auxiliary workers even if they do not reveal their radiation work history either due to ignorance or intentionally. To have the formula short, the phonetic number system of radix 128 has been employed. The formula finally arrived at consists of three phonetic digits representing 17 features and age in blocks of 8 years. There are four main advantages of this formula. The first is binary division which has more surety and better accuracy. The second is expert redundancy, that is expert examination is not required. Third is very large number of categories (128K=131072). And the fourth is nearly equal probabilities of all categories which make the number of people in each category very few and that simplifies the search. Hence by the scan of a few records, it is easily possible to ascertain whether a person is a new entrant or an old timer. Its application ensures better monitoring of the radiation exposure of auxiliary workers. This formula can also be used by police department and investigating agencies to classify the records of suspected persons for the ease of their identification when they give misleading information

  17. Attendance fingerprint identification system using arduino and single board computer

    Science.gov (United States)

    Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.

    2018-03-01

    Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

  18. Identification of Intellectually Able Disadvantaged Filipino Children.

    Science.gov (United States)

    Naval-Severino, Teresita

    1992-01-01

    Preschool Filipino children from disadvantaged urban communities were assessed for giftedness. This article describes the identification procedures and tools used and presents a profile of the children in terms of socioeconomic, intellectual, and personality variables. (Author/JDD)

  19. Personal dosimetry and information platforms

    International Nuclear Information System (INIS)

    Sanchez Hidalgo, M.; Galan Montenegro, P.; Bodineau Gil, C.; Hernandez Rodriguez, R.; Jimenez Nartin, A.; Cano Sanchez, J. J.

    2011-01-01

    One question often raised by the hospital personnel dosimetry is the high incidence in the no monthly turnover of dosimeters, which is currently a high number of administrative dose assignments. The high number of workers with personal dosimetry and in many cases, the dispersion of workplaces makes it impossible to personalized management. To make a more direct and personal, and transmit information quickly and with guaranteed reception, has developed and implemented a system of personalized dosimetric information through messaging Short Message Service (SMS) and access to the history of dosimetric dosimetric and management through web space Service Hospital Radio physics.

  20. 30 CFR 77.215-1 - Refuse piles; identification.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Refuse piles; identification. 77.215-1 Section... COAL MINES Surface Installations § 77.215-1 Refuse piles; identification. A permanent identification marker, at least six feet high and showing the refuse pile identification number as assigned by the...

  1. Nosewitness Identification: Effects of Negative Emotion

    Science.gov (United States)

    Ferreira, Jacqueline; Rocha, Marta; Silva, Carlos F.; Olsson, Mats J.

    2015-01-01

    Every individual has a unique body odor (BO), similar to a fingerprint. In forensic research, identification of culprit BOs has been performed by trained dogs, but not by humans. We introduce the concept of nosewitness identification and present the first experimental results on BO memory in witness situations involving violent crimes. Two experiments indicated that BO associated with male characters in authentic videos could later be identified in BO lineup tests well above chance. Moreover, culprit BO in emotional crime videos could be identified considerably better than the BO of a male person in neutral videos. This indicates that nosewitness identification benefits from emotional encoding. Altogether, the study testifies to the virtue of body odor as a cue to identify individuals observed under negative emotion. PMID:25612211

  2. Identification of copy number variants in horses

    KAUST Repository

    Doan, R.; Cohen, N.; Harrington, J.; Veazy, K.; Juras, R.; Cothran, G.; McCue, M. E.; Skow, L.; Dindot, S. V.

    2012-01-01

    identical CNVs from each animal yielded 775 CNV regions (CNVRs), involving 1707 protein- and RNA-coding genes. The number of CNVs per animal ranged from 55 to 347, with median and mean sizes of CNVs of 5.3 kb and 99.4 kb, respectively. Approximately 6

  3. Can DSM-IV borderline personality disorder be diagnosed via dimensional personality traits? Implications for the DSM-5 personality disorder proposal.

    Science.gov (United States)

    Miller, Joshua D; Morse, Jennifer Q; Nolf, Kimberly; Stepp, Stephanie D; Pilkonis, Paul A

    2012-11-01

    The proposal for the diagnosis of personality disorders (PDs) in the Diagnostic and Statistical Manual of Mental Disorders, 5th edition (DSM-5;American Psychiatric Association, in preparation) involves, in part, the use of elevated scores on dimensional personality traits. For instance, the diagnosis of borderline personality disorder (BPD) in the DSM-5 will require evidence of self- and interpersonal impairment as well as elevated scores on traits of emotional lability, anxiousness, separation insecurity, depressivity, impulsivity, risk taking, and hostility. Using a sample of individuals from the community (N = 134), half of whom were receiving psychiatric treatment, we tested whether the summation of relevant personality trait scores, using data derived from a measure of the Five-Factor Model of personality (FFM), would result in a construct that corresponds to the Diagnostic and Statistical Manual of Mental Disorders, 4th ed. (DSM-IV, American Psychiatric Association, 2000) BPD construct as scored by expert consensus ratings. The DSM-IV and FFM BPD scores were significantly correlated (r = .60) and generated highly similar patterns of relations (ricc = .84) with key constructs from BPD's nomological network. These data should serve to allay concerns that the DSM-5's new diagnostic approach will be detrimental to the identification of BPD. (PsycINFO Database Record (c) 2012 APA, all rights reserved).

  4. Examining How Media Literacy and Personality Factors Predict Skepticism Toward Alcohol Advertising.

    Science.gov (United States)

    Austin, Erica Weintraub; Muldrow, Adrienne; Austin, Bruce W

    2016-05-01

    To examine the potential effectiveness of media literacy education in the context of well-established personality factors, a survey of 472 young adults, focused on the issue of alcohol marketing messages, examined how individual differences in personality associate with constructs representing aspects of media literacy. The results showed that need for cognition predicted social expectancies and wishful identification with media portrayals in alcohol advertising only through critical thinking about media sources and media content, which are foci of media literacy education. Need for affect did not associate with increased or diminished levels of critical thinking. Critical thinking about sources and messages affected skepticism, represented by expectancies through wishful identification, consistent with the message interpretation process model. The results support the view that critical thinking about media sources is an important precursor to critical thinking about media messages. The results also suggest that critical thinking about media (i.e., media literacy) reflects more than personality characteristics and can affect wishful identification with role models observed in media, which appears to be a key influence on decision making. This adds support to the view that media literacy education can improve decision making across personality types regarding alcohol use by decreasing the potential influence of alcohol marketing messages.

  5. TO DETERMINE THE PERSONALITY TRAITS, CLINICAL CHARACTERISTICS AND COGNITIVE FUNCTIONS IN BIPOLAR DISORDER PATIENTS WITH COMORBID ALCOHOL USE DISORDERS

    Directory of Open Access Journals (Sweden)

    Ahalya Thinaharan

    2016-12-01

    Full Text Available BACKGROUND Comorbidity of bipolar disorder and substance use disorder is common. It is difficult to treat bipolar disorder patients with comorbid alcohol use disorder since the disease course is more severe and they have greater difficulties in cognitive functions than those without alcohol use. Whether alcohol negatively affects specific cognitive functions or the deficits are more diffuse in nature is unclear. Alcoholic bipolar patients present with high scores in openness to experience and neuroticism personality traits. Personality to an extent mediates the co-occurrence of substance use in bipolar disorder. Thus, identifying these personality traits in bipolar or substance use disorder patients, will help us to prevent the co-occurrence of the second disorder. The aim of the study is to evaluate the clinical characteristics, personality traits and cognitive functions of patients with bipolar and comorbid alcohol use disorders. MATERIALS AND METHODS A sample of 100 patients, 50 with bipolar and alcohol use disorder (cases and 50 with bipolar disorder (controls attending tertiary care hospital outpatient department at Chennai was selected. Alcohol status was assessed using AUDIT (alcohol use disorder identification test and SADQ (severity of alcohol dependence questionnaire. Personality was assessed using NEO-five factor inventory. Cognition was assessed using frontal lobe assessment battery, Stroop test, DSST (digit symbol substitution test and verbal N back test. RESULTS The cases group had more number of hospitalisations and mixed episodes than control group. They also performed poorer on frontal lobe assessment battery, Stroop test and digit symbol substitution test. Duration of alcohol use was associated positively with total number of hospitalisations and number of episodes. The cases group scored significantly higher on the personality traits of neuroticism and openness to experience. CONCLUSION The study confirmed the higher

  6. The role of personality traits in posttraumatic stress disorder (PTSD).

    Science.gov (United States)

    Jakšić, Nenad; Brajković, Lovorka; Ivezić, Ena; Topić, Radmila; Jakovljević, Miro

    2012-09-01

    A number of studies have shown that although exposure to potentially traumatic events is common, development of PTSD is relatively rare, which is one of the reasons PTSD still remains a controversial psychiatric entity. The aim of this article was to provide an overview of the research on the role of personality traits in the vulnerability, resilience, posttraumatic growth and expressions associated with PTSD. Personality based approach represents a dimensional aspect of the transdisciplinary integrative model of PTSD. We conducted a systematic search on PubMed, PsycINFO, and Academic Search Complete from 1980 (the year PTSD was first included in the DSM) and 2012 (the year the literature search was performed). Manual examination of secondary sources such as the reference sections of selected articles and book chapters were also conducted. Most of the reviewed studies dealing with personality traits as vulnerability and protective factors for PTSD examined the relationship between basic personality dimensions and severity of symptoms of PTSD. These studies have applied three types of methodological designs: cross-sectional, post-trauma and pre-trauma longitudinal studies, with latter being the least common option. Finding that appears relatively consistent is that PTSD is positively related to negative emotionality, neuroticism, harm avoidance, novelty-seeking and self-transcendence, as well as to trait hostility/anger and trait anxiety. On the other hand, PTSD symptoms are negatively associated with extraversion, conscientiousness, self-directedness, the combination of high positive and low negative emotionality, as well as with hardiness and optimism, while posttraumatic growth shows inverse relation to most of these traits. Furthermore, a number of studies have confirmed the existence of three distinct personality-based subtypes of PTSD: internalizing, externalizing and low pathology PTSD. These findings may help in further uncovering etiological mechanisms and

  7. Connecting Self-Esteem and Achievement: Diversity in Academic Identification and Dis-Identification Patterns among Black College Students

    Science.gov (United States)

    Hope, Elan C.; Chavous, Tabbye M.; Jagers, Robert J.; Sellers, Robert M.

    2013-01-01

    Using a person-oriented approach, we explored patterns of self-esteem and achievement among 324 Black college students across the freshman college year and identified four academic identification profiles. Multivariate analyses revealed profile differences in academic and psychological outcomes at beginning and end of freshman year (academic…

  8. Türkçede Üçüncü Kişide Kişi ve Sayı Özelliklerinin Onarım Tabanlı İncelenmesi A Repair-Based Investigation Of Person And Number Features Of Third Person In Turkish

    Directory of Open Access Journals (Sweden)

    Mehmet AYGÜNEŞ

    2013-07-01

    Full Text Available In syntactic theory, one line of reasoning holds that [person] and[number] features are in the form of bundle features (Chomsky, 1995,2000, 2004, while there are also views supporting the split featuresargument (Sigurðsson, 2004; Baker, 2008; Nevins, 2011, et al.. Inaddition to this distinction between [person] and [number] features, it isargued that there is also a hierarchical structure within the [person]feature and considering the cross-linguistic perspective, there is a1/2>3 [person] hierarchy (Benveniste, 1966; Silverstein, 1985;Carminati, 2005; Bianchi, 2006. The present study aims to understandwhether [person] and [number] features of third person in Turkish aresplit features or not through the repair strategy. Furthermore, the datacollected in this study have been combined with that of Aygüneş (2012,2013 and a second analysis was performed. The aim of this analysiswas to identify the differences reflected to the repair process in personand number categories of the first and third person. Seventyparticipants took part in the study. The participants were presentedwith three sentence types including person, number, and both personand number mismatches between DP (Determiner Phrase and To head(Tense Head and were asked to correct these sentences. The resultsrevealed that participants repaired sentences containing mismatch onthe basis of the DP at a higher rate and word order did not influence therepair process. Moreover, a difference was observed in the repair ofmismatches in the person and number categories in the third person.This finding is line with the argument that [person] and [number] aresplit features. When the present data were combined with data fromAygüneş (2012, 2013, a difference was observed between first and thirdperson in the repair process, which stems from the number category.While the number category interacted with DP and To head at a similarrate in the first person, it interacted with the DP at a higher rate in

  9. Eyewitness identification: Bayesian information gain, base-rate effect equivalency curves, and reasonable suspicion.

    Science.gov (United States)

    Wells, Gary L; Yang, Yueran; Smalarz, Laura

    2015-04-01

    We provide a novel Bayesian treatment of the eyewitness identification problem as it relates to various system variables, such as instruction effects, lineup presentation format, lineup-filler similarity, lineup administrator influence, and show-ups versus lineups. We describe why eyewitness identification is a natural Bayesian problem and how numerous important observations require careful consideration of base rates. Moreover, we argue that the base rate in eyewitness identification should be construed as a system variable (under the control of the justice system). We then use prior-by-posterior curves and information-gain curves to examine data obtained from a large number of published experiments. Next, we show how information-gain curves are moderated by system variables and by witness confidence and we note how information-gain curves reveal that lineups are consistently more proficient at incriminating the guilty than they are at exonerating the innocent. We then introduce a new type of analysis that we developed called base rate effect-equivalency (BREE) curves. BREE curves display how much change in the base rate is required to match the impact of any given system variable. The results indicate that even relatively modest changes to the base rate can have more impact on the reliability of eyewitness identification evidence than do the traditional system variables that have received so much attention in the literature. We note how this Bayesian analysis of eyewitness identification has implications for the question of whether there ought to be a reasonable-suspicion criterion for placing a person into the jeopardy of an identification procedure. (c) 2015 APA, all rights reserved).

  10. 20 CFR 422.112 - Employer identification numbers.

    Science.gov (United States)

    2010-04-01

    ... Form SSA-214-CD to the interstate instrumentality to notify it of the number assigned. [60 FR 42433... pension or excise tax return is not subject to this requirement. To apply for an EIN, employers file Form... employers, Form SS-4 is available at all SSA and IRS offices. Household employers, agricultural employers...

  11. Finger nail plate shape and size for personal identification – a ...

    African Journals Online (AJOL)

    ... identification – a possible low technology method for the developing world ... The population included 496 consenting individuals, four family units and four sets of ... Examination showed variations within members of the families i.e. no two ...

  12. Estimating the Number of Heterosexual Persons in the United States to Calculate National Rates of HIV Infection.

    Directory of Open Access Journals (Sweden)

    Amy Lansky

    Full Text Available This study estimated the proportions and numbers of heterosexuals in the United States (U.S. to calculate rates of heterosexually acquired human immunodeficiency virus (HIV infection. Quantifying the burden of disease can inform effective prevention planning and resource allocation.Heterosexuals were defined as males and females who ever had sex with an opposite-sex partner and excluded those with other HIV risks: persons who ever injected drugs and males who ever had sex with another man. We conducted meta-analysis using data from 3 national probability surveys that measured lifetime (ever sexual activity and injection drug use among persons aged 15 years and older to estimate the proportion of heterosexuals in the United States population. We then applied the proportion of heterosexual persons to census data to produce population size estimates. National HIV infection rates among heterosexuals were calculated using surveillance data (cases attributable to heterosexual contact in the numerators and the heterosexual population size estimates in the denominators.Adult and adolescent heterosexuals comprised an estimated 86.7% (95% confidence interval: 84.1%-89.3% of the U.S. population. The estimate for males was 84.1% (CI: 81.2%-86.9% and for females was 89.4% (95% CI: 86.9%-91.8%. The HIV diagnosis rate for 2013 was 5.2 per 100,000 heterosexuals and the rate of persons living with diagnosed HIV infection in 2012 was 104 per 100,000 heterosexuals aged 13 years or older. Rates of HIV infection were >20 times as high among black heterosexuals compared to white heterosexuals, indicating considerable disparity. Rates among heterosexual men demonstrated higher disparities than overall population rates for men.The best available data must be used to guide decision-making for HIV prevention. HIV rates among heterosexuals in the U.S. are important additions to cost effectiveness and other data used to make critical decisions about resources for

  13. Additional approaches to DNA typing of skeletal remains: the search for "missing" persons killed during the last dictatorship in Argentina.

    Science.gov (United States)

    Corach, D; Sala, A; Penacino, G; Iannucci, N; Bernardi, P; Doretti, M; Fondebrider, L; Ginarte, A; Inchaurregui, A; Somigliana, C; Turner, S; Hagelberg, E

    1997-08-01

    DNA typing techniques are among the most advanced tools for human identification and can contribute to the identification of poorly preserved skeletal remains. Ten thousand people are thought to have been killed during the last dictatorship in Argentina (1976-1983) and there are few official records on the identity of the victims or the location of burials. A mass grave containing 340 skeletons was excavated using archeological methods. A small number of individuals was identified by traditional forensic methods and one family group by mitochondrial DNA (mtDNA) analysis. Due to the lack of antemortem physical information on many of the victims, the application of molecular methods is imperative to speed up the identification process. We have tested two molecular screening methods, Y chromosome-specific short tandem repeats (DYS19, DYS385, DYS389 I, DYS389 II, DYS390, DYS391, DYS392, DYS393) and amplification of autosomal microsatellites using nested primers. These methods can complement solely matrilineal mtDNA sequence data in the identification of "missing" persons.

  14. Personal Moral Norms and Attitudes Toward Endangered Species Policies on Private Land

    Directory of Open Access Journals (Sweden)

    Leigh Raymond

    2014-01-01

    Full Text Available Research across multiple disciplines has shown that personal moral norms can play an important role in shaping individuals′ attitudes and behaviour. Despite this, we know relatively little about patterns of support among landowners for either a personal moral norm favouring a strong, ′intrinsic′ right of private ownership, or a moral duty to prevent extinction. In addition, we know even less about the ability of such norms to predict attitudes toward species protection on private lands, especially for non-charismatic species with few qualities that typically generate positive attitudes for conservation. Results from a mail survey of central Indiana landowners suggest broad support for a personal moral norm favouring a strong, ′intrinsic′ right of ownership as well as a personal moral norm to prevent extinction, and that these norms are better predictors of attitudes toward endangered species policies than partisan identification, identification as an environmentalist, strong religious beliefs, or several other demographic factors. The results suggest that those seeking to influence landowner attitudes toward species protection policies should pay closer attention to the influence of these personal moral norms.

  15. Genetic identification of children of the disappeared in Argentina.

    Science.gov (United States)

    Penchaszadeh, V B

    1997-01-01

    During the military dictatorship that ruled Argentina between 1976 and 1983, the security forces engaged in well-planned repression that included the abduction, torture, and disappearance of thousands of dissidents. Repression spared neither children nor pregnant women. Approximately 220 babies and children of the disappeared victims were abducted and kept mostly by families with connections with the military. After the restoration of democracy, attempts to find and identify the missing children were made, with the goal of restoring their personal and familial identities and returning them to their surviving relatives. The Association of Grandmothers of Plaza de Mayo and a number of geneticists who developed and applied methods of genetic identification to this human rights cause were instrumental in this quest. Initial use of histocompatibility (HLA) typing for genetic identification was later followed by nuclear DNA typing and mitochondrial DNA sequencing. Of 56 children found and identified, 30 were returned to their legitimate families, 13 remained with the families who had adopted them in good faith, 6 are still the subject of custody litigation in the courts, and 7 were found dead. Psychological and ethical guidelines protecting the best interests of the children were followed in all proceedings.

  16. PERSONALITY TRAITS AND BORDERLINE PERSONALITY DISORDER

    Directory of Open Access Journals (Sweden)

    Senija TAHIROVIC

    2016-12-01

    Full Text Available The people with Borderline Personality Disorder (BPD show pathological personality traits in three of the five domains (APA 2013. In addition to diagnostic criteria for BPD, described by Diagnostic and Statistical Manual of Mental Disorders (DSM-5, the dimensional model of personality disorder, based on five-factor model of personality, seems to gain interest as it promisses to eliminate problems associated with poor-fit, co-morbidity and unclear diagnosis. The purpose of this study is to identify the personality traits by people who are already diagnosed with BPD using the DSM-5 categorical criteria. Based on the theoretical concepts and existing research findings as well as increased interest in the dimensional personality theory, we assume that people diagnosed with BPD will show high levels of pathology on three trait domains: negative affectivity, disinhibition and antagonism. This study was conducted in Germany in psychiatric clinic. Fifteen participants represented a convenience sample, of patients already diagnosed with BPD. For this study Personality Inventory for DSM-5 (PID-5 was used. The findings supported the assumptions that people with BPD show some degree of anxiousness, emotional lability, hostility, impulsivity, risk taking and separation anxiety. The study also found that traits such as distractibility, withdrawal and submissiveness were also present in this participant group. Even though, study was conducted with small number of participants it has provided contribution to the already existing knowledge and understanding in regards to common personality treats for people diagnosed with BPD.

  17. Identification of genetic loci shared between schizophrenia and the Big Five personality traits.

    Science.gov (United States)

    Smeland, Olav B; Wang, Yunpeng; Lo, Min-Tzu; Li, Wen; Frei, Oleksandr; Witoelar, Aree; Tesli, Martin; Hinds, David A; Tung, Joyce Y; Djurovic, Srdjan; Chen, Chi-Hua; Dale, Anders M; Andreassen, Ole A

    2017-05-22

    Schizophrenia is associated with differences in personality traits, and recent studies suggest that personality traits and schizophrenia share a genetic basis. Here we aimed to identify specific genetic loci shared between schizophrenia and the Big Five personality traits using a Bayesian statistical framework. Using summary statistics from genome-wide association studies (GWAS) on personality traits in the 23andMe cohort (n = 59,225) and schizophrenia in the Psychiatric Genomics Consortium cohort (n = 82,315), we evaluated overlap in common genetic variants. The Big Five personality traits neuroticism, extraversion, openness, agreeableness and conscientiousness were measured using a web implementation of the Big Five Inventory. Applying the conditional false discovery rate approach, we increased discovery of genetic loci and identified two loci shared between neuroticism and schizophrenia and six loci shared between openness and schizophrenia. The study provides new insights into the relationship between personality traits and schizophrenia by highlighting genetic loci involved in their common genetic etiology.

  18. What Is a Personal Health Record (PHR)?

    Science.gov (United States)

    ... patient identification number, address, phone number, and social security number. Your health insurance company receives your health information through the claims provided by the patient accounts/billing department at your healthcare facility. The ...

  19. Lineup member similarity effects on children's eyewitness identification

    OpenAIRE

    Fitzgerald, Ryan J.; Whiting, Brittany F.; Therrien, Natalie M.; Price, Heather L.

    2014-01-01

    To date, research investigating the similarity among lineup members has focused on adult eyewitnesses. In the present research, children made identifications from lineups containing members of lower or higher similarity to a target person. In Experiment 1, following a live interaction, children's (6–14 years) correct identification rate was reduced in higher-similarity relative to lower-similarity lineups. In Experiment 2, children (6–12 years) and adults watched a video containing a target p...

  20. Correction for phylogeny, small number of observations and data redundancy improves the identification of coevolving amino acid pairs using mutual information

    DEFF Research Database (Denmark)

    Buslje, C.M.; Santos, J.; Delfino, J.M.

    2009-01-01

    Motivation: Mutual information (MI) theory is often applied to predict positional correlations in a multiple sequence alignment (MSA) to make possible the analysis of those positions structurally or functionally important in a given fold or protein family. Accurate identification of coevolving......-weighting techniques to reduce sequence redundancy and low-count corrections to account for small number of observations in limited size sequence families, can significantly improve the predictability of MI. The evaluation is made on large sets of both in silico-generated alignments as well as on biological sequence...

  1. Microbiological risk assessment for personal care products.

    Science.gov (United States)

    Stewart, S E; Parker, M D; Amézquita, A; Pitt, T L

    2016-12-01

    Regulatory decisions regarding microbiological safety of cosmetics and personal care products are primarily hazard-based, where the presence of a potential pathogen determines decision-making. This contrasts with the Food industry where it is a commonplace to use a risk-based approach for ensuring microbiological safety. A risk-based approach allows consideration of the degree of exposure to assess unacceptable health risks. As there can be a number of advantages in using a risk-based approach to safety, this study explores the Codex Alimentarius (Codex) four-step Microbiological Risk Assessment (MRA) framework frequently used in the Food industry and examines how it can be applied to the safety assessment of personal care products. The hazard identification and hazard characterization steps (one and two) of the Codex MRA framework consider the main microorganisms of concern. These are addressed by reviewing the current industry guidelines for objectionable organisms and analysing reports of contaminated products notified by government agencies over a recent 5-year period, together with examples of reported outbreaks. Data related to estimation of exposure (step three) are discussed, and examples of possible calculations and references are included. The fourth step, performed by the risk assessor (risk characterization), is specific to each assessment and brings together the information from the first three steps to assess the risk. Although there are very few documented uses of the MRA approach for personal care products, this study illustrates that it is a practicable and sound approach for producing products that are safe by design. It can be helpful in the context of designing products and processes going to market and with setting of microbiological specifications. Additionally, it can be applied reactively to facilitate decision-making when contaminated products are released on to the marketplace. Currently, the knowledge available may only allow a

  2. Management number identification method for nuclear fuel assembly

    International Nuclear Information System (INIS)

    Furuya, Nobuo; Mori, Kazuma.

    1995-01-01

    In the present invention, a management number indicated to appropriate portions of a fuel assembly can be read with no error for the management of nuclear fuel materials in the nuclear fuel assembly (counting management) and physical protection: PP. Namely, bar codes as a management number are printed by electrolytic polishing to one or more portions of a side surface of an upper nozzle of the assembly, an upper surface of a clamp and a side surface of a lower nozzle. The bar codes are read by a reader at one or more portions in a transporting path for transporting the fuel assembly and at a fuel detection device disposed in a fuel storage pool. The read signals are inputted to a computer. With such procedures, the nuclear fuel assembly can be identified with no error by reading the bar codes and without applying no danger to a human body. Since the reader is disposed in the course of the transportation and test for the assembly, and the read signals are inputted to the computer, the management for the counting number and PP is facilitated. (I.S.)

  3. Investigation of Personality Disordes and Personality Traits in Men with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Nahid Noorian

    2008-04-01

    Full Text Available Objective: The purpose of this study is to investigation of personality disorders and personality traits in men who have gender identity disorder (GID. Identification of personality disorders can be useful for enhancement of the quality of help to the patients. Materials & Methods: This analytical and cross-sectional study was a comparative and case – control research. 40 men with gender identity disorder were selected by convenient sampling from individuals who have been referred to Tehran Navab Safavi welfare center. Also, 40 available individuals who have no any diagnostic criteria about gender identity disorder in DSM-IV-TR and worked in Islamic Azad University (Tehran Sciences and Researches Unit were selected as control group and matched with patients. Personality disorders and those frequencies were evaluated with Millon Clinical Multiaxial Inventory-II (MCMI-II. Data were analyzed using by Chi-square and Independent T tests. Results: The results showed that gender identity disorder patients get higher scores as compared to control group in scales “Dependent” (P=0/038, “Histrionic” (P<0/001, “Antisocial” (P=0/017, “Passive – aggressive” (P=0/007, “Borderline” (P<0/001 and “Paranoid” (P=0/021 and their difference was significant. Conclusion: Generally, the results of this study showed persons who have gender identity disorder also have some symptoms of personality disorders more than normal people.

  4. The effects of authentic leadership, organizational identification, and occupational coping self-efficacy on new graduate nurses' job turnover intentions in Canada.

    Science.gov (United States)

    Fallatah, Fatmah; Laschinger, Heather K S; Read, Emily A

    Nurses' turnover has a costly impact on organizations, patients, and nurses. Numerous studies have highlighted the critical role of nursing leadership in enhancing new nurses' retention. To examine the influence of authentic leadership on new nurses' job turnover intentions through their personal identification with the leader, organizational identification, and occupational coping self-efficacy. Secondary data analysis of a cross-sectional national study of Canadian new graduate nurses was conducted using structural equation modeling. Authentic leadership had a significant positive effect on nurses' personal identification with their leader and their organization. Personal identification mediated the relationship between authentic leadership and organizational identification. Organizational identification had a significant positive effect on occupational coping self-efficacy, which, in turn, had a negative effect on new graduate nurses' job turnover intentions. The findings demonstrate the vital role authentic leadership plays in retaining new graduate nurses. Authentic leaders foster personal and organizational identification among new graduate nurses, leading to increase in the confidence in their ability to manage work-related challenges, which subsequently results in positive outcomes in both new graduate nurses and the organization. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Sociogenomic Personality Psychology

    Science.gov (United States)

    Roberts, Brent W.; Jackson, Joshua J.

    2009-01-01

    In this article, we address a number of issues surrounding biological models of personality traits. Most traditional and many contemporary biological models of personality traits assume that biological systems underlying personality traits are causal and immutable. In contrast, sociogenomic biology, which we introduce to readers in this article, directly contradicts the widely held assumption that something that is biological, heritable, or temperamental, is unchangeable. We provide examples of how seemingly unchanging biological systems, such as DNA, are both dependent on environments for elicitation and can be modified by environmental changes. Finally, we synthesize sociogenomic biology with personality psychology in a model of personality traits that integrates this more modern perspective on biology, physiology, and environment that we term sociogenomic personality psychology. We end the article with a discussion of the future directions of sociogenomic personality psychology. PMID:19012657

  6. 42 CFR 435.910 - Use of social security number.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Use of social security number. 435.910 Section 435... of social security number. (a) The agency must require, as a condition of eligibility, that each... religious objections, refuses to obtain a Social Security Number (SSN). The identification number may be...

  7. Analysis of personality characteristics of intellectually gifted students, causing difficulties in their process of preschool and school education

    Directory of Open Access Journals (Sweden)

    Ermakov S.S.

    2016-09-01

    Full Text Available Talented and intellectually gifted students often have difficulties in emotional and personal spheres in their learning process at school. Social maladjustment, emotional instability, increased anxiety and a number of other problems in the development of the personal sphere are common to students with a conventional development of intellectual abilities, but in the case of gifted students they are more frequent and intensive. If these problems are ignored by school teachers, psychologists and parents of gifted students, they can lead to a decrease in the ability of these children and even to a certain delay in the development of their academic abilities. The article provides an overview of contemporary foreign works aimed at identification and analysis of personal problems in gifted students. It describes different types of gifted students, their psychological characteristics that must be considered in the process of organizing their schooling with the aim of support to and development of their learning skills.

  8. Visual Analysis in Traffic & Re-identification

    DEFF Research Database (Denmark)

    Møgelmose, Andreas

    and analysis, and person re-identification. In traffic sign detection, the work comprises a thorough survey of the state of the art, assembly of the worlds largest public dataset with U.S. traffic signs, and work in machine learning based detection algorithms. It was shown that detection of U.S. traffic signs...

  9. Personal Virtual Libraries

    Science.gov (United States)

    Pappas, Marjorie L.

    2004-01-01

    Virtual libraries are becoming more and more common. Most states have a virtual library. A growing number of public libraries have a virtual presence on the Web. Virtual libraries are a growing addition to school library media collections. The next logical step would be personal virtual libraries. A personal virtual library (PVL) is a collection…

  10. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  11. [Collage work characteristics and personality].

    Science.gov (United States)

    Sato, Shizuka

    2002-06-01

    The purpose of this study was to investigate the relationship between personality and characteristics in collage work. Seventy undergraduates filled the Yatabe-Guilford (YG) personality test and produced a piece of collage work. The YG personality types were not different in terms of collage work characteristics. However, emotional adaptation and introvert/extrovert scores were reflected in the number of cuttings used in the piece. General activity score was reflected in the number of vehicle pictures used. Those who used an eye picture had a tendency to be depressed and lacking in confidence. Those who used a "stone circle" picture tended to be more emotionally adapted and extroverted. The results suggested a possibility that personality traits were reflected in specific characteristics in collage work.

  12. Tumor Slice Culture: A New Avatar in Personalized Oncology

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0149 TITLE: Tumor Slice Culture: A New Avatar in Personalized Oncology PRINCIPAL INVESTIGATOR: Raymond Yeung...CONTRACT NUMBER Tumor Slice Culture: A New Avatar in Personalized Oncology 5b. GRANT NUMBER W81XWH-16-1-0149 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...10 Annual Report 2017: Tumor Slice Culture: A new avatar for personalized oncology 1. INTRODUCTION: The goal of this research is to advance our

  13. Towards personalized TV for concurrent use; unlocking the potential of IMS-based IPTV

    NARCIS (Netherlands)

    Brandenburg, R. van; Deventer, M.O. van; Karagiannis, G.; Schenk, M.

