WorldWideScience

Sample records for suspicious concealed object

  1. Examination of suspicious objects by virus analysts

    Science.gov (United States)

    Ananin, E. V.; Ananina, I. S.; Nikishova, A. V.

    2018-05-01

    The paper presents data on virus threats urgency. But in order for antiviruses to work properly, all data on new implementations of viruses should be added to its database. For that to be done, all suspicious objects should be investigated. It is a dangerous process and should be done in the virtual system. However, it is not secure for the main system as well. So the diagram of a secure workplace for a virus analyst is proposed. It contains software for its protection. Also all kinds of setting to ensure security of the process of investigating suspicious objects are proposed. The proposed approach allows minimizing risks caused by the virus.

  2. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    Science.gov (United States)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  3. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  4. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  5. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    Science.gov (United States)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  6. Expanded opportunities of THz passive camera for the detection of concealed objects

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  7. SUSPICIOUS POST

    CERN Multimedia

    Relations with the Host States Service

    2001-01-01

    If you receive a suspicious letter or package in the post, please do not open it and contact the Fire Brigade Tel. 74444. They will contact the CERN Medical Service. This is especially important in today's current situation with regard to the Anthrax scare. For further information, the Permanent Mission of Switzerland to the International Organisations in Geneva recommends the following web sites:   http://www.admin.ch/ch/f/cf/brennpunkt/03.html http://www.who.int/emc-documents/zoonoses/whoemczdi986c.html

  8. Can methodological requirements be fulfilled when studying concealed or unethical research objects? The case of astroturfing

    Directory of Open Access Journals (Sweden)

    Sophie BOULAY

    2013-12-01

    Full Text Available Scientific soundness is key in the development of research designs. Methodological choices bear the responsibility to demonstrate its obtainment. However, it is challenging to abide by these standards while dealing with hidden, masked or unethical objects. In this article, we share the various strategies employed to aim at a sound scientific process in spite of astroturfing’s characteristics and of the methodological orientations it dictates. Facing the dilemma between the importance of scientific value and the richness of inductive and exploratory approaches, we question the influence of positivist research standards in communication studies. We fear these requirements may limit their development.

  9. Concealing with structured light.

    Science.gov (United States)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  10. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  11. Development and validation of the Body Concealment Scale for Scleroderma

    NARCIS (Netherlands)

    Jewett, L.R.; Malcarne, V.L.; Kwakkenbos, C.M.C.; Harcourt, D.; Rumsey, N.; Körner, A.; Steele, R.J.; Hudson, M.; Baron, M.; Haythornthwaite, J.A.; Heinberg, L.; Wigley, F.M.; Thombs, B.D.

    2016-01-01

    Objective: Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Methods: Initial items for the

  12. Concealed identification symbols and nondestructive determination of the identification symbols

    Science.gov (United States)

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  13. Induction detection of concealed bulk banknotes

    Science.gov (United States)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  14. Self-Concealment and Suicidal Behaviors

    Science.gov (United States)

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  15. Camouflage, Concealment, and Decoys

    Science.gov (United States)

    2010-11-26

    otherwise dull Note. Use canned milk or powdered eggs to increase the binding properties of field-expedient paints. RADAR-ABSORBING MATERIAL 3-72. RAM... falsification of evidence, inducing him to react in a manner prejudicial to his interests. decoy An imitation in any sense of a person, an object

  16. CT diagnosis of concealed rupture of intestine following abdominal trauma

    International Nuclear Information System (INIS)

    Ji Jiansong; Wei Tiemin; Wang Zufei; Zhao Zhongwei; Tu Jianfei; Fan Xiaoxi; Xu Min

    2009-01-01

    Objective: To investigate CT findings of concealed rupture of intestine following abdominal trauma. Methods: CT findings of 11 cases with concealed rupture of intestine following abdominal trauma proved by surgery were identified retrospectively. Results: The main special signs included: (1) Free air in 4 cases, mainly around injured small bowel or under the diaphragm, or in the retroperitoneal space or and in the lump. (2) High density hematoma between the intestines or in the bowel wall (4 cases). (3) Bowel wall injury sign, demonstrated as low density of the injured intestinal wall, attenuated locally but relatively enhanced in neighbor wall on enhanced CT. (4) Lump around the injured bowel wall with obvious ring-shaped enhancement (4 cases). Other signs included: (1) Free fluid in the abdominal cavity or between the intestines with blurred borders. (2) Bowel obstruction. Conclusion: CT is valuable in diagnosing concealed rupture of intestine following abdominal trauma. (authors)

  17. Induction detection of concealed bulk banknotes

    International Nuclear Information System (INIS)

    Fuller, Christopher; Chen, Antao

    2011-01-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects

  18. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  19. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  20. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  1. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  2. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  3. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  4. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  5. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  6. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  7. Minimising bias in the forensic evaluation of suspicious paediatric injury.

    Science.gov (United States)

    Skellern, Catherine

    2015-08-01

    In the rules of evidence in all legal jurisdictions, medical experts are required to maintain objectivity when providing opinions. When interpreting medical evidence, doctors must recognise, acknowledge and manage uncertainties to ensure their evidence is reliable to legal decision-makers. Even in the forensic sciences such as DNA analysis, implicit bias has been shown to influence how results are interpreted from cognitive and contextual biases unconsciously operating. In cases involving allegations of child abuse there has been significant exposure in the media, popular magazines, legal journals and in the published medical literature debating the reliability of medical evidence given in these proceedings. In these cases judges have historically been critical of experts they perceived had sacrificed objectivity for advocacy by having an investment in a 'side'. This paper firstly discusses the issue of bias then describes types of cognitive biases identified from psychological research applied to forensic evidence including adversarial bias, context bias, confirmation bias and explains how terminology can influence the communication of opinion. It follows with previously published guidelines of how to reduce the risk of bias compromising objectivity in forensic practices then concludes with my own recommendations of practices that can be used by child protection paediatricians and within an organisation when conducting forensic evaluations of suspicious childhood injury to improve objectivity in formulation of opinion evidence. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  8. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  9. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  12. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  13. Intra- and interpersonal consequences of experimentally induced concealment

    NARCIS (Netherlands)

    Bouman, T.K.

    2003-01-01

    Secrecy, concealment, and thought supression are assumed to be important aspects of psychopathology. However, most studies address these from an intrapersonal perspective. This study investigates both the intra- as well as the interpersonal consequences of experimentally induced concealment. Two

  14. Flow detection via sparse frame analysis for suspicious event recognition in infrared imagery

    Science.gov (United States)

    Fernandes, Henrique C.; Batista, Marcos A.; Barcelos, Celia A. Z.; Maldague, Xavier P. V.

    2013-05-01

    It is becoming increasingly evident that intelligent systems are very bene¯cial for society and that the further development of such systems is necessary to continue to improve society's quality of life. One area that has drawn the attention of recent research is the development of automatic surveillance systems. In our work we outline a system capable of monitoring an uncontrolled area (an outside parking lot) using infrared imagery and recognizing suspicious events in this area. The ¯rst step is to identify moving objects and segment them from the scene's background. Our approach is based on a dynamic background-subtraction technique which robustly adapts detection to illumination changes. It is analyzed only regions where movement is occurring, ignoring in°uence of pixels from regions where there is no movement, to segment moving objects. Regions where movement is occurring are identi¯ed using °ow detection via sparse frame analysis. During the tracking process the objects are classi¯ed into two categories: Persons and Vehicles, based on features such as size and velocity. The last step is to recognize suspicious events that may occur in the scene. Since the objects are correctly segmented and classi¯ed it is possible to identify those events using features such as velocity and time spent motionless in one spot. In this paper we recognize the suspicious event suspicion of object(s) theft from inside a parked vehicle at spot X by a person" and results show that the use of °ow detection increases the recognition of this suspicious event from 78:57% to 92:85%.

  15. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  16. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  17. 12 CFR 21.11 - Suspicious Activity Report.

    Science.gov (United States)

    2010-01-01

    ... or a suspicious transaction related to a money laundering activity or a violation of the Bank Secrecy... of suspects. (4) Transactions aggregating $5,000 or more that involve potential money laundering or...

  18. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  19. Thyroid nodules with highly suspicious ultrasonographic features, but with benign cytology on two occasions: is malignancy still possible?

    International Nuclear Information System (INIS)

    Rosario, Pedro Weslley; Calsolari, Maria Regina

    2016-01-01

    There is no information about the frequency of malignancy specifically in the case of thyroid nodules with highly suspicious sonographic features, but with two fine needle aspiration (FNA) showing benign cytology. This was the objective of the study. Subjects and methods: We report the results of 105 patients with thyroid nodules considered 'highly suspicious' according to the ultrasonographic classification of American Thyroid Association, in whom FNA revealed benign cytology on two occasions (interval of 6 months). Results: Thyroidectomy was performed in 11 cases due to desire of the patient or significant growth of the nodule. In these patients, cytology continued to be benign in 9, was non-diagnostic in 1, and suspicious in 1. Histology revealed papillary carcinoma in only one nodule. In patients in whom a third FNA was obtained for this study (n = 94), cytology continued to be benign in 86, became non-diagnostic in 5, indeterminate in 2, and suspicious in 1. The last 8 patients (with non-benign cytology) were submitted to thyroidectomy and histology revealed malignancy in only one nodule. Conclusion: The rate of malignancy found here for nodules with highly suspicious sonographic features, even after two FNA showing benign cytology, was 2%. We believe that in these cases, the continuation of follow-up consisting of ultrasound at intervals of 2 years may still be adequate. (author)

  20. Thyroid nodules with highly suspicious ultrasonographic features, but with benign cytology on two occasions: is malignancy still possible?

    Energy Technology Data Exchange (ETDEWEB)

    Rosario, Pedro Weslley; Calsolari, Maria Regina, E-mail: pedrowsrosario@gmail.com [Santa Casa de Belo Horizonte, MG (Brazil)

    2016-11-01

    There is no information about the frequency of malignancy specifically in the case of thyroid nodules with highly suspicious sonographic features, but with two fine needle aspiration (FNA) showing benign cytology. This was the objective of the study. Subjects and methods: We report the results of 105 patients with thyroid nodules considered 'highly suspicious' according to the ultrasonographic classification of American Thyroid Association, in whom FNA revealed benign cytology on two occasions (interval of 6 months). Results: Thyroidectomy was performed in 11 cases due to desire of the patient or significant growth of the nodule. In these patients, cytology continued to be benign in 9, was non-diagnostic in 1, and suspicious in 1. Histology revealed papillary carcinoma in only one nodule. In patients in whom a third FNA was obtained for this study (n = 94), cytology continued to be benign in 86, became non-diagnostic in 5, indeterminate in 2, and suspicious in 1. The last 8 patients (with non-benign cytology) were submitted to thyroidectomy and histology revealed malignancy in only one nodule. Conclusion: The rate of malignancy found here for nodules with highly suspicious sonographic features, even after two FNA showing benign cytology, was 2%. We believe that in these cases, the continuation of follow-up consisting of ultrasound at intervals of 2 years may still be adequate. (author)

  1. A Concealed Information Test with multimodal measurement.

    Science.gov (United States)

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  2. Objectivity

    CERN Document Server

    Daston, Lorraine

    2010-01-01

    Objectivity has a history, and it is full of surprises. In Objectivity, Lorraine Daston and Peter Galison chart the emergence of objectivity in the mid-nineteenth-century sciences--and show how the concept differs from its alternatives, truth-to-nature and trained judgment. This is a story of lofty epistemic ideals fused with workaday practices in the making of scientific images. From the eighteenth through the early twenty-first centuries, the images that reveal the deepest commitments of the empirical sciences--from anatomy to crystallography--are those featured in scientific atlases, the compendia that teach practitioners what is worth looking at and how to look at it. Galison and Daston use atlas images to uncover a hidden history of scientific objectivity and its rivals. Whether an atlas maker idealizes an image to capture the essentials in the name of truth-to-nature or refuses to erase even the most incidental detail in the name of objectivity or highlights patterns in the name of trained judgment is a...