    2009-01-01

    Television (TV) is getting more personal. It went from a passive broadcast medium without any form of personalization or user identification, to subscription TV, interactive TV and now to IPTV, featuring an integrated return channel. IMS-based IPTV is a good example of a personalised IPTV

  14. Towards Personalized TV for Concurrent Use: Unlocking the Potential of IMS-Based IPTV

    NARCIS (Netherlands)

    van Brandenburg, Ray; van Deventer, M. Oskar; Karagiannis, Georgios; Schenk, Mike

    2009-01-01

    Television (TV) is getting more personal. It went from a passive broadcast medium without any form of personalization or user identification, to subscription TV, interactive TV and now to IPTV, featuring an integrated return channel. IMS-based IPTV is a good example of a personalised IPTV

  15. Human Identification at a Distance Using Body Shape Information

    International Nuclear Information System (INIS)

    Rashid, N K A M; Yahya, M F; Shafie, A A

    2013-01-01

    Shape of human body is unique from one person to another. This paper presents an intelligent system approach for human identification at a distance using human body shape information. The body features used are the head, shoulder, and trunk. Image processing techniques for detection of these body features were developed in this work. Then, the features are recognized using fuzzy logic approach and used as inputs to a recognition system based on a multilayer neural network. The developed system is only applicable for recognizing a person from its frontal view and specifically constrained to male gender to simplify the algorithm. In this research, the accuracy for human identification using the proposed method is 77.5%. Thus, it is proved that human can be identified at a distance using body shape information

  16. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  17. Testing Delays Resulting in Increased Identification Accuracy in Line-Ups and Show-Ups.

    Science.gov (United States)

    Dekle, Dawn J.

    1997-01-01

    Investigated time delays (immediate, two-three days, one week) between viewing a staged theft and attempting an eyewitness identification. Compared lineups to one-person showups in a laboratory analogue involving 412 subjects. Results show that across all time delays, participants maintained a higher identification accuracy with the showup…

  18. A study on association and correlation of lip and finger print pattern analysis for gender identification

    Directory of Open Access Journals (Sweden)

    Surapaneni Ratheesh Kumar Nandan

    2015-01-01

    Conclusion: Lip print analysis is a challenging area in the personal identification during forensic dentistry examination. The study revealed the weaker correlation and approachable significance of lip and finger print pattern in gender identification. Future studies should be encouraged in the direction of software based identification for lip and finger print analysis in gender identification. Such studies may benefit this study pattern in more accurate way.

  19. Banner prints social security numbers

    OpenAIRE

    Robbins RA

    2014-01-01

    No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1). The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pion...

  20. ETHNO-CULTURAL IDENTIFICATION IN THE CONTEXT OF MODERN SOCIETY

    Directory of Open Access Journals (Sweden)

    Галина Семеновна Попова

    2013-04-01

    Full Text Available The aim of the article is the study of cultural peculiarities of ethnical identity on the example of the Sakha (Yakut people. The author also makes research on the processes of identification in present ethno-cultural and social conditions. Because the process of identification has local cultural peculiarities seen on mental level, it is necessary to count them in inter-personal and inter-cultural communication in the present socio-cultural space. Based on the duality and triple identity of a Sakha person who has three-part soul Kut, the author shows her own way of classification of identity types. The author suggests a new type of identity named as “creative identity” and introduces a notion of ethno-cultural identity. Having done the analyses of peculiarities of ethno-cultural identity the author results in claiming that all ethnicities have “human”-level identity and that for adequate communication it is necessary to “humanize” a person. DOI: http://dx.doi.org/10.12731/2218-7405-2013-2-30

  1. Brand Personality Creation through Advertising

    OpenAIRE

    Ouwersloot Hans; Tudorica Anamaria

    2001-01-01

    Brand Personality is one of the core dimensions of brand equity. Brand personality refers to the emotional side of a brand image. It is created by all experiences of consumers with a brand, but advertising plays a dominant role in personality creation. In this paper we explore the mechanism that builds brand personality with the help of advertising. We integrate advertising models with the theory of brand personality. Our integrated framework leads to a number of propositions that set an agen...

  2. Remembering the Musi - SilkAir Flight MI 185 crash victim identification.

    Science.gov (United States)

    Tan, Peng Hui; Wee, Keng Poh; Sahelangi, Peter

    2007-10-01

    On 19 December 1997, SilkAir Flight MI 185, a Boeing B737-300 airliner crashed into the Musi River near Palembang, Southern Sumatra, enroute from Jakarta, Indonesia to Singapore. All 104 passengers and crew onboard were killed. Of the human remains recovered, 6 positive identifications were made, including that of one Singaporean. Two of the identifications were by dental records, 2 by fingerprints, 1 by age estimation and 1 by personal effects. This paper describes the crash victim identification of Flight MI 185. The authors were part of an Indonesia- Singapore forensic team deployed for 3 weeks in Palembang to assist the Indonesian authorities in human remains identification.

  3. Two-dimensional PCA-based human gait identification

    Science.gov (United States)

    Chen, Jinyan; Wu, Rongteng

    2012-11-01

    It is very necessary to recognize person through visual surveillance automatically for public security reason. Human gait based identification focus on recognizing human by his walking video automatically using computer vision and image processing approaches. As a potential biometric measure, human gait identification has attracted more and more researchers. Current human gait identification methods can be divided into two categories: model-based methods and motion-based methods. In this paper a two-Dimensional Principal Component Analysis and temporal-space analysis based human gait identification method is proposed. Using background estimation and image subtraction we can get a binary images sequence from the surveillance video. By comparing the difference of two adjacent images in the gait images sequence, we can get a difference binary images sequence. Every binary difference image indicates the body moving mode during a person walking. We use the following steps to extract the temporal-space features from the difference binary images sequence: Projecting one difference image to Y axis or X axis we can get two vectors. Project every difference image in the difference binary images sequence to Y axis or X axis difference binary images sequence we can get two matrixes. These two matrixes indicate the styles of one walking. Then Two-Dimensional Principal Component Analysis(2DPCA) is used to transform these two matrixes to two vectors while at the same time keep the maximum separability. Finally the similarity of two human gait images is calculated by the Euclidean distance of the two vectors. The performance of our methods is illustrated using the CASIA Gait Database.

  4. Biometric identification of cardiosynchronous waveforms utilizing person specific continuous and discrete wavelet transform features.

    Science.gov (United States)

    Bhagavatula, Chandrasekhar; Venugopalan, Shreyas; Blue, Rebecca; Friedman, Robert; Griofa, Marc O; Savvides, Marios; Kumar, B V K Vijaya

    2012-01-01

    In this paper we explore how a Radio Frequency Impedance Interrogation (RFII) signal may be used as a biometric feature. This could allow the identification of subjects in operational and potentially hostile environments. Features extracted from the continuous and discrete wavelet decompositions of the signal are investigated for biometric identification. In the former case, the most discriminative features in the wavelet space were extracted using a Fisher ratio metric. Comparisons in the wavelet space were done using the Euclidean distance measure. In the latter case, the signal was decomposed at various levels using different wavelet bases, in order to extract both low frequency and high frequency components. Comparisons at each decomposition level were performed using the same distance measure as before. The data set used consists of four subjects, each with a 15 minute RFII recording. The various data samples for our experiments, corresponding to a single heart beat duration, were extracted from these recordings. We achieve identification rates of up to 99% using the CWT approach and rates of up to 100% using the DWT approach. While the small size of the dataset limits the interpretation of these results, further work with larger datasets is expected to develop better algorithms for subject identification.

  5. Stroke genetics: prospects for personalized medicine

    Directory of Open Access Journals (Sweden)

    Markus Hugh S

    2012-09-01

    Full Text Available Abstract Epidemiologic evidence supports a genetic predisposition to stroke. Recent advances, primarily using the genome-wide association study approach, are transforming what we know about the genetics of multifactorial stroke, and are identifying novel stroke genes. The current findings are consistent with different stroke subtypes having different genetic architecture. These discoveries may identify novel pathways involved in stroke pathogenesis, and suggest new treatment approaches. However, the already identified genetic variants explain only a small proportion of overall stroke risk, and therefore are not currently useful in predicting risk for the individual patient. Such risk prediction may become a reality as identification of a greater number of stroke risk variants that explain the majority of genetic risk proceeds, and perhaps when information on rare variants, identified by whole-genome sequencing, is also incorporated into risk algorithms. Pharmacogenomics may offer the potential for earlier implementation of 'personalized genetic' medicine. Genetic variants affecting clopidogrel and warfarin metabolism may identify non-responders and reduce side-effects, but these approaches have not yet been widely adopted in clinical practice.

  6. Identification as a Mediator of Celebrity Effects.

    Science.gov (United States)

    Basil, Michael D.

    1996-01-01

    This study examined personal concern, perceived risk, and sexual behavior of 147 college students a year after Magic Johnson announced he tested positive for HIV (Human Immunodeficiency Virus). It found that identification mediates message effects, suggesting that a spokesperson with whom an audience can identify insures the greatest likelihood of…

  7. Hidden Identification on Parts: Magnetic Machine-Readable Matrix Symbols

    Science.gov (United States)

    Schramm, Harry F.; Jones, Clyde S.; Roxby, Donald L.; Teed, James D.; Shih, William C. L.; Fitzpatrick, Gerald L.; Knisely, Craig

    2005-01-01

    All NASA parts have identification, usually expressed in terms of part number, serial number, and the like. In most cases, this identification is permanently marked directly on the part for tracking throughout its life cycle. NASA has developed a method for reading the matrix symbol through up to 15 mils (25 m) of paint (5 or 6 layers). This method of part identification involves coating selected patches on the objects with magnetic materials in matrix symbol patterns and reading the patterns by use of magneto-optical imaging equipment.

  8. An Overview of Some Electronic Identification Use Cases in Europe

    Science.gov (United States)

    Mattatia, Fabrice

    As online services become more and more widely used, and as the exchanges of personal data become more and more widespread, electronic identification appears to be a key function for the security of the process and for the protection of privacy. It is the sole means of ensuring only authorized people have access to the data. In France and throughout Europe, e-government services, as well as private services, already use different means of electronic identification. Among the different technical solutions stand the electronic identity card: around 20 million eID cards have already been issued in Europe. The question of their interoperability is now open, in order that all European citizens may access the e-services of any Member State. With the development of electronic administration comes the need for the citizen to be able to prove his or her identity. This is essential if the citizen wants access to her personal data or administrative files, or if he wants to claim a right attached to his very identity. On the other hand, administrations have the obligation to ensure the personal data they store are not displayed to people who are not entitled to see them. They also have the need to detect fraudsters. Electronic identification, which is the ability to prove someone's identity on the Internet, thus becomes a central matter.

  9. Biometric and Emotion Identification: An ECG Compression Based Method.

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H T; Soares, Sandra C; Pinho, Armando J

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  10. The Algebra of Complex Numbers.

    Science.gov (United States)

    LePage, Wilbur R.

    This programed text is an introduction to the algebra of complex numbers for engineering students, particularly because of its relevance to important problems of applications in electrical engineering. It is designed for a person who is well experienced with the algebra of real numbers and calculus, but who has no experience with complex number…

  11. Systems biology of personalized nutrition

    NARCIS (Netherlands)

    Ommen, B. van; Broek, T. van den; Hoogh, I. de; Erk, M. van; Someren, E. van; Rouhani-Rankouhi, T.; Anthony, J.C.; Hogenelst, K.; Pasman, W.; Boorsma, A.; Wopereis, S.

    2017-01-01

    Personalized nutrition is fast becoming a reality due to a number of technological, scientific, and societal developments that complement and extend current public health nutrition recommendations. Personalized nutrition tailors dietary recommendations to specific biological requirements on the

  12. Personality disorders

    DEFF Research Database (Denmark)

    Simonsen, Sebastian; Heinskou, Torben; Sørensen, Per

    2017-01-01

    BACKGROUND: In this naturalistic study, patients with personality disorders (N = 388) treated at Stolpegaard Psychotherapy Center, Mental Health Services, Capital Region of Denmark were allocated to two different kinds of treatment: a standardized treatment package with a preset number of treatment...... characteristics associated with clinicians' allocation of patients to the two different personality disorder services. METHODS: Patient characteristics across eight domains were collected in order to study whether there were systematic differences between patients allocated to the two different treatments....... Patient characteristics included measures of symptom severity, personality pathology, trauma and socio-demographic characteristics. Significance testing and binary regression analysis were applied to identify important predictors. RESULTS: Patient characteristics on fifteen variables differed...

  13. I and Us: A Longitudinal Study on the Interplay of Personal and Social Identity in Adolescence.

    Science.gov (United States)

    Albarello, Flavia; Crocetti, Elisabetta; Rubini, Monica

    2018-04-01

    The development of personal and social identity is crucial in adolescence. On the one hand, adolescents face the task of forming and consolidating their personal identity in multiple domains, with educational and interpersonal domains particularly salient. On the other hand, they enlarge their social horizon and increasingly define themselves as members of multiple peer groups, such as groups of classmates and friends met outside school. There is however a lack of integrative research on the interplay among and between personal and social identity processes. Hence the purpose of this study was threefold. First, we examined how personal identity processes in the educational and interpersonal domains are associated longitudinally. Second, we investigated to what extent social identifications with classmates and with the group of friends are associated over time. Third, with an original approach we examined the longitudinal interplay between personal and social identity processes, to connect theoretical contributions that have so far proceeded largely in parallel. Participants were 304 adolescents (61.84% female, M age  = 17.49) involved in a three-wave longitudinal study. We found that (a) the ways in which adolescents develop their identity in the educational and interpersonal domains become more closely intertwined over time; (b) identifications with classmates and with the group of friends are interconnected; and (c) personal and social identity processes are associated both concurrently and longitudinally, with most cross-lagged effects showing that social identifications influence personal identity formation and consolidation in the interpersonal identity domain. Theoretical implications are discussed.

  14. Single classifier, OvO, OvA and RCC multiclass classification method in handheld based smartphone gait identification

    Science.gov (United States)

    Raziff, Abdul Rafiez Abdul; Sulaiman, Md Nasir; Mustapha, Norwati; Perumal, Thinagaran

    2017-10-01

    Gait recognition is widely used in many applications. In the application of the gait identification especially in people, the number of classes (people) is many which may comprise to more than 20. Due to the large amount of classes, the usage of single classification mapping (direct classification) may not be suitable as most of the existing algorithms are mostly designed for the binary classification. Furthermore, having many classes in a dataset may result in the possibility of having a high degree of overlapped class boundary. This paper discusses the application of multiclass classifier mappings such as one-vs-all (OvA), one-vs-one (OvO) and random correction code (RCC) on handheld based smartphone gait signal for person identification. The results is then compared with a single J48 decision tree for benchmark. From the result, it can be said that using multiclass classification mapping method thus partially improved the overall accuracy especially on OvO and RCC with width factor more than 4. For OvA, the accuracy result is worse than a single J48 due to a high number of classes.

  15. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  16. Effects of postidentification feedback on eyewitness identification and nonidentification confidence.

    Science.gov (United States)

    Semmler, Carolyn; Brewer, Neil; Wells, Gary L

    2004-04-01

    Two experiments investigated new dimensions of the effect of confirming feedback on eyewitness identification confidence using target-absent and target-present lineups and (previously unused) unbiased witness instructions (i.e., "offender not present" option highlighted). In Experiment 1, participants viewed a crime video and were later asked to try to identify the thief from an 8-person target-absent photo array. Feedback inflated witness confidence for both mistaken identifications and correct lineup rejections. With target-present lineups in Experiment 2, feedback inflated confidence for correct and mistaken identifications and lineup rejections. Although feedback had no influence on the confidence-accuracy correlation, it produced clear overconfidence. Confidence inflation varied with the confidence measure reference point (i.e., retrospective vs. current confidence) and identification response latency.

  17. Delineating the structure of normal and abnormal personality: an integrative hierarchical approach.

    Science.gov (United States)

    Markon, Kristian E; Krueger, Robert F; Watson, David

    2005-01-01

    Increasing evidence indicates that normal and abnormal personality can be treated within a single structural framework. However, identification of a single integrated structure of normal and abnormal personality has remained elusive. Here, a constructive replication approach was used to delineate an integrative hierarchical account of the structure of normal and abnormal personality. This hierarchical structure, which integrates many Big Trait models proposed in the literature, replicated across a meta-analysis as well as an empirical study, and across samples of participants as well as measures. The proposed structure resembles previously suggested accounts of personality hierarchy and provides insight into the nature of personality hierarchy more generally. Potential directions for future research on personality and psychopathology are discussed.

  18. Delineating the Structure of Normal and Abnormal Personality: An Integrative Hierarchical Approach

    Science.gov (United States)

    Markon, Kristian E.; Krueger, Robert F.; Watson, David

    2008-01-01

    Increasing evidence indicates that normal and abnormal personality can be treated within a single structural framework. However, identification of a single integrated structure of normal and abnormal personality has remained elusive. Here, a constructive replication approach was used to delineate an integrative hierarchical account of the structure of normal and abnormal personality. This hierarchical structure, which integrates many Big Trait models proposed in the literature, replicated across a meta-analysis as well as an empirical study, and across samples of participants as well as measures. The proposed structure resembles previously suggested accounts of personality hierarchy and provides insight into the nature of personality hierarchy more generally. Potential directions for future research on personality and psychopathology are discussed. PMID:15631580

  19. Genotoxic effects of daily personal exposure to particle mass and number concentrations on buccal cells

    Science.gov (United States)

    de Almeida, Daniela S.; da Costa, Silvano César; Ribeiro, Marcos; Moreira, Camila A. B.; Beal, Alexandra; Squizzato, Rafaela; Rudke, Anderson Paulo; Rafee, Sameh Adib Abou; Martins, Jorge A.; Palioto, Graciana Freitas; Kumar, Prashant; Martins, Leila D.

    2018-03-01

    The aim of this study is to assess personal exposure to Particle Number Concentrations (PNC) in four size ranges between 0.3 and 10 μm, and particulate matter (PM1; PM2.5; PM4; PM10) in order to evaluate possible genotoxic effects through a comet assay in buccal cells. A convenience cohort of 30 individuals from a Brazilian medium-sized city was selected. These individuals aged between 20 and 61 and worked in typical job categories (i.e., administrative, commerce, education, general services and transport). They were recruited to perform personal exposure measurements during their typical daily routine activities, totaling 240 h of sampling. The 8-h average mass concentrations in air for volunteers ranged from 2.4 to 31.8 μg m-3 for PM1, 4.2-45.1 μg m-3 for PM2.5, 7.9-66.1 μg m-3 for PM4 and from 23.1 to 131.7 μg m-3 for PM10. The highest PNC variation was found for 0.3-0.5 range, between 14 and 181 particles cm-3, 1 to 14 particles cm-3 for the 0.5-1.0 range, 0.2 to 2 particles cm-3 for the 1.0-2.5 range, and 0.06 to 0.7 particles cm-3 for the 2.5-10 range. Volunteers in the 'education' category experienced the lowest inhaled dose of PM2.5, as opposed to those involved in 'commercial' activities with the highest doses for PM10 (1.63 μg kg-1 h-1) and PM2.5 (0.61 μg kg-1 h-1). The predominant cause for these high doses was associated with the proximity of the workplace to the street and vehicle traffic. The comet assay performed in buccal cells indicated that the volunteers in 'commerce' category experienced the highest damage to their DeoxyriboNucleic Acid (DNA) compared with the control category (i.e. 'education'). These results indicate the variability in personal exposure of the volunteers in different groups, and the potential damage to DNA was much higher for those spending time in close proximity to the vehicle sources (e.g. commercial services) leading to exposure to a higher fraction of fine particles. This study builds understanding on the exposure

  20. [Problems in organization of medical criminological registration and personality identification for subjects occupationally exposed to life risk].

    Science.gov (United States)

    Shcherbakov, V V

    2000-01-01

    The paper discusses problems in organization of identification studies under conditions of mass deaths as exemplified by forensic medical records of medical criminological identification studies of subjects killed during war conflict in Chechnya. The evolution of the organization model of identification studies is shown transformation of organization philosophy, formation of expert algorithms, formalization and technologic realization of expert solutions.

  1. Statistical pattern recognition for automatic writer identification and verification

    NARCIS (Netherlands)

    Bulacu, Marius Lucian

    2007-01-01

    The thesis addresses the problem of automatic person identification using scanned images of handwriting.Identifying the author of a handwritten sample using automatic image-based methods is an interesting pattern recognition problem with direct applicability in the forensic and historic document

  2. Identification, collection and domestication of medicinal plants in ...

    African Journals Online (AJOL)

    Field studies were conducted to investigate the medicinal plants, through identification, collection and domestication of these plants in southeastern, Nigeria. Questionnaire, personal interview and review of available records show that out of forty-three plants about fifteen were undergoing domestication in the course of this ...

  3. Electro-optical fuel pin identification system

    International Nuclear Information System (INIS)

    Kirchner, T.L.

    1978-09-01

    A prototype Electro-Optical Fuel Pin Identification System referred to as the Fuel Pin Identification System (FPIS) has been developed by the Hanford Engineering Development Laboratory (HEDL) in support of the Fast Flux Test Facility (FFTF) presently under construction at HEDL. The system is designed to remotely read an alpha-numeric identification number that is roll stamped on the top of the fuel pin end cap. The prototype FPIS consists of four major subassemblies: optical read head, digital compression electronics, video display, and line printer

  4. Lessons Learned from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital.

    Science.gov (United States)

    Shin, Soo-Yong; Lyu, Yongman; Shin, Yongdon; Choi, Hyo Joung; Park, Jihyun; Kim, Woo-Sung; Lee, Jae Ho

    2013-06-01

    The Korean government has enacted two laws, namely, the Personal Information Protection Act and the Bioethics and Safety Act to prevent the unauthorized use of medical information. To protect patients' privacy by complying with governmental regulations and improve the convenience of research, Asan Medical Center has been developing a de-identification system for biomedical research. We reviewed Korean regulations to define the scope of the de-identification methods and well-known previous biomedical research platforms to extract the functionalities of the systems. Based on these review results, we implemented necessary programs based on the Asan Medical Center Information System framework which was built using the Microsoft. NET Framework and C#. The developed de-identification system comprises three main components: a de-identification tool, a search tool, and a chart review tool. The de-identification tool can substitute a randomly assigned research ID for a hospital patient ID, remove the identifiers in the structured format, and mask them in the unstructured format, i.e., texts. This tool achieved 98.14% precision and 97.39% recall for 6,520 clinical notes. The search tool can find the number of patients which satisfies given search criteria. The chart review tool can provide de-identified patient's clinical data for review purposes. We found that a clinical data warehouse was essential for successful implementation of the de-identification system, and this system should be tightly linked to an electronic Institutional Review Board system for easy operation of honest brokers. Additionally, we found that a secure cloud environment could be adopted to protect patients' privacy more thoroughly.

  5. Hyper-realistic face masks: a new challenge in person identification.

    Science.gov (United States)

    Sanders, Jet Gabrielle; Ueda, Yoshiyuki; Minemoto, Kazusa; Noyes, Eilidh; Yoshikawa, Sakiko; Jenkins, Rob

    2017-01-01

    We often identify people using face images. This is true in occupational settings such as passport control as well as in everyday social environments. Mapping between images and identities assumes that facial appearance is stable within certain bounds. For example, a person's apparent age, gender and ethnicity change slowly, if at all. It also assumes that deliberate changes beyond these bounds (i.e., disguises) would be easy to spot. Hyper-realistic face masks overturn these assumptions by allowing the wearer to look like an entirely different person. If unnoticed, these masks break the link between facial appearance and personal identity, with clear implications for applied face recognition. However, to date, no one has assessed the realism of these masks, or specified conditions under which they may be accepted as real faces. Herein, we examined incidental detection of unexpected but attended hyper-realistic masks in both photographic and live presentations. Experiment 1 (UK; n = 60) revealed no evidence for overt detection of hyper-realistic masks among real face photos, and little evidence of covert detection. Experiment 2 (Japan; n = 60) extended these findings to different masks, mask-wearers and participant pools. In Experiment 3 (UK and Japan; n = 407), passers-by failed to notice that a live confederate was wearing a hyper-realistic mask and showed limited evidence of covert detection, even at close viewing distance (5 vs. 20 m). Across all of these studies, viewers accepted hyper-realistic masks as real faces. Specific countermeasures will be required if detection rates are to be improved.

  6. Writer Identification and Verification from Intra-variable Individual Handwriting

    OpenAIRE

    Adak, Chandranath; Chaudhuri, Bidyut B.; Blumenstein, Michael

    2017-01-01

    The handwriting of an individual may vary excessively with many factors such as mood, time, space, writing speed, writing medium, utensils etc. Therefore, it becomes more challenging to perform automated writer verification/ identification on a particular set of handwritten patterns (e.g. speedy handwriting) of a person, especially when the system is trained using a different set of writing patterns (e.g. normal/medium speed) of that same person. However, it would be interesting to experiment...

  7. Biased lineup instructions and face identification from video images.

    Science.gov (United States)

    Thompson, W Burt; Johnson, Jaime

    2008-01-01

    Previous eyewitness memory research has shown that biased lineup instructions reduce identification accuracy, primarily by increasing false-positive identifications in target-absent lineups. Because some attempts at identification do not rely on a witness's memory of the perpetrator but instead involve matching photos to images on surveillance video, the authors investigated the effects of biased instructions on identification accuracy in a matching task. In Experiment 1, biased instructions did not affect the overall accuracy of participants who used video images as an identification aid, but nearly all correct decisions occurred with target-present photo spreads. Both biased and unbiased instructions resulted in high false-positive rates. In Experiment 2, which focused on video-photo matching accuracy with target-absent photo spreads, unbiased instructions led to more correct responses (i.e., fewer false positives). These findings suggest that investigators should not relax precautions against biased instructions when people attempt to match photos to an unfamiliar person recorded on video.

  8. The internet of things for personalized health.

    Science.gov (United States)

    Schreier, Günter

    2014-01-01

    Advances in information and communications technologies (ICT) enable new personalized health care concepts which are often characterized by four "P" terms, i.e. personalized, predictive, preventive and participatory. However, real world implementations of the complete 4P spectrum hardly exist today. The Internet of Things (IoT) has been defined as an extension to the current Internet that enables pervasive communication between the physical and the virtual world. Smart devices and enabling elements like Near Field Communication (NFC) and Radio Frequency Identification (RFID) technology already exist and increasingly will be a mainstream element of our lives. This future vision paper attempts to assess if and how the Internet of Things for personalized health (IoT4pH) can help to facilitate the 4P healthcare paradigm and discusses related challenges and opportunities.

  9. Multiple independent identification decisions: a method of calibrating eyewitness identifications.

    Science.gov (United States)

    Pryke, Sean; Lindsay, R C L; Dysart, Jennifer E; Dupuis, Paul

    2004-02-01

    Two experiments (N = 147 and N = 90) explored the use of multiple independent lineups to identify a target seen live. In Experiment 1, simultaneous face, body, and sequential voice lineups were used. In Experiment 2, sequential face, body, voice, and clothing lineups were used. Both studies demonstrated that multiple identifications (by the same witness) from independent lineups of different features are highly diagnostic of suspect guilt (G. L. Wells & R. C. L. Lindsay, 1980). The number of suspect and foil selections from multiple independent lineups provides a powerful method of calibrating the accuracy of eyewitness identification. Implications for use of current methods are discussed. ((c) 2004 APA, all rights reserved)

  10. Hyperspectral Based Skin Detection for Person of Interest Identification

    Science.gov (United States)

    2015-03-01

    short-wave infrared VIS visible spectrum PCA principal component analysis FCBF Fast Correlation- Based Filter POI person of interest ANN artificial neural...an artificial neural network (ANN) that is created in MATLAB® using the Neural Network Toolbox to identify a POI based on their skin spectral data. A...identifying a POI based on skin spectral data. She identified an optimal feature subset to be used with the hyperspectral data she collected using a

  11. Pursuing Personal Passion: Learner-Centered Research Mentoring.

    Science.gov (United States)

    Phillips, William R

    2018-01-01

    New researchers often face difficulty finding and focusing research questions. I describe a new tool for research mentoring, the Pursuing Personal Passion (P3) interview, and a systematic approach to help learners organize their curiosity and develop researchable questions aligned with their personal and professional priorities. The learner-centered P3 research interview parallels the patient-centered clinical interview. This paper reviews experience with 27 research mentees over the years 2009 to 2016, using the P3 approach to identify their initial research topics, classify their underlying passions and track the evolution into their final research questions. These researchers usually identified one of three personal passions that provided lenses to focus their research: problem, person, or process. Initial research topics focused on: problem (24%, 6), person (48%, 12) and process (28%, 7). Final research questions evolved into: problem (20%, 5), person (32%, 8) and process (48%, 12). Identification of the underlying passion can lead researchers who start with one general topic to develop it into very different research questions. Using this P3 approach, mentors can help new researchers focus their interests into researchable questions, successful studies, and organized programs of scholarship.

  12. Defense Horizons. Number 79, April 2015

    Science.gov (United States)

    2015-04-01

    law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB...79, April 2015 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...aggression. Even more issues emerged following the downing of Malaysian Airlines Flight 17 over Ukraine in July 2014, and cross-border ar- tillery renewed

  13. Encryption and validation of multiple signals for optical identification systems

    International Nuclear Information System (INIS)

    Perez-Cabre, E; Millan, M S; Javidi, B

    2007-01-01

    Multifactor encryption-authentication technique reinforces optical security by allowing the simultaneous A N D-verification of more than one primary image. Instead of basing the identification on a unique signature or piece of information, our goal is to authenticate a given person, object, vehicle by the simultaneous recognition of several factors. Some of them are intrinsic to the person and object or vehicle under control. Other factors, act as keys of the authentication step. Such a system is proposed for situations such as the access control to restricted areas, where the demand of security is high. The multifactor identification method involves double random-phase encoding, fully phase-based encryption and a combined nonlinear joint transform correlator and a classical 4f-correlator for simultaneous recognition and authentication of multiple images. The encoded signal fulfils the general requirements of invisible content, extreme difficulty in counterfeiting and real-time automatic verification. Four reference double-phase encoded images are compared with the retrieved input images obtained in situ from the person or the vehicle whose authentication is wanted and from a database. A recognition step based on the correlation between the signatures and the stored references determines the authentication or rejection of the person and object under surveillance

  14. Encryption and validation of multiple signals for optical identification systems

    Energy Technology Data Exchange (ETDEWEB)

    Perez-Cabre, E [Universitat PoliteGcnica de Catalunya, Department Optica i Optometria, Violinista Vellsola 37, 08222 Terrassa (Spain); Millan, M S [Universitat PoliteGcnica de Catalunya, Department Optica i Optometria, Violinista Vellsola 37, 08222 Terrassa (Spain); Javidi, B [University of Connecticut, Electrical and Computer Engineering Department, 371 Fairfield Road, CT 06269 Storrs (United States)

    2007-07-15

    Multifactor encryption-authentication technique reinforces optical security by allowing the simultaneous A N D-verification of more than one primary image. Instead of basing the identification on a unique signature or piece of information, our goal is to authenticate a given person, object, vehicle by the simultaneous recognition of several factors. Some of them are intrinsic to the person and object or vehicle under control. Other factors, act as keys of the authentication step. Such a system is proposed for situations such as the access control to restricted areas, where the demand of security is high. The multifactor identification method involves double random-phase encoding, fully phase-based encryption and a combined nonlinear joint transform correlator and a classical 4f-correlator for simultaneous recognition and authentication of multiple images. The encoded signal fulfils the general requirements of invisible content, extreme difficulty in counterfeiting and real-time automatic verification. Four reference double-phase encoded images are compared with the retrieved input images obtained in situ from the person or the vehicle whose authentication is wanted and from a database. A recognition step based on the correlation between the signatures and the stored references determines the authentication or rejection of the person and object under surveillance.

  15. Figuration of tourist personality and tourist travels

    Directory of Open Access Journals (Sweden)

    Đorđević Saša

    2013-01-01

    Full Text Available Quality of tourist travel is a relative category, because its success depends on the subjective perception of the personality of tourists on a tourist trip. For this reason, any tourist trip can be treated from the perspective of different types of figurative forms of tourists' personality, which also determine different quality of tourist travel, which, in turn, makes them different. Thus, any tourist trip, unto itself, has its own uniqueness, taking on the forms and content created, for the most part, by the tourists themselves, along with all other tourism stakeholders involved in this process. These forms and contents are primarily conditioned by the spiritual profile of tourists' personality and their psychological and motivational preferences, which is symbolically represented in the figurative context of a chess game. In addition to this, identification of essential characteristics of different spiritual profiles of tourist's personality, must be a starting point for the programming of overall content and especially of animation and cultural content.

  16. Attributions to Discrimination and Self-Esteem: The Role of Group Identification and Appraisals

    OpenAIRE

    Eccleston , Collette P.; Major , Brenda N.

    2006-01-01

    Abstract This study tested the hypothesis that appraisals of discrimination (i.e. its perceived severity, global aspects, stability, and uncontrollability) mediate the relationship between attributions to discrimination and personal self-esteem. It also tested three models of how ethnic group identification is related to discrimination attributions, discrimination appraisals, and personal self-esteem. In ...

  17. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits.

    Science.gov (United States)

    Mehta, S; Rice, D; McIntyre, A; Getty, H; Speechley, M; Sequeira, K; Shapiro, A P; Morley-Forster, P; Teasell, R W

    2016-01-01

    Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  18. A Multilayer Secure Biomedical Data Management System for Remotely Managing a Very Large Number of Diverse Personal Healthcare Devices

    Directory of Open Access Journals (Sweden)

    KeeHyun Park

    2015-01-01

    Full Text Available In this paper, a multilayer secure biomedical data management system for managing a very large number of diverse personal health devices is proposed. The system has the following characteristics: the system supports international standard communication protocols to achieve interoperability. The system is integrated in the sense that both a PHD communication system and a remote PHD management system work together as a single system. Finally, the system proposed in this paper provides user/message authentication processes to securely transmit biomedical data measured by PHDs based on the concept of a biomedical signature. Some experiments, including the stress test, have been conducted to show that the system proposed/constructed in this study performs very well even when a very large number of PHDs are used. For a stress test, up to 1,200 threads are made to represent the same number of PHD agents. The loss ratio of the ISO/IEEE 11073 messages in the normal system is as high as 14% when 1,200 PHD agents are connected. On the other hand, no message loss occurs in the multilayered system proposed in this study, which demonstrates the superiority of the multilayered system to the normal system with regard to heavy traffic.

  19. Self-Renewal, Personal Development and Change: An Inexorable Link.

    Science.gov (United States)

    Krupp, Judy-Arin

    1995-01-01

    Self-renewal, personal development, and change create an inexorable link. Change management processes include the following: (1) internal locus of control; (2) freedom from institutional crutches; (3) flexible teaching; (4) recognition of emotional reactions to change; and (5) identification of the causes of indecisiveness and insecurities. (JOW)

  20. Position coincidence optical identifications using Texas interferometer radio positions

    International Nuclear Information System (INIS)

    Bozyan, E.P.

    1979-01-01

    1048 radio source positions measured with the Texas Interferometer were searched for optical identifications on glass copies of the Palomar Sky Survey E and O plates, resulting in 242 identifications and 806 blank fields. Finding charts are presented for 124 of the 125 new identifications not previously reported in the literature, and for 73 blank fields containing nearby optical objects which may be real identifications. This brings the cumulative number of Texas radio positions searched to 2015, producing 864 optical identifications and 1151 blank fields

  1. [Projective identification in human relations].

    Science.gov (United States)

    Göka, Erol; Yüksel, Fatih Volkan; Göral, F Sevinç

    2006-01-01

    Melanie Klein, one of the pioneers of Object Relations Theory, first defined "projective identification", which is regarded as one of the most efficacious psychoanalytic concepts after the discovery of the "unconscious". Examination of the literature on "projective identification" shows that there are various perspectives and theories suggesting different uses of this concept. Some clinicians argue that projective identification is a primitive defense mechanism observed in severe psychopathologies like psychotic disorder and borderline personality disorder, where the intra-psychic structure has been damaged severely. Others suggest it to be an indispensable part of the transference and counter-transference between the therapist and the patient during psychotherapy and it can be used as a treatment material in the therapy by a skillful therapist. The latter group expands the use of the concept through normal daily relationships by stating that projective identification is one type of communication and part of the main human relation mechanism operating in all close relationships. Therefore, they suggest that projective identification has benign forms experienced in human relations as well as malign forms seen in psychopathologies. Thus, discussions about the definition of the concept appear complex. In order to clarify and overcome the complexity of the concept, Melanie Klein's and other most important subsequent approaches are discussed in this review article. Thereby, the article aims to explain its important function in understanding the psychopathologies, psychotherapeutic relationships and different areas of normal human relations.

  2. Biometric and Emotion Identification: An ECG Compression Based Method

    Directory of Open Access Journals (Sweden)

    Susana Brás

    2018-04-01

    Full Text Available We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG. The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1 conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2 conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3 identification of the ECG record class, using a 1-NN (nearest neighbor classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  3. Biometric and Emotion Identification: An ECG Compression Based Method

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H. T.; Soares, Sandra C.; Pinho, Armando J.

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model. PMID:29670564

  4. The verbal facilitation effect: re-reading person descriptions as a system variable to improve identification performance.

    Science.gov (United States)

    Sporer, Siegfried L; Kaminski, Kristina S; Davids, Maike C; McQuiston, Dawn

    2016-11-01

    When witnesses report a crime, police usually ask for a description of the perpetrator. Several studies suggested that verbalising faces leads to a detriment in identification performance (verbal overshadowing effect [VOE]) but the effect has been difficult to replicate. Here, we sought to reverse the VOE by inducing context reinstatement as a system variable through re-reading one's own description before an identification task. Participants (N = 208) watched a video film and were then dismissed (control group), only described the perpetrator, or described and later re-read their own descriptions before identification in either target-present or target-absent lineups after a 2-day or a 5-week delay. Identification accuracy was significantly higher after re-reading (85.0%) than in the no description control group (62.5%) irrespective of target presence. Data were internally replicated using a second target and corroborated by several small meta-analyses. Identification accuracy was related to description quality. Moreover, there was a tendency towards a verbal facilitation effect (VFE) rather than a VOE. Receiver operating characteristic (ROC) curve analyses confirm that our findings are not due to a shift in response bias but truly reflect improvement of recognition performance. Differences in the ecological validity of study paradigms are discussed.

  5. Legionellosis: a Walk-through to Identification of the Source of Infection.

    Science.gov (United States)

    Chochlakis, Dimosthenis; Sandalakis, Vassilios; Keramarou, Maria; Tselentis, Yannis; Psaroulaki, Anna

    2017-09-01

    Although a number of human Legionnaires' disease in tourists are recorded annually in Europe, there are few cases where a direct link can be made between the infected person and the source of infection (hotel or other accommodation). We present a scheme followed in order to track down and identify the source of infection in a tourist suffering from L. pneumophila sg 5 infection, who was accommodated in seven different hotels during his holidays in the island of Crete, and we comment on various difficulties and draw-backs of the process. Water samples were collected from the seven hotels where the patient had resided and analyzed at the regional public health laboratory using cultivation and molecular tests. Of 103 water samples analyzed, 19 (18.4%) were positive for Legionella non-pneumophila and 8 (7.8%) were positive for L. pneumophila. A successful L. pneumophila sg 5 match was found between the clinical and environmental sample, which led us to the final identification of the liable hotel. Timely notification of the case, within the the European Legionnaires' Disease Surveillance Network (ELDSNet) of the partners involved, is crucial during a course of travel associated with Legionella case investigation. Moreover, the urinary antigen test alone cannot provide sufficient information for the source identification. However, acquiring clinical as well as environmental isolates for serogroup and SBT identification is highly important for the successful matching. Copyright© by the National Institute of Public Health, Prague 2017

  6. Detachable strong cation exchange monolith, integrated with capillary zone electrophoresis and coupled with pH gradient elution, produces improved sensitivity and numbers of peptide identifications during bottom-up analysis of complex proteomes.

    Science.gov (United States)

    Zhang, Zhenbin; Yan, Xiaojing; Sun, Liangliang; Zhu, Guijie; Dovichi, Norman J

    2015-04-21

    A detachable sulfonate-silica hybrid strong cation-exchange monolith was synthesized in a fused silica capillary, and used for solid phase extraction with online pH gradient elution during capillary zone electrophoresis-tandem mass spectrometry (CZE-MS/MS) proteomic analysis. Tryptic digests were prepared in 50 mM formic acid and loaded onto the strong cation-exchange monolith. Fractions were eluted using a series of buffers with lower concentration but higher pH values than the 50 mM formic acid background electrolyte. This combination of elution and background electrolytes results in both sample stacking and formation of a dynamic pH junction and allows use of relatively large elution buffer volumes while maintaining reasonable peak efficiency and resolution. A series of five pH bumps were applied to elute E. coli tryptic peptides from the monolith, followed by analysis using CZE coupled to an LTQ-Orbitrap Velos mass spectrometer; 799 protein groups and 3381 peptides were identified from 50 ng of the digest in a 2.5 h analysis, which approaches the identification rate for this organism that was obtained with an Orbitrap Fusion. We attribute the improved numbers of peptide and protein identifications to the efficient fractionation by the online pH gradient elution, which decreased the complexity of the sample in each elution step and improved the signal intensity of low abundance peptides. We also performed a comparative analysis using a nanoACQUITY UltraPerformance LCH system. Similar numbers of protein and peptide identifications were produced by the two methods. Protein identifications showed significant overlap between the two methods, whereas peptide identifications were complementary.

  7. Personalized identification of differentially expressed pathways in pediatric sepsis.

    Science.gov (United States)

    Li, Binjie; Zeng, Qiyi

    2017-10-01

    Sepsis is a leading killer of children worldwide with numerous differentially expressed genes reported to be associated with sepsis. Identifying core pathways in an individual is important for understanding septic mechanisms and for the future application of custom therapeutic decisions. Samples used in the study were from a control group (n=18) and pediatric sepsis group (n=52). Based on Kauffman's attractor theory, differentially expressed pathways associated with pediatric sepsis were detected as attractors. When the distribution results of attractors are consistent with the distribution of total data assessed using support vector machine, the individualized pathway aberrance score (iPAS) was calculated to distinguish differences. Through attractor and Kyoto Encyclopedia of Genes and Genomes functional analysis, 277 enriched pathways were identified as attractors. There were 81 pathways with Ppathways with Ppathway clusters and four sample clusters. Thus, in the majority pediatric sepsis samples, core pathways can be detected as different from accumulated normal samples. In conclusion, a novel procedure that identified the dysregulated attractors in individuals with pediatric sepsis was constructed. Attractors can be markers to identify pathways involved in pediatric sepsis. iPAS may provide a correlation score for each of the signaling pathways present in an individual patient. This process may improve the personalized interpretation of disease mechanisms and may be useful in the forthcoming era of personalized medicine.

  8. Resting State EEG-based biometrics for individual identification using convolutional neural networks.

    Science.gov (United States)

    Lan Ma; Minett, James W; Blu, Thierry; Wang, William S-Y

    2015-08-01

    Biometrics is a growing field, which permits identification of individuals by means of unique physical features. Electroencephalography (EEG)-based biometrics utilizes the small intra-personal differences and large inter-personal differences between individuals' brainwave patterns. In the past, such methods have used features derived from manually-designed procedures for this purpose. Another possibility is to use convolutional neural networks (CNN) to automatically extract an individual's best and most unique neural features and conduct classification, using EEG data derived from both Resting State with Open Eyes (REO) and Resting State with Closed Eyes (REC). Results indicate that this CNN-based joint-optimized EEG-based Biometric System yields a high degree of accuracy of identification (88%) for 10-class classification. Furthermore, rich inter-personal difference can be found using a very low frequency band (0-2Hz). Additionally, results suggest that the temporal portions over which subjects can be individualized is less than 200 ms.

  9. Specific comorbidity between bulimia nervosa and personality disorders.

    Science.gov (United States)

    Carroll, J M; Touyz, S W; Beumont, P J

    1996-03-01

    The present study investigates the comorbidity between bulimia nervosa (BN) and the entire range of American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders, 3rd rev. ed. (DSM-III-R) personality disorders and controls for the presence of coexisting depression. The Personality Disorders Examination (PDE), a structured interview that encompasses all 13 (provisional) DSM-III-R personality disorders, was administered to three groups of subjects: depressed BN patients (n = 15), nondepressed BN patients (n = 15), and nonpsychiatric controls (n = 15). The BN patients were referrals to a dieting disorder unit affiliated with the University of Sydney. They all met DSM-III-R criteria and all had body mass indexes (BMIs) greater than 19. The nonpsychiatric control group were recruited from an undergraduate psychology course. All subjects were given the Bulimic Investigatory Test, Edinburgh (BITE), the Eating Disorders Inventory-2 (EDI-2), the Hamilton Depression Rating Scale (HDRS), and the PDE. 46.7% of depressed BN patients met the criteria for at least one Axis II diagnosis, as assessed by the PDE, and 33.3% of nondepressed BN patients received such a diagnosis, whereas only 6.7% of nonpsychiatric control subjects met this criterion (p personality disorders and BN that cannot be attributed to the confounding influence of coexisting depression. This finding enables the identification of subgroups of individuals with BN, enabling them to be compared and contrasted. The identification of differences between subgroups may provide information regarding prognosis and differential response to treatment, which could enable more appropriate treatment decisions to be made.

  10. Cheiloscopy and dactyloscopy: Do they dictate personality patterns?

    Science.gov (United States)

    Abidullah, Mohammed; Kumar, M Naveen; Bhorgonde, Kavita D; Reddy, D Shyam Prasad

    2015-01-01

    Cheiloscopy and dactyloscopy, both are well-established forensic tools used in individual identification in any scenario be it a crime scene or civil cause. Like finger prints, lip prints are unique and distinguishable for every individual. But their relationship to personality types has not been established excepting the hypothesis stating that finger prints could explain these personality patterns. The study was aimed to record and correlate the lip and finger prints with that of character/personality of a person. The lip and finger prints and character of a person were recorded and the data obtained was subjected for statistical analysis, especially for Pearson's Chi-square test and correlation/association between the groups was also studied. The study sample comprised of 200 subjects, 100 males and 100 females, aged between 18 and 30 years. For recording lip prints, brown/pink-colored lipstick was applied on the lips and the subjects were asked to spread uniformly over the lips. Lip prints were traced in the normal rest position on a plain white bond paper. For recording the finger prints, imprints of the fingers were taken on a plain white bond paper using ink pad. The collected prints were visualized using magnifying lens. To record the character of person, a pro forma manual for multivariable personality inventory by Dr. BC Muthayya was used. Data obtained was subjected for statistical analysis, especially for Pearson's Chi-square test and correlation/association between the groups was also studied. In males, predominant lip pattern recorded was Type I with whorls-type finger pattern and the character being ego ideal, pessimism, introvert, and dogmatic; whereas in females, predominant lip pattern recorded was Type II with loops-type finger pattern and the character being neurotic, need achievers, and dominant. Many studies on lip pattern, finger pattern, palatal rugae, etc., for individual identification and gender determination exist, but correlative

  11. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Science.gov (United States)

    2010-01-01

    ... Section 1235.10 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 1235.10 U.S. Citizen Identification... applicant objects and demands an opportunity to see and rebut the adverse evidence. Any rebuttal...

  12. Optimal Number of Questionnaire Response Categories

    Directory of Open Access Journals (Sweden)

    W. Paul Jones

    2013-05-01

    Full Text Available Two multi-instrument investigations in a university clinic/lab provided an opportunity to explore the impact of reducing the number of response alternatives in a scale measuring vocational personality traits. In a simulation study, a standard computer-based administration provided a numeric scale for each item ranging from 0 to 10. The tests were then rescored to simulate the effect of only three choices. For the follow-up study, two versions of the scale were created, one with two response options and the other with six response options, and were randomly assigned to participants. Typical relationships were evident between the vocational personality traits and scores on standard measures of core personality traits with negligible impact from reducing the number of response alternatives. Neither the ability of the participants nor the self-reported distress had a measurable impact on the utility of the results with the reduction in response alternatives.

  13. Biometric identification systems: the science of transaction facilitation

    Science.gov (United States)

    Rogers, Robert R.

    1994-10-01

    The future ofthe "secure transaction" and the success ofall undertakings that depend on absolute certainty that the individuals involved really are who and what they represent themselves to be is dependent upon the successful development of absolutely accurate, low-cost and easy-to-operate Biometric Identification Systems. Whether these transactions are political, military, financial or administrative (e.g. health cards, drivers licenses, welfare entitlement, national identification cards, credit card transactions, etc.), the need for such secure and positive identification has never been greater -and yet we are only at the beginning ofan era in which we will see the emergence and proliferation of Biometric Identification Systems in nearly every field ofhuman endeavor. Proper application ofthese systems will change the way the world operates, and that is precisely the goal ofComparator Systems Corporation. Just as with the photo-copier 40 years ago and the personal computer 20 years ago, the potential applications for positive personal identification are going to make the Biometric Identification System a commonplace component in the standard practice ofbusiness, and in interhuman relationships ofall kinds. The development of new and specific application hardware, as well as the necessary algorithms and related software required for integration into existing operating procedures and newly developed systems alike, has been a more-than-a-decade-long process at Comparator -and we are now on the verge of delivering these systems to the world markets so urgently in need of them. An individual could feel extremely confident and satisfied ifhe could present his credit, debit, or ATM card at any point of sale and, after inserting his card, could simply place his finger on a glass panel and in less than a second be positively accepted as being the person that the card purported him to be; not to mention the security and satisfaction of the vendor involved in knowing that

  14. Structural Acoustic UXO Detection and Identification in Marine Environments

    Science.gov (United States)

    2016-05-01

    a thick steel wall, is cylindrical, and has an aspect ratio of about 5:1. Further, the interior water can support acoustic waves as does the epoxy...FINAL REPORT Structural Acoustic UXO Detection and Identification in Marine Environments SERDP Project MR-2103 MAY 2016 B. H...NUMBER Structural Acoustic UXO Detection and Identification in Marine Environments- Final report for Follow-on Work- MR-2103 Sb. GRANT NUMBER Sc

  15. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits

    Directory of Open Access Journals (Sweden)

    S. Mehta

    2016-01-01

    Full Text Available Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p<0.05. Significant difference in disability was seen between the subgroups. Conclusions. The study identified a high risk group of CP individuals whose level of personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  16. The emergence of radiofrequency identification tags: applications in surgery.

    Science.gov (United States)

    Schwaitzberg, S D

    2006-08-01

    Radiofrequency identification (RFID) is a wireless method of automatic identification. Currently, RFID tags are emerging into our environment in many aspects of our lives. Applications are being developed in a variety of fields, including health care. Aspects of surgical care will lend themselves to this approach. This technology could provide large amounts of data that not only carry the promise of improving health care, but also may have an impact on personal aspects of our daily lives. Each of us must become familiar with the risks and benefits of RFID use.

  17. Evaluation of dose equivalent and identification of energy rangeby the electronic personal dosemeter for neutron 'Saphydose-N' at different workplaces of nuclear facilities

    International Nuclear Information System (INIS)

    Chau, Q.; Lahaye, T.; Lacoste, V.; Muller, H.; Luszik-Bhadra, M.; Reginatto, M.

    2005-01-01

    Full text: According to the transposition of the Directive 96/29/EURATOM into the French legislation, any worker operating in a controlled area has to be monitored by 'passive' and 'active' dosemeters. Electronic personal dosemeters are especially needed for optimization of workplaces. In nuclear facilities, some of the workers are likely to be exposed to mixed neutron-photon fields. If the dosimetry of the photons is relatively well controlled, the neutron dosimetry raises more difficulties. In this context, the Institute for Radiological Protection and Nuclear Safety (IRSN) has developed an electronic device based on a silicon detector: the 'Saphydose-N' dosemeter. It is composed of several detectors and covers more than eight energy decades. The Saphydose-N device complies with recommendations of standard IEC 1323. As the radiation fields produced in laboratory are not strictly representative to those encountered at workplaces, IRSN evaluated the response of Saphydose-N at various workplaces from nuclear industry. Several campaigns were performed in the framework of the European contract EVIDOS ('Evaluation of Individual Dosimetry in Mixed Neutron and Photon Radiation Fields'). Saphydose-N was carried out at a fuel processing plant, at the Nuclear Power Plant close to the boiling water reactor, near the transport and storage cask and at the Research Reactor. This paper mainly aims at presenting the measurements, the identification of the energy range and the results obtained with the electronic personal neutron Saphydose-N at different facilities. The results are compared with reference values, defined by other partners in EVIDOS project, for ambient and personal dose equivalent. (author)

  18. Kaon identification and Search for Lepton Number Violation in $K^{\\pm}$ decay-in-flight experiments at CERN

    CERN Document Server

    Massri, Karim; Goudzovski, Evgueni

    A search for the Lepton Number Violating decay $K^{\\pm} \\to \\pi^{\\pm} \\mu^{\\pm} \\mu^{\\pm}$ has been performed using the data collected by the NA48/2 experiment in 2003 and 2004. The signal event selection, the background rejection, the evaluation of the muon identifcation efficiency and the statistical methods used for the data interpretation are presented. Based on $1.8 \\times 10 ^{11}$ kaon decays in the fiducial volume and using several models for the signal, upper limits for the branching fraction B($K^{\\pm} \\to \\pi^{\\pm} \\mu^{\\pm} \\mu^{\\pm}$) of the order of $10^{-10} $ have been obtained for 90%, 95% and 99% confidence levels, improving the previous best limit by one order of magnitude. The Cherenkov differential counter used for kaon identification in the NA62 experiment, equipped with approximately 30% of the photo-detectors, was installed and tested during a Technical Run in 2012. The counter's ability of distinguishing between kaons and pions has been validated via pressure scan procedure. The da...

  19. Collection, Use, Disclosure and Protection of Personal Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    whoskin

    addresses, personal and/or work email addresses, personal and/or work or cell telephone numbers); and. • language testing and language assessment results. How Do We Use Your Personal Information? We use the personal information you provide exclusively for the purposes of processing, screening, assessing ...

  20. Human Trafficking Identification and Service Provision in the Medical and Social Service Sectors.

    Science.gov (United States)

    Schwarz, Corinne; Unruh, Erik; Cronin, Katie; Evans-Simpson, Sarah; Britton, Hannah; Ramaswamy, Megha

    2016-06-01

    The medical sector presents a unique opportunity for identification and service to victims of human trafficking. In this article, we describe local and site-specific efforts to develop an intervention tool to be used in an urban hospital's emergency department in the midwestern United States. In the development of our tool, we focused on both identification and intervention to assist trafficked persons, through a largely collaborative process in which we engaged local stakeholders for developing site-specific points of intervention. In the process of developing our intervention, we highlight the importance of using existing resources and services in a specific community to address critical gaps in coverage for trafficked persons. For example, we focus on those who are victims of labor trafficking, in addition to those who are victims of sex trafficking. We offer a framework informed by rights-based approaches to anti-trafficking efforts that addresses the practical challenges of human trafficking victim identification while simultaneously working to provide resources and disseminate services to those victims.

  1. Review on identification study of driver behavior intention and characteristics

    Directory of Open Access Journals (Sweden)

    Gang LI

    2017-08-01

    Full Text Available In order to better improve vehicle active safety and realize personalized driving, aiming at the problem of the identification of driver behavior intention and characteristics, the electronic control systems' important role in the automobile and the importance of the driver behavior intention and characteristic identification are discussed. The relative domestic and foreign research is summarized, and the prospect is put forward. In order to improve the performance of automobile electronic control system and realize the intelligent control for the cars, the identification of driver behavior intention and characteristics needs to be studied. How to rationally classify and on-line identify drivers' characteristics correctly for the steering, braking and acceleration characteristics is a long term research topic.

  2. Emotional Verbalization and Identification of Facial Expressions in Teenagers’ Communication

    Directory of Open Access Journals (Sweden)

    I. S. Ivanova

    2013-01-01

    Full Text Available The paper emphasizes the need for studying the subjective effectiveness criteria of interpersonal communication and importance of effective communication for personality development in adolescence. The problemof undeveloped representation of positive emotions in communication process is discussed. Both the identification and verbalization of emotions are regarded by the author as the basic communication skills. The experimental data regarding the longitude and age levels are described, the gender differences in identification and verbalization of emotions considered. The outcomes of experimental study demonstrate that the accuracy of facial emotional expressions of teenage boys and girls changes at different rates. The prospects of defining the age norms for identification and verbalization of emotions are analyzed.

  3. The influence of regional deprivation index on personal happiness using multilevel analysis.

    Science.gov (United States)

    Kim, Kil Hun; Chun, Jin-Ho; Sohn, Hae Sook

    2015-01-01

    The objective of the present study was to identify the factors that influence the happiness index of community residents, by considering personal and regional aspects, and to use as evidence of efforts for improvement of the happiness index. The study was conducted based on information from 16,270 participants who met the data requirement among those who participated in the 2011 South Gyeongsang Community Health Survey. Of the factors that can influence the happiness index, socioeconomic characteristics, health behavior, morbidity, and healthcare use, social contact, and participation in social activities were classified as personal factors; for regional factors, data from the 2010 census were used to extrapolate the regional deprivation indices at the submunicipal-level (eup, myeon, and dong) in South Gyeongsang Province. The happiness index for each characteristic was compared to that for others via t-test and ANOVA, and multilevel analysis was performed, using four models: a basic model for identification of only random effects, model 1 for identification of personal factors, model 2 for identification of regional factors, and model 3 for simultaneous consideration of both personal and regional factors. The mean happiness index was 63.2 points (64.6 points in males and 62.0 points in females), while the mean deprivation index was -1.58 points. In the multilevel analysis, the regional-level variance ratio of the basic model was 10.8%, confirming interregional differences. At the personal level, higher happiness indices were seen in groups consisting of males with high educational level, high income, high degree of physical activity, sufficient sleep, active social contact, and participation in social activities; whereas lower happiness indices were seen in people who frequently skipped breakfast, had unmet healthcare needs, and had accompanying diseases, as well as those with higher deprivation index. The study confirmed that the happiness index of community

  4. The influence of regional deprivation index on personal happiness using multilevel analysis

    Directory of Open Access Journals (Sweden)

    Kil Hun Kim

    2015-04-01

    Full Text Available OBJECTIVES: The objective of the present study was to identify the factors that influence the happiness index of community residents, by considering personal and regional aspects, and to use as evidence of efforts for improvement of the happiness index. METHODS: The study was conducted based on information from 16,270 participants who met the data requirement among those who participated in the 2011 South Gyeongsang Community Health Survey. Of the factors that can influence the happiness index, socioeconomic characteristics, health behavior, morbidity, and healthcare use, social contact, and participation in social activities were classified as personal factors; for regional factors, data from the 2010 census were used to extrapolate the regional deprivation indices at the submunicipal-level (eup, myeon, and dong in South Gyeongsang Province. The happiness index for each characteristic was compared to that for others via t-test and ANOVA, and multilevel analysis was performed, using four models: a basic model for identification of only random effects, model 1 for identification of personal factors, model 2 for identification of regional factors, and model 3 for simultaneous consideration of both personal and regional factors. RESULTS: The mean happiness index was 63.2 points (64.6 points in males and 62.0 points in females, while the mean deprivation index was -1.58 points. In the multilevel analysis, the regional-level variance ratio of the basic model was 10.8%, confirming interregional differences. At the personal level, higher happiness indices were seen in groups consisting of males with high educational level, high income, high degree of physical activity, sufficient sleep, active social contact, and participation in social activities; whereas lower happiness indices were seen in people who frequently skipped breakfast, had unmet healthcare needs, and had accompanying diseases, as well as those with higher deprivation index. CONCLUSIONS

  5. Optimizations for the EcoPod field identification tool

    Directory of Open Access Journals (Sweden)

    Yu YuanYuan

    2008-03-01

    Full Text Available Abstract Background We sketch our species identification tool for palm sized computers that helps knowledgeable observers with census activities. An algorithm turns an identification matrix into a minimal length series of questions that guide the operator towards identification. Historic observation data from the census geographic area helps minimize question volume. We explore how much historic data is required to boost performance, and whether the use of history negatively impacts identification of rare species. We also explore how characteristics of the matrix interact with the algorithm, and how best to predict the probability of observing a previously unseen species. Results Point counts of birds taken at Stanford University's Jasper Ridge Biological Preserve between 2000 and 2005 were used to examine the algorithm. A computer identified species by correctly answering, and counting the algorithm's questions. We also explored how the character density of the key matrix and the theoretical minimum number of questions for each bird in the matrix influenced the algorithm. Our investigation of the required probability smoothing determined whether Laplace smoothing of observation probabilities was sufficient, or whether the more complex Good-Turing technique is required. Conclusion Historic data improved identification speed, but only impacted the top 25% most frequently observed birds. For rare birds the history based algorithms did not impose a noticeable penalty in the number of questions required for identification. For our dataset neither age of the historic data, nor the number of observation years impacted the algorithm. Density of characters for different taxa in the identification matrix did not impact the algorithms. Intrinsic differences in identifying different birds did affect the algorithm, but the differences affected the baseline method of not using historic data to exactly the same degree. We found that Laplace smoothing

  6. The Role of Defense Mechanisms, Personality and Demographical Factors on Complicated Grief following Death of a loved one by Cancer

    Directory of Open Access Journals (Sweden)

    Isaac Rahimian-Boogar

    2015-10-01

    Full Text Available Objective: Identification of the risk factors and psychological correlates of prolonged grief disorder is vital for health promotions in relatives of persons who died of cancer. The aim of this research was to investigate the role of defense mechanisms, character dimension of personality and demographic factors on complicated grief following a loss of a family member to cancer .Method: A number of 226 persons who had lost a family member to cancer in a cancer institute at Tehran University of Medical Science were selected through compliance sampling and completed the Inventory of complicated Grief-Revised (ICG-R, the Defense Styles Questionnaire (DSQ, the Character dimension of Temperament and Character Inventory (TCI, and the Demographical questionnaire. Data were analyzed by stepwise multiple regression analysis, using the PASW version 18 .Results: Findings revealed that neurotic defense style had a significant positive predictive role in the complicated grief; and cooperativeness, age of the deceased person, self-transcendence and mature defense style had a significant negative predictive role in complicated grief (p<0.001. R2 was 0.73 for the final model (p<.001.Conclusion: The results revealed that two character dimensions (low cooperativeness and self-transcendence, high neurotic defense style and young age of the deceased person were involved in the psychopathological course of the complicated and prolonged grief. It was concluded that personality characteristics of the grieving persons and demographics of the deceased person should be addressed in designing tailored interventions for complicated grief.

  7. Palatal Rugoscopy: A new era for forensic identification

    Directory of Open Access Journals (Sweden)

    Namrata Harchandani

    2015-01-01

    Full Text Available Aims and Objectives: To observe and compare the distribution of various palatal rugae patterns in western and northern Indian populations and to study the variations in male and female subjects respectively. Materials and Methods: The study consisted of 100 subjects, 50 each from the two groups of geographically different regions of western and northern India. After obtaining informed consent, an alginate impression of maxillary arch was made for interpretation. The number, type, and unification were followed according to Thomas and Kotze′s classification and the shape was recorded according to Kapali et al.′s classification. Results: The shape of rugae was compared between the two study groups and was found to be highly significant between western Indian and northern Indian subjects. The number and shape of rugae differed significantly between the genders, with males having a highly significant difference as compared to the females. The western Indian group showed wavy shape predominantly in males and females had straight rugae. Similarly, the northern Indian male participants also had wavy shape; however, females in this group had more curved shaped rugae. Conclusion: The uniqueness of palatal rugae pattern can be utilized similar to fingerprints and when combined with other methods, it can help in the identification of a person.

  8. Maladaptive Personality Trait Models: Validating the Five-Factor Model Maladaptive Trait Measures With the Personality Inventory for DSM-5 and NEO Personality Inventory.

    Science.gov (United States)

    Helle, Ashley C; Mullins-Sweatt, Stephanie N

    2017-05-01

    Eight measures have been developed to assess maladaptive variants of the five-factor model (FFM) facets specific to personality disorders (e.g., Five-Factor Borderline Inventory [FFBI]). These measures can be used in their entirety or as facet-based scales (e.g., FFBI Affective Dysregulation) to improve the comprehensiveness of assessment of pathological personality. There are a limited number of studies examining these scales with other measures of similar traits (e.g., DSM-5 alternative model). The current study examined the FFM maladaptive scales in relation to the respective general personality traits of the NEO Personality Inventory-Revised and the pathological personality traits of the DSM-5 alternative model using the Personality Inventory for DSM-5. The results indicated the FFM maladaptive trait scales predominantly converged with corresponding NEO Personality Inventory-Revised, and Personality Inventory for DSM-5 traits, providing further validity for these measures as extensions of general personality traits and evidence for their relation to the pathological trait model. Benefits and applications of the FFM maladaptive scales in clinical and research settings are discussed.

  9. Piping stress analysis with personal computers

    International Nuclear Information System (INIS)

    Revesz, Z.

    1987-01-01

    The growing market of the personal computers is providing an increasing number of professionals with unprecedented and surprisingly inexpensive computing capacity, which if using with powerful software, can enhance immensely the engineers capabilities. This paper focuses on the possibilities which opened in piping stress analysis by the widespread distribution of personal computers, on the necessary changes in the software and on the limitations of using personal computers for engineering design and analysis. Reliability and quality assurance aspects of using personal computers for nuclear applications are also mentioned. The paper resumes with personal views of the author and experiences gained during interactive graphic piping software development for personal computers. (orig./GL)

  10. The signer and the sign: cortical correlates of person identity and language processing from point-light displays.

    Science.gov (United States)

    Campbell, Ruth; Capek, Cheryl M; Gazarian, Karine; MacSweeney, Mairéad; Woll, Bencie; David, Anthony S; McGuire, Philip K; Brammer, Michael J

    2011-09-01

    In this study, the first to explore the cortical correlates of signed language (SL) processing under point-light display conditions, the observer identified either a signer or a lexical sign from a display in which different signers were seen producing a number of different individual signs. Many of the regions activated by point-light under these conditions replicated those previously reported for full-image displays, including regions within the inferior temporal cortex that are specialised for face and body-part identification, although such body parts were invisible in the display. Right frontal regions were also recruited - a pattern not usually seen in full-image SL processing. This activation may reflect the recruitment of information about person identity from the reduced display. A direct comparison of identify-signer and identify-sign conditions showed these tasks relied to a different extent on the posterior inferior regions. Signer identification elicited greater activation than sign identification in (bilateral) inferior temporal gyri (BA 37/19), fusiform gyri (BA 37), middle and posterior portions of the middle temporal gyri (BAs 37 and 19), and superior temporal gyri (BA 22 and 42). Right inferior frontal cortex was a further focus of differential activation (signer>sign). These findings suggest that the neural systems supporting point-light displays for the processing of SL rely on a cortical network including areas of the inferior temporal cortex specialized for face and body identification. While this might be predicted from other studies of whole body point-light actions (Vaina, Solomon, Chowdhury, Sinha, & Belliveau, 2001) it is not predicted from the perspective of spoken language processing, where voice characteristics and speech content recruit distinct cortical regions (Stevens, 2004) in addition to a common network. In this respect, our findings contrast with studies of voice/speech recognition (Von Kriegstein, Kleinschmidt, Sterzer

  11. Standoff Human Identification Using Body Shape

    Energy Technology Data Exchange (ETDEWEB)

    Matzner, Shari; Heredia-Langner, Alejandro; Amidan, Brett G.; Boettcher, Evelyn J.; Lochtefeld, Darrell; Webb, Timothy

    2015-09-01

    The ability to identify individuals is a key component of maintaining safety and security in public spaces and around critical infrastructure. Monitoring an open space is challenging because individuals must be identified and re-identified from a standoff distance nonintrusively, making methods like fingerprinting and even facial recognition impractical. We propose using body shape features as a means for identification from standoff sensing, either complementing other identifiers or as an alternative. An important challenge in monitoring open spaces is reconstructing identifying features when only a partial observation is available, because of the view-angle limitations and occlusion or subject pose changes. To address this challenge, we investigated the minimum number of features required for a high probability of correct identification, and we developed models for predicting a key body feature—height—from a limited set of observed features. We found that any set of nine randomly selected body measurements was sufficient to correctly identify an individual in a dataset of 4426 subjects. For predicting height, anthropometric measures were investigated for correlation with height. Their correlation coefficients and associated linear models were reported. These results—a sufficient number of features for identification and height prediction from a single feature—contribute to developing systems for standoff identification when views of a subject are limited.