  3. Suspicious amorphous microcalcifications detected on full-field digital mammography: correlation with histopathology

    Directory of Open Access Journals (Sweden)

    Vera Christina Camargo de Siqueira Ferreira

    2018-03-01

    Full Text Available Abstract Objective: To evaluate suspicious amorphous calcifications diagnosed on full-field digital mammography (FFDM and establish correlations with histopathology findings. Materials and Methods: This was a retrospective study of 78 suspicious amorphous calcifications (all classified as BI-RADS® 4 detected on FFDM. Vacuum-assisted breast biopsy (VABB was performed. The histopathological classification of VABB core samples was as follows: pB2 (benign; pB3 (uncertain malignant potential; pB4 (suspicion of malignancy; and pB5 (malignant. Treatment was recommended for pB5 lesions. To rule out malignancy, surgical excision was recommended for pB3 and pB4 lesions. Patients not submitted to surgery were followed for at least 6 months. Results: Among the 78 amorphous calcifications evaluated, the histopathological analysis indicated that 8 (10.3% were malignant/suspicious (6 classified as pB5 and 2 classified as pB4 and 36 (46.2% were benign (classified as pB2. The remaining 34 lesions (43.6% were classified as pB3: 33.3% were precursor lesions (atypical ductal hyperplasia, lobular neoplasia, or flat epithelial atypia and 10.3% were high-risk lesions. For the pB3 lesions, the underestimation rate was zero. Conclusion: The diagnosis of precursor lesions (excluding atypical ductal hyperplasia, which can be pB4 depending on the severity and extent of the lesion should not necessarily be considered indicative of underestimation of malignancy. Suspicious amorphous calcifications correlated more often with precursor lesions than with malignant lesions, at a ratio of 3:1.

  4. Concealed semantic and episodic autobiographical memory electrified.

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  5. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  6. Concealed semantic and episodic autobiographical memory electrified

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  7. Money laundering: correlation between risk assessment and suspicious transactions

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2013-06-01

    Full Text Available The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service.The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice.The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies.

  8. Computed tomography is not justified in every pediatric blunt trauma patient with a suspicious mechanism of injury.

    Science.gov (United States)

    Hershkovitz, Yehuda; Zoarets, Itai; Stepansky, Albert; Kozer, Eran; Shapira, Zahar; Klin, Baruch; Halevy, Ariel; Jeroukhimov, Igor

    2014-07-01

    Computed tomography (CT) has become an important tool for the diagnosis of intra-abdominal and chest injuries in patients with blunt trauma. The role of CT in conscious asymptomatic patients with a suspicious mechanism of injury remains controversial. This controversy intensifies in the management of pediatric blunt trauma patients, who are much more susceptible to radiation exposure. The objective of this study was to evaluate the role of abdominal and chest CT imaging in asymptomatic pediatric patients with a suspicious mechanism of injury. Forty-two pediatric patients up to 15 years old were prospectively enrolled. All patients presented with a suspicious mechanism of blunt trauma and multisystem injury. They were neurologically intact and had no signs of injury to the abdomen or chest. Patients underwent CT imaging of the chest and abdomen as part of the initial evaluation. Thirty-one patients (74%) had a normal CT scan. Two patients of 11 with an abnormal CT scan required a change in management and were referred for observation in the Intensive Care Unit. None of the patients required surgical intervention. The routine use of CT in asymptomatic pediatric patients with a suspicious mechanism of blunt trauma injury is not justified. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. Neural Correlates of Suspiciousness and Interactions with Anxiety during Emotional and Neutral Word Processing

    Directory of Open Access Journals (Sweden)

    Joscelyn E Fisher

    2014-06-01

    Full Text Available Suspiciousness is usually classified as a symptom of psychosis, but it also occurs in depression and anxiety disorders. Though how suspiciousness overlaps with depression is not obvious, suspiciousness does seem to overlap with anxious apprehension and anxious arousal (e.g., verbal iterative processes and vigilance about environmental threat. However, suspiciousness also has unique characteristics (e.g., concern about harm from others and vigilance about social threat. Given that both anxiety and suspiciousness have been associated with abnormalities in emotion processing, it is unclear whether it is the unique characteristics of suspiciousness or the overlap with anxiety that drive abnormalities in emotion processing.. Event-related brain potentials were obtained during an emotion-word Stroop task. Results indicated that suspiciousness interacts with anxious apprehension to modulate initial stimulus perception processes. Suspiciousness is associated with attention to all stimuli regardless of emotion content. In contrast, anxious arousal is associated with a later response to emotion stimuli only. These results suggest that suspiciousness and anxious apprehension share overlapping processes, but suspiciousness alone is associated with a hyperactive early vigilance response. Depression did not interact with suspiciousness to predict response to emotion stimuli. These findings suggest that it may be informative to assess suspiciousness in conjunction with anxiety in order to better understand how these symptoms interact and contribute to dysfunctional emotion processing.

  10. Schizotypy and mindfulness: Magical thinking without suspiciousness characterizes mindfulness meditators

    Directory of Open Access Journals (Sweden)

    Elena Antonova

    2016-09-01

    Full Text Available Despite growing evidence for demonstrated efficacy of mindfulness in various disorders, there is a continuous concern about the relationship between mindfulness practice and psychosis. As schizotypy is part of the psychosis spectrum, we examined the relationship between long-term mindfulness practice and schizotypy in two independent studies. Study 1 included 24 experienced mindfulness practitioners (19 males from the Buddhist tradition (meditators and 24 meditation-naïve individuals (all males. Study 2 consisted of 28 meditators and 28 meditation-naïve individuals (all males. All participants completed the Schizotypal Personality Questionnaire (Raine, 1991, a self-report scale containing 9 subscales (ideas of reference, excessive social anxiety, magical thinking, unusual perceptual experiences, odd/eccentric behavior, no close friends, odd speech, constricted affect, suspiciousness. Participants of study 2 also completed the Five-Facet Mindfulness Questionnaire which assesses observing (Observe, describing (Describe, acting with awareness (Awareness, non-judging of (Non-judgment and non-reactivity to inner experience (Non-reactivity facets of trait mindfulness. In both studies, meditators scored significantly lower on suspiciousness and higher on magical thinking compared to meditation-naïve individuals and showed a trend towards lower scores on excessive social anxiety. Excessive social anxiety correlated negatively with Awareness and Non-judgment; and suspiciousness with Awareness, Non-judgment and Non-reactivity facets across both groups. The two groups did not differ in their total schizotypy score. We conclude that mindfulness practice is not associated with an overall increase in schizotypal traits. Instead, the pattern suggests that mindfulness meditation, particularly with an emphasis on the Awareness, Non-judgment and Non-reactivity aspects, may help to reduce suspiciousness and excessive social anxiety.

  11. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  13. Organizational Concealment: An Incentive of Reducing the Responsibility

    OpenAIRE

    Tajika, Tomoya

    2017-01-01

    We studyworkers’ incentives of reporting problems within an OLG organization consisting of a subordinate and a manager. The subordinate is responsible for reporting a problem, and the manager is responsible for solving the reported problem. The subordinate has an incentive to conceal a detected problem since if he reports it but the manager is too lazy to solve the problem, the responsibility is transferred to the subordinate since he becomes a manager in the next period. We show that conceal...

  14. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  15. Teaching preschool children to report suspicious packages to adults.

    Science.gov (United States)

    May, Michael E; Shayter, Ashley M; Schmick, Ayla; Barron, Becky; Doherty, Meghan; Johnson, Matthew

    2018-05-16

    Law enforcement agencies stress that public reporting of terror-related crime is the predominant means for disrupting these actions. However, schools may be unprepared because the majority of the populace may not understand the threat of suspicious materials or what to do when they are found on school grounds. The purpose of this study was to systematically teach preschool children to identify and report suspicious packages across three experiments. In the first experiment, we used multiple exemplar training to teach children to identify the characteristics of safe and unsafe packages. In the second experiment, we taught participants to identify the locations where packages should be considered unsafe. Finally, in the third experiment, we used behavioral skills training to teach participants to avoid touching unsafe packages, leave the area where they were located, and report their discovery to an adult. Results suggest the participants quickly developed these skills. Implications for safety skills in young school children are discussed. © 2018 Society for the Experimental Analysis of Behavior.

  16. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  17. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  18. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  19. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  20. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    The study emanates from the contentions of leaders of states, who, instead of promoting the ideals and values which promote social and political-coexistence, limit and conceal their views of leadership to some tribalistic, ethnocentric and self-serving idols, and by so doing, they cause a monumental harm to the polity. This is ...

  1. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  2. 76 FR 69204 - Anti-Money Laundering Program and Suspicious Activity Reporting Requirements for Housing...

    Science.gov (United States)

    2011-11-08

    ... 1506-AB14 Anti-Money Laundering Program and Suspicious Activity Reporting Requirements for Housing... enterprises as financial institutions for the purpose of requiring them to establish anti-money laundering... organizations to establish anti-money laundering programs and report suspicious activities is intended to help...

  3. 31 CFR 103.21 - Reports by casinos of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by casinos of suspicious....21 Reports by casinos of suspicious transactions. (a) General. (1) Every casino shall file with Fin... relevant to a possible violation of law or regulation. A casino may also file with FinCEN, by using the...

  4. Sonographic findings of thyroid cancer initially assessed as no suspicious malignancy

    International Nuclear Information System (INIS)

    Kim, Do Youn; Kang, Seok Seon; Ji, Eun Kyung; Kwon, Tae Hee; Park, Hae Lin; Shim, Jeong Yun

    2008-01-01

    To review the retrospective imaging findings of thyroid cancer initially assessed as no suspicious malignancy. Of 338 nodules confirmed to be thyroid cancer, this study included 38 patients with 39 nodules assessed as no suspicious malignancy on initial sonography. (mean age:39 years, 36 females and 2 males). We evaluated sonographic findings by shape, margin, echogenecity, calcification, cystic degeneration and peripheral hypoechoic rim retrospectively. We analyzed whether sonographic findings were different according to the size (standard:1 cm). The most frequent sonographic findings were avoid to round shape 90%, well-defined smooth margin 64%, hypoechogenecity 54%, no calcification 92%, no cystic degeneration 77% and peripheral hypoechoic rim 56%. Suspicious malignancy findings were taller than wide shape 10%, well-defined spiculated margin 36%, markedly hypoechogenecity 10% and microcalcifications 8%. Isoechogenecity, cystic degeneration and peripheral hypoechoic rim were common in 1 cm more than nodules. Well-defined spiculated margin was common in 1 cm less than nodules. In retrospective, 56% showed no suspicious malignancy finding. Although nodules assessed as no suspicious malignancy on initial US had many retrospectively suspicious malignancy findings, still many nodules showed no suspicious malignancy finding. Suspicious findings were ignored due to equivocal finding in small size, isoechogenecity, cystic degeneration or peripheral hypoechoic rim. We need careful observation

  5. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  6. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  7. A hybrid frame concealment algorithm for H.264/AVC.