  12. Antipatterns identification, refactoring, and management

    CERN Document Server

    Neill, Colin J

    2005-01-01

    AntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful practices, you will be able to correctly identify problems in your own work environment, and take action to correct them. The authors apply their extensive work and consultative experience, as well as the experience of the many professionals that t

  13. Borderline Personality Disorder

    Science.gov (United States)

    ... of a mood disorder—not borderline personality disorder Self-harming behavior, such as cutting Recurring thoughts of suicidal ... symptoms and reduce the number of suicidal or self-harming behaviors. Read more on NIMH’s Psychotherapies health topic ...

  14. Behavior of Personality Type Toward Stress and Job Performance: A Study of Healthcare Professionals

    Directory of Open Access Journals (Sweden)

    Yasmin Janjhua

    2012-01-01

    Full Text Available Background: The present paper has examined the sources of stress among the healthcare professionals and the difference between responses of personality type A and type B healthcare professionals toward stressful situations. Further, the difference in the performance of both the personality types has been studied. The relationship between stress and performance among the healthcare professionals in general and with respect to personality type A and type B healthcare professionals in particular has also been investigated. Methods: A total of 160 healthcare professionals of Post Graduate Institute (PGI, Chandigarh, were subjects of this study. Results: Identification with patients, deterioration and complication in the patient condition, and job criticism emerged to be the sources of stress. Significant difference between personality type A and personality type B professionals′ response pertaining to identification with the patients only has been reported. However, type A individuals showed slightly higher inclination as compared to type B individuals on majority of stressful situations. It was further noted that type A individuals had scored higher on almost all the performance indicators as compared to personality type B individuals. The mean difference between the personality types was found to be significant for two performance dimensions, i.e., relationship with colleagues, and teaching and training. Conclusions: The stressful situation relationship with patients was found to have significantly negative impact on the performance factors such as good clinical care and rapport with patients. Daily work was also found to be negatively related to good medical practice.

  15. Behavior of personality type toward stress and job performance: a study of healthcare professionals.

    Science.gov (United States)

    Janjhua, Yasmin; Chandrakanta

    2012-07-01

    The present paper has examined the sources of stress among the healthcare professionals and the difference between responses of personality type A and type B healthcare professionals toward stressful situations. Further, the difference in the performance of both the personality types has been studied. The relationship between stress and performance among the healthcare professionals in general and with respect to personality type A and type B healthcare professionals in particular has also been investigated. A total of 160 healthcare professionals of Post Graduate Institute (PGI), Chandigarh, were subjects of this study. Identification with patients, deterioration and complication in the patient condition, and job criticism emerged to be the sources of stress. Significant difference between personality type A and personality type B professionals' response pertaining to identification with the patients only has been reported. However, type A individuals showed slightly higher inclination as compared to type B individuals on majority of stressful situations. It was further noted that type A individuals had scored higher on almost all the performance indicators as compared to personality type B individuals. The mean difference between the personality types was found to be significant for two performance dimensions, i.e., relationship with colleagues, and teaching and training. The stressful situation relationship with patients was found to have significantly negative impact on the performance factors such as good clinical care and rapport with patients. Daily work was also found to be negatively related to good medical practice.

  16. Automatic Identification of the Repolarization Endpoint by Computing the Dominant T-wave on a Reduced Number of Leads.

    Science.gov (United States)

    Giuliani, C; Agostinelli, A; Di Nardo, F; Fioretti, S; Burattini, L

    2016-01-01

    Electrocardiographic (ECG) T-wave endpoint (Tend) identification suffers lack of reliability due to the presence of noise and variability among leads. Tend identification can be improved by using global repolarization waveforms obtained by combining several leads. The dominant T-wave (DTW) is a global repolarization waveform that proved to improve Tend identification when computed using the 15 (I to III, aVr, aVl, aVf, V1 to V6, X, Y, Z) leads usually available in clinics, of which only 8 (I, II, V1 to V6) are independent. The aim of the present study was to evaluate if the 8 independent leads are sufficient to obtain a DTW which allows a reliable Tend identification. To this aim Tend measures automatically identified from 15-dependent-lead DTWs of 46 control healthy subjects (CHS) and 103 acute myocardial infarction patients (AMIP) were compared with those obtained from 8-independent-lead DTWs. Results indicate that Tend distributions have not statistically different median values (CHS: 340 ms vs. 340 ms, respectively; AMIP: 325 ms vs. 320 ms, respectively), besides being strongly correlated (CHS: ρ=0.97, AMIP: 0.88; Pautomatic Tend identification from DTW, the 8 independent leads can be used without a statistically significant loss of accuracy but with a significant decrement of computational effort. The lead dependence of 7 out of 15 leads does not introduce a significant bias in the Tend determination from 15 dependent lead DTWs.

  17. People identification for domestic non-overlapping RGB-D camera networks

    NARCIS (Netherlands)

    Takac, B.; Rauterberg, G.W.M.; Català, A.; Chen, W.

    2015-01-01

    The ability to identify the specific person in a home camera network is very relevant for healthcare applications where humans need to be observed daily in their living environment. The appearance based people identification in a domestic environment has many similarities with the problem of

  18. Personality disorder symptoms are differentially related to divorce frequency.

    Science.gov (United States)

    Disney, Krystle L; Weinstein, Yana; Oltmanns, Thomas F

    2012-12-01

    Divorce is associated with a multitude of outcomes related to health and well-being. Data from a representative community sample (N = 1,241) of St. Louis residents (ages 55-64) were used to examine associations between personality pathology and divorce in late midlife. Symptoms of the 10 DSM-IV personality disorders were assessed with the Structured Interview for DSM-IV Personality and the Multisource Assessment of Personality Pathology (both self and informant versions). Multiple regression analyses showed Paranoid and Histrionic personality disorder symptoms to be consistently and positively associated with number of divorces across all three sources of personality assessment. Conversely, Avoidant personality disorder symptoms were negatively associated with number of divorces. The present paper provides new information about the relationship between divorce and personality pathology at a developmental stage that is understudied in both domains. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  19. Example of human individual identification from World War II gravesite.

    Science.gov (United States)

    Ossowski, Andrzej; Kuś, Marta; Brzeziński, Piotr; Prüffer, Jakub; Piątek, Jarosław; Zielińska, Grażyna; Bykowska, Milena; Jałowińska, Katarzyna; Torgaszev, Anton; Skoryukov, Antoliy; Parafiniuk, Mirosław

    2013-12-10

    This paper presents the procedure elaborated by our team which was applied to the mode of identification of Red Army soldiers who were taken as prisoners by the German Army during World War II and deceased in captivity. In the course of our search the unmarked burial of ten Soviet prisoners of war was found. Historical, anthropological and genetic research conducted by us led to the personal identification of nine of them, including two by means of DNA analysis. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  20. Palatal Rugae Pattern as an Aid for Personal Identification: A Forensic Study

    Directory of Open Access Journals (Sweden)

    R Kamala

    2011-01-01

    Conclusion: No two palates are alike in their configuration and once formed, they do not undergo any changes except in length due to normal growth, remaining in the same position throughout a person′s entire life. Thus, palatal rugae appear to possess the features of an ideal forensic identification parameter, i.e. uniqueness, postmortem resistance and stability, provided antemortem record exists.

  1. Really big numbers

    CERN Document Server

    Schwartz, Richard Evan

    2014-01-01

    In the American Mathematical Society's first-ever book for kids (and kids at heart), mathematician and author Richard Evan Schwartz leads math lovers of all ages on an innovative and strikingly illustrated journey through the infinite number system. By means of engaging, imaginative visuals and endearing narration, Schwartz manages the monumental task of presenting the complex concept of Big Numbers in fresh and relatable ways. The book begins with small, easily observable numbers before building up to truly gigantic ones, like a nonillion, a tredecillion, a googol, and even ones too huge for names! Any person, regardless of age, can benefit from reading this book. Readers will find themselves returning to its pages for a very long time, perpetually learning from and growing with the narrative as their knowledge deepens. Really Big Numbers is a wonderful enrichment for any math education program and is enthusiastically recommended to every teacher, parent and grandparent, student, child, or other individual i...

  2. When and which employees feel obliged: A personality perspective of how organizational identification develops

    Directory of Open Access Journals (Sweden)

    Muhammad Ali Asadullah

    2017-07-01

    Full Text Available This paper examines the indirect effect of interpersonal and informational justice on organizational identification through psychological contract fulfillment across different levels of equity sensitivity. The data were collected using self-reported measures from 656 permanent employees working in five commercial banks in Pakistan. The statistical results of the study confirmed that the indirect effect of interpersonal and informational justice on organizational identification through psychological contract fulfillment is significant. However, the statistical results of the study also demonstrated that the indirect effect of interpersonal and informational justice does not differ across different levels of equity sensitivity. This study offers some implications for managers to maintain an effective employment relationship with the employees inside the organizations.

  3. Song Recognition without Identification: When People Cannot "Name that Tune" but Can Recognize It as Familiar

    Science.gov (United States)

    Kostic, Bogdan; Cleary, Anne M.

    2009-01-01

    Recognition without identification (RWI) is a common day-to-day experience (as when recognizing a face or a tune as familiar without being able to identify the person or the song). It is also a well-established laboratory-based empirical phenomenon: When identification of recognition test items is prevented, participants can discriminate between…

  4. 7 CFR 1400.402 - Notification.

    Science.gov (United States)

    2010-01-01

    ... social security number or taxpayer identification number of such a person or legal entity, if known, and... SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Foreign Persons § 1400.402 Notification. (a) Any legal entity... legal entity conducts its farming operation if: (1) Any person, group of persons, legal entity, or group...

  5. 45 CFR 705.4 - Times, places, and requirements for identification of individuals making requests and...

    Science.gov (United States)

    2010-10-01

    ... Officer for the Commission. (b) An individual making a request to the General Counsel in person may do so at the Commission's headquarters office, 624 9th Street, N.W., Washington, D.C. 20425, on any business day during business hours. Persons may also appear for purposes of identification only, at any of...

  6. Moral Personality Growth

    Directory of Open Access Journals (Sweden)

    Jana Kalin

    1998-12-01

    Full Text Available Learning in terms of personality growth is a life-long process, just as personality growth itself is a life-long process. Kalin presents a number of psychological theories and their impact on moral development - which is an integral part of personality growth. The paper further treats the formation and changing of beliefs, and the role of education in the two processes. Great emphasis is put on cognitive theories; Kalin explains those formulated by L. Kohlberg and J. Rest. In discussing the process of shaping and changing one's views, special emphasis is put on the environment, or rather the social group an individual belongs to, and on the influence of personality traits and experience. The paper juxtaposes the influence - strengths and weaknesses - of the psychology of persuasion and education on forming and changing one's views, taken into consideration that views consist of cognitive, emotive and conative dimensions.

  7. Belief In Numbers: When and why women disbelieve tailored breast cancer risk statistics

    Science.gov (United States)

    Scherer, Laura D.; Ubel, Peter A.; McClure, Jennifer; Green, Sarah M.; Alford, Sharon Hensley; Holtzman, Lisa; Exe, Nicole; Fagerlin, Angela

    2013-01-01

    Objective To examine when and why women disbelieve tailored information about their risk of developing breast cancer. Methods 690 women participated in an online program to learn about medications that can reduce the risk of breast cancer. The program presented tailored information about each woman’s personal breast cancer risk. Half of women were told how their risk numbers were calculated, whereas the rest were not. Later, they were asked whether they believed that the program was personalized, and whether they believed their risk numbers. If a woman did not believe her risk numbers, she was asked to explain why. Results Beliefs that the program was personalized were enhanced by explaining the risk calculation methods in more detail. Nonetheless, nearly 20% of women did not believe their personalized risk numbers. The most common reason for rejecting the risk estimate was a belief that it did not fully account for personal and family history. Conclusions The benefits of tailored risk statistics may be attenuated by a tendency for people to be skeptical that these risk estimates apply to them personally. Practice Implications Decision aids may provide risk information that is not accepted by patients, but addressing the patients’ personal circumstances may lead to greater acceptance. PMID:23623330

  8. When I equals we: exploring the relation between social and personal identity of extreme right-wing political party members.

    Science.gov (United States)

    Baray, Gamze; Postmes, Tom; Jetten, Jolanda

    2009-12-01

    This paper introduces the concept of self-defining groups to explain how personal and social aspects of identity relate to each other among members of an extreme right-wing political party. Two studies were conducted. Study 1 examined how affiliation with a social group that has clear-cut, rigid norms and values affects the personal and social self-concept. Participants were members of a (self-defining) Turkish nationalist organisation (N=66) and a control group of Turkish university students (N=58). Paradoxically, high levels of national identification were associated with stronger personal identity. Study 2 used the same participant population (N=177) and manipulated self-focused attention by means of a mirror. Self-aware members reported the highest levels of identification with the nationalist organisation. Results suggest that members of this groups show no signs of 'vanishing individuality': although boundaries between personal and social identities are blurred, extremist group members retain a distinct and strengthened sense of personal identity. This raises some interesting questions for the concept of personal identity and how it can be informed by the content of one's social identity.

  9. Individual identification via electrocardiogram analysis.

    Science.gov (United States)

    Fratini, Antonio; Sansone, Mario; Bifulco, Paolo; Cesarelli, Mario

    2015-08-14

    During last decade the use of ECG recordings in biometric recognition studies has increased. ECG characteristics made it suitable for subject identification: it is unique, present in all living individuals, and hard to forge. However, in spite of the great number of approaches found in literature, no agreement exists on the most appropriate methodology. This study aimed at providing a survey of the techniques used so far in ECG-based human identification. Specifically, a pattern recognition perspective is here proposed providing a unifying framework to appreciate previous studies and, hopefully, guide future research. We searched for papers on the subject from the earliest available date using relevant electronic databases (Medline, IEEEXplore, Scopus, and Web of Knowledge). The following terms were used in different combinations: electrocardiogram, ECG, human identification, biometric, authentication and individual variability. The electronic sources were last searched on 1st March 2015. In our selection we included published research on peer-reviewed journals, books chapters and conferences proceedings. The search was performed for English language documents. 100 pertinent papers were found. Number of subjects involved in the journal studies ranges from 10 to 502, age from 16 to 86, male and female subjects are generally present. Number of analysed leads varies as well as the recording conditions. Identification performance differs widely as well as verification rate. Many studies refer to publicly available databases (Physionet ECG databases repository) while others rely on proprietary recordings making difficult them to compare. As a measure of overall accuracy we computed a weighted average of the identification rate and equal error rate in authentication scenarios. Identification rate resulted equal to 94.95 % while the equal error rate equal to 0.92 %. Biometric recognition is a mature field of research. Nevertheless, the use of physiological signals

  10. Narrator Point of View and Persuasion in Health Narratives: The Role of Protagonist-Reader Similarity, Identification, and Self-Referencing.

    Science.gov (United States)

    Chen, Meng; Bell, Robert A; Taylor, Laramie D

    2016-08-01

    Narratives are often used in messages about health threats. We posited that a 1st-person point of view (POV) narrative would have a greater effect than a 3rd-person POV on the mediators identification and self-referencing-an effect moderated by protagonist-reader similarity. Higher levels of identification and self-referencing were expected to elevate susceptibility and severity perceptions, leading to persuasion. Participants ages ≤30 years were recruited from a crowdsource website and randomly assigned to read one version of a faux magazine article about caffeine overdose. Article versions were defined by a 2 (1st- or 3rd-person POV) × 2 (similar or dissimilar protagonist) design. To manipulate similarity, we had respondents read an article in which the protagonist was also young (24 years of age) and of the same sex or much older (54 years of age) and of the opposite sex. Participants then completed a questionnaire measuring study variables. Contrary to expectations, POV did not affect identification or self-referencing. However, similarity directly impacted identification, which in turn influenced severity perceptions. Self-referencing was not affected by the experimental manipulations but had a direct effect on susceptibility and also mediated the identification → susceptibility relationship. Susceptibility and severity perceptions were associated with greater levels of persuasion. Implications for message design are discussed.

  11. Beyond the numbers : A user-centered design approach for personal reflective healthcare technologies

    NARCIS (Netherlands)

    Jimenez Garcia, J.C.

    2014-01-01

    The current healthcare paradigm shifts towards considering the patients’ home as the primary self-care environment. Health care is changing from being solely delivered by professionals in hospitals, to considering daily-life experiences and patients’ personal contexts. In order to meet this

  12. Premorbid personality in schizophrenia spectrum: a prospective study

    DEFF Research Database (Denmark)

    Ekstrøm, Morten; Lykke Mortensen, Erik; Sørensen, Holger J

    2006-01-01

    Schizophrenia has been linked with premorbid character anomalies since it was first described. However, few prospective studies of premorbid personality characteristics in schizophrenia and related disorders have been conducted. This study evaluates premorbid personality in children who developed...... to these three diagnostic categories. Twelve-year-old children destined to develop a disorder in the schizophrenia spectrum deviated significantly from healthy controls on a number of personality characteristics: they were rated significantly lower than controls on intelligence, concentration, maturity......, friendliness, cooperation, self-control and significantly higher on aggression. Non-significant trends indicated that this group displayed more deviant personality scores than psychiatric controls. Children who later develop schizophrenia spectrum disorder differed from normal controls with respect to a number...

  13. Microbiological method for radiation sterilization (II). Identification procedure of gram positive bacteria by using BBL CRYSTAL GP identification kit

    International Nuclear Information System (INIS)

    Koshikawa, Tomihiko

    2004-01-01

    The part II in this title series describes details of the commercially available BBL CRYSTAL GP Identification Kit with the software (Becton, Dickinson and Co., Ltd.), by which identification of Gram positive bacteria as well as their number becoming easier in the radiation sterilization of medical devices. Isolation of a bacterium has to be confirmed by microscopy and its Gram positive property, by the Gram staining. The exponentially growing bacteria are to be inoculated in the Kit and cultured for 18-24 hr at 37 deg C with the lid attached by substrates for identification. Reactions to substrates are to be judged by CRYSTAL auto-reader, which is further to be searched by the computer software (code-book) for final identification. For possible misidentification, re-isolation of the bacterium, prolonged culture, concentrated inoculation and re-consideration for ranking of identification the software provides are necessary as well as other identification approaches. Representative bacteria as the bioburden are spp. of Bacilli, Corynebacteria, Staphylococci and Micrococci. (N.I.)

  14. Inclusive education and personal development.

    Science.gov (United States)

    Leigh, I

    1999-01-01

    Open-ended questionnaires covering mainstream educational experiences and personal development of deaf and hard-of-hearing adults were analyzed. Half of the 34 deaf and hard-of-hearing respondents altered self-labels based on changes in personal definitions rather than audiological changes. Supportive school environments and coping skills contributed to positive perceptions; nonsupportive school environments and being treated as 'different' were viewed negatively. Everyone valued contact with hearing peers. Contact with deaf peers depended on finding those with similar values. Identification with Deaf culture was nonexistent. Most noteworthy, 24 of 34 participants felt caught between the deaf and hearing worlds, indicating the need for niches in both. Implications for educators are that development of self-confidence and comfort with identity may be enhanced by validating the deafness dimension through opportunities for contact with deaf adults and positive relationships with both deaf and hearing peers.

  15. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  16. Acoustic Signals Processing at the Realization of Contact-Difference Method for Person Identification

    Directory of Open Access Journals (Sweden)

    A. N. Golubinskiy

    2011-09-01

    Full Text Available The questions of speech and acoustic (registered on a human body at pronouncing by him of sounds signals processing are examined. The measure of a distinguish ability for identification at parameterization of a biometric image by an amplitude-frequency response of a human body is developed.

  17. Feeling global, acting ethically: global identification and fairtrade consumption.

    Science.gov (United States)

    Reese, Gerhard; Kohlmann, Fabienne

    2015-01-01

    Global identification has become a popular construct in recent psychological debate as it relates to harmonious intergroup relations and a caring for all humanity. Based on social identity theorizing, the current research tests whether global identification can also predict consumer choices, at the expense of lower personal benefit. Importantly, we assumed that concerns about global injustice represent a crucial component of that relation. We predicted that participants who identified strongly with all humanity would rather choose a Fairtrade product alternative over a conventional one, compared with low identifiers. In addition, we assumed that this effect be mediated by perceived global injustice. Both predictions were confirmed in a consumer choice study (N = 68). Overall, global identification and globally relevant consumer behavior seem meaningfully interconnected, and we discuss these findings with regard to recent theoretical developments in Fairtrade consumption research.

  18. Forensic human identification in the United States and Canada: a review of the law, admissible techniques, and the legal implications of their application in forensic cases.

    Science.gov (United States)

    Holobinko, Anastasia

    2012-10-10

    Forensic human identification techniques are successful if they lead to positive personal identification. However, the strongest personal identification is of no use in the prosecution--or vindication--of an accused if the associated evidence and testimony is ruled inadmissible in a court of law. This review examines the U.S. and Canadian legal rulings regarding the admissibility of expert evidence and testimony, and subsequently explores four established methods of human identification (i.e., DNA profiling, forensic anthropology, forensic radiography, forensic odontology) and one complementary technique useful in determining identity, and the legal implications of their application in forensic cases. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  19. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data

    Science.gov (United States)

    Ma, Jianhua

    2018-01-01

    A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model. PMID:29495343

  20. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data

    Directory of Open Access Journals (Sweden)

    Ao Guo

    2018-02-01

    Full Text Available A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual. This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.

  1. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data.

    Science.gov (United States)

    Guo, Ao; Ma, Jianhua

    2018-02-25

    A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject's persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual's facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.

  2. Skin and respiratory disorders following the identification of disaster victims in Thailand

    DEFF Research Database (Denmark)

    Huusom, Anja Julie; Agner, Tove; Backer, Vibeke

    2011-01-01

    The purpose was to assess disorders related to disaster victim identification (DVI) in a group of Danish forensic personnel that had performed disaster victim identification in Thailand after the 2004 tsunami. All individuals from the DVI team were screened using a questionnaire to identify....... Individuals with respiratory disorders were evaluated by a specialists in pulmonary medicine, based on the results of an extended lung function test and a skin prick test. Out of the 165 persons that worked with DVI in Thailand, 152 (92%) answered the questionnaire, and 24 underwent subsequent clinical...... examination. On examination, five persons were found to have skin disorders and four had airway disorders associated with the DVI work in Thailand. The allergy tests gave no support to the conditions being caused by exposure to disinfectants or other specific chemicals in any of the examined individuals...

  3. Understanding changes in employees' identification and professional identity : the case of teachers in higher vocational education in the Netherlands

    NARCIS (Netherlands)

    Max Aangenendt

    2015-01-01

    The central aim of this dissertation is to increase our understanding of changes in identifications and in the professional identity of employees, by investigating the prominent foci of identification, their mix in higher-order social identities and the personal and organisational factors (HRM and

  4. Forensic Medicine and the Military Population: International Dental Records and Personal Identification Concerns

    Directory of Open Access Journals (Sweden)

    Maria Inês Guimarães

    2017-02-01

    Conclusion: This article reinforces the need for mandatory quality dental records in all countries, which must be efficiently stored and easily accessible in case dental identification is necessary. For the military population, these requirements are especially important, due to the added risks to which this group is subject.

  5. Identification and status revisited: the moderating role of self-enhancement and self-transcendence values.

    Science.gov (United States)

    Roccas, Sonia

    2003-06-01

    Two studies examined the moderating role of the importance attributed to self-enhancement and self-transcendence values on the association of group status with identification. In the first study, students reported their personal value priorities, their identification with a group, and their perception of the status of that group. The more importance respondents attributed to self-enhancement and the less importance to self-transcendence, the more their identification with a group depended on the group's status. In the second study, the salience of self-enhancement and of self-transcendence values was experimentally manipulated. Identification with a group depended more on the status of that group when self-enhancement values were salient than when self-transcendence values were salient.

  6. A Parallel Process Growth Model of Avoidant Personality Disorder Symptoms and Personality Traits

    Science.gov (United States)

    Wright, Aidan G. C.; Pincus, Aaron L.; Lenzenweger, Mark F.

    2012-01-01

    Background Avoidant personality disorder (AVPD), like other personality disorders, has historically been construed as a highly stable disorder. However, results from a number of longitudinal studies have found that the symptoms of AVPD demonstrate marked change over time. Little is known about which other psychological systems are related to this change. Although cross-sectional research suggests a strong relationship between AVPD and personality traits, no work has examined the relationship of their change trajectories. The current study sought to establish the longitudinal relationship between AVPD and basic personality traits using parallel process growth curve modeling. Methods Parallel process growth curve modeling was applied to the trajectories of AVPD and basic personality traits from the Longitudinal Study of Personality Disorders (Lenzenweger, 2006), a naturalistic, prospective, multiwave, longitudinal study of personality disorder, temperament, and normal personality. The focus of these analyses is on the relationship between the rates of change in both AVPD symptoms and basic personality traits. Results AVPD symptom trajectories demonstrated significant negative relationships with the trajectories of interpersonal dominance and affiliation, and a significant positive relationship to rates of change in neuroticism. Conclusions These results provide some of the first compelling evidence that trajectories of change in PD symptoms and personality traits are linked. These results have important implications for the ways in which temporal stability is conceptualized in AVPD specifically, and PD in general. PMID:22506627

  7. 75 FR 82575 - Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel

    Science.gov (United States)

    2010-12-30

    ... 9000-AL60 Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel AGENCY... requirement of collecting from contractors all forms of Government-provided identification once they are no...D Inspector General Audit Report No. D-2009-005, entitled ``Controls Over the Contractor Common...

  8. The clinical identification of peripheral neuropathy among older persons.

    Science.gov (United States)

    Richardson, James K

    2002-11-01

    To identify simple clinical rules for the detection of a diffuse peripheral neuropathy among older outpatients. Observational, blinded, controlled study. A tertiary-care electrodiagnostic laboratory and biomechanics laboratory. One hundred research subjects, 68 with electrodiagnostic evidence of peripheral neuropathy, between the ages of 50 and 80 years. Not applicable. One examiner, unaware of the results of electrodiagnostic testing, evaluated Achilles' and patellar reflexes, Romberg testing, semiquantified vibration, and position sense at the toe and ankle in all subjects, and unipedal stance time and the Michigan Diabetes Neuropathy Score in a subset of subjects. Significant group differences were present in all clinical measures tested. Three signs, Achilles' reflex (absent despite facilitation), vibration (128Hz tuning fork perceived for <10s), and position sense (<8/10 1-cm trials) at the toe, were the best predictors of peripheral neuropathy on both univariate and logistic regression (pseudo R(2)=.744) analyses. The presence of 2 or 3 signs versus 0 or 1 sign identified peripheral neuropathy with sensitivity, specificity, and positive and negative predictive values of 94.1%, 84.4%, 92.8%, and 87.1%, respectively. Values were similar among subgroups of subjects with and without diabetes mellitus. When other clinicians applied the technique to 12 more subjects, excellent interrater reliability regarding the presence of peripheral neuropathy (kappa=.833) and good to excellent interrater reliability for each sign (kappa range,.667-1.00) were shown. Among older persons, the presence of 2 or 3 of the 3 clinical signs strongly suggested electrodiagnostic evidence of a peripheral neuropathy, regardless of etiology. Age-related decline in peripheral nerve function need not be a barrier to the clinical recognition of a diffuse peripheral neuropathy among older persons. Copyright 2002 by the American Congress of Rehabilitation Medicine and the American Academy of

  9. Personality expression in Chinese language use.

    Science.gov (United States)

    Qiu, Lin; Lu, Jiahui; Ramsay, Jonathan; Yang, Shanshan; Qu, Weina; Zhu, Tingshao

    2017-12-01

    To date, little research has investigated personality expressions in languages other than English. Given that the Chinese language has the largest number of native speakers in the world, it is vitally important to examine the associations between personality and Chinese language use. In this research, we analysed Chinese microblogs and identified word categories and factorial structures associated with personality traits. We also compared our results with previous findings in English and showed that linguistic expression of personality has both universal- and language-specific aspects. Expression of personality via content words is more likely to be consistent across languages than expression via function words. This makes an important step towards uncovering universal patterns of personality expression in language. © 2016 International Union of Psychological Science.

  10. Text-independent writer identification and verification using textural and allographic features

    NARCIS (Netherlands)

    Bulacu, M.L.; Schomaker, L.R.B.

    The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and constitutes an exemplary study area within the research field of behavioral biometrics. We developed new and very effective

  11. Identification of candidate genes for dissecting complex branch number trait in chickpea.

    Science.gov (United States)

    Bajaj, Deepak; Upadhyaya, Hari D; Das, Shouvik; Kumar, Vinod; Gowda, C L L; Sharma, Shivali; Tyagi, Akhilesh K; Parida, Swarup K

    2016-04-01

    The present study exploited integrated genomics-assisted breeding strategy for genetic dissection of complex branch number quantitative trait in chickpea. Candidate gene-based association analysis in a branch number association panel was performed by utilizing the genotyping data of 401 SNP allelic variants mined from 27 known cloned branch number gene orthologs of chickpea. The genome-wide association study (GWAS) integrating both genome-wide GBS- (4556 SNPs) and candidate gene-based genotyping information of 4957 SNPs in a structured population of 60 sequenced desi and kabuli accessions (with 350-400 kb LD decay), detected 11 significant genomic loci (genes) associated (41% combined PVE) with branch number in chickpea. Of these, seven branch number-associated genes were further validated successfully in two inter (ICC 4958 × ICC 17160)- and intra (ICC 12299 × ICC 8261)-specific mapping populations. The axillary meristem and shoot apical meristem-specific expression, including differential up- and down-regulation (4-5 fold) of the validated seven branch number-associated genes especially in high branch number as compared to the low branch number-containing parental accessions and homozygous individuals of two aforesaid mapping populations was apparent. Collectively, this combinatorial genomic approach delineated diverse naturally occurring novel functional SNP allelic variants in seven potential known/candidate genes [PIN1 (PIN-FORMED protein 1), TB1 (teosinte branched 1), BA1/LAX1 (BARREN STALK1/LIKE AUXIN1), GRAS8 (gibberellic acid insensitive/GAI, Repressor of ga13/RGA and Scarecrow8/SCR8), ERF (ethylene-responsive element-binding factor), MAX2 (more axillary growth 2) and lipase] governing chickpea branch number. The useful information generated from this study have potential to expedite marker-assisted genetic enhancement by developing high-yielding cultivars with more number of productive (pods and seeds) branches in chickpea. Copyright © 2016 Elsevier

  12. Human hair identification by instrumental neutron activation analysis

    International Nuclear Information System (INIS)

    Cho, S.Y.; Jang, S.G.; Chung, Y.S.

    1998-01-01

    Nondestructive neutron activation technique was used to analyze 17 elements (Al, As, Au, Ba, Br, Cl, Cu, Hg, I, K, Mg, Mn, Na, Sb, Sr, V and Zn) in 75 human hair samples in 5 different locations, respectively, from 15 glassware workers. The analytical results were treated further statistically to find the elemental distribution among different human hairs and to identify the individual's hair. The identifying probability of one's hair by the comparison of elemental concentrations is found to be 10 4 -10 6 times higher from the same person's than from any other person's. The standard deviation of the elemental concentrations of samples taken from 5 different locations of one person is about 5 time smaller than the standard deviation for individual's hair. These data support the possibility of using NAA of hair for human hair identification. (author)

  13. What is it like to be a person with Schizophrenia in the social world? A first-person perspective study on Schizophrenic Dissociality--part 2: methodological issues and empirical findings.

    Science.gov (United States)

    Stanghellini, Giovanni; Ballerini, Massimo

    2011-01-01

    This is an empirical study exploring the personal level of experience of social dysfunction in persons with schizophrenia. We adopted a qualitative method of inquiry based on a review of transcripts of individual therapy sessions conducted for 52 persons with chart diagnoses of schizophrenia or schizotypal disorder. In our interviews, the experience of the social world in persons with schizophrenia emerged as an overall crisis of immediate, prepredicative, prereflexive attunement, typically accompanied by feelings of invasiveness and abnormalities in bodily and emotional sensations; a hyperreflexive mode for understanding the intentions of other persons, and a sceptical, aversive and sometimes utopian attitude towards sociality. Social dysfunction in persons with schizophrenia may reflect a disorder of the process of corporeal identification/differentiation that allows both for the intersubjective understanding through body-to-body attunement and for the demarcation between self and other. Copyright © 2011 S. Karger AG, Basel.

  14. Identification of protective antigens for vaccination against systemic salmonellosis

    Directory of Open Access Journals (Sweden)

    Dirk eBumann

    2014-08-01

    Full Text Available There is an urgent medical need for improved vaccines with broad serovar coverage and high efficacy against systemic salmonellosis. Subunit vaccines offer excellent safety profiles but require identification of protective antigens, which remains a challenging task. Here, I review crucial properties of Salmonella antigens that might help to narrow down the number of potential candidates from more than 4000 proteins encoded in Salmonella genomes, to a more manageable number of 50-200 most promising antigens. I also discuss complementary approaches for antigen identification and potential limitations of current pre-clinical vaccine testing.

  15. Wall Turbulence with Designer Properties: Identification, Characterization and Manipulation of Energy Pathways

    Science.gov (United States)

    2016-02-26

    AFRL-AFOSR-VA-TR-2016-0108 Wall turbulence with designer properties Beverley Mckeon CALIFORNIA INSTITUTE OF TECHNOLOGY Final Report 02/26/2016... Wall turbulence with designer properties: Identification, characterization & manipulation of energy pathways 5a. CONTRACT NUMBER 5b. GRANT NUMBER...identification, characterization and manipulation of energy pathways in wall turbulence . The objectives were pursued separately and collaboratively by the

  16. SAMPO80, Ge(Li) Detector Gamma Spectra Unfolding with Isotope Identification

    International Nuclear Information System (INIS)

    Koskelo, M.J.; Aarnio, P.A.; Routti, J.T.

    1998-01-01

    1 - Description of problem or function: Analysis of gamma spectra measured with Ge(Li) or HPGe detectors. 2 - Method of solution: - Shape calibration using a non-linear least squares algorithm with a variable metric method. - Peak location with a smoothed second difference method. - Peak area calculation with a linear least squares fit to predefined peak shapes. - Nuclide identification with a linear least squares fit based on associated lines. 3 - Restrictions on the complexity of the problem: Number of shape calibration points allowed: 20; Number of energy calibration points allowed: 20; Number of efficiency calibration points allowed: 20; Maximum number of found peaks: 100; Maximum number of fitted peaks: 100; Maximum number of peaks in a multiplet: 5; Maximum number of channels in a fitting interval: 50; Maximum number of peaks for nuclide identification: 80; Maximum number of identified nuclides: 30; Maximum number of lines per nuclide: 30

  17. Identification through osteometric data on three radium-burdened skeletons

    International Nuclear Information System (INIS)

    Farnham, J.E.; Forkal, J.W.

    1981-01-01

    The skeletal remains of four persons of uncertain identity were disinterred from a family grave. The weight and description morphological traits of each bone were recorded, as were the lengths of the long bones. Analyses of these data, combined with information obtained from medical records and disinterment reports, led to the specific identification of each skeleton

  18. Narcissistic personality disorder: a current review.

    Science.gov (United States)

    Ronningstam, Elsa

    2010-02-01

    The diagnosis of narcissistic personality disorder in the DSM-IV has been criticized foremost for its limitations in capturing the range and complexity of narcissistic pathology. The attention to the narcissistic individual's external, symptomatic, or social interpersonal patterns--at the expense of his or her internal complexity and individual suffering--has also added to the diagnosis' low clinical utility and limited guidance for treatment. Recent studies and reviews have pointed to the need for change in the diagnostic approach to and formulation of narcissism. This review focuses specifically on studies of features that add to the identification, understanding, and treatment of patients with pathological narcissistic functioning and narcissistic personality disorder. They have been integrated into a regulatory model that includes the functions and fluctuations of internal control, self-esteem, perfectionism with accompanying self-criticism, shame, and empathic ability and functioning.

  19. Comparing Correlations between Four-Quadrant and Five-Factor Personality Assessments

    Science.gov (United States)

    Jones, Cathleen S.; Hartley, Nell T.

    2013-01-01

    For decades,some of the most popular devices used in educating students and employees to the values of diversity are those that are based on a four-grid identification of behavior style. The results from the scoring of the instruments provide individual profiles in terms of a person's assertiveness, responsiveness, and preferred tone of…

  20. Personality as a Subject of Managerial Activity

    Directory of Open Access Journals (Sweden)

    Tytova Kateryna V.

    2014-01-01

    Full Text Available Psychological science, along with many other natural and social sciences, studies a person and personality, but it allocates in them its own specific aspect. The psychological science has a big number of approaches to understanding essence of the personality. Professionally important qualities are individual qualities of a subject of activity, which influence efficiency of activity and success of its mastering. The considered concepts are efforts to put in order various sociological and psychological knowledge about the personality and unite the personality theory with the theory of professional choice. The problem of professional formation of the personality belongs to actively developed psychological problems.

  1. Young siblings of children with cancer deserve care and a personalized approach.

    Science.gov (United States)

    Massimo, Luisa M; Wiley, Thomas J

    2008-03-01

    The youngest siblings may be both emotionally vulnerable and often neglected members of the family of a childhood cancer patient. The prompt identification of signs of distress in these subjects allows trained caregivers to intervene with personalized, age-appropriate, attention, and care. A narrative approach, based on personalized listening, writings, and spontaneous drawings, can provide the means to elicit markers of psychological maladjustment in even the youngest of siblings. Two exemplary cases are reported to illustrate this approach. (c) 2007 Wiley-Liss, Inc.

  2. External and Intrinsic Signatures in Human Teeth to Assist Forensic Identification Work

    OpenAIRE

    Alkass, Kanar

    2011-01-01

    In forensic medicine, dead victim identification constitutes an important task for forensic professionals including forensic pathologists, anthropologists, and odontologists. If no clues are at hand regarding the identity of the deceased, whether it is a victim of a mass disaster or a suspect homicide case, it is vital to know when a person died, and to know the sex and age of the decedent in order to limit the search for possible matching persons. In paper I, teeth from ...

  3. Children's metacognitive judgments in an eyewitness identification task.

    Science.gov (United States)

    Keast, Amber; Brewer, Neil; Wells, Gary L

    2007-08-01

    Two experiments examined children's metacognitive monitoring of recognition judgments within an eyewitness identification paradigm. A confidence-accuracy (CA) calibration approach was used to examine patterns of calibration, over-/underconfidence, and resolution. In Experiment 1, children (n=619, mean age=11 years 10 months) and adults (n=600) viewed a simulated crime and attempted two separate identifications from 8-person target-present or target-absent lineups given lineup instructions that manipulated witnesses choosing patterns by varying the degree of social pressure. For choosers, but not nonchoosers, meaningful CA relations were observed for adults but not for children. Experiment 2 tested a guided hypothesis disconfirmation manipulation designed to improve the realism of children's metacognitive judgments. Children (N=796, mean age=11 years 11 months) in experimental and control conditions viewed a crime and attempted two separate identifications. The manipulation had minimal impact on the CA relation for choosers and nonchoosers. In contrast to adults, children's identification confidence provides no useful guide for investigators about the likely guilt or innocence of a suspect. These experiments revealed limitations in children's metacognitive monitoring processes that have not been apparent in previous research on recall and recognition with younger children.

  4. Factors Linked to Identification with a Super-Ordinate Category in a ...

    African Journals Online (AJOL)

    Multiple regression analyses suggested that factors linked to identification with a super-ordinate category were related more to personal variables than to status differentiation and distribution of resources. These results are discussed with reference to the Common Ingroup Identity model (Gaertner et al, 1993), Breakwell's ...

  5. Benefits of using culturally unfamiliar stimuli in ambiguous emotion identification: A cross-cultural study.

    Science.gov (United States)

    Koelkebeck, Katja; Kohl, Waldemar; Luettgenau, Julia; Triantafillou, Susanna; Ohrmann, Patricia; Satoh, Shinji; Minoshita, Seiko

    2015-07-30

    A novel emotion recognition task that employs photos of a Japanese mask representing a highly ambiguous stimulus was evaluated. As non-Asians perceive and/or label emotions differently from Asians, we aimed to identify patterns of task-performance in non-Asian healthy volunteers with a view to future patient studies. The Noh mask test was presented to 42 adult German participants. Reaction times and emotion attribution patterns were recorded. To control for emotion identification abilities, a standard emotion recognition task was used among others. Questionnaires assessed personality traits. Finally, results were compared to age- and gender-matched Japanese volunteers. Compared to other tasks, German participants displayed slowest reaction times on the Noh mask test, indicating higher demands of ambiguous emotion recognition. They assigned more positive emotions to the mask than Japanese volunteers, demonstrating culture-dependent emotion identification patterns. As alexithymic and anxious traits were associated with slower reaction times, personality dimensions impacted on performance, as well. We showed an advantage of ambiguous over conventional emotion recognition tasks. Moreover, we determined emotion identification patterns in Western individuals impacted by personality dimensions, suggesting performance differences in clinical samples. Due to its properties, the Noh mask test represents a promising tool in the differential diagnosis of psychiatric disorders, e.g. schizophrenia. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Searching methods for biometric identification systems: Fundamental limits

    NARCIS (Netherlands)

    Willems, F.M.J.

    2009-01-01

    We study two-stage search procedures for biometric identification systems in an information-theoretical setting. Our main conclusion is that clustering based on vector-quantization achieves the optimum trade-off between the number of clusters (cluster rate) and the number of individuals within a

  7. A parallel process growth model of avoidant personality disorder symptoms and personality traits.

    Science.gov (United States)

    Wright, Aidan G C; Pincus, Aaron L; Lenzenweger, Mark F

    2013-07-01

    Avoidant personality disorder (AVPD), like other personality disorders, has historically been construed as a highly stable disorder. However, results from a number of longitudinal studies have found that the symptoms of AVPD demonstrate marked change over time. Little is known about which other psychological systems are related to this change. Although cross-sectional research suggests a strong relationship between AVPD and personality traits, no work has examined the relationship of their change trajectories. The current study sought to establish the longitudinal relationship between AVPD and basic personality traits using parallel process growth curve modeling. Parallel process growth curve modeling was applied to the trajectories of AVPD and basic personality traits from the Longitudinal Study of Personality Disorders (Lenzenweger, M. F., 2006, The longitudinal study of personality disorders: History, design considerations, and initial findings. Journal of Personality Disorders, 20, 645-670. doi:10.1521/pedi.2006.20.6.645), a naturalistic, prospective, multiwave, longitudinal study of personality disorder, temperament, and normal personality. The focus of these analyses is on the relationship between the rates of change in both AVPD symptoms and basic personality traits. AVPD symptom trajectories demonstrated significant negative relationships with the trajectories of interpersonal dominance and affiliation, and a significant positive relationship to rates of change in neuroticism. These results provide some of the first compelling evidence that trajectories of change in PD symptoms and personality traits are linked. These results have important implications for the ways in which temporal stability is conceptualized in AVPD specifically, and PD in general.

  8. Set-Membership Identification for Robust Control Design

    Science.gov (United States)

    1993-04-28

    Clauifica lion) ( U) Set-Memnbership Identification for Robust Control Design ___________________ 1. PERSONAL A UTHOR(SI Dr. Robert L. Kosul. Final Report...Shalom, E.Tse "Caution, probing, and the value of information in the control of un- certain systems", Annals of Economic and Social Measurement, 5/3, pp...knowing a bound on I the impulse response is quantitative. A similar clasoitication can be made regarding signal charateristics . Knowing that a signal is

  9. Medicolegal death of homeless persons in Tokyo Metropolis over 12 years (1999-2010).

    Science.gov (United States)

    Suzuki, Hideto; Hikiji, Wakako; Tanifuji, Takanobu; Abe, Nobuyuki; Fukunaga, Tatsushige

    2013-05-01

    Recently, the number of homeless persons in Japan has steadily decreased. However, it is not certain whether unexpected death of the homeless have actually decreased in proportion to decrease in total number of cases. The documentation of medicolegal deaths among homeless persons handled in the Tokyo Medical Examiner's Office during 1999-2010 were reviewed, and we compared the number and manner/cause of death between cases occurring before 2004 and those occurring after 2004. In addition, we compared manner/cause of death between homeless and non-homeless persons. The number of medicolegal deaths of homeless persons remained almost the same during the study period in spite of a marked decrease in the total number of homeless persons after 2004. Age distribution shifted to older after 2004, and a higher proportion of the deceased had longer postmortem periods after 2004. Comparison between the manners/causes of death of the cases occurring before 2004 and those occurring after 2004 showed little difference. Disease constituted about 70% of all cases, and causes of death from disease were more various than those of non-homeless persons. Certain specific patterns included a higher proportion of death from circulatory disease in elderly homeless persons and a higher proportion of death from alcohol-related digestive disease and tuberculosis among younger homeless persons. Regarding accidental death, hypothermia was a leading cause of death irrespective of age group. Aging and isolation among homeless persons might contribute to an unchanged number of medicolegal death of them. In addition to measures to address frequent causes of death in each age group, better intervention for isolated homeless persons might be a key factor to prevent unexpected deaths of homeless persons in the future. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  10. 26 CFR 301.6109-1 - Identifying numbers.

    Science.gov (United States)

    2010-04-01

    ... §§ 1.671-4(b)(4) of this chapter. (6) Effective date. Paragraphs (a)(3), (4), and (5) of this section...) of this chapter, any college or university that is an educational organization as defined in § 1.501... must have an employer identification number for use in any communication with the Internal Revenue...

  11. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  12. 3D ear identification based on sparse representation.

    Directory of Open Access Journals (Sweden)

    Lin Zhang

    Full Text Available Biometrics based personal authentication is an effective way for automatically recognizing, with a high confidence, a person's identity. Recently, 3D ear shape has attracted tremendous interests in research field due to its richness of feature and ease of acquisition. However, the existing ICP (Iterative Closet Point-based 3D ear matching methods prevalent in the literature are not quite efficient to cope with the one-to-many identification case. In this paper, we aim to fill this gap by proposing a novel effective fully automatic 3D ear identification system. We at first propose an accurate and efficient template-based ear detection method. By utilizing such a method, the extracted ear regions are represented in a common canonical coordinate system determined by the ear contour template, which facilitates much the following stages of feature extraction and classification. For each extracted 3D ear, a feature vector is generated as its representation by making use of a PCA-based local feature descriptor. At the stage of classification, we resort to the sparse representation based classification approach, which actually solves an l1-minimization problem. To the best of our knowledge, this is the first work introducing the sparse representation framework into the field of 3D ear identification. Extensive experiments conducted on a benchmark dataset corroborate the effectiveness and efficiency of the proposed approach. The associated Matlab source code and the evaluation results have been made publicly online available at http://sse.tongji.edu.cn/linzhang/ear/srcear/srcear.htm.

  13. [Personal emergency call system based on human vital and system technical parameters in a Smart Home environment].

    Science.gov (United States)

    Hampicke, M; Schadow, B; Rossdeutscher, W; Fellbaum, K; Boenick, U

    2002-11-01

    Progress in microtechnology and radio transmission technology has enabled the development of highly reliable emergency-call systems. The present article describes systems that have been specially designed to improve the safety and independence of handicapped and elderly persons living at home. For such persons immediate help in an emergency situation is of crucial importance. The technical state of the art of emergency-call systems specially developed for use by the elderly, is briefly discussed, in particular the well-known radio emergency-call button, with the aid of which an alarm can be activated manually. This system, however, does not offer adequate safety in all emergency situations. Alternative or complementary systems designed to automatically trigger an alarm on the basis of the recording and evaluation of so-called vital parameters, are therefore proposed. In addition, in a smart-home environment with networked devices, further parameters--so-called environment parameters can be used. It is found that the identification of an emergency situation becomes more reliable as the number of parameters employed increases.

  14. A facial reconstruction and identification technique for seriously devastating head wounds.

    Science.gov (United States)

    Joukal, Marek; Frišhons, Jan

    2015-07-01

    Many authors have focused on facial identification techniques, and facial reconstructions for cases when skulls have been found are especially well known. However, a standardized facial identification technique for an unknown body with seriously devastating head injuries has not yet been developed. A reconstruction and identification technique was used in 7 cases of accidents involving trains striking pedestrians. This identification technique is based on the removal of skull bone fragments, subsequent fixation of soft tissue onto a universal commercial polystyrene head model, precise suture of dermatomuscular flaps, and definitive adjustment using cosmetic treatments. After reconstruction, identifying marks such as scars, eyebrows, facial lines, facial hair and partly hairstyle become evident. It is then possible to present a modified picture of the reconstructed face to relatives. After comparing the results with photos of the person before death, this technique has proven to be very useful for identifying unknown bodies when other identification techniques are not available. This technique is useful for its being rather quick and especially for its results. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  15. Identification procedures as a part of death investigation in Turkey.

    Science.gov (United States)

    Uzün, Ibrahim; Daregenli, Oner; Sirin, Gözde; Müslümanoğlu, Omer

    2012-03-01

    Forensic identification techniques include the examination of ID cards, the decedent's private belongings, fingerprints, footprints, lip marks, dental findings, red blood cell enzymes, performing photograph matching, facial reconstruction, visual identification, and DNA "fingerprinting." As part of forensic examinations, the identification of corpses that are fresh, decomposed, fragmented, or skeletonized as well as individual body parts and human remains can be requested. Identification becomes a challenging task for forensic terms particularly in mass-disaster situations. Each identification case should be considered to its own merit and the way to do that should be based on the effectiveness and cost of each method used. In Turkey, one of the major duties of the medicolegal system on the investigation of deaths is to identify the deceased if unknown.This study is undertaken to investigate the procedures, as well as their validities, used to deal with individualization of dismembered bodies directly sent to the Council of Forensic Medicine, Ministry of Justice, for autopsy and/or visual identification, as well as those received from peripheral districts for forensic identification. According to the Turkish Penal Procedural Law, a positive identification of the deceased is mandatory before performing an autopsy. According to the law, the ID cards are not taken to be sufficient for recognition of the deceased, and the major way of identification in daily practice is visual identification by a relative or any recognizant person to approve the identification to the prosecutor. If visual identification fails, fingerprints, dental x-rays or body x-rays, and DNA "fingerprinting" can be used to establish identity when compared with known records of the individual obtained by law enforcement.This retrospective study was carried out into 421 dismembered bodies, among 3063 autopsies performed in year 2002 by the Department of Morgue at the Council of Forensic Medicine, with

  16. Nuclear Magnetic Resonance Spectroscopy-Based Identification of Yeast.

    Science.gov (United States)

    Himmelreich, Uwe; Sorrell, Tania C; Daniel, Heide-Marie

    2017-01-01

    Rapid and robust high-throughput identification of environmental, industrial, or clinical yeast isolates is important whenever relatively large numbers of samples need to be processed in a cost-efficient way. Nuclear magnetic resonance (NMR) spectroscopy generates complex data based on metabolite profiles, chemical composition and possibly on medium consumption, which can not only be used for the assessment of metabolic pathways but also for accurate identification of yeast down to the subspecies level. Initial results on NMR based yeast identification where comparable with conventional and DNA-based identification. Potential advantages of NMR spectroscopy in mycological laboratories include not only accurate identification but also the potential of automated sample delivery, automated analysis using computer-based methods, rapid turnaround time, high throughput, and low running costs.We describe here the sample preparation, data acquisition and analysis for NMR-based yeast identification. In addition, a roadmap for the development of classification strategies is given that will result in the acquisition of a database and analysis algorithms for yeast identification in different environments.

  17. Identification of a Genomic Signature Predicting for Recurrence in Early Stage Ovarian Cancer

    Science.gov (United States)

    2015-12-01

    do it. Thus, instead of simply sequencing all the FFPE samples, we used 10 tumor samples (5 recurrent and 5 non recurrent ) to test sequencing and...Award Number: W81XWH-12-1-0521 TITLE: Identification of a Genomic Signature Predicting for Recurrence in Early-Stage Ovarian Cancer PRINCIPAL...4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH-12-1-0521 Identification of a Genomic Signature Predicting for Recurrence in

  18. Personality Facets and RIASEC Interests: An Integrated Model

    Science.gov (United States)

    Armstrong, Patrick Ian; Anthoney, Sarah Fetter

    2009-01-01

    Research examining links between personality and interest have typically focused on links between measures of the five factor model and Holland's RIASEC types. However, the five factor model of personality can be divided in to a larger set of narrow domain personality scales measuring facets of the "big five" traits. Research in a number of fields…

  19. Inclusion probability for DNA mixtures is a subjective one-sided match statistic unrelated to identification information.

    Science.gov (United States)

    Perlin, Mark William

    2015-01-01

    DNA mixtures of two or more people are a common type of forensic crime scene evidence. A match statistic that connects the evidence to a criminal defendant is usually needed for court. Jurors rely on this strength of match to help decide guilt or innocence. However, the reliability of unsophisticated match statistics for DNA mixtures has been questioned. The most prevalent match statistic for DNA mixtures is the combined probability of inclusion (CPI), used by crime labs for over 15 years. When testing 13 short tandem repeat (STR) genetic loci, the CPI(-1) value is typically around a million, regardless of DNA mixture composition. However, actual identification information, as measured by a likelihood ratio (LR), spans a much broader range. This study examined probability of inclusion (PI) mixture statistics for 517 locus experiments drawn from 16 reported cases and compared them with LR locus information calculated independently on the same data. The log(PI(-1)) values were examined and compared with corresponding log(LR) values. The LR and CPI methods were compared in case examples of false inclusion, false exclusion, a homicide, and criminal justice outcomes. Statistical analysis of crime laboratory STR data shows that inclusion match statistics exhibit a truncated normal distribution having zero center, with little correlation to actual identification information. By the law of large numbers (LLN), CPI(-1) increases with the number of tested genetic loci, regardless of DNA mixture composition or match information. These statistical findings explain why CPI is relatively constant, with implications for DNA policy, criminal justice, cost of crime, and crime prevention. Forensic crime laboratories have generated CPI statistics on hundreds of thousands of DNA mixture evidence items. However, this commonly used match statistic behaves like a random generator of inclusionary values, following the LLN rather than measuring identification information. A quantitative

  20. An Investigation of the Effectiveness and Efficiency of Classroom Teachers in the Identification of Gifted Students

    Directory of Open Access Journals (Sweden)

    Feyzullah Şahin

    2015-12-01

    Full Text Available Nomination process is the first stage of the identification process. The effectiveness and efficiency in nomination process of teachers trained and not trained on gifted students were examined in this study. Static group comparison or nonequivalent control group design was used. Teacher rating scale, information form and Raven's Standard Progressive Matrices Plus (RSPM+ were used as the data collection tools. Teachers’ effectiveness and efficiency ratios in the identification process were calculated in the data analysis. In identification, efficiency is ratio of number of gifted students identified by teachers to number of students nominated. Effectiveness in identification is the ratio of the number of gifted students identified by teacher to number of students are really gifted. The result showed that the effectiveness and efficacy of teachers attaining training are higher than those not trained.

  1. Rapid Methods for the Laboratory Identification of Pathogenic Microorganisms.

    Science.gov (United States)

    1982-09-01

    coli Hemophilus influenzae Bacillus anthracis Bacillus circulans Bacillus coagulans Bacillus cereus T Candida albicans Cryptococcus neoformans Legionel...reveree aide If neceeeary and Identify by block number) Lectins: Rapid Identification, Bacillus anthracisjCryptococcus " neoformans. Neisseria...field-type kit for the rapid identification of Bacillus anthracis. We have shown that certain lectins will selectively interact with B. anthracis

  2. Identification of Burkholderia cepacia in patients with cystic fibrosis by pulsed-field gel electrophoresis

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdi Soltan Dallal

    2014-05-01

    Conclusion: Application of PFGE and identification of pulse-type is a potential tool to enhance the investigation of apparent nosocomial outbreaks of B.cepacia. Similar type of pulse patterns was observed in this study means that all of infection has been from one source; therefore the hypothesis of transferring person to person will be rejected. Base on these results environmental sources sampling should be considered in future investigation.

  3. Solving Person Re-identification in Non-overlapping Camera using Efficient Gibbs Sampling

    NARCIS (Netherlands)

    John, V.; Englebienne, G.; Krose, B.; Burghardt, T.; Damen, D.; Mayol-Cuevas, W.; Mirmehdi, M.

    2013-01-01

    This paper proposes a novel probabilistic approach for appearance-based person reidentification in non-overlapping camera networks. It accounts for varying illumination, varying camera gain and has low computational complexity. More specifically, we present a graphical model where we model the

  4. A biometric identification system based on eigenpalm and eigenfinger features.

    Science.gov (United States)

    Ribaric, Slobodan; Fratric, Ivan

    2005-11-01

    This paper presents a multimodal biometric identification system based on the features of the human hand. We describe a new biometric approach to personal identification using eigenfinger and eigenpalm features, with fusion applied at the matching-score level. The identification process can be divided into the following phases: capturing the image; preprocessing; extracting and normalizing the palm and strip-like finger subimages; extracting the eigenpalm and eigenfinger features based on the K-L transform; matching and fusion; and, finally, a decision based on the (k, l)-NN classifier and thresholding. The system was tested on a database of 237 people (1,820 hand images). The experimental results showed the effectiveness of the system in terms of the recognition rate (100 percent), the equal error rate (EER = 0.58 percent), and the total error rate (TER = 0.72 percent).

  5. Identifying with fictive characters: structural brain correlates of the personality trait 'fantasy'.

    Science.gov (United States)

    Cheetham, Marcus; Hänggi, Jürgen; Jancke, Lutz

    2014-11-01

    The perception of oneself as absorbed in the thoughts, feelings and happenings of a fictive character (e.g. in a novel or film) as if the character's experiences were one's own is referred to as identification. We investigated whether individual variation in the personality trait of identification is associated with individual variation in the structure of specific brain regions, using surface and volume-based morphometry. The hypothesized regions of interest were selected on the basis of their functional role in subserving the cognitive processing domains considered important for identification (i.e. mental imagery, empathy, theory of mind and merging) and for the immersive experience called 'presence'. Controlling for age, sex, whole-brain volume and other traits, identification covaried significantly with the left hippocampal volume, cortical thickness in the right anterior insula and the left dorsal medial prefrontal cortex, and with gray matter volume in the dorsolateral prefrontal cortex. These findings show that trait identification is associated with structural variation in specific brain regions. The findings are discussed in relation to the potential functional contribution of these regions to identification. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  6. 33 CFR 174.19 - Contents of a certificate of number.

    Science.gov (United States)

    2010-07-01

    ... commercial use. (7) Manufacturer's hull identification number (if any). (8) Make of vessel. (9) Year vessel..., inboard-outdrive, or sail. (14) Whether the fuel is gasoline, diesel, or other. (b) A certificate of...

  7. Prospects of A and Z identification experiments at LBNL

    International Nuclear Information System (INIS)

    Gates, Jacklyn M.

    2016-01-01

    The identification of six new elements within the last 15 years and with proton numbers, Z = 113–118 has transformed the heavy element field. However, one key piece of information on these nuclei remains unmeasured: their proton and mass numbers, A. At Lawrence Berkeley National Laboratory, the heavy element group has undertaken a program to study these new elements to perform experiments aimed at measuring the Z and A.Here, an overview of recent experiments aimed towards identifying the Z of SHE, and the prospects for Z and A identification experiments at LBNL are presented.

  8. Translating Personality Psychology to Help Personalize Preventive Medicine for Young-Adult Patients

    Science.gov (United States)

    Israel, Salomon; Moffitt, Terrie E.; Belsky, Daniel W.; Hancox, Robert J.; Poulton, Richie; Roberts, Brent; Thomson, W. Murray; Caspi, Avshalom

    2014-01-01

    The rising number of newly insured young adults brought on by healthcare reform will soon increase demands on primary-care physicians. Physicians will face more young-adult patients which presents an opportunity for more prevention-oriented care. In the current study, we evaluated whether brief observer reports of young adults’ personality traits could predict which individuals would be at greater risk for poor health as they entered midlife. Following the Dunedin Study cohort of 1,000 individuals, we show that very brief measures of young adults’ personalities predicted their midlife physical health across multiple domains (metabolic abnormalities, cardiorespiratory fitness, pulmonary function, periodontal disease, and systemic inflammation). Individuals scoring low on the traits of Conscientiousness and Openness-to-Experience went on to develop poorer health even after accounting for preexisting differences in education, socioeconomic status, smoking, obesity, self-reported health, medical conditions, and family medical history. Moreover, personality ratings from peer informants who knew participants well, and from a nurse and receptionist who had just met participants for the first time, predicted health decline from young adulthood to midlife despite striking differences in level of acquaintance. Personality effect sizes were on par with other well-established health-risk factors such as socioeconomic status, smoking, and self-reported health. We discuss the potential utility of personality measurement to function as an inexpensive and accessible tool for healthcare professionals to personalize preventive medicine. Adding personality information to existing healthcare electronic infrastructures could also advance personality theory by generating opportunities to examine how personality processes influence doctor-patient communication, health service use, and patient outcomes. PMID:24588093

  9. Assessing personal disposition of individuals towards technology adoption

    Directory of Open Access Journals (Sweden)

    Irbha Magotra

    2016-06-01

    Full Text Available The present study has attempted to explore personal disposition of individuals towards technology adoption through the development of an index named as Technology Adoption Index. For developing the index, exploratory factor analysis approach has been employed on the sample of 1201 responses collected from the residents of 12 different cities in India. Accordingly, the results of the index have indicated significant role of seven personal traits, namely, optimism, innovativeness, self-efficacy, risk taking propensity, habit, social influence and psychological resilience while manifesting personal disposition of individuals towards technology adoption, i.e., the technology adoption propensity of the individuals. Further, an attempt has also been made to explore the socio-economic characteristics of the individuals possessing distinct level of personal disposition towards technology adoption. Accordingly, the results have unveiled that the personal disposition of the individuals towards technology adoption increases with enhancement in their income and qualification but decreases with enhancement in their age. As a measurement tool, Technology Adoption Index can be used as ready-recknor by practitioners for the identification of technology adoption propensity of the individuals. This will facilitate organizations in developing and designing new products and services which can be readily accepted by the individuals.

  10. Influence of the signer's psychophysiological state on the results of his identification using handwritten pattern by natural and artificial intelligence

    Directory of Open Access Journals (Sweden)

    Alexey E. Sulavko

    2017-11-01

    Full Text Available At present, while various mechanisms to ensure information security are actively being improved, particular attention is paid to prevent unauthorized access to information resources.  The human factor and process of identification still remain the most problematic, as well as user authentication. A progress in the technology of information resources protection from internal security threats paves its way towards biometric systems of hidden identification of computer users and their psychophysiological state. A change in psychophysiological state results in the person's handwriting. The influence of the signer’s state of fatigue and excitation on the results of its identification both by a person and by pattern recognition methods on reproduced signatures are studied. Capabilities of human and artificial intelligence are compared in equal conditions. When the state of the signer changes, the probability of erroneous recognition by artificial intelligence increases by factor 3.3 to 3.7. A person identifies a handwritten image with fewer errors in case when the signer is agitated, and with higher error rate if the signer is tired.

  11. [The cognitive-behavioral aspects of the personality of politicians].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2010-01-17

    At the research of the personality of politicians, the task is not psychopathology and thereby the diagnose of a certain illness, but the identification of those features, characteristic marks and the examination of those cognitive functions, attitudes that might affect the ability to lead, might influence the managerial and negotiating style as well as the decisions made during an eventual crisis. Basically, there are two approaches considering the role of personality in politics. The first one regards political events as a projection of the personality of the leading politician; the other one denies entirely the significance of the personality. With reference to the first school, the aim of the present essay is, from among the examinations of the personality of the politician by indirect and direct methods, the determination of the cognitive and behavioral marks connected to the last method. Among the indirect examinations are the analysis of speeches and interviews (psycholinguistics), the reflection of the metacommunicative marks and the psychological elaboration of biographical data (psychobiography). The character of the leading politician is important with respect to image building, campaign work and party competition, "survival".

  12. Passive ultra high frequency radio frequency identification systems for single-item identification in food supply chains

    Directory of Open Access Journals (Sweden)

    Paolo Barge

    2017-02-01

    Full Text Available In the food industry, composition, size, and shape of items are much less regular than in other commodities sectors. In addition, a wide variety of packaging, composed by different materials, is employed. As material, size and shape of items to which the tag should be attached strongly influence the minimum power requested for tag functioning, performance improvements can be achieved only selecting suitable radio frequency (RF identifiers for the specific combination of food product and packaging. When dealing with logistics units, the dynamic reading of a vast number of tags could originate simultaneous broadcasting of signals (tag-to-tag collisions that could affect reading rates and the overall reliability of the identification procedure. This paper reports the results of an analysis of the reading performance of ultra high frequency radio frequency identification systems for multiple static and dynamic electronic identification of food packed products in controlled conditions. Products were considered when arranged on a logistics pallet. The effects on reading rate of different factors, among which the product type, the gate configuration, the field polarisation, the power output of the RF reader, the interrogation protocol configuration as well as the transit speed, the number of tags and their interactions were statistically analysed and compared.