    Science.gov (United States)

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  8. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  9. Suspiciousness and low self-esteem as predictors of misattributions of anger in schizophrenia spectrum disorders.

    Science.gov (United States)

    Lysaker, Paul Henry; Davis, Louanne Whitman; Tsai, Jack

    2009-04-30

    While it is widely recognized that many with schizophrenia have significant difficulties in correctly identifying the emotions of others, less is known about the causes and correlates of particular forms of misattribution, including mistakenly seeing anger in others. One possibility is that persons with high levels of suspiciousness and low levels of self-esteem are at risk to attribute their poor feelings about themselves to the malice of others. To explore this possibility, we identified 52 persons with a schizophrenia spectrum disorder who made significant numbers of errors on the Bell-Lysaker Emotional Recognition Test. We then performed a cluster analysis based on measures of suspiciousness from the Positive and Negative Syndrome Scale and self-esteem from the Rosenberg Self-Esteem Schedule, and found the following four groups: a) High Suspiciousness/High Self-Esteem; b) Mild Suspiciousness/High Self-Esteem; c) High Suspiciousness/Low Self-Esteem; and d) Minimal Suspiciousness/Low Self-Esteem. Comparisons between groups revealed that as predicted the High Suspiciousness/Low Self-Esteem group made significantly more misattributions of anger than other groups, even when levels of depression were controlled for statistically. Implications for addressing the misattributions of anger in schizophrenia are discussed.

  10. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  11. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  12. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  13. Event-related potential correlates of suspicious thoughts in individuals with schizotypal personality features.

    Science.gov (United States)

    Li, Xue-bing; Huang, Jia; Cheung, Eric F C; Gong, Qi-yong; Chan, Raymond C K

    2011-01-01

    Suspiciousness is a common feature of schizophrenia. However, suspicious thoughts are also commonly experienced by the general population. This study aimed to examine the underlying neural mechanism of suspicious thoughts in individuals with and without schizotypal personality disorder (SPD)-proneness, using an event-related potential (ERP) paradigm. Electroencephalography (EEG) was recorded when the "feeling of being seen through" was evoked in the participants. The findings showed a prominent positive deflection of the difference wave within the time window 250-400 ms after stimuli presentation in both SPD-prone and non-SPD-prone groups. Furthermore, the P3 amplitude was significantly reduced in the SPD-prone group compared to the non-SPD-prone group. The current density analysis also indicated hypoactivity in both frontal and temporal regions in the SPD-prone group, suggesting that the frontotemporal cortical network may play a role in the onset of suspicious thoughts. The P3 of difference wave was inversely correlated with the cognitive-perception factor and the suspiciousness/paranoid ideation trait, which provided preliminary electrophysiological evidence for the association of suspiciousness with SPD features.

  14. [Effects of false memories on the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  15. Concealment tactics among HIV-positive nurses in Uganda

    OpenAIRE

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that thre...

  16. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  17. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  18. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  19. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  20. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    Science.gov (United States)

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  2. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  3. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  4. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    Science.gov (United States)

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  5. Concealment tactics among HIV-positive nurses in Uganda.

    Science.gov (United States)

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  6. [Identification and management of intra-operative suspicious tissues in 20 transsphenoidal surgery cases].

    Science.gov (United States)

    Liu, Jun-Feng; Ke, Chang-Shu; Chen, Xi; Xu, Yu; Zhang, Hua-Qiu; Chen, Juan; Gan, Chao; Li, Chao-Xi; Lei, Ting

    2013-05-01

    To determine appropriate protocols for the identification and management of intra operative suspicious tissues during transsphenoidal surgery. Clinical data and pathological reports of 20 patients with intra-operative suspicious tissues during transsphenoidal surgeries were analyzed retrospectively. The methods for discriminating between adenoma and normal pituitary tissues were reviewed. The postoperative pathological reports revealed that adenoma and normal pituitary tissues coexisted in 9 samples, while 5 samples were identified as normal pituitary tissues, 2 as adenoma tissues, and 4 as other tissues. Adenomas were distinguished from normal pituitary tissues on the basis of intra-operative appearance, texture, blood supply and possible existence of boundary. If decisions are difficult to made during surgeries from the appearance of the suspicious tissues, pathological examinations are advised as a guidance for the next steps.

  7. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  8. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1...

  9. The added value of contrast enhanced spectral mammography in identification of multiplicity of suspicious lesions in dense breast

    Directory of Open Access Journals (Sweden)

    Amr Farouk Ibrahim Moustafa

    2018-03-01

    Full Text Available Objective: To evaluate the additive value of Contrast Enhanced Spectral Mammography (CESM in the preoperative assessment of malignant lesions in dense breast parenchyma regarding multiplicity. Material and methods: The study included 160 women having heterogeneous dense breast parenchyma (ACR c and d with suspicious lesions identified on sono mammography examination. All patients performed contrast enhanced spectral mammography to confirm or exclude lesion multiplicity. The number of lesions was calculated in the contrast high energy subtraction images with the reference standard being histopathological analysis. Results: Adding CESM to sono-mammography the accuracy in identifying multiple malignant lesion increased from 81.8% accuracy of sono-mammography up to 100% accuracy after adding CESM. Conclusion: Contrast enhanced spectral mammogram showed an added value in the preoperative assessment of breast masses increasing the accuracy of detection of lesions and multiplicity (multifocality and multi-centricity. Keywords: Breast cancer, Contrast enhanced spectral mammogram

  10. Computer aided detection of suspicious regions on digital mammograms : rapid segmentation and feature extraction

    Energy Technology Data Exchange (ETDEWEB)

    Ruggiero, C; Giacomini, M; Sacile, R [DIST - Department of Communication Computer and System Sciences, University of Genova, Via Opera Pia 13, 16145 Genova (Italy); Rosselli Del Turco, M [Centro per lo studio e la prevenzione oncologica, Firenze (Italy)

    1999-12-31

    A method is presented for rapid detection of suspicious regions which consists of two steps. The first step is segmentation based on texture analysis consisting of : histogram equalization, Laws filtering for texture analysis, Gaussian blur and median filtering to enhance differences between tissues in different respects, histogram thresholding to obtain a binary image, logical masking in order to detect regions to be discarded from the analysis, edge detection. This method has been tested on 60 images, obtaining 93% successful detection of suspicious regions. (authors) 4 refs, 9 figs, 1 tabs.

  11. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  12. Revaluation of breast cytology with pathologist on-site of lesions with suspicious sonographic features

    Energy Technology Data Exchange (ETDEWEB)

    Capalbo, Emanuela, E-mail: emanuelacapalbo@tiscalinet.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Sajadidehkordi, Farideh, E-mail: faridehit@yahoo.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Colombi, Claudio; Ticha, Vladimira; Moretti, Angela, E-mail: info.radiologia@sancarlo.mi.it [Dipartimento di Scienze Diagnostiche, UOC di Radiologia Diagnostica ed Interventistica, A.O San Carlo Borromeo. Via Pio II, 3, 20153 Milano (Italy); Peli, Michela, E-mail: peli.michela@gmail.com [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Cosentino, Maria, E-mail: maria-cosentino@tiscali.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Lovisatti, Maria, E-mail: marialovisatti@hotmail.com [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Berti, Elisabetta, E-mail: eliberti@hotmail.it [Dipartimento di Scienze Diagnostiche, UOC di Anatomia Patologica, A.O San Carlo Borromeo. Via Pio II, 3, Milano 20153 (Italy); Cariati, Maurizio, E-mail: info.radiologia@sancarlo.mi.it [Dipartimento di Scienze Diagnostiche, UOC di Radiologia Diagnostica ed Interventistica, A.O San Carlo Borromeo. Via Pio II, 3, 20153 Milano (Italy)

    2013-09-15

    Objective: Evaluating correlation estimation between diagnostic ultrasound (U.S.) of breast lesions and fine needle aspiration cytology (FNAC), and the correlation between cytology and histology (I) of these lesions undergo surgery. Materials and methods: In 2010 we performed 1589 ultrasound breast. We identified 210 suspicious lesions to be subjected to FNAC, which was performed with pathologist on site, and extemporaneous analysis of the sample to assess their appropriateness. We classified the lesions in 5 ultrasound (U) classes according to the criteria defined by Echographic BIRADS Lexicon. The results of cytology were classified in 5 classes (C) according to the guidelines of F.O.N.Ca.M. Then we evaluated the diagnostic correlation between U.S. and FNAC, and between FNAC and Histology. Results: The distribution of lesions in U classes was: 57U2, 55U3, 36U4 and 62U5. The diagnostic concordance between U and FNAC was 96.7%, with a sensitivity of 98%, specificity 93%, negative and positive predictive value respectively of 94.9% and 97.3%, and diagnostic accuracy of 96.6%. The 98 patients with C4-C5 lesions were subjected to surgery and the histology confirmed high-grade malignancy of lesions with a concordance of 99.7%. Conclusions: Having achieved high diagnostic concordance between U and FNAC, and then between FNAC and histology, we may say that the FNAC, less invasive and traumatic for the patient than needle biopsy (CB), may be still a valid method when performed with pathologist on-site to assess the adequacy of the sample taken.

  13. Economic Impact of Frozen Section for Thyroid Nodules with "Suspicious for Malignancy" Cytology.

    Science.gov (United States)

    Bollig, Craig A; Gilley, David; Lesko, David; Jorgensen, Jeffrey B; Galloway, Tabitha L; Zitsch, Robert P; Dooley, Laura M

    2018-02-01

    Objective To perform a cost analysis of the routine use of intraoperative frozen section (iFS) among patients undergoing a thyroid lobectomy with "suspicious for malignancy" (SUSP) cytology in the context of the 2015 American Thyroid Association guidelines. Study Design Case series with chart review; cost minimization analysis. Setting Academic. Subjects and Methods Records were reviewed for patients with SUSP cytology who underwent thyroid surgery between 2010 and 2015 in which iFS was utilized. The diagnostic test performance of iFS and the frequency of indicated completion/total thyroidectomies based on the 2015 guidelines were calculated. A cost minimization analysis was performed comparing lobectomy, with and without iFS, and the need for completion thyroidectomy according to costs estimated from 2014 data from Medicare, the Bureau of Labor Statistics, and the Nationwide Inpatient Sample. Results Sixty-five patients met inclusion criteria. The malignancy rate was 61.5%, 45% of which was identified intraoperatively. The specificity and positive predictive value were 100%. The negative predictive value and sensitivity were 83% and 95%, respectively. Completion/total thyroidectomy was indicated for 9% of patients; 83% of these individuals had findings on iFS that would have changed management intraoperatively. Application of the new guidelines would have resulted in a significant reduction in the frequency of conversion to a total thyroidectomy when compared with the actual management (26.1% vs 7.7%, P = .005). Performing routine iFS was the less costly scenario, resulting in a savings of $474 per case. Conclusion For patients with SUSP cytology undergoing lobectomy, routine use of iFS would result in decreased health care utilization.

  14. 31 CFR 103.18 - Reports by banks of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... violations that require immediate attention, such as, for example, ongoing money laundering schemes, the bank... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by banks of suspicious transactions. 103.18 Section 103.18 Money and Finance: Treasury Regulations Relating to Money and Finance...

  15. 31 CFR 103.15 - Reports by mutual funds of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... suspected terrorist financing or ongoing money laundering schemes, a mutual fund shall immediately notify by... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by mutual funds of suspicious transactions. 103.15 Section 103.15 Money and Finance: Treasury Regulations Relating to Money and Finance...