  13. Improving the care of older persons in Australian prisons using the Policy Delphi method.

    Science.gov (United States)

    Patterson, Karen; Newman, Claire; Doona, Katherine

    2016-09-01

    There are currently no internationally recognised and approved processes relating to the care of older persons with dementia in prison. This research aimed to develop tools and procedures related to managing the care of, including the identification and assessment of, older persons with dementia who are imprisoned in New South Wales, Australia. A modified approach to the Policy Delphi method, using both surveys and facilitated discussion groups, enabled experts to come together to discuss improving the quality of care provision for older persons with dementia in prison and achieve research aims. © The Author(s) 2014.

  14. Prospective Teachers' Personal Characteristics to Multicultural Education

    Science.gov (United States)

    Eskici, Menekse

    2016-01-01

    The aim of this paper is to determine prospective teachers' personal characteristics to multicultural education. It is also aimed to reveal whether there are meaningful differences in prospective teachers' personal characteristics to multicultural education according to their genders, age and number of siblings. The descriptive model was chosen to…

  15. Toward a Personalized Science of Emotion Regulation

    Science.gov (United States)

    Doré, Bruce P.; Silvers, Jennifer A.; Ochsner, Kevin N.

    2018-01-01

    The ability to successfully regulate emotion plays a key role in healthy development and the maintenance of psychological well-being. Although great strides have been made in understanding the nature of regulatory processes and the consequences of deploying them, a comprehensive understanding of emotion regulation that can specify what strategies are most beneficial for a given person in a given situation is still a far-off goal. In this review, we argue that moving toward this goal represents a central challenge for the future of the field. As an initial step, we propose a concrete framework that (i) explicitly considers emotion regulation as an interaction of person, situation, and strategy, (ii) assumes that regulatory effects vary according to these factors, and (iii) sets as a primary scientific goal the identification of person-, situation-, and strategy-based contingencies for successful emotion regulation. Guided by this framework, we review current questions facing the field, discuss examples of contextual variation in emotion regulation success, and offer practical suggestions for continued progress in this area. PMID:29750085

  16. Individual Biomarkers Using Molecular Personalized Medicine Approaches.

    Science.gov (United States)

    Zenner, Hans P

    2017-01-01

    Molecular personalized medicine tries to generate individual predictive biomarkers to assist doctors in their decision making. These are thought to improve the efficacy and lower the toxicity of a treatment. The molecular basis of the desired high-precision prediction is modern "omex" technologies providing high-throughput bioanalytical methods. These include genomics and epigenomics, transcriptomics, proteomics, metabolomics, microbiomics, imaging, and functional analyses. In most cases, producing big data also requires a complex biomathematical analysis. Using molecular personalized medicine, the conventional physician's check of biomarker results may no longer be sufficient. By contrast, the physician may need to cooperate with the biomathematician to achieve the desired prediction on the basis of the analysis of individual big data typically produced by omex technologies. Identification of individual biomarkers using molecular personalized medicine approaches is thought to allow a decision-making for the precise use of a targeted therapy, selecting the successful therapeutic tool from a panel of preexisting drugs or medical products. This should avoid the treatment of nonresponders and responders that produces intolerable unwanted effects. © 2017 S. Karger AG, Basel.

  17. 78 FR 57001 - Identification of Persons Pursuant to the Iranian Transactions and Sanctions Regulations and...

    Science.gov (United States)

    2013-09-16

    ... in property of the Government of Iran, including the Central Bank of Iran, that are in the United..., or instrumentality thereof, including the Central Bank of Iran, and any person owned or controlled by... instrumentality thereof, including the Central Bank of Iran; (b) Any person owned or controlled, directly or...

  18. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  19. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  20. Number of perceptually distinct surface colors in natural scenes.

    Science.gov (United States)

    Marín-Franch, Iván; Foster, David H

    2010-09-30

    The ability to perceptually identify distinct surfaces in natural scenes by virtue of their color depends not only on the relative frequency of surface colors but also on the probabilistic nature of observer judgments. Previous methods of estimating the number of discriminable surface colors, whether based on theoretical color gamuts or recorded from real scenes, have taken a deterministic approach. Thus, a three-dimensional representation of the gamut of colors is divided into elementary cells or points which are spaced at one discrimination-threshold unit intervals and which are then counted. In this study, information-theoretic methods were used to take into account both differing surface-color frequencies and observer response uncertainty. Spectral radiances were calculated from 50 hyperspectral images of natural scenes and were represented in a perceptually almost uniform color space. The average number of perceptually distinct surface colors was estimated as 7.3 × 10(3), much smaller than that based on counting methods. This number is also much smaller than the number of distinct points in a scene that are, in principle, available for reliable identification under illuminant changes, suggesting that color constancy, or the lack of it, does not generally determine the limit on the use of color for surface identification.

  1. ’Cause You’ve Got Personality

    Directory of Open Access Journals (Sweden)

    Aaron Weinschenk

    2013-10-01

    Full Text Available The integration of the Big Five personality traits into models of political participation represents an important advance in the political behavior literature. However, because national surveys that include political and personality measures are not widespread, such analyses have been limited in number. In addition, there have been inconsistencies within and across studies on personality and participation. The availability of more data make it possible to compare the performance of personality measurement batteries across recent political surveys, reexamine hypotheses about the link between personality and participation, test the explanatory power of personality across samples and in different contexts, and expand measures of political and civic engagement, all of which I do in this article. Personality traits do influence political participation, although the magnitude and direction of effects depend on the particular act. Extraversion has a consistent effect on participation, but the effects of Agreeableness, Openness, Conscientiousness, and Emotional Stability are much less consistent.

  2. Human Posture Identification Using a MIMO Array

    Directory of Open Access Journals (Sweden)

    Dai Sasakawa

    2018-03-01

    Full Text Available The elderly are constantly in danger of falling and injuring themselves without anyone realizing it. A safety-monitoring system based on microwaves can ease these concerns. The authors have proposed safety-monitoring systems that use multiple-input multiple-output (MIMO radar to localize persons by capturing their biological activities such as respiration. However, our studies to date have focused on localization, which is easier to achieve than an estimation of human postures. This paper proposes a human posture identification scheme based on height and a Doppler radar cross section (RCS as estimated by a MIMO array. This scheme allows smart home applications to dispense with contact and wearable devices. Experiments demonstrate that this method can identify the supine position (i.e., after a fall with 100% accuracy, and the average identification rate is 95.0%.

  3. Facial image identification using Photomodeler

    DEFF Research Database (Denmark)

    Lynnerup, Niels; Andersen, Marie; Lauritsen, Helle Petri

    2003-01-01

    consist of many images of the same person taken from different angles. We wanted to see if it was possible to combine such a suite of images in useful 3-D renderings of facial proportions.Fifteen male adults were photographed from four different angles. Based on these photographs, a 3-D wireframe model......We present the results of a preliminary study on the use of 3-D software (Photomodeler) for identification purposes. Perpetrators may be photographed or filmed by surveillance systems. The police may wish to have these images compared to photographs of suspects. The surveillance imagery will often...

  4. Numbers and other math ideas come alive

    CERN Document Server

    Pappas, Theoni

    2012-01-01

    Most people don't think about numbers, or take them for granted. For the average person numbers are looked upon as cold, clinical, inanimate objects. Math ideas are viewed as something to get a job done or a problem solved. Get ready for a big surprise with Numbers and Other Math Ideas Come Alive. Pappas explores mathematical ideas by looking behind the scenes of what numbers, points, lines, and other concepts are saying and thinking. In each story, properties and characteristics of math ideas are entertainingly uncovered and explained through the dialogues and actions of its math

  5. Osteoporosis in older persons: current pharmacotherapy and future directions.

    Science.gov (United States)

    Duque, Gustavo

    2013-10-01

    Osteopororic fractures are highly prevalent in older persons having catastrophic consequences in their quality of life and increasing disability and mortality in this population. The mechanisms of osteoporosis in older persons are unique in terms of cellular changes and response to osteoporosis treatment. Therefore, specifically targeted treatments are required in this particular population. This paper provides an overview on the particular mechanisms of osteoporosis in older persons and the current and future therapeutic strategies to improve bone mass and prevent fractures in this population. Osteoporosis in older persons (especially in the old-old) has a unique pathophysiology that predisposes them to fractures thus having catastrophic consequences. Identification of patients at risk followed by therapies targeted to their cellular changes is pivotal to close the care gap observed in osteoporosis, predominantly in the older population. The treatment of osteoporosis has evolved from daily to yearly dosing thus facilitating compliance and effectiveness. It is expected that future biologically targeted treatments will have a similar separate dosing regime with better anti-fracture efficacy and lower incidence of side effects.

  6. Personality, personnel selection, and job performance

    NARCIS (Netherlands)

    D. van der Linden (Dimitri); D.H.M. Pelt (Dirk); C.S. Dunkel (Curtis); M.Ph. Born (Marise)

    2017-01-01

    markdownabstractJob Performance: The term job performance can either refer to the objective or subjective outcomes one achieves in a specific job (e.g., the profit of a sales persons, the number of publications of a scientist, the number of successful operations of a surgeon) or to work-related

  7. New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, identification cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is a need for a higher degree of security on such documents and this chapter covers new techniques to make personalized OVDs.

  8. Normal personality, personality disorder and psychosis: current views and future perspectives.

    Science.gov (United States)

    Balaratnasingam, Sivasankaran; Janca, Aleksandar

    2015-01-01

    The purpose of this article is to review recent literature examining the occurrence of psychotic experiences in normal population and those with personality disorders. Up to 15% of individuals in the general population report some type or degree of psychotic experience. Most of these individuals function adequately, do not require psychiatric treatment and do not receive diagnosis of a psychotic illness. A significant number of individuals diagnosed with borderline personality disorder (25-50%) also report psychotic symptoms. These are not easily differentiated from the psychotic symptoms reported by individuals with schizophrenia, nor are they always transient. However, emerging research has confirmed that individuals with schizotypal personality disorder are dimensionally related to those with schizophrenia and are at an increased risk of transition to psychosis. Psychotic symptoms are best considered as 'trans-diagnostic' entities on a continuum from normal to pathological. There is a large body of evidence for a dimensional relationship between schizotypal personality disorder and schizophrenia. There is also a significant amount of research showing that psychotic symptoms in borderline personality disorder are frequent, nontransient and represent a marker of illness severity. This review highlights the need to move beyond traditional assumptions and categorical boundaries when evaluating psychotic experiences and psychopathological phenomena.

  9. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  10. Clinical aspects of personality disorder diagnosis in the DSM-5

    Directory of Open Access Journals (Sweden)

    Francesco Modica

    2015-05-01

    Full Text Available Abstract: Personality disorders represent psychopathological conditions hard to be diagnosed. The Author highlights the clinical aspects of personality disorder diagnosis according to the criteria of the DSM-5. In this study, some of the numerous definitions of personality are mentioned; afterwards, some of the theories on the development of personality shall be. Later on, concepts of temperament, character and personality get analysed. Then, the current approach to personality disorders according to the two models of DSM-5 is reported. The first model is included in the Section II of DSM-5; while in the Section III there exists a proposal for a so-called alternate model. The first one suggests a qualitative or categorical kind of approach to personality disorders, whereas the alternate model proposes a dimensional or quantitative kind of approach and aims to formulate, as well as a diagnosis for general alterations of the personological functioning, even a trait-based personality disorder diagnosis, which can be formulated when a personality disorder is there but doesn't fit criteria for a specific disorder. Ultimately, it can be so claimed: 1 diagnostic criteria of the first model are similar to those of DSM-IV with its respective strenghts and weaknesses, and namely high probability in diagnosis, where  there, of personality disorder, yet insufficient sensitivity in the specification of the disorder; 2 the alternate model, despite criticism, thanks to the possibility of delivering a trait-based personality disorder diagnosis, seems to be more equipped both in the identification of the personality disorder and further specifications.

  11. Psychosomatic plasticity: An "emergent property" of personality research?

    Science.gov (United States)

    Jawer, Michael

    2006-03-01

    Psychosomatic plasticity, defined as an extreme capacity to turn suggestions into bodily realities, is as phenomenon well worth investigating because it challenges mainstream conceptions about the relationship between mind and body in health as well as illness. The field of psychoneuroimmunology (PNI) offers a framework within which to understand this phenomenon because PNI makes a compelling case for the biological unity of self. Hartmann's Boundaries concept is particularly applicable because it suggests that the minds of "thin-boundary" persons are relatively fluid and able to make numerous connections. Wilson and Barber's identification of the fantasy prone person and Thalbourne's transliminality concept are similarly relevant. Taking these explorations a step further, this author proposes that the flow of feeling within individuals represents the key to psychosomatic plasticity. Blushing, psoriasis, and immune reactions are offered as examples, as are more anomalous reports such as those provided by heart transplantation recipients and cases said to be indicative of reincarnation. In each instance, persons who are highly sensitive (ie, have a speedier and more direct flow of feeling) are more likely to evidence physical reactions. Psychosomatic plasticity represents an emerging area of interest in personality research, one that clearly merits further investigation.

  12. Which Users Should Be the Focus of Mobile Personal Health Records? Analysis of User Characteristics Influencing Usage of a Tethered Mobile Personal Health Record.

    Science.gov (United States)

    Lee, Guna; Park, Joong Yeol; Shin, Soo-Yong; Hwang, Jong Su; Ryu, Hyeon Jeong; Lee, Jae Ho; Bates, David W

    2016-05-01

    This study was conducted to analyze the usage pattern of a hospital-tethered mobile personal health records (m-PHRs) application named My Chart in My Hand (MCMH) and to identify user characteristics that influence m-PHR usage. Access logs to MCMH and its menus were collected for a total of 18 months, from August 2011 to January 2013. Usage patterns between users without a patient identification number (ID) and users with a patient ID were compared. Users with a patient ID were divided into light and heavy user groups by the median number of monthly access. Multiple linear regression models were used to assess MCMH usage pattern by characteristics of MCMH user with a patient ID. The total number of MCMH logins was 105,603, and the median number of accesses was 15 times. Users (n = 7,096) mostly accessed the "My Chart" menu, but "OPD [outpatient department] Service Support" and "Health Management" menus were also frequently used. Patients with chronic diseases, experience of hospital visits including emergency room and OPD, and age group of 0-19 years were more frequently found among users with a patient ID (n = 2,186) (p < 0.001). A similar trend was found in the heavy user group (n = 1,123). Submenus of laboratory result, online appointment, and medication lists that were accessed mostly by users with a patient ID were associated with OPD visit and chronic diseases. This study showed that focuses on patients with chronic disease and more hospital visits and empowerment functions in a tethered m-PHR would be helpful to pursue the extensive use.

  13. Taking It to the Classroom: Number Board Games as a Small Group Learning Activity

    Science.gov (United States)

    Ramani, Geetha B.; Siegler, Robert S.; Hitti, Aline

    2012-01-01

    We examined whether a theoretically based number board game could be translated into a practical classroom activity that improves Head Start children's numerical knowledge. Playing the number board game as a small group learning activity promoted low-income children's number line estimation, magnitude comparison, numeral identification, and…

  14. Toxicity identification evaluation methods for identification of toxicants in refinery effluents

    International Nuclear Information System (INIS)

    Barten, K.A.; Mount, D.R.; Hackett, J.R.

    1993-01-01

    During the last five years, the authors have used Toxicity Identification Evaluation (TIE) methods to characterize and identify the source(s) of toxicity in effluents from dozens of municipal and industrial facilities. In most cases, specific chemicals responsible for toxicity have been identified. Although generally successful, the initial experience was that for several refinery effluents, they were able only to qualitatively characterize the presence of organic toxicants; standard toxicant identification procedures were not able to isolate specific organic chemicals. They believe that organic toxicity in these refinery effluents is caused by multiple organic compounds rather than by just a few; evidence for this includes an inability to isolate toxicity in a small number of fractions using liquid chromatography and the presence of very large numbers of compounds in isolated fractions. There is also evidence that the toxicant(s) may be ionic, in that the toxicity of whole effluent and isolated fractions often show increasing toxicity with decreasing pH. Finally, positive-pressure filtration has also reduced toxicity in some samples. In this presentation the authors summarize their experiences with refinery effluents, focusing on typical patterns they have observed and alternative procedures they have used to better understand the nature of these toxicants

  15. A Parameter Identification Method for Helicopter Noise Source Identification and Physics-Based Semi-Empirical Modeling

    Science.gov (United States)

    Greenwood, Eric, II; Schmitz, Fredric H.

    2010-01-01

    A new physics-based parameter identification method for rotor harmonic noise sources is developed using an acoustic inverse simulation technique. This new method allows for the identification of individual rotor harmonic noise sources and allows them to be characterized in terms of their individual non-dimensional governing parameters. This new method is applied to both wind tunnel measurements and ground noise measurements of two-bladed rotors. The method is shown to match the parametric trends of main rotor Blade-Vortex Interaction (BVI) noise, allowing accurate estimates of BVI noise to be made for operating conditions based on a small number of measurements taken at different operating conditions.

  16. An open source toolkit for medical imaging de-identification

    International Nuclear Information System (INIS)

    Rodriguez Gonzalez, David; Carpenter, Trevor; Wardlaw, Joanna; Hemert, Jano I. van

    2010-01-01

    Medical imaging acquired for clinical purposes can have several legitimate secondary uses in research projects and teaching libraries. No commonly accepted solution for anonymising these images exists because the amount of personal data that should be preserved varies case by case. Our objective is to provide a flexible mechanism for anonymising Digital Imaging and Communications in Medicine (DICOM) data that meets the requirements for deployment in multicentre trials. We reviewed our current de-identification practices and defined the relevant use cases to extract the requirements for the de-identification process. We then used these requirements in the design and implementation of the toolkit. Finally, we tested the toolkit taking as a reference those requirements, including a multicentre deployment. The toolkit successfully anonymised DICOM data from various sources. Furthermore, it was shown that it could forward anonymous data to remote destinations, remove burned-in annotations, and add tracking information to the header. The toolkit also implements the DICOM standard confidentiality mechanism. A DICOM de-identification toolkit that facilitates the enforcement of privacy policies was developed. It is highly extensible, provides the necessary flexibility to account for different de-identification requirements and has a low adoption barrier for new users. (orig.)

  17. Language Personality in the Conditions of Cross-Cultural Communication: Case-Study Experience

    Science.gov (United States)

    Davidovitch, Nitza; Khyhniak, Kateryna

    2018-01-01

    The article is devoted to the problem of identification of a language personality's traits under conditions of cross-cultural communication. It is shown that effective cross-cultural communication is revised under globalization and increasingly intensive social interactions. The results of the authors' research prove that it is possible to develop…

  18. Mind the Gap? An Intensive Longitudinal Study of Between-Person and Within-Person Intention-Behavior Relations.

    Science.gov (United States)

    Inauen, Jennifer; Shrout, Patrick E; Bolger, Niall; Stadler, Gertraud; Scholz, Urte

    2016-08-01

    Despite their good intentions, people often do not eat healthily. This is known as the intention-behavior gap. Although the intention-behavior relationship is theorized as a within-person process, most evidence is based on between-person differences. The purpose of the present study is to investigate the within-person intention-behavior association for unhealthy snack consumption. Young adults (N = 45) participated in an intensive longitudinal study. They reported intentions and snack consumption five times daily for 7 days (n = 1068 observations analyzed). A within-person unit difference in intentions was associated with a halving of the number of unhealthy snacks consumed in the following 3 h (CI95 27-70 %). Between-person differences in average intentions did not predict unhealthy snack consumption. Consistent with theory, the intention-behavior relation for healthy eating is best understood as a within-person process. Interventions to reduce unhealthy snacking should target times of day when intentions are weakest.

  19. Lights, camera…citizen science: assessing the effectiveness of smartphone-based video training in invasive plant identification.

    Directory of Open Access Journals (Sweden)

    Jared Starr

    Full Text Available The rapid growth and increasing popularity of smartphone technology is putting sophisticated data-collection tools in the hands of more and more citizens. This has exciting implications for the expanding field of citizen science. With smartphone-based applications (apps, it is now increasingly practical to remotely acquire high quality citizen-submitted data at a fraction of the cost of a traditional study. Yet, one impediment to citizen science projects is the question of how to train participants. The traditional "in-person" training model, while effective, can be cost prohibitive as the spatial scale of a project increases. To explore possible solutions, we analyze three training models: 1 in-person, 2 app-based video, and 3 app-based text/images in the context of invasive plant identification in Massachusetts. Encouragingly, we find that participants who received video training were as successful at invasive plant identification as those trained in-person, while those receiving just text/images were less successful. This finding has implications for a variety of citizen science projects that need alternative methods to effectively train participants when in-person training is impractical.

  20. Fundamental limits for privacy-preserving biometric identification systems that support authentication

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2015-01-01

    In this paper we analyze two types of biometric identification systems with protected templates that also support authentication. In the first system two terminals observe biometric enrollment and identification sequences of a number of individuals. It is the goal of these terminals to form a common

  1. Study on Personality Types of Dentists in different Disciplines of Dentistry.

    Science.gov (United States)

    Al-Dlaigan, Yousef H; Alahmari, Albatool S; Almubarak, Sara H; Alateeq, Sahar A; Anil, Sukumaran

    2017-07-01

    The purpose of this study was to determine the most common personality type among dentists in seven selected clinical dentistry specialties using the Myers-Briggs Type Indicator (MBTI) and to compare between these different types of personalities. A survey containing the MBTI and demographic and practice questions was used to assess the personality styles of 243 dental specialists in Riyadh, Saudi Arabia. The survey results were analyzed using descriptive statistics. The results of the MBTI for 243 specialist dentists revealed, generally, a higher percentage of scoring for introversion (I) with an average of 65% than extroversion (E). The study identified 10 common personality types among these specialists: ISTJ, ISFJ, INFJ, ISTP, INFP, INTP, ENFP, ENTP, ENFJ, and ENTJ (extraversion-introversion (E-I), sensing-intuition (S-N), thinking-feeling (T-F), and judging-perception (J-P)). The dominant personality type in all seven clinical specialties in dentistry was ISTJ, with an average of 54%. The personality types showed variation among the seven clinical dentistry specialties. However, among these seven clinician's specialties in dentistry, more than 50% of the individuals shared one common type of personality (ISTJ). The identification of the personality type might help in their association with coworkers, students, and patients as well as knowing the individual preferences toward different specialties in dentistry.

  2. When forensic odontology met biochemistry: Multidisciplinary approach in forensic human identification.

    Science.gov (United States)

    Adserias-Garriga, Joe; Thomas, Christian; Ubelaker, Douglas H; C Zapico, Sara

    2018-03-01

    When human remains are found, the priority of the investigation is to ascertain the identity of the deceased. A positive identification is a key factor in providing closure for the family of the deceased; it is also required to issue the death certificate and therefore, to settle legal affairs. Moreover, it is difficult for any forensic investigation involving human remains to be solved without the determination of an identity. Therefore, personal identification is necessary for social, legal and forensic reasons. In the last thirty years forensic odontology has experienced an important transformation, from primarily involving occasional dental identification into a broader role, contributing to the determination of the biological profile. In the same way, "DNA fingerprinting" has evolved not only in terms of improving its technology, but also in its application beyond the "classical": helping with the estimation of sex, age and ancestry. As these two forensic disciplines have developed independently, their pathways have crossed several times through human identification operations, especially the ones that require a multidisciplinary approach. Thus, the aim of this review is to describe the contributions of both forensic odontology and molecular biology/biochemistry to human identification, demonstrating how a multidisciplinary approach can lead to a better and more efficient identification. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Borderline personality symptoms and work performance: a population-based survey.

    Science.gov (United States)

    Juurlink, Trees T; Ten Have, Margreet; Lamers, Femke; van Marle, Hein J F; Anema, Johannes R; de Graaf, Ron; Beekman, Aartjan T F

    2018-06-19

    This study aims to elucidate the interplay between borderline personality symptoms and working conditions as a pathway for impaired work performance among workers in the general population. Cross-sectional data from the Netherlands Mental Health Survey and Incidence Study-2 (NEMESIS-2) were used, including 3672 workers. Borderline personality symptoms were measured with the International Personality Disorder Examination (IPDE) questionnaire. Working conditions (decision latitude, psychological job demands, job security and co-worker support) were assessed with the Job Content Questionnaire (JCQ). Impaired work performance was assessed as total work loss days per month, defined as the sum of days of three types of impaired work performance (inability to work, cut-down to work, and diminished quality at work). These were assessed with the WHO Disability Assessment Schedule (WHO-DAS). Common mental disorders (CMD) were assessed with the Composite International Diagnostic Interview (CIDI). Number of borderline personality symptoms was consistently associated with impaired work performance, even after controlling for type or number of adverse working conditions and co-occurrence of CMD. Borderline personality symptoms were associated with low decision latitude, job insecurity and low co-worker support. The relationship between borderline personality symptoms and work performance diminished slightly after controlling for type or number of working conditions. The current study shows that having borderline personality symptoms is a unique determinant of work performance. This association seems partially explained through the impact of borderline personality symptoms on working conditions. Future studies are warranted to study causality and should aim at diminishing borderline personality symptoms and coping with working conditions.

  4. Resolving person names in web people search

    NARCIS (Netherlands)

    Balog, K.; Azzopardi, L.; de Rijke, M.; King, I.; Baeza-Yates, R.

    2009-01-01

    Disambiguating person names in a set of documents (such as a set of web pages returned in response to a person name) is a key task for the presentation of results and the automatic profiling of experts. With largely unstructured documents and an unknown number of people with the same name the

  5. Identification of copy number variations and translocations in cancer cells from Hi-C data.

    Science.gov (United States)

    Chakraborty, Abhijit; Ay, Ferhat

    2017-10-18

    with CNV events for a breast cancer cell line (r=0.89) and capture most of the CNVs we simulate using Avesim. For HiCtrans predictions, we report evidence from the literature for 30 out of 90 translocations for eight of our cancer cell lines. Furthermore, we show that our tools identify and correctly classify relatively understudied rearrangements such as double minutes (DMs) and homogeneously staining regions (HSRs). Considering the inherent limitations of existing techniques for karyotyping (i.e., missing balanced rearrangements and those near repetitive regions), the accurate identification of CNVs and translocations in a cost-effective and high-throughput setting is still a challenge. Our results show that the set of tools we develop effectively utilize moderately sequenced Hi-C libraries (100-300 million reads) to identify known and de novo chromosomal rearrangements/abnormalities in well-established cancer cell lines. With the decrease in required number of cells and the increase in attainable resolution, we believe that our framework will pave the way towards comprehensive mapping of genomic rearrangements in primary cells from cancer patients using Hi-C. CNV calling: https://github.com/ay-lab/HiCnvTranslocation calling: https://github.com/ay-lab/HiCtransHi-C simulation: https://github.com/ay-lab/AveSim. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  6. Adaptive Robot to Person Encounter by Motion Patterns

    DEFF Research Database (Denmark)

    Andersen, Hans Jørgen; Bak, Thomas; Svenstrup, Mikael

    2009-01-01

    This paper introduces a new method for adaptive control of a robot approaching a person controlled by the person's interest in interaction. For adjustment of the robot behavior a cost function centered in the person is adapted according to an introduced person evaluator method relying on the three...... variables: the distance between the person and the robot, the relative velocity between the two, and position of the person. The person evaluator method determine the person's interest by evaluating the spatial relationship between robot and person in a Case Based Reasoning (CBR) system that is trained...... to determine to which degree the person is interested in interaction. The outcome of the CBR system is used to adapt the cost function around the person, so that the robot's behavior is adapted to the expressed interest. The proposed methods are evaluated by a number of physical experiments that demonstrate...

  7. Character Selection During Interactive Taxonomic Identification: “Best Characters”

    Directory of Open Access Journals (Sweden)

    Nadia Talent

    2014-03-01

    Full Text Available Software interfaces for interactive multiple-entry taxonomic identification (polyclaves sometimes provide a “best character” or “separation” coefficient, to guide the user to choose a character that could most effectively reduce the number of identification steps required. The coefficient could be particularly helpful when difficult or expensive tasks are needed for forensic identification, and in very large databases, uses that appear likely to increase in importance. Several current systems also provide tools to develop taxonomies or single-entry identification keys, with a variety of coefficients that are appropriate to that purpose. For the identification task, however, information theory neatly applies, and provides the most appropriate coefficient. To our knowledge, Delta-Intkey is the only currently available system that uses a coefficient related to information theory, and it is currently being reimplemented, which may allow for improvement. We describe two improvements to the algorithm used by Delta-Intkey. The first improves transparency as the number of remaining taxa decreases, by normalizing the range of the coefficient to [0,1]. The second concerns numeric ranges, which require consistent treatment of sub-intervals and their end-points. A stand-alone Bestchar program for categorical data is provided, in the Python and R languages. The source code is freely available and dedicated to the Public Domain.

  8. E-Learning Personalization Based on Hybrid Recommendation Strategy and Learning Style Identification

    Science.gov (United States)

    Klasnja-Milicevic, Aleksandra; Vesin, Boban; Ivanovic, Mirjana; Budimac, Zoran

    2011-01-01

    Personalized learning occurs when e-learning systems make deliberate efforts to design educational experiences that fit the needs, goals, talents, and interests of their learners. Researchers had recently begun to investigate various techniques to help teachers improve e-learning systems. In this paper, we describe a recommendation module of a…

  9. The relation between dimensions of normal and pathological personality and childhood maltreatment in incarcerated boys.

    Science.gov (United States)

    Nederlof, E; Van der Ham, J M; Dingemans, P M J A; Oei, T I

    2010-12-01

    The relation between subtypes of maltreatment and dimensions of personality and personality pathology was investigated in a representative sample of 142 incarcerated Dutch male juveniles. Normal personality dimensions were assessed with the Big Five Inventory, the Dimensional Assessment of Personality Pathology-Basic Questionnaire for Adolescents was used to measure pathological personality dimensions, and the Childhood Trauma Questionnaire was used to assess childhood maltreatment. The five maltreatment subtypes were found to be differentially and uniquely related to the normal and pathological personality dimensions in juvenile delinquents. The association between the abusive subtypes and Emotional Dysregulation depended on the co-occurrence of neglect. It was concluded that subtypes of maltreatment are distinctively related to dimensions of personality and personality pathology, possibly due to specific gene-environment interactions. Further research on this interplay is needed to be able to recognize genetic vulnerability. Early identification of children at risk could aid to limit the long-term consequences of maltreatment.

  10. EEG-guided meditation: A personalized approach.

    Science.gov (United States)

    Fingelkurts, Andrew A; Fingelkurts, Alexander A; Kallio-Tamminen, Tarja

    2015-12-01

    The therapeutic potential of meditation for physical and mental well-being is well documented, however the possibility of adverse effects warrants further discussion of the suitability of any particular meditation practice for every given participant. This concern highlights the need for a personalized approach in the meditation practice adjusted for a concrete individual. This can be done by using an objective screening procedure that detects the weak and strong cognitive skills in brain function, thus helping design a tailored meditation training protocol. Quantitative electroencephalogram (qEEG) is a suitable tool that allows identification of individual neurophysiological types. Using qEEG screening can aid developing a meditation training program that maximizes results and minimizes risk of potential negative effects. This brief theoretical-conceptual review provides a discussion of the problem and presents some illustrative results on the usage of qEEG screening for the guidance of mediation personalization. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Suicide and Suicidal Behavior among Transgender Persons.

    Science.gov (United States)

    Virupaksha, H G; Muralidhar, Daliboyina; Ramakrishna, Jayashree

    2016-01-01

    Suicide rate and suicidal tendencies among transgender persons are considerably high compared to general population. Hence, this review is an attempt to understand the issues around the suicide and suicidal behavior among transgender persons. The literature search conducted using three sources, i.e., electronic databases (PubMed, ProQuest, Google Scholar, PsycInfo), manual search (library catalog), and gray literature (consultation with experts). The suicide attempt rate among transgender persons ranges from 32% to 50% across the countries. Gender-based victimization, discrimination, bullying, violence, being rejected by the family, friends, and community; harassment by intimate partner, family members, police and public; discrimination and ill treatment at health-care system are the major risk factors that influence the suicidal behavior among transgender persons. In spite of facing a number of hardships in their day-to-day life, the transgender community holds a number of resiliency factors. Further, this community needs to be supported to strengthen their resiliency factors and draw culturally sensitive and transgender-inclusive suicide prevention strategies and increase protective factors to tackle this high rate of suicidality.

  12. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  13. Heritability estimates of the Big Five personality traits based on common genetic variants.

    Science.gov (United States)

    Power, R A; Pluess, M

    2015-07-14

    According to twin studies, the Big Five personality traits have substantial heritable components explaining 40-60% of the variance, but identification of associated genetic variants has remained elusive. Consequently, knowledge regarding the molecular genetic architecture of personality and to what extent it is shared across the different personality traits is limited. Using genomic-relatedness-matrix residual maximum likelihood analysis (GREML), we here estimated the heritability of the Big Five personality factors (extraversion, agreeableness, conscientiousness, neuroticism and openness for experience) in a sample of 5011 European adults from 527,469 single-nucleotide polymorphisms across the genome. We tested for the heritability of each personality trait, as well as for the genetic overlap between the personality factors. We found significant and substantial heritability estimates for neuroticism (15%, s.e. = 0.08, P = 0.04) and openness (21%, s.e. = 0.08, P Big Five personality traits using the GREML approach. Findings should be considered exploratory and suggest that detectable heritability estimates based on common variants is shared between neuroticism and openness to experiences.