  16. 31 CFR 103.20 - Reports by money services businesses of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... immediate attention, such as ongoing money laundering schemes, the money services business shall immediately... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by money services businesses of suspicious transactions. 103.20 Section 103.20 Money and Finance: Treasury Regulations Relating to...

  17. 75 FR 76677 - Financial Crimes Enforcement Network: Anti-Money Laundering Program and Suspicious Activity...

    Science.gov (United States)

    2010-12-09

    ...: Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for Residential... loan or finance companies for the purpose of requiring them to establish anti-money laundering programs...-money laundering program requirements on financial institutions.\\3\\ The authority of the Secretary to...

  18. 75 FR 75593 - Financial Crimes Enforcement Network; Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter... law or regulation, or a suspicious activity related to money laundering, terrorist financing, or other...). \\3\\ The Annunzio-Wylie Anti-Money Laundering Act of 1992 (the Annunzio-Wylie Act), amended the BSA...

  19. 77 FR 8148 - Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for Residential...

    Science.gov (United States)

    2012-02-14

    ... 1506-AB02 Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for... finance companies for the purpose of requiring them to establish anti-money laundering programs and report... Secretary is authorized to impose anti-money laundering (``AML'') program requirements on financial...

  20. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    NARCIS (Netherlands)

    Bouma, H.; Baan, J.; Burghouts, G.J.; Eendebak, P.T.; Huis, J.R. van; Dijk, J.; Rest, J.H.C. van

    2014-01-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature

  1. Clinical experiences with photoacoustic breast imaging: the appearance of suspicious lesions

    NARCIS (Netherlands)

    Heijblom, M.

    2014-01-01

    This thesis describes photoacoustic (PA) imaging of suspicious breast lesions. In PA imaging, the tissue of interest is illuminated by short pulses of laser light, usually in the near infrared (NIR) regime. Upon absorption by primarily the tumor vasculature, the light causes a small temperature

  2. 31 CFR 103.19 - Reports by brokers or dealers in securities of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by brokers or dealers in... Reports Required To Be Made § 103.19 Reports by brokers or dealers in securities of suspicious transactions. (a) General. (1) Every broker or dealer in securities within the United States (for purposes of...

  3. Studies on the detection of concealed objects using the neutron reflection method

    International Nuclear Information System (INIS)

    Papp, A.

    2013-01-01

    The increment of reflected thermal and 1.45 eV resonance neutrons vs. the thickness of the reflector has been measured and described by an analytical expression. Macroscopic, Σ β , and microscopic, σ β , reflection cross sections averaged over the bulk reflector substances were deduced for some elements and compounds. It was found that the σ β values are additive even for bulk samples and so the σ βmol could be given for some illicit drugs, explosives and hiding materials. - Highlights: ► The effect of reflector materials on the increment of neutrons were determined. ► Macroscopic and microscopic reflection cross sections averaged over bulk samples were determined. ► Simple analytical expression was given to describe the yield of reflected neutrons. ► The observed additive behavior in reflected neutrons rendered to characterize other materials

  4. 31 CFR 103.17 - Reports by futures commission merchants and introducing brokers in commodities of suspicious...

    Science.gov (United States)

    2010-07-01

    ... merchants and introducing brokers in commodities of suspicious transactions. 103.17 Section 103.17 Money and... merchants and introducing brokers in commodities of suspicious transactions. (a) General—(1) Every futures commission merchant (“FCM”) and introducing broker in commodities (“IB-C”) within the United States shall...

  5. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    Science.gov (United States)

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome.

  6. Early experience with multiparametric magnetic resonance imaging-targeted biopsies under visual transrectal ultrasound guidance in patients suspicious for prostate cancer undergoing repeated biopsy

    DEFF Research Database (Denmark)

    Boesen, Lars; Noergaard, Nis; Chabanova, Elizaveta

    2015-01-01

    OBJECTIVES: The purpose of this study was to investigate the detection rate of prostate cancer (PCa) by multiparametric magnetic resonance imaging-targeted biopsies (mp-MRI-bx) in patients with prior negative transrectal ultrasound biopsy (TRUS-bx) sessions without previous experience of this......-RADS) and Likert classification. All underwent repeated TRUS-bx (10 cores) and mp-MRI-bx under visual TRUS guidance of any mp-MRI-suspicious lesion not targeted by systematic TRUS-bx. RESULTS: PCa was found in 39 out of 83 patients (47%) and mp-MRI identified at least one lesion with some degree of suspicion...

  7. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  8. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  9. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  10. Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

    Directory of Open Access Journals (Sweden)

    Robert Hudec

    2011-01-01

    Full Text Available This paper deals with video transmission over lossy communication networks. The main idea is to develop video concealment method for information losses and errors correction. At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. Finally, the efficiency of developed algorithm is presented in experimental part of this paper.

  11. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  12. Suspicious Behavior Detection System for an Open Space Parking Based on Recognition of Human Elemental Actions

    Science.gov (United States)

    Inomata, Teppei; Kimura, Kouji; Hagiwara, Masafumi

    Studies for video surveillance applications for preventing various crimes such as stealing and violence have become a hot topic. This paper proposes a new video surveillance system that can detect suspicious behaviors such as a car break-in and vandalization in an open space parking, and that is based on image processing. The proposed system has the following features: it 1)deals time series data flow, 2)recognizes “human elemental actions” using statistic features, and 3)detects suspicious behavior using Subspace method and AdaBoost. We conducted the experiments to test the performance of the proposed system using open space parking scenes. As a result, we obtained about 10.0% for false positive rate, and about 4.6% for false negative rate.

  13. Suspiciousness perception in dynamic scenes: a comparison of CCTV operators and novices.

    Directory of Open Access Journals (Sweden)

    Christina Jayne Howard

    2013-08-01

    Full Text Available Perception of scenes has typically been investigated by using static or simplified visual displays. How attention is used to perceive and evaluate dynamic, realistic scenes is more poorly understood, in part due to the problem of comparing eye fixations to moving stimuli across observers. When the task and stimulus is common across observers, consistent fixation location can indicate that that region has high goal-based relevance. Here we investigated these issues when an observer has a specific, and naturalistic, task: closed-circuit television (CCTV monitoring. We concurrently recorded eye movements and ratings of perceived suspiciousness as different observers watched the same set of clips from real CCTV footage. Trained CCTV operators showed a greater consistency in fixation location and greater consistency in suspiciousness judgements than untrained observers. Training appears to increase between-operators consistency by learning 'knowing what to look for' in these scenes. We used a novel ‘Dynamic Area of Focus (DAF’ analysis to show that in CCTV monitoring there is a temporal relationship between eye movements and subsequent manual responses, as we have previously found for a sports video watching task. For trained CCTV operators and for untrained observers, manual responses were most highly related to between-observer eye position spread when a temporal lag was introduced between the fixation and response data. Shortly after between-observer eye positions became most similar, observers tended to push the joystick to indicate perceived suspiciousness. Conversely, shortly after between-observer eye positions became dissimilar, observers tended to rate suspiciousness as low. These data provide further support for this DAF method as an important tool for examining goal-directed fixation behaviour when the stimulus is a real moving image.

  14. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    OpenAIRE

    Bouma, H.; Baan, J.; Burghouts, G.J.; Eendebak, P.T.; Huis, J.R. van; Dijk, J.; Rest, J.H.C. van

    2014-01-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This is challenging because the environment is crowded, people move freely through areas which cannot be covered by a single camera, because the actual snat...

  15. Utilizing Social Media to Further the Nationwide Suspicious Activity Reporting Initiative

    Science.gov (United States)

    2012-09-01

    Initiative NYPD New York Police Department OSINT Open Source Intelligence P2P Peer to Patent SAR Suspicious Activity Report SMS Short Message (or...Media as an Open-Source Intelligence Tool Several government documents outline the use of social media as an Open Source intelligence tool ( OSINT ...social media to be an OSINT tool that federal, state, and local law enforcement agencies should use to develop timely, relevant, and actionable

  16. Surgical resection of highly suspicious pulmonary nodules without a tissue diagnosis

    International Nuclear Information System (INIS)

    Heo, Eun-Young; Lee, Kyung-Won; Jheon, Sanghoon; Lee, Jae-Ho; Lee, Choon-Taek; Yoon, Ho-II

    2011-01-01

    The safety and efficacy of surgical resection of lung nodule without tissue diagnosis is controversial. We evaluated direct surgical resection of highly suspicious pulmonary nodules and the clinical and radiological predictors of malignancy. Retrospective analyses were performed on 113 patients who underwent surgical resection without prior tissue diagnosis for highly suspicious pulmonary nodules. Clinical and radiological characteristics were compared between histologically proven benign and malignant nodules after resection. Total costs, length of hospitalization and waiting time to surgery were compared with those of patients who had tissue diagnosis prior to surgery. Among 280 patients with pulmonary nodules suspicious for lung cancer, 113 (40.4%) underwent operation without prior tissue diagnosis. Lung nodules were diagnosed as malignant in 96 (85%) of the 113 patients. Except for forced expiratory volume in 1 s, clinical characteristics were not significantly different according to the pathologic results. Forty-five (90%) of 50 patients with ground-glass opacity nodules had a malignancy. Mixed ground-glass opacity, bubble lucency, irregular margin and larger size correlated with malignancy in ground-glass opacity nodules (P<0.05). Fifty-one (81%) of 67 patients with solid nodules had a malignancy. Spiculation, pre-contrast attenuation and contrast enhancement significantly correlated with malignancy in solid nodules (P<0.05). Surgical resection without tissue diagnosis significantly decreased total costs, hospital stay and waiting time (P<0.05). Direct surgical resection of highly suspicious pulmonary nodules can be a valid procedure. However, careful patient selection and further investigations are required to justify direct surgical resection. (author)

  17. Role of percent tissue altered on ectasia after LASIK in eyes with suspicious topography.

    Science.gov (United States)

    Santhiago, Marcony R; Smadja, David; Wilson, Steven E; Krueger, Ronald R; Monteiro, Mario L R; Randleman, J Bradley

    2015-04-01

    To investigate the association of the percent tissue altered (PTA) with the occurrence of ectasia after LASIK in eyes with suspicious preoperative corneal topography. This retrospective comparative case-control study compared associations of reported ectasia risk factors in 129 eyes, including 57 eyes with suspicious preoperative Placido-based corneal topography that developed ectasia after LASIK (suspect ectasia group), 32 eyes with suspicious topography that remained stable for at least 3 years after LASIK (suspect control group), and 30 eyes that developed ectasia with bilateral normal topography (normal topography ectasia group). Groups were subdivided based on topographic asymmetry into high- or low-suspect groups. The PTA, preoperative central corneal thickness (CCT), residual stromal bed (RSB), and age (years) were evaluated in univariate and multivariate analyses. Average PTA values for normal topography ectasia (45), low-suspect ectasia (39), high-suspect ectasia (36), low-suspect control (32), and high-suspect control (29) were significantly different from one another in all comparisons (P topography ectasia groups, and CCT was not significantly different between any groups. Stepwise logistic regression revealed the PTA as the most significant independent variable (P topography. Less tissue alteration, or a lower PTA value, was necessary to induce ectasia in eyes with more remarkable signs of topographic abnormality, and PTA provided better discriminative capabilities than RSB for all study populations. Copyright 2015, SLACK Incorporated.

  18. Separating Facts from Fiction: Linguistic Models to Classify Suspicious and Trusted News Posts on Twitter

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Shaffer, Kyle J.; Jang, Jin Yea; Hodas, Nathan O.

    2017-07-30

    Pew research polls report 62 percent of U.S. adults get news on social media (Gottfried and Shearer, 2016). In a December poll, 64 percent of U.S. adults said that “made-up news” has caused a “great deal of confusion” about the facts of current events (Barthel et al., 2016). Fabricated stories spread in social media, ranging from deliberate propaganda to hoaxes and satire, contributes to this confusion in addition to having serious effects on global stability. In this work we build predictive models to classify 130 thousand news tweets as suspicious or verified, and predict four subtypes of suspicious news – satire, hoaxes, clickbait and propaganda. We demonstrate that neural network models trained on tweet content and social network interactions outperform lexical models. Unlike previous work on deception detection, we find that adding syntax and grammar features to our models decreases performance. Incorporating linguistic features, including bias and subjectivity, improves classification results, however social interaction features are most informative for finer-grained separation between our four types of suspicious news posts.

  19. Angiosonography in suspicious breast lesions with non-diagnostic FNAC: comparison with power Doppler US.

    Science.gov (United States)

    Caumo, F; Carbognin, G; Casarin, A; Pinali, L; Vasori, S; D'Onofrio, M; Pozzi Mucelli, R

    2006-02-01

    The purpose of this study was to evaluate the accuracy of angiosonography in comparison with colour Doppler ultrasound (US) in the discrimination of suspicious breast lesions with nondiagnostic fine-needle aspiration cytology (FNAC). Pre-operative Power Doppler US and angiosonography were prospectively performed in 20 suspicious breast lesions with non-diagnostic FNAC. A second-generation US contrast agent was utilised with a high-frequency transducer and a contrast-specific algorithm (low acoustic pressure CnTI). The enhancement characteristics of all lesions were analysed using qualitative and quantitative parameters obtained from time-intensity curves with the different imaging modalities. The final diagnosis was confirmed at pathology in all cases. Microvessel density (MVD) was assessed in the surgical specimen using CD34. The correct assessment of biological behaviour was achieved in all cases by angiosonography (sensitivity of 100%; specificity of 91%) and colour Doppler US (45% sensitivity; 78% specificity). MVD correlated with the biological behaviour. Angiosonography is more accurate than colour Doppler US in the correct assessment of biological behaviour of suspicious breast lesions.

  20. Diffusion-weighted magnetic resonance imaging in the assessment of ovarian masses with suspicious features: Strengths and challen

    Directory of Open Access Journals (Sweden)

    Sahar Mansour

    2015-12-01

    Conclusion: DWI supported by conventional MRI data can confirm or exclude malignancy in suspicious ovarian masses. The combined analysis of quantitative and qualitative criteria and knowledge of the sequence pitfalls are required.

  1. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  2. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    Science.gov (United States)

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  3. Role of 3D power Doppler ultrasound in the further characterization of suspicious breast masses.

    Science.gov (United States)

    Kupeli, Ali; Kul, Sibel; Eyuboglu, Ilker; Oguz, Sukru; Mungan, Sevdegul

    2016-01-01

    To investigate effectiveness of vascular indices obtained with 3D power Doppler ultrasound in the further characterization of breast masses and prevention of unnecessary biopsies. Between April 2013 and March 2014, 109 patients (age range, 17-85 years; mean age, 47 years) with 117 radiologically or clinically suspicious breast masses were prospectively evaluated with 3DPDUS before biopsy. Mass volume (MV), vascularization index (VI), flow index (FI) and vascularization flow index (VFI) were calculated using Virtual Organ Computer-aided Analysis (VOCAL) software and they were correlated with the final diagnosis. Cutoff values of vascular indices were determinated and diagnostic efficacy was calculated with receiver operating curve (ROC) analysis. All vascular indices, age of patients and tumor volume were significantly lower in benign masses compared with malignant ones (p<0.001). AUCs were 0.872, 0.867 and 0.789 for VI, VFI and FI, respectively. The diagnostic efficacy of VI (for cutoff 1.1; 83% sensitivity, 82% specificity and 82% accuracy) and VFI (for cutoff 0.4; 80% sensitivity, 83% specificity and 80% accuracy) were significantly higher than FI (for cutoff 33,9; 73% sensitivity, 69% specificity and 71% accuracy). It was found that with the use of vascular indices of 3DPDUS in the further characterization of suspicious breast masses between 24% to 37% of unnecessary biopsies could have been avoided. The vascular indices obtained with 3DPDUS seem reliable in the further characterization of suspicious breast masses and might be used to decrease unnecessary biopsies. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  4. Phishing suspiciousness in older and younger adults: The role of executive functioning.

    Directory of Open Access Journals (Sweden)

    Brandon E Gavett

    Full Text Available Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft. The current study sought to determine whether age is associated with increased susceptibility to phishing and whether tests of executive functioning can predict phishing susceptibility. A total of 193 cognitively intact participants, 91 younger adults and 102 older adults, were primarily recruited through a Psychology department undergraduate subject pool and a gerontology research registry, respectively. The Executive Functions Module from the Neuropsychological Assessment Battery and the Iowa Gambling Task were the primary cognitive predictors of reported phishing suspiciousness. Other predictors included age group (older vs. younger, sex, education, race, ethnicity, prior knowledge of phishing, prior susceptibility to phishing, and whether or not browsing behaviors were reportedly different in the laboratory setting versus at home. A logistic regression, which accounted for a 22.7% reduction in error variance compared to the null model and predicted phishing suspiciousness with 73.1% (95% CI [66.0, 80.3] accuracy, revealed three statistically significant predictors: the main effect of education (b = 0.58, SE = 0.27 and the interactions of age group with prior awareness of phishing (b = 2.31, SE = 1.12 and performance on the Neuropsychological Assessment Battery Mazes test (b = 0.16, SE = 0.07. Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. This suggests that simple educational interventions may be effective in reducing phishing vulnerability. Although one test of executive functioning was found useful for identifying those at risk of phishing susceptibility, four tests were not found to be useful; these results speak to the need for more ecologically valid

  5. Error Concealment using Neural Networks for Block-Based Image Coding

    Directory of Open Access Journals (Sweden)

    M. Mokos

    2006-06-01

    Full Text Available In this paper, a novel adaptive error concealment (EC algorithm, which lowers the requirements for channel coding, is proposed. It conceals errors in block-based image coding systems by using neural network. In this proposed algorithm, only the intra-frame information is used for reconstruction of the image with separated damaged blocks. The information of pixels surrounding a damaged block is used to recover the errors using the neural network models. Computer simulation results show that the visual quality and the MSE evaluation of a reconstructed image are significantly improved using the proposed EC algorithm. We propose also a simple non-neural approach for comparison.

  6. The association between concealing emotions at work and medical utilization in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  7. Upright stereotactic vacuum-assisted needle biopsy of suspicious breast microcalcification

    International Nuclear Information System (INIS)

    Sim, L. S. J.; Kei, P. L.

    2008-01-01

    Full text: Stereotactic core needle biopsy is a useful technique for evaluation of suspicious breast microcalcifications. Thf development of the 11-G vacuum-assisted biopsy system offers another method of minimally invasive biopsy carried out on a conventional mammography unit. We evaluate its usefulness, efficacy and safety in Asian women.. Vacuum-assisted biopsy was carried out through the lateral approach using an add-on stereotactic device attached to a mammography unit. One hundred and five lesions were sampled in 97 patients. Excisional biopsy was subsequently Carried out for diagnosis of atypical ductal hyperplasia or carcinoma in high-risk patients. Patients with benign diagnosis underwent mammographic follow up. The technical success rate was 97%. An average of 13.5 tissue cores were retrieved for each lesion. The histopathological result obtained from mammotome was benign in 84.8% and malignant in 15.2%. The benign microcalcifications were predominantly fibrocystic change (n = 42)| whereas the malignant microcalcifications included ductal carcinoma in situ (n = 15) and invasive carcinoma (n = 1). Twenty-two patients underwent subsequent open surgical biopsy but no underestimation of disease was seen. Only two patients had vasovagal syncope and three others felt unwell during the biopsy. Nine patients had small haema-1 tomas, which resolved spontaneously. Vacuum-assisted biopsy carried out on an upright stereotactic mammography] unit is a safe and effective method for evaluation of suspicious microcalcifications.

  8. Informing cancer patient based on his type of personality: the suspicious (paranoid) patient.

    Science.gov (United States)

    Kallergis, G

    2013-01-01

    Imparting bad news had always been an unpleasant task for the physician, as shown from ancient years to our days. In the healthcare sector and as far as the cancer patient is concerned, the imparting of bad news is performed by the patient's doctor within a therapeutic relationship of course. The fundamental question is how a therapist could tailor the information to any patient and if "Is it possible to determine who should be told what, when and how ?". The aim of this paper was to describe the suspicious character or type of personality thoroughly so that any physician can make a diagnosis and tailor the information strategy to the patient's needs. As method of research was used the qualitative method through groups with doctors and nurses, while research within groups lasted for 5 years. The degree of informing of the suspicious personality in the range "minimal - small - medium - large - very large" is : the degree of denial varies between large and very large. The degree of informing varies between medium and small and sometimes minimal. Informing the Family: The hardest family to deal with. Pay attention to litigious mania. Avoid confrontation or be drawn into agreeing with the family views.

  9. The value of preoperative ultrasound guided fine-needle aspiration cytology of radiologically suspicious axillary lymph nodes in breast cancer

    Directory of Open Access Journals (Sweden)

    Torill Sauer

    2014-01-01

    Full Text Available Background: Preoperative ultrasound (US and eventually US-guided fine-needle aspiration cytology (FNAC of suspicious axillary lymph nodes (ALN is a standard procedure in the work-up of suspicious breast lesions. Preoperative US FNAC may prevent sentinel node biopsy (SNB procedure in 24-30% of patients with early stage breast carcinoma. The aim of this study was to evaluate the institutional results of this preoperative diagnostic procedure. Materials and Methods: A total of 182 cases of preoperative FNAC of suspicious ALN where retrieved from the pathology files. The results were compared with the final histology and staging. False negative (FN FNAC cases were reviewed and possibly missed metastatic cases (2 were immunostained with the epithelial marker AE1/AE3. Results: There were no false positives, whereas 16 cases were FN. In all but one case the FN′s represented sampling error. Half of the 16 FN cases in this series were macrometastases. Discussion: About 83% of the preoperatively aspirated cases were N+, indicating that a radiologically suspicious ALN has a very high risk of being metastatic. Preoperative US guided FNAC from radiologically suspicious ALN is highly efficient in detecting metastases. Depending on national guidelines, a preoperative, positive ALN FNAC might help to stratify the patients as to SNB and/or ALN dissection.

  10. Bayesian interpolation in a dynamic sinusoidal model with application to packet-loss concealment

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Christensen, Mads Græsbøll; Cemgil, Ali Taylan

    2010-01-01

    a Bayesian inference scheme for the missing observations, hidden states and model parameters of the dynamic model. The inference scheme is based on a Markov chain Monte Carlo method known as Gibbs sampler. We illustrate the performance of the inference scheme to the application of packet-loss concealment...

  11. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  12. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...