  14. The Brain Derived Neurotrophic Factor and Personality

    OpenAIRE

    Christian Montag

    2014-01-01

    The study of the biological basis of personality is a timely research endeavor, with the aim of deepening our understanding of human nature. In recent years, a growing body of research has investigated the role of the brain derived neurotrophic factor (BDNF) in the context of individual differences across human beings, with a focus on personality traits. A large number of different approaches have been chosen to illuminate the role of BDNF for personality, ranging from the measurement of BDNF...

  15. Infectious Disease Management through Point-of-Care Personalized Medicine Molecular Diagnostic Technologies

    Directory of Open Access Journals (Sweden)

    Luc Bissonnette

    2012-05-01

    Full Text Available Infectious disease management essentially consists in identifying the microbial cause(s of an infection, initiating if necessary antimicrobial therapy against microbes, and controlling host reactions to infection. In clinical microbiology, the turnaround time of the diagnostic cycle (>24 hours often leads to unnecessary suffering and deaths; approaches to relieve this burden include rapid diagnostic procedures and more efficient transmission or interpretation of molecular microbiology results. Although rapid nucleic acid-based diagnostic testing has demonstrated that it can impact on the transmission of hospital-acquired infections, we believe that such life-saving procedures should be performed closer to the patient, in dedicated 24/7 laboratories of healthcare institutions, or ideally at point of care. While personalized medicine generally aims at interrogating the genomic information of a patient, drug metabolism polymorphisms, for example, to guide drug choice and dosage, personalized medicine concepts are applicable in infectious diseases for the (rapid identification of a disease-causing microbe and determination of its antimicrobial resistance profile, to guide an appropriate antimicrobial treatment for the proper management of the patient. The implementation of point-of-care testing for infectious diseases will require acceptance by medical authorities, new technological and communication platforms, as well as reimbursement practices such that time- and life-saving procedures become available to the largest number of patients.

  16. Efficient Discovery of De-identification Policies Through a Risk-Utility Frontier.

    Science.gov (United States)

    Xia, Weiyi; Heatherly, Raymond; Ding, Xiaofeng; Li, Jiuyong; Malin, Bradley

    2013-01-01

    Modern information technologies enable organizations to capture large quantities of person-specific data while providing routine services. Many organizations hope, or are legally required, to share such data for secondary purposes (e.g., validation of research findings) in a de-identified manner. In previous work, it was shown de-identification policy alternatives could be modeled on a lattice, which could be searched for policies that met a prespecified risk threshold (e.g., likelihood of re-identification). However, the search was limited in several ways. First, its definition of utility was syntactic - based on the level of the lattice - and not semantic - based on the actual changes induced in the resulting data. Second, the threshold may not be known in advance. The goal of this work is to build the optimal set of policies that trade-off between privacy risk (R) and utility (U), which we refer to as a R-U frontier. To model this problem, we introduce a semantic definition of utility, based on information theory, that is compatible with the lattice representation of policies. To solve the problem, we initially build a set of policies that define a frontier. We then use a probability-guided heuristic to search the lattice for policies likely to update the frontier. To demonstrate the effectiveness of our approach, we perform an empirical analysis with the Adult dataset of the UCI Machine Learning Repository. We show that our approach can construct a frontier closer to optimal than competitive approaches by searching a smaller number of policies. In addition, we show that a frequently followed de-identification policy (i.e., the Safe Harbor standard of the HIPAA Privacy Rule) is suboptimal in comparison to the frontier discovered by our approach.

  17. A third generation personality test

    OpenAIRE

    Sjöberg, Lennart

    2010-01-01

    The development of personality testing in the workplace has undergone three phases. The first generation of tests, such as Cattell’s 16 PF and the British test OPQ, was characterized by complex systems for the description of the personality. These systems were simplified in part by the following generation of the test, which was based on the five factor model but that model was simple only at the horizontal level. Beneath the five main factors were a large number of ancillary factors, usually...

  18. Typewriting: Personal-Use Typewriting--A Sound Foundation

    Science.gov (United States)

    Ownby, Arnola; Rhea, Jeanine

    1977-01-01

    Because educators are recognizing the contributions that typewriting can make as a tool of communication, greater numbers of personal-use typewriting courses are being offered in which students will develop an effective skill for personal use, as well as gain a sound foundation for further study in a vocational course. The major issue is one of…

  19. Drugs and the older person

    African Journals Online (AJOL)

    2007-09-14

    Sep 14, 2007 ... Sebastiana Kalula is Head of Geriatric Medicine and Acting Director of The Albertina and Walter .... performance of cognitive and physical .... Older persons may need multiple drug therapy for an increased number of chronic.

  20. The virtual neonate in The Neonatal Intensive Care Unit: when twin number three adds up to error not imagination.

    Science.gov (United States)

    Kushnir, Amir; Chulsky, Elena; Rubin, Robyn; Zohar, Daniel; Barak, Shay

    2014-09-01

    During the administrative admittance of extreme premature twin neonates to the Hospital Information System (HIS), at an Israeli government general hospital, a third virtual baby was mistakenly admitted in addition to the twins. The third virtual baby's records were in department occupancy and transactions were performed in the HIS, such as "admittance" to Neonatal Intensive Care Unit (NICU), being appended to a mother as well as clinical orders. Once noticed, the records of the third virtual baby were merged in the system with the second correct twin (Baby II), whose records were also in the department occupancy list. An error occurred in the interface whilst merging the records, and patient demography was not updated for clinical orders for Baby II. As a result, all new clinical orders for Baby II carried the non existing third baby's identity. We emphasize that it is advisable to register all newborns as early on in life whilst still in the delivery room, with a permanent identification number as opposed to a temporary identification number to avoid any mismatching if patients records are to be merged or updated. Furthermore, steps that could help prevent such an event could be additional administrative staff to register newborns. However, we conclude, that it would be most helpful to introduce a Radio Frequency Identification (RFID) system based on a permanent identity number. If any discrepancies in patient information are detected, an alarm will be triggered during transfer of the baby from the delivery room to the designated Department. A RFID receptor is located at the exit of the delivery room. While most literature available regarding Hospital Information Technology (HIT) and patient safety, mainly discusses mismatching of patients during medication and laboratory testing not much literature regarding the process of registering newborns as a source of patient mismatching has been found. The authors feel that there is a need to further investigate this

  1. Forensic bitemark identification: weak foundations, exaggerated claims

    Science.gov (United States)

    Saks, Michael J.; Albright, Thomas; Bohan, Thomas L.; Bierer, Barbara E.; Bowers, C. Michael; Bush, Mary A.; Bush, Peter J.; Casadevall, Arturo; Cole, Simon A.; Denton, M. Bonner; Diamond, Shari Seidman; Dioso-Villa, Rachel; Epstein, Jules; Faigman, David; Faigman, Lisa; Fienberg, Stephen E.; Garrett, Brandon L.; Giannelli, Paul C.; Greely, Henry T.; Imwinkelried, Edward; Jamieson, Allan; Kafadar, Karen; Kassirer, Jerome P.; Koehler, Jonathan ‘Jay’; Korn, David; Mnookin, Jennifer; Morrison, Alan B.; Murphy, Erin; Peerwani, Nizam; Peterson, Joseph L.; Risinger, D. Michael; Sensabaugh, George F.; Spiegelman, Clifford; Stern, Hal; Thompson, William C.; Wayman, James L.; Zabell, Sandy; Zumwalt, Ross E.

    2016-01-01

    Abstract Several forensic sciences, especially of the pattern-matching kind, are increasingly seen to lack the scientific foundation needed to justify continuing admission as trial evidence. Indeed, several have been abolished in the recent past. A likely next candidate for elimination is bitemark identification. A number of DNA exonerations have occurred in recent years for individuals convicted based on erroneous bitemark identifications. Intense scientific and legal scrutiny has resulted. An important National Academies review found little scientific support for the field. The Texas Forensic Science Commission recently recommended a moratorium on the admission of bitemark expert testimony. The California Supreme Court has a case before it that could start a national dismantling of forensic odontology. This article describes the (legal) basis for the rise of bitemark identification and the (scientific) basis for its impending fall. The article explains the general logic of forensic identification, the claims of bitemark identification, and reviews relevant empirical research on bitemark identification—highlighting both the lack of research and the lack of support provided by what research does exist. The rise and possible fall of bitemark identification evidence has broader implications—highlighting the weak scientific culture of forensic science and the law's difficulty in evaluating and responding to unreliable and unscientific evidence. PMID:28852538

  2. Striving for Group Agency: Threat to Personal Control Increases the Attractiveness of Agentic Groups

    Directory of Open Access Journals (Sweden)

    Janine eStollberg

    2015-05-01

    Full Text Available When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93 that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects. Turning to groups people are not (yet part of, Study 2 (N = 47 showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78 replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control.

  3. What Works in the Treatment of Borderline Personality Disorder

    OpenAIRE

    Choi-Kain, Lois W.; Finch, Ellen F.; Masland, Sara R.; Jenkins, James A.; Unruh, Brandon T.

    2017-01-01

    Purpose of the Review This review summarizes advances in treatments for adults with borderline personality disorder (BPD) in the last 5?years. Recent Findings Evidence-based advances in the treatment of BPD include a delineation of generalist models of care in contrast to specialist treatments, identification of essential effective elements of dialectical behavioral therapy (DBT), and the adaptation of DBT treatment to manage post-traumatic stress disorder (PTSD) and BPD. Studies on pharmacol...

  4. Personalized Lifestyle Medicine: Relevance for Nutrition and Lifestyle Recommendations

    Directory of Open Access Journals (Sweden)

    Deanna M. Minich

    2013-01-01

    Full Text Available Public health recommendations for lifestyle modification, including diet and physical activity, have been widely disseminated for the prevention and treatment of disease. These guidelines are intended for the overall population without significant consideration for the individual with respect to one’s genes and environment. Personalized lifestyle medicine is a newly developed term that refers to an approach to medicine in which an individual’s health metrics from point-of-care diagnostics are used to develop lifestyle medicine-oriented therapeutic strategies for improving individual health outcomes in managing chronic disease. Examples of the application of personalized lifestyle medicine to patient care include the identification of genetic variants through laboratory tests and/or functional biomarkers for the purpose of designing patient-specific prescriptions for diet, exercise, stress, and environment. Personalized lifestyle medicine can provide solutions to chronic health problems by harnessing innovative and evolving technologies based on recent discoveries in genomics, epigenetics, systems biology, life and behavioral sciences, and diagnostics and clinical medicine. A comprehensive, personalized approach to medicine is required to promote the safety of therapeutics and reduce the cost of chronic disease. Personalized lifestyle medicine may provide a novel means of addressing a patient’s health by empowering them with information they need to regain control of their health.

  5. A comprehensive profile of DNA copy number variations in a Korean population: identification of copy number invariant regions among Koreans.

    Science.gov (United States)

    Jeon, Jae Pil; Shim, Sung Mi; Jung, Jong Sun; Nam, Hye Young; Lee, Hye Jin; Oh, Berm Seok; Kim, Kuchan; Kim, Hyung Lae; Han, Bok Ghee

    2009-09-30

    To examine copy number variations among the Korean population, we compared individual genomes with the Korean reference genome assembly using the publicly available Korean HapMap SNP 50 k chip data from 90 individuals. Korean individuals exhibited 123 copy number variation regions (CNVRs) covering 27.2 mb, equivalent to 1.0% of the genome in the copy number variation (CNV) analysis using the combined criteria of P value (Por= 0.25) among study subjects. In contrast, when compared to the Affymetrix reference genome assembly from multiple ethnic groups, considerably more CNVRs (n=643) were detected in larger proportions (5.0%) of the genome covering 135.1 mb even by more stringent criteria (Por=0.25), reflecting ethnic diversity of structural variations between Korean and other populations. Some CNVRs were validated by the quantitative multiplex PCR of short fluorescent fragment (QMPSF) method, and then copy number invariant regions were detected among the study subjects. These copy number invariant regions would be used as good internal controls for further CNV studies. Lastly, we demonstrated that the CNV information could stratify even a single ethnic population with a proper reference genome assembly from multiple heterogeneous populations.

  6. The burden of neck pain: its meaning for persons with neck pain and healthcare providers, explored by concept mapping.

    Science.gov (United States)

    van Randeraad-van der Zee, Carlijn H; Beurskens, Anna J H M; Swinkels, Raymond A H M; Pool, Jan J M; Batterham, Roy W; Osborne, Richard H; de Vet, Henrica C W

    2016-05-01

    To empirically define the concept of burden of neck pain. The lack of a clear understanding of this construct from the perspective of persons with neck pain and care providers hampers adequate measurement of this burden. An additional aim was to compare the conceptual model obtained with the frequently used Neck Disability Index (NDI). Concept mapping, combining qualitative (nominal group technique and group consensus) and quantitative research methods (cluster analysis and multidimensional scaling), was applied to groups of persons with neck pain (n = 3) and professionals treating persons with neck pain (n = 2). Group members generated statements, which were organized into concept maps. Group members achieved consensus about the number and description of domains and the researchers then generated an overall mind map covering the full breadth of the burden of neck pain. Concept mapping revealed 12 domains of burden of neck pain: impaired mobility neck, neck pain, fatigue/concentration, physical complaints, psychological aspects/consequences, activities of daily living, social participation, financial consequences, difficult to treat/difficult to diagnose, difference of opinion with care providers, incomprehension by social environment, and how person with neck pain deal with complaints. All ten items of the NDI could be linked to the mind map, but the NDI measures only part of the burden of neck pain. This study revealed the relevant domains for the burden of neck pain from the viewpoints of persons with neck pain and their care providers. These results can guide the identification of existing measurements instruments for each domain or the development of new ones to measure the burden of neck pain.

  7. Profiles of drug addicts in relation to personality variables and disorders.

    Science.gov (United States)

    Carou, María; Romero, Estrella; Luengo, Mª Ángeles

    2016-10-07

    In recent decades, research has identified a set of impulsive/disinhibited personality variables closely associated with drug addiction. As well as this, disorders linked with these variables, such as ADHD and personality disorders, are being closely studied in the field of drug addiction. Although much knowledge has been accumulated about the relation of these variables and disorders taken separately, less is known about how these constructs allow identify-specific profiles within the drug dependent population to be identified. This work, on the basis of data collected on a sample of drug addicts in treatment, analyzes how impulsiveness, sensation seeking, self-control, ADHD and personality disorders contribute to identifying specific profiles of addicts. Cluster analysis allowed two profiles to be outlined according to these personality and psychopathology characteristics. Self-control, impulsiveness, impulsive and antisocial personality disorders, as well as scores in ADHD, emerge as the variables that contribute more to profile differentiation. One of these profiles (56.1% of participants) with a high disinhibition pattern, is associated with severe indicators of consumption and criminal career patterns. These results allow us to emphasize the role of personality and impulsiveness-related disorders in the identification of distinctive profiles within the addict population, and suggest the need to generate treatment strategies adapted to personal/psychopathology configurations of drug addicts.

  8. Reduced Complexity Volterra Models for Nonlinear System Identification

    Directory of Open Access Journals (Sweden)

    Hacıoğlu Rıfat

    2001-01-01

    Full Text Available A broad class of nonlinear systems and filters can be modeled by the Volterra series representation. However, its practical use in nonlinear system identification is sometimes limited due to the large number of parameters associated with the Volterra filter′s structure. The parametric complexity also complicates design procedures based upon such a model. This limitation for system identification is addressed in this paper using a Fixed Pole Expansion Technique (FPET within the Volterra model structure. The FPET approach employs orthonormal basis functions derived from fixed (real or complex pole locations to expand the Volterra kernels and reduce the number of estimated parameters. That the performance of FPET can considerably reduce the number of estimated parameters is demonstrated by a digital satellite channel example in which we use the proposed method to identify the channel dynamics. Furthermore, a gradient-descent procedure that adaptively selects the pole locations in the FPET structure is developed in the paper.

  9. The risk of re-identification versus the need to identify individuals in rare disease research.

    Science.gov (United States)

    Hansson, Mats G; Lochmüller, Hanns; Riess, Olaf; Schaefer, Franz; Orth, Michael; Rubinstein, Yaffa; Molster, Caron; Dawkins, Hugh; Taruscio, Domenica; Posada, Manuel; Woods, Simon

    2016-11-01

    There is a growing concern in the ethics literature and among policy makers that de-identification or coding of personal data and biospecimens is not sufficient for protecting research subjects from privacy invasions and possible breaches of confidentiality due to the possibility of unauthorized re-identification. At the same time, there is a need in medical science to be able to identify individual patients. In particular for rare disease research there is a special and well-documented need for research collaboration so that data and biosamples from multiple independent studies can be shared across borders. In this article, we identify the needs and arguments related to de-identification and re-identification of patients and research subjects and suggest how the different needs may be balanced within a framework of using unique encrypted identifiers.

  10. Life Stories and Mental Health: The Role of Identification Processes in Theory and Interventions

    NARCIS (Netherlands)

    Westerhof, Gerben Johan; Bohlmeijer, Ernst Thomas

    2012-01-01

    The goal of this article is to explore the relations between narratives and mental health from a psychological perspective. We argue that a process of identification with personal experiences underlies narrative structures that are known to be related to mental health. Overidentification and

  11. 77 FR 56212 - Federal Acquisition Regulation; Information Collection; Use of Data Universal Numbering System...

    Science.gov (United States)

    2012-09-12

    ...; Information Collection; Use of Data Universal Numbering System (DUNS) as Primary Contractor Identification... ``Information Collection 9000-0145, Use of Data Universal Numbering System (DUNS) as Primary Contractor... extension of a previously approved information collection requirement concerning use of the Data Universal...

  12. UHF RFID technologies for identification and traceability

    CERN Document Server

    Laheurte, Jean-Marc; Paret, Dominique; Loussert, Christophe

    2014-01-01

    UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or person to be automatically identified at a distance without a direct line-of-sight using a radio wave exchange. Applications include inventory tracking, prescription medication tracking and authentication, secure automobile keys, and access control for secure facilities. This book begins with an overview of UHF RFID challenges describing the applications, markets, trades and basic technologies. It follows this by highlighting the main features distinguishing UHF (860MHz-960MHz) and HF

  13. Psychobiology and treatment of borderline personality disorder.

    Science.gov (United States)

    Cloninger, C Robert

    2002-04-01

    Borderline personality disorder can be characterized in terms of a profile of abnormal deviations on multiple personality dimensions using the temperament and character inventory (TCI). Borderline patients show poor character development, including low TCI self-directedness (irresponsible, blaming) and low TCI cooperativeness (hostile, intolerant). Their temperament is explosive or unstable due to a combination of high TCI harm avoidance (anxious, shy), high TCI novelty seeking (impulsive, quick-tempered), and low reward dependence (cold, aloof). Consequently they are usually dysthymic with an admixture of anxiety and anger, and regulate their social problems and intense emotions in immature ways. Genetic and psychobiological studies have led to identification of biological correlates of each of the TCI dimensions of personality, including individual differences in regional brain activity, psychophysiological variables, neuroendocrine abnormalities and specific gene polymorphisms. Each dimension of personality involves complex non-linear interaction of multiple genetic and environmental factors and, in turn, each personality dimension interacts with the others in influencing the way an individual directs and adapts to his or her life experiences. Systematic clinical trials have shown that these personality variables predict the response to pharmacological and psychotherapeutic treatments. For example, high harm avoidance and low self-directedness predict slower response and more rapid relapse with both antidepressants and cognitive-behavioral therapy. Treatment with drugs and/or psychotherapy can be individually matched to the patient's profile of temperament and character traits, rather than treating a heterogeneous group of patients as if they had a discrete, homogeneous illness. Fundamental change in cognitive schemas depends on attention to all aspects of character, especially self-transcendence, which has previously been neglected in cognitive

  14. Apolipoprotein e4 Is Associated with More Rapid Decline in Odor Identification than in Odor Threshold or Dementia Rating Scale Scores

    Science.gov (United States)

    Calhoun-Haney, R.; Murphy, C.

    2005-01-01

    Individuals with the apolipoprotein E e4 genetic risk factor for Alzheimer's disease (AD) show deficits in olfactory function. The purpose of the present study was to examine longitudinally odor identification (odor ID), odor threshold, picture identification, and global cognitive status in allele positive (e4+) and negative (e4-) persons.…

  15. Vitamin D Pathway Status and the Identification of Target Genes in the Mouse Mammary Gland

    Science.gov (United States)

    2014-11-01

    breast cancer stem cells with oncolytic herpes simplex virus. Cancer Gene Therapy 2012;19(10):707-14. June 21, 2012 – Poster Presentation – Presented...AD_________________ Award Number: W81XWH-11-1-0152 TITLE: Vitamin D Pathway Status and the Identification of Target Genes in the Mouse Mammary... Identification of Target Genes in the 5b. GRANT NUMBER W81XWH-11-1-0152 Mouse Mammary Gland 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT

  16. The re-identification risk of Canadians from longitudinal demographics

    Science.gov (United States)

    2011-01-01

    Background The public is less willing to allow their personal health information to be disclosed for research purposes if they do not trust researchers and how researchers manage their data. However, the public is more comfortable with their data being used for research if the risk of re-identification is low. There are few studies on the risk of re-identification of Canadians from their basic demographics, and no studies on their risk from their longitudinal data. Our objective was to estimate the risk of re-identification from the basic cross-sectional and longitudinal demographics of Canadians. Methods Uniqueness is a common measure of re-identification risk. Demographic data on a 25% random sample of the population of Montreal were analyzed to estimate population uniqueness on postal code, date of birth, and gender as well as their generalizations, for periods ranging from 1 year to 11 years. Results Almost 98% of the population was unique on full postal code, date of birth and gender: these three variables are effectively a unique identifier for Montrealers. Uniqueness increased for longitudinal data. Considerable generalization was required to reach acceptably low uniqueness levels, especially for longitudinal data. Detailed guidelines and disclosure policies on how to ensure that the re-identification risk is low are provided. Conclusions A large percentage of Montreal residents are unique on basic demographics. For non-longitudinal data sets, the three character postal code, gender, and month/year of birth represent sufficiently low re-identification risk. Data custodians need to generalize their demographic information further for longitudinal data sets. PMID:21696636

  17. Enhancing lineup identification accuracy: two codes are better than one.

    Science.gov (United States)

    Melara, R D; DeWitt-Rickards, T S; O'Brien, T P

    1989-10-01

    Ways of improving identification accuracy were explored by comparing the conventional visual lineup with an auditory/visual lineup, one that paired color photographs with voice recordings. This bimodal lineup necessitated sequential presentation of lineup members; Experiment 1 showed that performance in sequential lineups was better than performance in traditional simultaneous lineups. In Experiments 2A and 2B unimodal and bimodal lineups were compared by using a multiple-lineup paradigm: Ss viewed 3 videotaped episodes depicting standard police procedures and were tested in 4 sequential lineups. Bimodal lineups were more diagnostic than either visual or auditory lineups alone. The bimodal lineup led to a 126% improvement in number of correct identifications over the conventional visual lineup, with no concomitant increase in number of false identifications. These results imply strongly that bimodal procedures should be adopted in real-world lineups. The nature of memorial processes underlying this bimodal advantage is discussed.

  18. Suicide and Personality

    Directory of Open Access Journals (Sweden)

    K. Nahit Ozmenler

    2009-07-01

    suicide are important clues as to presence of suicidality. Several studies have been conducted on the relationship between suicide attempts and personality features. However, there is not sufficient number of studies conducted on the completed suicide victims. The only methodology that could be used among this group of patients is psychological autopsy which is quite hard to implement because of inherent methodological problems. These factors prevent accumulation of sufficient data on the relationships between completed suicide and personality. However, we should evaluate suicidal behavior comprehensively in order to treat and to prevent its occurrence. Personality features are important in choosing the method of treatment, for social arrangements, and predicting possible new attempts. Our knowledge, about relationship between personality and suicide, will reach a better level by accelerating studies on completed suicide, and investigating suicide, personality, temperament, character relationship more thoroughly.

  19. DNA typing for personal identification of urine after long-term preservation for testing in doping control.

    Science.gov (United States)

    Aoki, Kimiko; Tanaka, Hiroyuki; Ueki, Makoto

    2017-08-01

    When the tampering of a urine sample is suspected in doping control, personal identification of the sample needs to be determined by short tandem repeat (STR) analysis using DNA. We established a method for extracting DNA from urine samples stored at -20 °C without using any additives or procedures, which is consistent with how samples are required to be managed for doping control. The method, using the Puregene® Blood Core kit followed by NucleoSpin® gDNA Clean-up or NucleoSpin® gDNA Clean-up XS kit, does not need any special instrument and can provide a purified extract with high-quality DNA from up to 40 mL of urine suitable for STR analysis using an AmpFlSTR® Identifiler® PCR amplification kit. Storing urine at -20 °C is detrimental to the stability of DNA. The DNA concentration of preserved urine could not be predicted by specific gravity or creatinine level at the time of urine collection. The DNA concentration of a purified extract (10 μL) was required to be >0.06 ng/μL to ensure a successful STR analysis. Thus, the required extraction volumes of urine preserved for 3-7 years at -20 °C were estimated to be 30 mL and 20 mL to succeed in at least 86% of men and 91% of women, respectively. Considering the long half-life of DNA during long-term preservation, our extraction method is applicable to urine samples stored even for 10 years, which is currently the storage duration allowed (increased from 8 years) before re-examination in doping control. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  20. 75 FR 28771 - Federal Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor...

    Science.gov (United States)

    2010-05-24

    ... Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor Personnel AGENCIES... of collecting from contractors all forms of Government provided identification once they are no..., titled Controls Over the Contractor Common Access Card (CAC) Life Cycle, was performed to determine...

  1. Personality assessment in snow leopards (Uncia uncia).

    Science.gov (United States)

    Gartner, Marieke Cassia; Powell, David

    2012-01-01

    Knowledge of individual personality is a useful tool in animal husbandry and can be used effectively to improve welfare. This study assessed personality in snow leopards (Uncia uncia) by examining their reactions to six novel objects and comparing them to personality assessments based on a survey completed by zookeepers. The objectives were to determine whether these methods could detect differences in personality, including age and sex differences, and to assess whether the two methods yielded comparable results. Both keeper assessments and novel object tests identified age, sex, and individual differences in snow leopards. Five dimensions of personality were found based on keepers' ratings: Active/Vigilant, Curious/Playful, Calm/Self-Assured, Timid/Anxious, and Friendly to Humans. The dimension Active/Vigilant was significantly positively correlated with the number of visits to the object, time spent locomoting, and time spent in exploratory behaviors. Curious/Playful was significantly positively correlated with the number of visits to the object, time spent locomoting, and time spent in exploratory behaviors. However, other dimensions (Calm/Self-Assured, Friendly to Humans, and Timid/Anxious) did not correlate with novel-object test variables and possible explanations for this are discussed. Thus, some of the traits and behaviors were correlated between assessment methods, showing the novel-object test to be useful in assessing an animal's personality should a keeper be unable to, or to support a keeper's assessment. © 2011 Wiley Periodicals, Inc.

  2. Integrating personality structure, personality process, and personality development

    NARCIS (Netherlands)

    Baumert, Anna; Schmitt, Manfred; Perugini, Marco; Johnson, Wendy; Blum, Gabriela; Borkenau, Peter; Costantini, Giulio; Denissen, J.J.A.; Fleeson, William; Grafton, Ben; Jayawickreme, Eranda; Kurzius, Elena; MacLeod, Colin; Miller, Lynn C.; Read, Stephen J.; Robinson, Michael D.; Wood, Dustin; Wrzus, Cornelia

    2017-01-01

    In this target article, we argue that personality processes, personality structure, and personality development have to be understood and investigated in integrated ways in order to provide comprehensive responses to the key questions of personality psychology. The psychological processes and

  3. How to spot a narcissist: Mental health literacy with respect to Narcissistic Personality Disorder.

    Science.gov (United States)

    Wright, Kirstie; Furnham, Adrian

    2015-05-01

    Lay people were asked to read one Depression, one Schizophrenia, and three Narcissistic Personality Disorder (NPD) vignettes. After each, they were asked what they thought the problem was for the individuals concerned and to make various ratings. Half of each of the five vignettes were of male, and the other of female, characters. The results demonstrated that laypeople are less likely to suggest help for, and have more difficulty identifying NPD compared to Depression and Schizophrenia. There were differences in the likeliness to suggest help between all three NPD vignettes and differences in the identification of two NPD vignettes possible due to the length and details in different vignettes. The gender of the person in the vignette had no effect on identification. The participants NPI scores were not correlated with the Narcissism literacy suggesting no relationship between having, and spotting, the disorder. Implications and limitations of the research are considered. Copyright © 2014 John Wiley & Sons, Ltd.

  4. Personalizing Therapy in Advanced Non–Small Cell Lung Cancer

    Science.gov (United States)

    Villaruz, Liza C.; Burns, Timothy F.; Ramfidis, Vasilis S.; Socinski, Mark A.

    2016-01-01

    The recognition that non–small cell lung cancer (NSCLC) is not a single disease entity, but rather a collection of distinct molecularly driven neoplasms, has permanently shifted the therapeutic landscape of NSCLC to a personalized approach. This personalization of NSCLC therapy is typified by the dramatic response rates seen in EGFR mutant NSCLC when treated with targeted tyrosine kinase inhibitor therapy and in ALK translocation–driven NSCLC when treated with ALK inhibitors. Targeted therapeutic approaches in NSCLC necessitate consideration of more invasive biopsy techniques aimed at providing sufficient tissue for both histological determination and molecular profiling in all patients with stage IV disease both at the time of diagnosis and at the time of disease progression. Comprehensive genotyping efforts have identified oncogenic drivers in 62% lung adenocarcinomas and an increasing proportion of squamous cell carcinomas of the lung. The identification of these oncogenic drivers and the triage of patients to clinical trials evaluating novel targeted therapeutic approaches will increasingly mold a landscape of personalized lung cancer therapy where each genotype has an associated targeted therapy. This review outlines the state of personalized lung cancer therapy as it pertains to individual NSCLC genotypes. PMID:24258572

  5. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    Science.gov (United States)

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  6. Ferenczi's concept of identification with the aggressor: understanding dissociative structure with interacting victim and abuser self-states.

    Science.gov (United States)

    Howell, Elizabeth F

    2014-03-01

    No one has described more passionately than Ferenczi the traumatic induction of dissociative trance with its resulting fragmentation of the personality. Ferenczi introduced the concept and term, identification with the aggressor in his seminal "Confusion of Tongues" paper, in which he described how the abused child becomes transfixed and robbed of his senses. Having been traumatically overwhelmed, the child becomes hypnotically transfixed by the aggressor's wishes and behavior, automatically identifying by mimicry rather than by a purposeful identification with the aggressor's role. To expand upon Ferenczi's observations, identification with the aggressor can be understood as a two-stage process. The first stage is automatic and initiated by trauma, but the second stage is defensive and purposeful. While identification with the aggressor begins as an automatic organismic process, with repeated activation and use, gradually it becomes a defensive process. Broadly, as a dissociative defense, it has two enacted relational parts, the part of the victim and the part of the aggressor. This paper describes the intrapersonal aspects (how aggressor and victim self-states interrelate in the internal world), as well as the interpersonal aspects (how these become enacted in the external). This formulation has relevance to understanding the broad spectrum of the dissociative structure of mind, borderline personality disorder, and dissociative identity disorder.

  7. Investigating User Identification in Remote Patient Monitoring Devices.

    Science.gov (United States)

    Ondiege, Brian; Clarke, Malcolm

    2017-09-13

    With the increase in the number of people having a chronic disease, there is an increase in households having more than a single person suffering from the same chronic illness. One problem of monitoring such patients in their own home is that current devices have a limitation in the number of people who can use a single device. This study investigates the use of Near Field Communication (NFC) for identification in a multi-user environment. A mixed-method qualitative and quantitative approach was adopted, including focus groups, observations and a field trial. Data were collected in three phases. In Phase 1, five focus groups were conducted with patients to determine their beliefs, concerns and issues with using identification in remote patient monitoring devices. In Phase 2, participants were given a blood pressure monitor modified to include an NFC reader to enable identification. The modified device was given to patients living as a couple in the same household and both suffering from hypertension. Both patients used the device for a period of two weeks to observe their acceptance of the technology and determine their experience of usage. A total of 40 (20 couples) patients participated in the trial. Non-adherence to the full monitoring regimen was low and was mainly due to usability issues or commitments taking them away from the home and thus unable to take readings. After the trial period participants were invited to discuss their experiences with the technology in a focus group discussion (Phase 3), a total of five focus groups were conducted. Focus group discussions with the patients revealed that most participants liked using the system and were not apprehensive towards Healthcare Information Technology (HIT). The participants also had suggestions for improvements that could be made to the modified blood pressure monitor (such as, rechargeable in place batteries, integrate the components, easier to use cuff, and increased sensitivity of the NFC reader) that

  8. Personalized translational epilepsy research - Novel approaches and future perspectives: Part II: Experimental and translational approaches.