  13. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    Science.gov (United States)

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  14. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  15. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  16. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  17. Visualization of suspicious lesions in breast MRI based on intelligent neural systems

    Science.gov (United States)

    Twellmann, Thorsten; Lange, Oliver; Nattkemper, Tim Wilhelm; Meyer-Bäse, Anke

    2006-05-01

    Intelligent medical systems based on supervised and unsupervised artificial neural networks are applied to the automatic visualization and classification of suspicious lesions in breast MRI. These systems represent an important component of future sophisticated computer-aided diagnosis systems and enable the extraction of spatial and temporal features of dynamic MRI data stemming from patients with confirmed lesion diagnosis. By taking into account the heterogenity of the cancerous tissue, these techniques reveal the malignant, benign and normal kinetic signals and and provide a regional subclassification of pathological breast tissue. Intelligent medical systems are expected to have substantial implications in healthcare politics by contributing to the diagnosis of indeterminate breast lesions by non-invasive imaging.

  18. Student Perceptions of Auditor Responses to Evidence of Suspicious Activities: An Experimental Assessment

    Directory of Open Access Journals (Sweden)

    David S Murphy

    2015-12-01

    Full Text Available This study assessed student perceptions of auditor responses to evidence that a client failed to respond appropriately to suspicious activities that could indicate money laundering. Subjects were presented with a series of randomized cases in which partner type (new vs. experienced, firm type (regional vs. international and audit fee materiality (not material, material to the local office only, material to the firm were manipulated asked to indicate their perceptions of the likelihood that an audit partner would discuss such evidence with the client, and the likelihood that the issue would be disclosed by the auditor. Both partner type and audit fee materiality was found to have significant effects on perceived likelihoods.

  19. Computerized classification of suspicious regions in chest radiographs using subregion Hotelling observers

    International Nuclear Information System (INIS)

    Baydush, Alan H.; Catarious, David M. Jr.; Lo, Joseph Y.; Abbey, Craig K.; Floyd, Carey E. Jr.

    2001-01-01

    We propose to investigate the use of subregion Hotelling observers (SRHOs) in conjunction with perceptrons for the computerized classification of suspicious regions in chest radiographs for being nodules requiring follow up. Previously, 239 regions of interest (ROIs), each containing a suspicious lesion with proven classification, were collected. We chose to investigate the use of SRHOs as part of a multilayer classifier to determine the presence of a nodule. Each SRHO incorporates information about signal, background, and noise correlation for classification. For this study, 225 separate Hotelling observers were set up in a grid across each ROI. Each separate observer discriminates an 8 by 8 pixel area. A round robin sampling scheme was used to generate the 225 features, where each feature is the output of the individual observers. These features were then rank ordered by the magnitude of the weights of a perceptron. Once rank ordered, subsets of increasing number of features were selected to be used in another perceptron. This perceptron was trained to minimize mean squared error and the output was a continuous variable representing the likelihood of the region being a nodule. Performance was evaluated by receiver operating characteristic (ROC) analysis and reported as the area under the curve (A Z ). The classifier was optimized by adding additional features until the A Z declined. The optimized subset of observers then were combined using a third perceptron. A subset of 80 features was selected which gave an A Z of 0.972. Additionally, at 98.6% sensitivity, the classifier had a specificity of 71.3% and increased the positive predictive value from 60.7% to 84.1%. Preliminary results suggest that using SRHOs in combination with perceptrons can provide a successful classification scheme for pulmonary nodules. This approach could be incorporated into a larger computer aided detection system for decreasing false positives

  20. Introducing a Model for Suspicious Behaviors Detection in Electronic Banking by Using Decision Tree Algorithms

    Directory of Open Access Journals (Sweden)

    Rohulla Kosari Langari

    2014-02-01

    Full Text Available Change the world through information technology and Internet development, has created competitive knowledge in the field of electronic commerce, lead to increasing in competitive potential among organizations. In this condition The increasing rate of commercial deals developing guaranteed with speed and light quality is due to provide dynamic system of electronic banking until by using modern technology to facilitate electronic business process. Internet banking is enumerate as a potential opportunity the fundamental pillars and determinates of e-banking that in cyber space has been faced with various obstacles and threats. One of this challenge is complete uncertainty in security guarantee of financial transactions also exist of suspicious and unusual behavior with mail fraud for financial abuse. Now various systems because of intelligence mechanical methods and data mining technique has been designed for fraud detection in users’ behaviors and applied in various industrial such as insurance, medicine and banking. Main of article has been recognizing of unusual users behaviors in e-banking system. Therefore, detection behavior user and categories of emerged patterns to paper the conditions for predicting unauthorized penetration and detection of suspicious behavior. Since detection behavior user in internet system has been uncertainty and records of transactions can be useful to understand these movement and therefore among machine method, decision tree technique is considered common tool for classification and prediction, therefore in this research at first has determinate banking effective variable and weight of everything in internet behaviors production and in continuation combining of various behaviors manner draw out such as the model of inductive rules to provide ability recognizing of different behaviors. At least trend of four algorithm Chaid, ex_Chaid, C4.5, C5.0 has compared and evaluated for classification and detection of exist

  1. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    Science.gov (United States)

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  2. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  3. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  4. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  5. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  6. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  7. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  8. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    Science.gov (United States)

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    Science.gov (United States)

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  10. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  11. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  12. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    Science.gov (United States)

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  14. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  15. 3-T breast magnetic resonance imaging in patients with suspicious microcalcifications on mammography

    Energy Technology Data Exchange (ETDEWEB)

    Stehouwer, B.L.; Merckel, L.G.; Verkooijen, H.M.; Peters, N.H.G.M.; Mali, W.P.T.M.; Veldhuis, W.B.; Bosch, M.A.A.J. van den [University Medical Center Utrecht, Department of Radiology, Utrecht (Netherlands); Mann, R.M. [University Medical Center St Radboud, Departement of Radiology, Nijmegen (Netherlands); Duvivier, K.M. [University Medical Center Utrecht, Department of Radiology, Utrecht (Netherlands); VU University Medical Center, Department of Radiology, Amsterdam (Netherlands); Peeters, P.H.M. [University Medical Center Utrecht, Julius Center for Health Sciences and Primary Care, Utrecht (Netherlands)

    2014-03-15

    To investigate the diagnostic value of 3-Tesla (T) breast MRI in patients presenting with microcalcifications on mammography. Between January 2006 and May 2009, 123 patients with mammographically detected BI-RADS 3-5 microcalcifications underwent 3-T breast MRI before undergoing breast biopsy. All MRIs of the histopathologically confirmed index lesions were reviewed by two breast radiologists. The detection rate of invasive carcinoma and ductal carcinoma in situ (DCIS) was evaluated, as well as the added diagnostic value of MRI over mammography and breast ultrasound. At pathology, 40/123 (33 %) lesions proved malignant; 28 (70 %) DCIS and 12 (30 %) invasive carcinoma. Both observers detected all invasive malignancies at MRI, as well as 79 % (observer 1) and 86 % (observer 2) of in situ lesions. MRI in addition to conventional imaging led to a significant increase in area under the receiver operating characteristic (ROC) curve from 0.67 (95 % CI 0.56-0.79) to 0.79 (95 % CI 0.70-0.88, observer 1) and to 0.80 (95 % CI 0.71-0.89, observer 2), respectively. 3-T breast MRI was shown to add significant value to conventional imaging in patients presenting with suspicious microcalcifications on mammography. (orig.)

  16. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Burghouts, Gertjan J.; Eendebak, Pieter T.; van Huis, Jasper R.; Dijk, Judith; van Rest, Jeroen H. C.

    2014-10-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This is challenging because the environment is crowded, people move freely through areas which cannot be covered by a single camera, because the actual snatch is a subtle action, and because collaboration is complex social behavior. We carried out an experiment with more than 20 validated pickpocket incidents. We used a top-down approach to translate expert knowledge in features and rules, and a bottom-up approach to learn discriminating patterns with a classifier. The classifier was used to separate the pickpockets from normal passers-by who are shopping in the mall. We performed a cross validation to train and evaluate our system. In this paper, we describe our method, identify the most valuable features, and analyze the results that were obtained in the experiment. We estimate the quality of these features and the performance of automatic detection of (collaborating) pickpockets. The results show that many of the pickpockets can be detected at a low false alarm rate.

  17. Clinical and diagnostic value of preoperative MR mammography and FDG-PET in suspicious breast lesions

    International Nuclear Information System (INIS)

    Walter, C.; Scheidhauer, K.; Theissen, P.; Scharl, A.; Goering, U.J.; Kugel, H.; Krahe, T.; Pietrzyk, U.

    2003-01-01

    Dynamic enhanced magnetic resonance (MR) mammography and fluorine-18 fluorodeoxyglucose positron emission tomography (FDG-PET) of the breast were directly compared preoperatively in suspicious breast lesions. Forty-two breast lesions in 40 patients were examined with a three-dimensional dynamic MR imaging series and FDG-PET. The MR and PET examinations were evaluated separately and the results were compared with the histological findings. The sensitivity and specificity of each method were calculated. The diagnostic value of both modalities as single diagnostic tool and in combination was investigated. Nineteen malignant and 23 benign breast lesions were proven histologically. Magnetic resonance mammography and FDG-PET showed a sensitivity of 89 and 63%, respectively. The specificity was 74 and 91%, respectively. The combination of both imaging methods decreased the not-required biopsies from 55 to 17%. Only one false-negative finding - a patient pre-treated with chemotherapy - was observed in both methods. The combination of MR mammography and FDG-PET can help to decrease biopsies of benign breast lesions. Because of their high cost, these modalities should only be used in problematic cases to either rule out or to demonstrate malignancy. The best diagnostic strategy is achieved using MR mammography first. If the diagnosis is still questionable, FDG-PET can be performed. (orig.)

  18. Evaluation of a mammographic stereotactic device for localization, fine-needle aspiration cytologic studies, and core biopsy of suspicious lesions

    International Nuclear Information System (INIS)

    Fajardo, L.J.; Davey, G.A.

    1988-01-01

    Mammography-guided interventional breast procedures, such as preoperative localization, fine-needle aspiration cytology (FNAC), and core biopsy of suspicious lesions, require accurate three-dimensional localization. The authors have evaluated a prototype stereotactic mammography device for localizing abnormalities with both phantom and clinical studies. Twenty-six localizations on a phantom were within 0.5 mm +- 0.93 (standard deviation) from the lesions; accuracy in clinical procedures was within 0.6 mm +- 0.8. Procedures are performed an average of 8 minutes faster with this device. They are prospectively evaluating mammography-guided FNAC and core biopsy of suspicious lesions in 100 patients. Results of FNAC performed without the stereotactic device agreed with results of open surgical biopsy in six of eight patients; results of core biopsy agreed in seven of eight

  19. Error in laboratory report data for platelet count assessment in patients suspicious for dengue: a note from observation

    Directory of Open Access Journals (Sweden)

    Somsri Wiwanitkit

    2016-08-01

    Full Text Available Dengue is a common tropical infection that is still a global health threat. An important laboratory parameter for the management of dengue is platelet count. Platelet count is an useful test for diagnosis and following up on dengue. However, errors in laboratory reports can occur. This study is a retrospective analysis on laboratory report data of complete blood count in cases with suspicious dengue in a medical center within 1 month period during the outbreak season on October, 2015. According to the studied period, there were 184 requests for complete blood count for cases suspected for dengue. From those 184 laboratory report records, errors can be seen in 12 reports (6.5%. This study demonstrates that there are considerable high rate of post-analytical errors in laboratory reports. Interestingly, the platelet count in those erroneous reports can be unreliable and ineffective or problematic when it is used for the management of dengue suspicious patients.

  20. Combining PET/CT with serum tumor markers to improve the evaluation of histological type of suspicious lung cancers.

    Science.gov (United States)

    Jiang, Rifeng; Dong, Ximin; Zhu, Wenzhen; Duan, Qing; Xue, Yunjing; Shen, Yanxia; Zhang, Guopeng

    2017-01-01

    Histological type is important for determining the management of patients with suspicious lung cancers. In this study, PET/CT combined with serum tumor markers were used to evaluate the histological type of lung lesions. Patients with suspicious lung cancers underwent 18F-FDG PET/CT and serum tumor markers detection. SUVmax of the tumor and serum levels of tumor markers were acquired. Differences in SUVmax and serum levels of tumor markers among different histological types of lung cancers and between EGFR mutation statues of adenocarcinoma were compared. The diagnostic efficiencies of SUVmax alone, each serum tumor marker alone, combined tumor markers and the combination of both methods were further assessed and compared. SCC had the highest level of SUVmax, followed by SCLC and adenocarcinoma, and benign lesions had a lowest level. CYFRA21-1 and SCC-Ag were significantly higher in SCC, NSE was significantly higher in SCLC (Ptumor marker or SUVmax alone. When combined, the AUC, sensitivity and specificity increased significantly (Ptumor markers (P>0.05 for all). SUVmax and serum tumor markers show values in evaluating the histological types of suspicious lung cancers. When properly combined, the diagnostic efficiency can increase significantly.

  1. Ultrasound guided core biopsy of suspicious mammographic calcifications using high frequency and power Doppler ultrasound

    International Nuclear Information System (INIS)

    Teh, W.L.; Wilson, A.R.M; Evans, A.J.; Burrell, H.; Pinder, S.E.; Ellis, I.O.

    2000-01-01

    AIM: The pre-operative diagnosis of suspicious mammographic microcalcifications usually requires stereotactic needle biopsy. The aim of this study was to evaluate if high frequency 13 MHz ultrasound (HFUS) and power Doppler (PD) can aid visualization and biopsy of microcalcifications. MATERIALS AND METHODS: Forty-four consecutive patients presenting with microcalcifications without associated mammographic or palpable masses were examined with HFUS and PD. Ultrasound-guided core biopsy (USCB) was performed where possible. Stereotactic biopsy was carried out when US-guided biopsy was unsuccessful. Surgery was performed if a diagnosis of malignancy was made on core biopsy or if the repeat core biopsy was non-diagnostic. RESULTS: Forty-one patients (93%) had ultrasound abnormalities corresponding to mammographic calcification. USCB was performed on 37 patients. In 29/37, USCB obtained a definitive result (78.4%). USCB was non-diagnostic in 4/9 benign (44.4%) and 4/28 (14.3%) malignant lesions biopsied. The complete and absolute sensitivities for malignancy using USCB were 85.7% (24/28) and 81% (23/28), respectively. USCB correctly identified invasive disease in 12/23 (52.2%) cases. There was no significant difference in the presence of abnormal flow on PD between benign and malignant lesions. However, abnormal PD vascularity was present in 43.5% of invasive cancer and was useful in directing successful biopsy in eight cases. CONCLUSION: The combination of high frequency US with PD is useful in the detection and guidance of successful needle biopsy of microcalcifications particularly where there is an invasive focus within larger areas of DCIS. Teh, W.L. (2000)

  2. Fusion of classifiers for REIS-based detection of suspicious breast lesions

    Science.gov (United States)

    Lederman, Dror; Wang, Xingwei; Zheng, Bin; Sumkin, Jules H.; Tublin, Mitchell; Gur, David

    2011-03-01

    After developing a multi-probe resonance-frequency electrical impedance spectroscopy (REIS) system aimed at detecting women with breast abnormalities that may indicate a developing breast cancer, we have been conducting a prospective clinical study to explore the feasibility of applying this REIS system to classify younger women (breast cancer. The system comprises one central probe placed in contact with the nipple, and six additional probes uniformly distributed along an outside circle to be placed in contact with six points on the outer breast skin surface. In this preliminary study, we selected an initial set of 174 examinations on participants that have completed REIS examinations and have clinical status verification. Among these, 66 examinations were recommended for biopsy due to findings of a highly suspicious breast lesion ("positives"), and 108 were determined as negative during imaging based procedures ("negatives"). A set of REIS-based features, extracted using a mirror-matched approach, was computed and fed into five machine learning classifiers. A genetic algorithm was used to select an optimal subset of features for each of the five classifiers. Three fusion rules, namely sum rule, weighted sum rule and weighted median rule, were used to combine the results of the classifiers. Performance evaluation was performed using a leave-one-case-out cross-validation method. The results indicated that REIS may provide a new technology to identify younger women with higher than average risk of having or developing breast cancer. Furthermore, it was shown that fusion rule, such as a weighted median fusion rule and a weighted sum fusion rule may improve performance as compared with the highest performing single classifier.

  3. Malignancy rate of biopsied suspicious bone lesions identified on FDG PET/CT

    Energy Technology Data Exchange (ETDEWEB)

    Adams, Hugo J.A.; Kwee, Thomas C. [University Medical Center Utrecht, Department of Radiology and Nuclear Medicine, Utrecht (Netherlands); Klerk, John M.H. de [Meander Medical Center, Department of Nuclear Medicine, Amersfoort (Netherlands); Heggelman, Ben G.F. [Meander Medical Center, Department of Radiology, Amersfoort (Netherlands); Dubois, Stefan V. [Meander Medical Center, Department of Pathology, Amersfoort (Netherlands)

    2016-07-15

    To determine the malignancy rate of bone lesions identified on FDG PET/CT in patients who have undergone CT-guided biopsy because of the suspicion of malignancy. This single-centre retrospective study spanned eight consecutive years and included all patients who underwent both FDG PET/CT and CT-guided bone biopsy because of the suspicion of malignancy. The positive predictive value (PPV) for malignancy was calculated, and different patient and imaging characteristics were compared between malignant and benign bone lesions. Of 102 included patients with bone lesions that all showed FDG uptake exceeding mediastinal uptake, bone biopsy showed a malignant lesion in 91 patients, yielding a PPV for malignancy of 89.2 % (95 % CI 81.7 - 93.9 %). In the 94 patients with bone lesions that showed FDG uptake exceeding liver uptake, bone biopsy showed a malignant lesion in 83 patients, yielding a PPV for malignancy of 88.3 % (95 % CI 80.1 - 93.5 %). Higher age, bone marrow replacement of the lesion seen on CT, expansion of the lesion seen on CT, and presence of multifocal lesions on FDG PET/CT were significantly more frequent in patients with malignant lesions than in those with benign bone lesions (P = 0.044, P = 0.009, P = 0.015, and P = 0.019, respectively). Furthermore, there was a trend towards a higher incidence of cortical destruction (P = 0.056) and surrounding soft tissue mass (P = 0.063) in patients with malignant bone lesions. The PPV for malignancy of suspicious bone lesions identified on FDG PET/CT is not sufficiently high to justify changes in patient management without histopathological confirmation. Nevertheless, ancillary patient and imaging characteristics may increase the likelihood of a malignant bone lesion. (orig.)

  4. Autofluorescence guided diagnostic evaluation of suspicious oral mucosal lesions: opportunities, limitations, and pitfalls

    Science.gov (United States)

    Vigneswaran, Nadarajah

    2011-03-01

    Wide-filed autofluorescence examination is currently considered as a standard of care for screening and diagnostic evaluation of early neoplastic changes of the skin, cervix, lung, bladder, gastrointestinal tract and oral cavity. Naturally occurring fluorophores within the tissue absorb UV and visible light and can re-emit some of this light at longer wavelengths in the form of fluorescence. This non-invasive tissue autofluorescence imaging is used in optical diagnostics, especially in the early detection of cancer. Usually, malignant transformation is associated with thickening of the epithelium, enhanced cellular density due to increased nuclear cytoplasmic ratio which may attenuate the excitation leading to a decrease in collagen autofluorescence. Hence, dysplastic and cancerous tissues often exhibit decreased blue-green autofluorescence and appear darker compared to uninvolved mucosa. Currently, there are three commercially available devices to examine tissue autofluorescence in the oral cavity. In this study we used the oral cancer screening device IdentafiTM 3000 to examine the tissue reflectance and autofluorescence of PML and confounding lesions of the oral cavity. Wide-field autofluorescence imaging enables rapid inspection of large mucosal surfaces, to aid in recognition of suspicious lesions and may also help in discriminate the PML (class 1) from some of the confounding lesions (class II). However, the presence of inflammation or pigments is also associated with loss of stromal autofluorescence, and may give rise to false-positive results with widefield fluorescence imaging. Clinicians who use these autofluorescence based oral cancer screening devices should be aware about the benign oral mucosal lesions that may give false positivity so that unnecessary patient's anxiety and the need for scalpel biopsy can be eliminated.

  5. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    Science.gov (United States)

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  6. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  7. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    Science.gov (United States)

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  8. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  9. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    Science.gov (United States)

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  10. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  11. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  12. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  13. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  14. Geophysical techniques for exploration of concealed uranium deposits in the Gwalior basin

    International Nuclear Information System (INIS)

    Choudhary, Kalpan; Singh, R.B.

    2004-01-01

    There is no direct geophysical method for the exploration of concealed uranium ore. Scope of geophysics for this in the Gwalior basin comprises delineating the basement topography, demarcation or zones of intense fracturing intersecting the unconformities and to identify the presence of carbonaceous rocks, specially in the graben-like structures. These geophysical problems have been successfully solved in other places by employing IP, resistivity, SP and gravity techniques for basement mapping, identification of fracture zone/shear zone, delineation of electrical conductors like carbonaceous rocks and sulphides. Three such case histories are presented here that include: a). basement and shear/fracture zone mapping in the Vindhyan basin north of Son-Narmada lineament, b). delineation of conductive zone (proved to be carbon phyllite) in the Mahakoshal Group of Kanhara area of Sonbhadra district, UP and c). Identification of a conductive zone, proved to be sulphide body, within the Mahakoshal group in the Gurharpahar area of Sidhi and Sonbhadra districts of MP and UP respectively. In the context of exploration for concealed uranium in the Gwalior basin, it is suggested to employ IP, resistivity, SP, gravity and magnetic methods for delineation of conductive zones like carbonaceous rocks, basement topography, including the graben like structures, fracture zone, geological boundaries and demarcation of the basin boundary. (author)

  15. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  16. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  17. Object and Objective Lost?

    DEFF Research Database (Denmark)

    Lopdrup-Hjorth, Thomas

    2015-01-01

    This paper explores the erosion and problematization of ‘the organization’ as a demarcated entity. Utilizing Foucault's reflections on ‘state-phobia’ as a source of inspiration, I show how an organization-phobia has gained a hold within Organization Theory (OT). By attending to the history...... of this organization-phobia, the paper argues that OT has become increasingly incapable of speaking about its core object. I show how organizations went from being conceptualized as entities of major importance to becoming theoretically deconstructed and associated with all kinds of ills. Through this history......, organizations as distinct entities have been rendered so problematic that they have gradually come to be removed from the center of OT. The costs of this have been rather significant. Besides undermining the grounds that gave OT intellectual credibility and legitimacy to begin with, the organization-phobia...