    Science.gov (United States)

    Bauer, Sebastian; van Alphen, Natascha; Becker, Albert; Chiocchetti, Andreas; Deichmann, Ralf; Deller, Thomas; Freiman, Thomas; Freitag, Christine M; Gehrig, Johannes; Hermsen, Anke M; Jedlicka, Peter; Kell, Christian; Klein, Karl Martin; Knake, Susanne; Kullmann, Dimitri M; Liebner, Stefan; Norwood, Braxton A; Omigie, Diana; Plate, Karlheinz; Reif, Andreas; Reif, Philipp S; Reiss, Yvonne; Roeper, Jochen; Ronellenfitsch, Michael W; Schorge, Stephanie; Schratt, Gerhard; Schwarzacher, Stephan W; Steinbach, Joachim P; Strzelczyk, Adam; Triesch, Jochen; Wagner, Marlies; Walker, Matthew C; von Wegner, Frederic; Rosenow, Felix

    2017-11-01

    Despite the availability of more than 15 new "antiepileptic drugs", the proportion of patients with pharmacoresistant epilepsy has remained constant at about 20-30%. Furthermore, no disease-modifying treatments shown to prevent the development of epilepsy following an initial precipitating brain injury or to reverse established epilepsy have been identified to date. This is likely in part due to the polyetiologic nature of epilepsy, which in turn requires personalized medicine approaches. Recent advances in imaging, pathology, genetics, and epigenetics have led to new pathophysiological concepts and the identification of monogenic causes of epilepsy. In the context of these advances, the First International Symposium on Personalized Translational Epilepsy Research (1st ISymPTER) was held in Frankfurt on September 8, 2016, to discuss novel approaches and future perspectives for personalized translational research. These included new developments and ideas in a range of experimental and clinical areas such as deep phenotyping, quantitative brain imaging, EEG/MEG-based analysis of network dysfunction, tissue-based translational studies, innate immunity mechanisms, microRNA as treatment targets, functional characterization of genetic variants in human cell models and rodent organotypic slice cultures, personalized treatment approaches for monogenic epilepsies, blood-brain barrier dysfunction, therapeutic focal tissue modification, computational modeling for target and biomarker identification, and cost analysis in (monogenic) disease and its treatment. This report on the meeting proceedings is aimed at stimulating much needed investments of time and resources in personalized translational epilepsy research. This Part II includes the experimental and translational approaches and a discussion of the future perspectives, while the diagnostic methods, EEG network analysis, biomarkers, and personalized treatment approaches were addressed in Part I [1]. Copyright © 2017

  9. Self-compassion influences PTSD symptoms in the process of change in trauma-focused cognitive-behavioral therapies: A study of within-person processes

    Directory of Open Access Journals (Sweden)

    Asle eHoffart

    2015-08-01

    Full Text Available AbstractAlthough self-compassion is considered a promising change agent in the treatment of PTSD, no studies of this hypothesis exist. This study examined the within-person relationship of self-compassion components (self-kindness, common humanity, mindfulness, self-judgment, isolation, over-identification and subsequent PTSD symptoms over the course of therapy. Method: PTSD patients (n = 65 were randomized to either standard prolonged exposure, which includes imaginal exposure (IE to the traumatic memory, or modified prolonged exposure, where imagery re-scripting (IR of the memory replaced IE as the imagery component of prolonged exposure in a 10 week residential program. They were assessed weekly on self-compassion and PTSD symptom measures. The centering method of detrending was used to separate the variance related to the within-person process of change over the course of treatment from between-person variance. Results: The self-compassion components self-kindness, self-judgment, isolation, and over-identification had a within-person effect on subsequent PTSD symptoms. These relationships were independent of therapy form. The within-person relationship between self-judgment and subsequent PTSD symptoms was stronger in patients with higher initial self-judgment. By contrast, there were few indications that within-person variations in PTSD symptoms predict subsequent self-compassion components. Conclusion: The results support the role of self-compassion components in maintaining PTSD and imply the recommendation to facilitate decrease of self-judgment, isolation, and over-identification and increase of self-kindness in the treatment of PTSD patients. The reduction of self-judgment appears to be most important, especially for patients with a high initial level of self-judgment.

  10. The NNSYSID Toolbox - A MATLAB Toolbox for System Identification with Neural Networks

    DEFF Research Database (Denmark)

    Nørgård, Peter Magnus; Ravn, Ole; Hansen, Lars Kai

    1996-01-01

    To assist the identification of nonlinear dynamic systems, a set of tools has been developed for the MATLAB(R) environment. The tools include a number of different model structures, highly effective training algorithms, functions for validating trained networks, and pruning algorithms for determi......To assist the identification of nonlinear dynamic systems, a set of tools has been developed for the MATLAB(R) environment. The tools include a number of different model structures, highly effective training algorithms, functions for validating trained networks, and pruning algorithms...

  11. Operational modal analysis and wavelet transformation for damage identification in wind turbine blades

    DEFF Research Database (Denmark)

    Ulriksen, Martin Dalgaard; Tcherniak, Dmitri; Kirkegaard, Poul Henning

    2014-01-01

    The presented study demonstrates an application of a previously proposed modal and wavelet analysis-based damage identification method to a wind turbine blade. A trailing edge debonding was introduced to a SSP 34m blade mounted on a test rig. Operational modal analysis (OMA) was conducted to obtain...... are captured in the CWT by significantly magnified transform coefficients, thus providing combined damage detection, localization, and size assessment. It was found that due to the nature of the proposed method, the value of the identification results highly depends on the number of employed measurement points....... Since only a limited number of measurement points were utilized in the experiments, valid damage identification can only be obtained when employing high-frequency modes....

  12. Image Guided Virtual Autopsy: An Adjunct with Radiographic and Computed Tomography Modalities - An Important Tool in Forensic Identification

    Directory of Open Access Journals (Sweden)

    Shalu Rai

    2017-01-01

    Full Text Available The forensic examination of dead bodies is very helpful in order to identify the person, cause of death, gender, and solving the mysterious cases. It includes a number of techniques, out of which autopsy is the primary investigation that is performed in every medicolegal case. Because of mutilation technologies, traditional autopsy technique is most disturbing in terms of emotions and rituals of relatives. The use of radiology in forensic science comprises performance, interpretation, and reporting of radiographs that is helpful in detecting those changes that are not clinically visible. Forensic radiology plays an important role for identification of humans in mass disasters, criminal investigations, and evaluation of cause of death. The introduction of radiological modalities in autopsy techniques is a complementary tool for forensic identification and is known as virtual autopsy. The advance imaging techniques such as computed tomography (CT and magnetic resonance imaging (MRI is used in virtual autopsy in order to visualize and reconstruct the internal organs to know the site, type, and depth of injury. This review elaborates the role of maxillofacial imaging in image-guided virtual autopsy.

  13. Personality types and Facebook advertising::an exploratory study

    OpenAIRE

    Clark, Lillian; Calli, Levent

    2014-01-01

    The Five-Factor Model of personality types has been utilized by a number of computer science and psychology academics as a framework to explore aspects of internet adoption and, more recently, social media adoption and behaviours. While the use of personality type models in research has been less popular with marketing academics, the Five-Factor Model has been used to predict the emotional appeal of advertising based on personality types and potentially to provide guidelines for tailoring adv...

  14. Feature interpretability and the positions of 2nd person possessives in Brazilian Portuguese

    Directory of Open Access Journals (Sweden)

    Bruna Karla Pereira

    2016-12-01

    Full Text Available Interpretability and valuation of φ-features (Chomsky, 2001; Pesetsky and Torrego, 2007 have played a central role in the investigation of language universals. With regard to that, in standard Brazilian Portuguese (BP, as well as in other Romance languages, possessives have uninterpretable number features, which are valued via nominal agreement. However, dialects of BP, especially the one spoken in Minas Gerais, have shown that 2nd person possessives, in postnominal position, do not have number agreement with the noun. In order to account for these facts, I will argue that, in this grammar, number features on 2nd person possessives are reanalyzed as being: (i associated with the person (rather than the noun and (ii interpretable. From the first postulation, ‘seu’ is expected to be the possessive for 2nd person singular, and ‘seus’ for 2nd person plural. From the second postulation, no number concord is expected to be triggered on the possessive. In addition, based on Danon (2011 and Norris (2014, I will argue that cardinals divide BP DPs into two domains in that phrases located above NumP are marked with the plural morpheme, while phrases below it are unmarked. In this sense, because prenominal possessives precede cardinals (NumP, they must be marked with the plural morpheme for nominal agreement; whereas postnominal possessives, which follow NumP, must be unmarked. Free from the plural marking associated with nominal agreement, postnominal 2nd person possessives favor the reanalysis of the morpheme ‘-s’ as indicating the number associated with person features.

  15. 47 CFR 74.1283 - Station identification.

    Science.gov (United States)

    2010-10-01

    ... translator's call letters and location, giving the name, address and telephone number of the licensee or his... FM Broadcast Booster Stations § 74.1283 Station identification. (a) The call sign of an FM broadcast... requests for the assignment of particular combinations of letters will not be considered. (b) The call sign...

  16. Realtime Observation, Identification and Tracking from dangerous persons in airports - a logistics system ROIT

    Directory of Open Access Journals (Sweden)

    Bernd Hentschel

    2013-09-01

    Full Text Available Background: The aim of this paper is to present and analyze a new method of the logistics disaster management and concentrates particularly on terrorist attacks of CBRN type (C - chemical attack/weapon, B - biological attack/weapon, R - radiological attack/weapon, N - nuclear attack/weapon at the airports. Each of the aforementioned is an issue of great importance and high priority for the airport communication.                                                                   Methods: The research of a ROIT project (Realtime Observation, Identification and Tracking from dangerous people in airports has been conducted in a way that enables the application of the three-step computer system. The program has been configured to identify, observe and protect from undesired actions of people suspected of involvement in CBRN. Results: The main results of applying the device in different scenarios are: enabling reliable automatic identification and classification of potentially hazardous materials and substances, association of the materials with their owners or distributors.                                                                            Conclusion: Simultaneous passing information to the airport security guards, police and expert team guarantees that further purposes involve the independent opportunity to observe in real time the CBRN suspects as well as to eliminate them secretly and quickly from the rest of airport passengers after thorough and credible identification.

  17. Sparse regularization for force identification using dictionaries

    Science.gov (United States)

    Qiao, Baijie; Zhang, Xingwu; Wang, Chenxi; Zhang, Hang; Chen, Xuefeng

    2016-04-01

    The classical function expansion method based on minimizing l2-norm of the response residual employs various basis functions to represent the unknown force. Its difficulty lies in determining the optimum number of basis functions. Considering the sparsity of force in the time domain or in other basis space, we develop a general sparse regularization method based on minimizing l1-norm of the coefficient vector of basis functions. The number of basis functions is adaptively determined by minimizing the number of nonzero components in the coefficient vector during the sparse regularization process. First, according to the profile of the unknown force, the dictionary composed of basis functions is determined. Second, a sparsity convex optimization model for force identification is constructed. Third, given the transfer function and the operational response, Sparse reconstruction by separable approximation (SpaRSA) is developed to solve the sparse regularization problem of force identification. Finally, experiments including identification of impact and harmonic forces are conducted on a cantilever thin plate structure to illustrate the effectiveness and applicability of SpaRSA. Besides the Dirac dictionary, other three sparse dictionaries including Db6 wavelets, Sym4 wavelets and cubic B-spline functions can also accurately identify both the single and double impact forces from highly noisy responses in a sparse representation frame. The discrete cosine functions can also successfully reconstruct the harmonic forces including the sinusoidal, square and triangular forces. Conversely, the traditional Tikhonov regularization method with the L-curve criterion fails to identify both the impact and harmonic forces in these cases.

  18. System Identification for Integrated Aircraft Development and Flight Testing (l’Identification des systemes pour le developpement integre des aeronefs et les essais en vol)

    Science.gov (United States)

    1999-03-01

    aerodynamics to affect load motions. The effects include a load trail angle in proportion to the drag specific force, and modification of the load pendulum...equations algorithm for flight data filtering architeture . and data consistency checking; and SCIDNT 8, an output architecture. error identification...accelerations at the seven sensor locations, identified system is proportional to the number When system identification is performed, as of flexible modes

  19. Identification of the unidentified deceased and locating next of kin: experience with a UID web site page, Fulton County, Georgia.

    Science.gov (United States)

    Hanzlick, Randy

    2006-06-01

    Medical examiner and coroner offices may face difficulties in trying to achieve identification of deceased persons who are unidentified or in locating next of kin for deceased persons who have been identified. The Fulton County medical examiner (FCME) has an office web site which includes information about unidentified decedents and cases for which next of kin are being sought. Information about unidentified deceased and cases in need of next of kin has been posted on the FCME web site for 3 years and 1 year, respectively. FCME investigators and staff medical examiners were surveyed about the web site's usefulness for making identifications and locating next of kin. No cases were recalled in which the web site led to making an identification. Two cases were reported in which next of kin were located, and another case involved a missing person being ruled out as one of the decedents. The web site page is visited by agencies interested in missing and unidentified persons, and employees do find it useful for follow-up because information about all unidentified decedents is located and easily accessible, electronically, in a single location. Despite low yield in making identifications and locating next of kin, the UID web site is useful in some respects, and there is no compelling reason to discontinue its existence. It is proposed that UID pages on office web sites be divided into "hot" (less than 30 days, for example) and "warm" (31 days to 1 year, for example) cases and that cases older than a year be designated as "cold cases." It is conceivable that all unidentified deceased cases nationally could be placed on a single web site designed for such purposes, to remain in public access until identity is established and confirmed.

  20. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  1. Automatic system for localization and recognition of vehicle plate numbers

    OpenAIRE

    Vázquez, N.; Nakano, M.; Pérez-Meana, H.

    2003-01-01

    This paper proposes a vehicle numbers plate identification system, which extracts the characters features of a plate from a captured image by a digital camera. Then identify the symbols of the number plate using a multilayer neural network. The proposed recognition system consists of two processes: The training process and the recognition process. During the training process, a database is created using 310 vehicular plate images. Then using this database a multilayer neural network is traine...

  2. Finger vein recognition with personalized feature selection.

    Science.gov (United States)

    Xi, Xiaoming; Yang, Gongping; Yin, Yilong; Meng, Xianjing

    2013-08-22

    Finger veins are a promising biometric pattern for personalized identification in terms of their advantages over existing biometrics. Based on the spatial pyramid representation and the combination of more effective information such as gray, texture and shape, this paper proposes a simple but powerful feature, called Pyramid Histograms of Gray, Texture and Orientation Gradients (PHGTOG). For a finger vein image, PHGTOG can reflect the global spatial layout and local details of gray, texture and shape. To further improve the recognition performance and reduce the computational complexity, we select a personalized subset of features from PHGTOG for each subject by using the sparse weight vector, which is trained by using LASSO and called PFS-PHGTOG. We conduct extensive experiments to demonstrate the promise of the PHGTOG and PFS-PHGTOG, experimental results on our databases show that PHGTOG outperforms the other existing features. Moreover, PFS-PHGTOG can further boost the performance in comparison with PHGTOG.

  3. Finger Vein Recognition with Personalized Feature Selection

    Directory of Open Access Journals (Sweden)

    Xianjing Meng

    2013-08-01

    Full Text Available Finger veins are a promising biometric pattern for personalized identification in terms of their advantages over existing biometrics. Based on the spatial pyramid representation and the combination of more effective information such as gray, texture and shape, this paper proposes a simple but powerful feature, called Pyramid Histograms of Gray, Texture and Orientation Gradients (PHGTOG. For a finger vein image, PHGTOG can reflect the global spatial layout and local details of gray, texture and shape. To further improve the recognition performance and reduce the computational complexity, we select a personalized subset of features from PHGTOG for each subject by using the sparse weight vector, which is trained by using LASSO and called PFS-PHGTOG. We conduct extensive experiments to demonstrate the promise of the PHGTOG and PFS-PHGTOG, experimental results on our databases show that PHGTOG outperforms the other existing features. Moreover, PFS-PHGTOG can further boost the performance in comparison with PHGTOG.

  4. Primary Identification Methods and their Effectiveness in Mass Disaster Situations: A Literature Review

    Directory of Open Access Journals (Sweden)

    Naiara M. Gaglietti

    2017-06-01

    Full Text Available Mass disasters generally result in an elevated number of casualties that need identification. The primary identification methods listed by INTERPOL (DNA, fingerprint and forensic dentistry have a very important role in helping and speeding up the victim identification process. The present study sought to report mass destruction cases found in the literature published from 2005 to 2015 that have used the primary human identification methods. This study has been done as a literature review using the keywords: disasters, natural disasters, disaster victims, and human identification in a total of 16 selected papers and 13 listed disasters. It has been concluded that the primary identification methods are capable and efficient to perform a safe and satisfactory identification of mass disasters victims, used both separately or in combination.

  5. Persons with Multiple Disabilities Use Orientation Technology to Find Room Entrances during Indoor Traveling

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Scigliuzzo, Francesca; Signorino, Mario; Oliva, Doretta; Smaldone, Angela; La Martire, Maria L.

    2010-01-01

    These two studies assessed adapted orientation technology for promoting correct direction and room identification during indoor traveling by persons with multiple (e.g., sensory, motor and intellectual/adaptive) disabilities. In Study I, two adults were included who had severe visual impairment or total blindness and deafness and used a wheelchair…

  6. A true random number generator based on mouse movement and chaotic cryptography

    International Nuclear Information System (INIS)

    Hu Yue; Liao Xiaofeng; Wong, Kwok-wo; Zhou Qing

    2009-01-01

    True random number generators are in general more secure than pseudo random number generators. In this paper, we propose a novel true random number generator which generates a 256-bit random number by computer mouse movement. It is cheap, convenient and universal for personal computers. To eliminate the effect of similar movement patterns generated by the same user, three chaos-based approaches, namely, discretized 2D chaotic map permutation, spatiotemporal chaos and 'MASK' algorithm, are adopted to post-process the captured mouse movements. Random bits generated by three users are tested using NIST statistical tests. Both the spatiotemporal chaos approach and the 'MASK' algorithm pass the tests successfully. However, the latter has a better performance in terms of efficiency and effectiveness and so is more practical for common personal computer applications.

  7. Service workers' job performance: the roles of personality traits, organizational identification, and customer orientation

    OpenAIRE

    He, Hongwei; Wang, Weiyue; Zhu, Weichun; Harris, Lloyd

    2015-01-01

    Purpose– This paper aims to advance the literature by testing the boundary of this relationship with reference to a key construct in employee performance in the service domain: employee customer orientation. Organizational identification refers to employees’ perceived oneness and belongingness to their work organization, and has been argued to be associated with higher employee performance.Design/methodology/approach– Data were collected based on a sample of call center service workers. Emplo...

  8. Differences in route-learning performance and correlations among abilities between persons with and without Down syndrome

    Directory of Open Access Journals (Sweden)

    Megan eDavis

    2014-12-01

    Full Text Available Two experiments are reported that evaluated route learning of youth with DS, youth with Intellectual Disability and not DS (ID, and typically developing children (TD matched on Mental Age (MA. In both experiments, participants learned routes with eight choice-points presented via computer. Several objects were placed along the route that could be used as landmarks. Participants were shown the correct route once and then were asked retraced the route without assistance. In Experiment 1 we found that the TD children and ID participants performed very similarly. They learned the route in the same number of attempts, committed the same number of errors while learning the route, and recalled approximately the same number of landmarks. The participants with DS performed significantly worse on both measures of navigation (attempts and errors and also recalled significantly fewer landmarks. In Experiment 2, we attempted to reduce TD and ID vs DS differences by focusing participants’ attention on the landmarks. Half of the participants in each group were instructed to identify the landmarks as they passed them the first time. The participants with DS again committed more errors than the participants in the ID and TD groups in the navigation task. In addition, they recalled fewer landmarks. While landmark identification improved landmark memory for both groups, it did not have a significant impact on navigation. Participants with DS still performed more poorly than did the TD and ID participants. Of additional interest, we observed that the performance of persons with DS correlated with different ability measures than did the performance of the other groups. The results the two experiments point to a problem in navigation for persons with DS that exceeds expectations based solely on intellectual level.

  9. Personalized translational epilepsy research - Novel approaches and future perspectives: Part I: Clinical and network analysis approaches.

    Science.gov (United States)

    Rosenow, Felix; van Alphen, Natascha; Becker, Albert; Chiocchetti, Andreas; Deichmann, Ralf; Deller, Thomas; Freiman, Thomas; Freitag, Christine M; Gehrig, Johannes; Hermsen, Anke M; Jedlicka, Peter; Kell, Christian; Klein, Karl Martin; Knake, Susanne; Kullmann, Dimitri M; Liebner, Stefan; Norwood, Braxton A; Omigie, Diana; Plate, Karlheinz; Reif, Andreas; Reif, Philipp S; Reiss, Yvonne; Roeper, Jochen; Ronellenfitsch, Michael W; Schorge, Stephanie; Schratt, Gerhard; Schwarzacher, Stephan W; Steinbach, Joachim P; Strzelczyk, Adam; Triesch, Jochen; Wagner, Marlies; Walker, Matthew C; von Wegner, Frederic; Bauer, Sebastian

    2017-11-01

    Despite the availability of more than 15 new "antiepileptic drugs", the proportion of patients with pharmacoresistant epilepsy has remained constant at about 20-30%. Furthermore, no disease-modifying treatments shown to prevent the development of epilepsy following an initial precipitating brain injury or to reverse established epilepsy have been identified to date. This is likely in part due to the polyetiologic nature of epilepsy, which in turn requires personalized medicine approaches. Recent advances in imaging, pathology, genetics and epigenetics have led to new pathophysiological concepts and the identification of monogenic causes of epilepsy. In the context of these advances, the First International Symposium on Personalized Translational Epilepsy Research (1st ISymPTER) was held in Frankfurt on September 8, 2016, to discuss novel approaches and future perspectives for personalized translational research. These included new developments and ideas in a range of experimental and clinical areas such as deep phenotyping, quantitative brain imaging, EEG/MEG-based analysis of network dysfunction, tissue-based translational studies, innate immunity mechanisms, microRNA as treatment targets, functional characterization of genetic variants in human cell models and rodent organotypic slice cultures, personalized treatment approaches for monogenic epilepsies, blood-brain barrier dysfunction, therapeutic focal tissue modification, computational modeling for target and biomarker identification, and cost analysis in (monogenic) disease and its treatment. This report on the meeting proceedings is aimed at stimulating much needed investments of time and resources in personalized translational epilepsy research. Part I includes the clinical phenotyping and diagnostic methods, EEG network-analysis, biomarkers, and personalized treatment approaches. In Part II, experimental and translational approaches will be discussed (Bauer et al., 2017) [1]. Copyright © 2017 Elsevier Inc

  10. Molecular identification of tsetse fly (Diptera: Glossinidae) species ...

    African Journals Online (AJOL)

    Christopher

    2015-05-13

    May 13, 2015 ... plates (Bauer and Wetzel, 1976). The blood is usually collected ... number of males and females, although sex was not considerd in the identification. .... Basic local alignment search tool (BLAST) of the DNA sequences of COII ...

  11. Estimate of person-years at risk among A-bomb survivors, Hiroshima and Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Hrubec, Z

    1964-11-19

    Using information from the Supplementary Schedules of the 1950 National Census and from the JNIH-ABCC Life Span Study, cumulative person-years at risk in 1950 to 1960 were estimated by age ATB, sex, distance from hypocenter, radiation dose and symptoms for A-bomb survivors resident in Hiroshima and Nagasaki cities. The number of person-years at risk in 1951 to 1958 was estimated by applying the survivorship in each age group of the Adult Health Study sample during the period 1951 to 1958 to the number of survivors in 1950. To determine the number of person-years at risk from 1959 to 1960, the average yearly loss was evaluated for each exposure group for the period 1955 to 1958 in Hiroshima and for 1953 to 1958 in Nagasaki which was then applied to 1959 and 1960, respectively. The estimate of person-years among the nonexposed groups for this period was obtained from the above estimates, the total population of both cities, and the number of persons born after the A-bombing. Estimates by other associated factors were obtained by the same procedure. 20 references, 25 tables.

  12. World Epidemiology Review, Number 109.

    Science.gov (United States)

    1978-10-11

    infantilism, "lung color," monale, followed by cardiac deficiency, cyanosis, intestinal stenosis ; glomerulonephritis and neurological symptoms. Many...Bursa were infected by rabid dogs and cats. The following breakdown was given for the number of persons infected during the succeeding 7 months of...area it is much more difficult to save his life. One of the six dogs taken into custody under the suspicion of being rabid during the past 8 months

  13. Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion

    Directory of Open Access Journals (Sweden)

    Long Binh Tran

    2017-01-01

    Full Text Available In this paper, the authors present a novel personal verification system based on the likelihood ratio test for fusion of match scores from multiple biometric matchers (face, fingerprint, hand shape, and palm print. In the proposed system, multimodal features are extracted by Zernike Moment (ZM. After matching, the match scores from multiple biometric matchers are fused based on the likelihood ratio test. A finite Gaussian mixture model (GMM is used for estimating the genuine and impostor densities of match scores for personal verification. Our approach is also compared to some different famous approaches such as the support vector machine and the sum rule with min-max. The experimental results have confirmed that the proposed system can achieve excellent identification performance for its higher level in accuracy than different famous approaches and thus can be utilized for more application related to person verification.

  14. Personality, functioning, and recovery from major depression.

    Science.gov (United States)

    Casey, P; Meagher, D; Butler, E

    1996-04-01

    The effect of personality on the effectiveness of electroconvulsive therapy in those with severe depressive illness has been investigated in a few studies, and the results are conflicting, with some demonstrating no effect and others the opposite. These studies, however, used hospital readmission as the only outcome measure, and the methods of personality assessment varied. To study this question in further detail, 40 patients were assessed while receiving inpatient electroconvulsive therapy, at the time of discharge, every 6 weeks for 6 months, and at 1 year after discharge. A number of outcome variables were assessed, including both symptomatic and social functioning measures as well as readmission to hospital. Premorbid personality was also assessed after discharge. The results demonstrate that personality is a predictor of social function at the time of discharge from hospital. In those patients with personality disorders, social recovery is slower than in those with normal personalities. Personality status did not distinguish the speed of symptomatic recovery or of readmission. The significance of these findings is discussed.

  15. Creativity-Relevant Personal Characteristics among Indonesia Creative Workers

    Directory of Open Access Journals (Sweden)

    Nugroho J. Setiadi

    2014-09-01

    Full Text Available The study aims to identify Creativity-relevant Personal Characteristics among creative workers in Indonesia’s creative industry. Identification of the constituent elements of the nature of the changes needs to be measured. Researchers have advocated replacing creativity-relevant personal characteristics based on the five-factor model to investigate how individual differences stimulate creativity. This study presents data supporting reliability (internal consistency and validity (criterion and construct of the instrument. Validity of the instrument is based on the content validity involving art and design experts. The 220 creative workers from several creative industry firms in Indonesia participated as samples in this research. Results of a factor analysis indicated a five factor solution of creative characteristics and behavior. Discussion of findings and the most important ways in which individuals differ in their enduring emotional, interpersonal, experiential, attitudinal, and motivational styles for stimulating creativity are presented.

  16. Assessment of various parameters to improve MALDI-TOF MS reference spectra libraries constructed for the routine identification of filamentous fungi.

    Science.gov (United States)

    Normand, Anne-Cécile; Cassagne, Carole; Ranque, Stéphane; L'ollivier, Coralie; Fourquet, Patrick; Roesems, Sam; Hendrickx, Marijke; Piarroux, Renaud

    2013-04-08

    The poor reproducibility of matrix-assisted desorption/ionization time-of-flight (MALDI-TOF) spectra limits the effectiveness of the MALDI-TOF MS-based identification of filamentous fungi with highly heterogeneous phenotypes in routine clinical laboratories. This study aimed to enhance the MALDI-TOF MS-based identification of filamentous fungi by assessing several architectures of reference spectrum libraries. We established reference spectrum libraries that included 30 filamentous fungus species with various architectures characterized by distinct combinations of the following: i) technical replicates, i.e., the number of analyzed deposits for each culture used to build a reference meta-spectrum (RMS); ii) biological replicates, i.e., the number of RMS derived from the distinct subculture of each strain; and iii) the number of distinct strains of a given species. We then compared the effectiveness of each library in the identification of 200 prospectively collected clinical isolates, including 38 species in 28 genera.Identification effectiveness was improved by increasing the number of both RMS per strain (plibrary markedly improved the effectiveness of the MALDI-TOF MS-based identification of clinical filamentous fungi.

  17. Time-activity relationships to VOC personal exposure factors

    Science.gov (United States)

    Edwards, Rufus D.; Schweizer, Christian; Llacqua, Vito; Lai, Hak Kan; Jantunen, Matti; Bayer-Oglesby, Lucy; Künzli, Nino

    Social and demographic factors have been found to play a significant role in differences between time-activity patterns of population subgroups. Since time-activity patterns largely influence personal exposure to compounds as individuals move across microenvironments, exposure subgroups within the population may be defined by factors that influence daily activity patterns. Socio-demographic and environmental factors that define time-activity subgroups also define quantifiable differences in VOC personal exposures to different sources and individual compounds in the Expolis study. Significant differences in exposures to traffic-related compounds ethylbenzene, m- and p-xylene and o-xylene were observed in relation to gender, number of children and living alone. Categorization of exposures further indicated time exposed to traffic at work and time in a car as important determinants. Increased exposures to decane, nonane and undecane were observed for males, housewives and self-employed. Categorization of exposures indicated exposure subgroups related to workshop use and living downtown. Higher exposures to 3-carene and α-pinene commonly found in household cleaning products and fragrances were associated with more children, while exposures to traffic compounds ethylbenzene, m- and p-xylene and o-xylene were reduced with more children. Considerable unexplained variation remained in categorization of exposures associated with home product use and fragrances, due to individual behavior and product choice. More targeted data collection methods in VOC exposure studies for these sources should be used. Living alone was associated with decreased exposures to 2-methyl-1-propanol and 1-butanol, and traffic-related compounds. Identification of these subgroups may help to reduce the large amount of unexplained variation in VOC exposure studies. Further they may help in assessing impacts of urban planning that result in changes in behavior of individuals, resulting in shifts in

  18. Gene identification in the congenital disorders of glycosylation type I by whole-exome sequencing

    NARCIS (Netherlands)

    Timal, Sharita; Hoischen, Alexander; Lehle, Ludwig; Adamowicz, Maciej; Huijben, Karin; Sykut-Cegielska, Jolanta; Paprocka, Justyna; Jamroz, Ewa; van Spronsen, Francjan J.; Koerner, Christian; Gilissen, Christian; Rodenburg, Richard J.; Eidhof, Ilse; Van den Heuvel, Lambert; Thiel, Christian; Wevers, Ron A.; Morava, Eva; Veltman, Joris; Lefeber, Dirk J.

    2012-01-01

    Congenital disorders of glycosylation type I (CDG-I) form a growing group of recessive neurometabolic diseases. Identification of disease genes is compromised by the enormous heterogeneity in clinical symptoms and the large number of potential genes involved. Until now, gene identification included

  19. Development of Personalized Cancer Therapy for Men with Advanced Prostate Cancer

    Science.gov (United States)

    2017-10-01

    AWARD NUMBERS: W81XWH-14-1-0554 TITLE: Development of Personalized Cancer Therapy for Men with Advanced Prostate Cancer PRINCIPAL INVESTIGATOR...Dr. Nora M. Navone CONTRACTING ORGANIZATION: The University of Texas MD Anderson Cancer Center 1515 Holcombe Blvd. Houston, TX 77030-4009...COVERED 09/22/2016-09/21/2017 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER N/A Development of Personalized Cancer Therapy for Men with Advanced

  20. A new disaster victim identification management strategy targeting "near identification-threshold" cases: Experiences from the Boxing Day tsunami.

    Science.gov (United States)

    Wright, Kirsty; Mundorff, Amy; Chaseling, Janet; Forrest, Alexander; Maguire, Christopher; Crane, Denis I

    2015-05-01

    The international disaster victim identification (DVI) response to the Boxing Day tsunami, led by the Royal Thai Police in Phuket, Thailand, was one of the largest and most complex in DVI history. Referred to as the Thai Tsunami Victim Identification operation, the group comprised a multi-national, multi-agency, and multi-disciplinary team. The traditional DVI approach proved successful in identifying a large number of victims quickly. However, the team struggled to identify certain victims due to incomplete or poor quality ante-mortem and post-mortem data. In response to these challenges, a new 'near-threshold' DVI management strategy was implemented to target presumptive identifications and improve operational efficiency. The strategy was implemented by the DNA Team, therefore DNA kinship matches that just failed to reach the reporting threshold of 99.9% were prioritized, however the same approach could be taken by targeting, for example, cases with partial fingerprint matches. The presumptive DNA identifications were progressively filtered through the Investigation, Dental and Fingerprint Teams to add additional information necessary to either strengthen or conclusively exclude the identification. Over a five-month period 111 victims from ten countries were identified using this targeted approach. The new identifications comprised 87 adults, 24 children and included 97 Thai locals. New data from the Fingerprint Team established nearly 60% of the total near-threshold identifications and the combined DNA/Physical method was responsible for over 30%. Implementing the new strategy, targeting near-threshold cases, had positive management implications. The process initiated additional ante-mortem information collections, and established a much-needed, distinct "end-point" for unresolved cases. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.