  18. Comparison of F-18 FDG PET and I-131 whole body scan in diagnosis of suspicious metastatic thyroid carcinoma

    International Nuclear Information System (INIS)

    Seok, Ju Won; Chung, June Key

    2005-01-01

    There are several reports about the usefulness of F-18 FDG PET in thyroid cancer. The aim of this study was to evaluate the effectiveness of F-18 FDG PET and I-131 whole body scan in suspicious metastatic thyroid cancer. There were 46 patients (11 men, 35 women; age range, 18-74yr; mean age, 47.3yr) with suspicious metastatic thyroid cancer after total thyroidectomy who performed FDG PET and I-131 scan. The interval of FDG PET and I-131 scan was within 6 months. An overall clinical evaluation was performed including cytology, thyroglobulin level, sonography, MRI and CT. Metastatic regions were divided into four areas: neck, mediastinum, lung and bone. Among 46 patients, the number of patients, metastatic lesions were detected, totaled 36 (78.3%). Twenty-nine patients (63.0%) were detected by FDG PET and 18 patients (39.1%) were detected by I-131 scan. Twenty-one patients were detected in neck by two methods. Nineteen patients (90.5%) were detected by FDG PET and 7 patients (33.3%) were detected by I-131 scan. Eighteen patients were detected in mediastinum by two methods. Ten patients (55.5%) were detected by FDG PET and 10 patients (55.5%) were detected by I-131 scan. Ten patients were detected in lung by two methods. Nine patients (90.0%) were detected by FDG PET and 3 patients (30.0%) were detected by I-131 scan. Three patients were detected in bone by two methods. Three patients (100%) were detected by FDG PET and 0 patients (0%) were detected by I-131 scan. These data indicate that for detecting metastatic lesions, F-18 FDG PET and I-131 whole body scan may provide complementary information. Thus, the combination of FDG PET and I-131 scan is the method of choice for detecting suspicious metastatic thyroid cancer after total thyroidectomy

  19. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  20. Crustal concealing of small-scale core-field secular variation

    DEFF Research Database (Denmark)

    Hulot, G.; Olsen, Nils; Thebault, E.

    2009-01-01

    of internal origin happen to be detectable now in spherical harmonic degrees up to, perhaps, 16. All of these changes are usually attributed to changes in the core field itself, the secular variation, on the ground that the lithospheric magnetization cannot produce such signals. It has, however, been pointed...... out, on empirical grounds, that temporal changes in the field of internal origin produced by the induced part of the lithospheric magnetization could dominate the core field signal beyond degree 22. This short note revisits this issue by taking advantage of our improved knowledge of the small...... cause of the observed changes in the field of internal origin up to some critical degree, N-C, is indeed likely to be the secular variation of the core field, but that the signal produced by the time-varying lithospheric field is bound to dominate and conceal the time-varying core signal beyond...

  1. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  2. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  3. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    Science.gov (United States)

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction.

    Science.gov (United States)

    Singh, P; Ajmera, D-H; Xiao, S-S; Yang, X-Z; Liu, X; Peng, B

    2016-11-01

    The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient's age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated ( p < or = 0.05) with extraction difficulty under regression models. In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice.

  5. Can positron emission mammography help to identify clinically significant breast cancer in women with suspicious calcifications on mammography?

    Energy Technology Data Exchange (ETDEWEB)

    Bitencourt, Almir G.V.; Lima, Eduardo N.P.; Macedo, Bruna R.C.; Conrado, Jorge L.F.A.; Marques, Elvira F.; Chojniak, Rubens [A C Camargo Cancer Center-Department of Imaging, Sao Paulo, SP (Brazil)

    2017-05-15

    To evaluate the diagnostic accuracy of positron emission mammography (PEM) for identifying malignant lesions in patients with suspicious microcalcifications detected on mammography. A prospective, single-centre study that evaluated 40 patients with suspicious calcifications at mammography and indication for percutaneous or surgical biopsy, with mean age of 56.4 years (range: 28-81 years). Patients who agreed to participate in the study underwent PEM with 18F-fluorodeoxyglucose before the final histological evaluation. PEM findings were compared with mammography and histological findings. Most calcifications (n = 34; 85.0 %) were classified as BIRADS 4. On histology, there were 25 (62.5 %) benign and 15 (37.5 %) malignant lesions, including 11 (27.5 %) ductal carcinoma in situ (DCIS) and 4 (10 %) invasive carcinomas. On subjective analysis, PEM was positive in 15 cases (37.5 %) and most of these cases (n = 14; 93.3 %) were confirmed as malignant on histology. There was one false-positive result, which corresponded to a fibroadenoma, and one false negative, which corresponded to an intermediate-grade DCIS. PEM had a sensitivity of 93.3 %, specificity of 96.0 % and accuracy of 95 %. PEM was able to identify all invasive carcinomas and high-grade DCIS (nuclear grade 3) in the presented sample, suggesting that this method may be useful for further evaluation of patients with suspected microcalcifications. (orig.)

  6. A comparisonof lymphocytic thyroiditis with papillary thyroid carcinoma showing suspicious ultrasonographic findings in a background of heterogeneous parenchyma

    Energy Technology Data Exchange (ETDEWEB)

    Nam, Sang Yu; Shin, Jung Hee; Ko, Eun Young; Hahn, Soo Yeon [Dept. of Radiology, Samsung Medicine Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2015-01-15

    The aim of this study was to compare ultrasonographic features in patients with lymphocytic thyroiditis (LT) and papillary thyroid carcinoma (PTC) having suspicious thyroid nodule(s) in a background of heterogeneous parenchyma and to determine the clinical and radiological predictors of malignancy. We reviewed the cases of 100 patients who underwent ultrasonography between April 2011 and October 2012, and showed suspicious thyroid nodule(s) in a background of heterogeneous parenchyma. Eight patients who did not undergo ultrasonography-guided fineneedle aspiration cytology (FNAC) and 34 cases of follow-up ultrasonography after initial FNAC were excluded. We compared the benign and malignant nodules in terms of their clinical and radiological factors. For the 58 nodules including 31 LTs (53.4%) and 27 PTCs (46.6%), the mean tumor sizes of the two groups were 0.96 cm for LT and 0.97 cm for PTC. A univariate analysis revealed that PTCs were more frequent in patients younger than 45 years and having microcalcifications than was LT. An independent predictor of PTC after adjustment was an age of <45 years. LT mimics malignancy in a background of heterogeneous parenchyma on ultrasonography. A young age of <45 years is the most important predictor of malignancy in this condition.

  7. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  8. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  9. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  10. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  11. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  12. The clinical value of bilateral breast MR imaging: is it worth performing on patients showing suspicious microcalcifications on mammography?

    Energy Technology Data Exchange (ETDEWEB)

    Akita, Ayano; Tanimoto, Akihiro; Kuribayashi, Sachio [Keio University, Department of Diagnostic Radiology, School of Medicine, Tokyo (Japan); Jinno, Hiromitsu [Keio University, Department of Surgery, School of Medicine, Tokyo (Japan); Kameyama, Kaori [Keio University, Division of Diagnostic Pathology, School of Medicine, Tokyo (Japan)

    2009-09-15

    The purpose of this study was to evaluate the clinical value of bilateral breast magnetic resonance (MR) imaging (MRI) in patients showing suspicious microcalcifications on mammography and negative ultrasound findings. Fifty patients underwent MRI before stereotactic vacuum-assisted breast biopsy (SVAB). MR findings were classified into five types for interpretation, and types 4 and 5 were considered malignant. SVAB revealed 13 carcinomas and 37 benign lesions. Malignant lesions were more frequently found in cases of positive MRI diagnoses than in negative MRI diagnoses (P < 0.001). Mammography had a sensitivity of 100%, a specificity of 24% and an accuracy of 44%, whereas mammography plus MRI had a sensitivity of 85%, a specificity of 100% and an accuracy of 96%. In the evaluation of mammographically detected microcalcifications, bilateral breast MRI is of good diagnostic value and may alter the indications for SVAB. (orig.)

  13. Retrospective Study on the Prevalence and Antibiotic Resistance Pattern of Staphylococcus Aureus and Staphylococcus Epidermidis Among Patients Suspicious of Bacteremia During 2006 - 2011

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Mohaghegh

    2015-05-01

    Full Text Available Background: Staphylococci bacteria cause different diseases, varies from mild skin infections to serious bacteremia. Also they are a major cause of nosocomial and community-acquired infections globally. Staphylococcus aureus and Staphylococcus epidermidis are the two important opportunistic pathogens of the staphylococci that both can cause bacteremia. Objectives: The aim of the present study was to investigate the prevalence and antibiotic resistance pattern of S. aureus and S. epidermidis among blood culture of patients of Ghaem Educational, Research and Treatment Center, Mashhad, Iran, during 6 years (2006 - 2011. Patients and Methods: In this retrospective study, hospital medical records of 28000 patients referred to Ghaem Educational, Research and Treatment Center, Mashhad, Iran, who were suspicious of blood infections during 6 years (2005-2011, were extracted. The patient’s blood culture with staphylococcal growth and their antibiogram results during 2006 - 2011 were collected and studied. Results: Staphylococcus spp. were isolated from 600 (2.14% out of 28000 blood cultures. Furthermore, 420 (70%, 170 (28.3% and 10 (1.7% out of 600 bacterial isolates identified as S. epidermidis, S. aureus and other Staphylococcus spp., respectively. Ampicillin, amoxicillin, cefixime, ceftazidime, penicillin, oxacillin, nalidixic acid and cephepime were the most antibiotics that the isolates were resistant against. Also vancommycin and chloramphenicol were the most effective antibiotics against S. epidermidis and S. aureus, respectively. Conclusions: Prevalence of Staphylococcal bacteremia caused by S. epidermidis is fairly high comparing to S. aureus among patients referred to Ghaem Educational, Research and Treatment Center, Mashhad, Iran. Also the resistance rate of Staphylococcus spp. isolated from blood against commonly used antibiotic is high, but there are some highly sensitive antibiotic against the infection.

  14. Concealed concern: fathers' experiences of having a child with juvenile idiopathic arthritis.

    Science.gov (United States)

    Waite-Jones, J M; Madill, A

    2008-01-01

    Despite increased research into families of chronically ill children, more needs to be known about the father's experience. We address this issue through asking: 'What is it like to be the father of a child with Juvenile Idiopathic Arthritis?' (JIA). Four members of eight families with an adolescent diagnosed with JIA, including seven fathers, were interviewed and transcripts analysed using grounded theory. This study suggests that fathers of children with JIA experience several severe losses which are exacerbated through comparisons they make between their own situation and that of fathers of healthy children. In addition, the fathers faced several constraints which reduced their opportunities to communicate with their ill child through shared activities. Fathers appeared to conceal their distress by adopting strategies of denial and distraction however their adjustment was facilitated, to some extent, by social support. They could also develop greater acceptance of their situation over time as the care of their ill child became assimilated into family life and constraints upon their life gradually reduced through the increased maturity of their son or daughter with JIA. These findings have implications for healthcare professionals and voluntary organisations.

  15. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  16. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  17. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  18. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials.

    Science.gov (United States)

    Devine, Eric G; Peebles, Kristina R; Martini, Valeria

    2017-03-01

    Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  19. A concealed observational study of infection control and safe injection practices in Jordanian governmental hospitals.

    Science.gov (United States)

    Al-Rawajfah, Omar M; Tubaishat, Ahmad

    2017-10-01

    The recognized international organizations on infection prevention recommend using an observational method as the gold standard procedure for assessing health care professional's compliance with standard infection control practices. However, observational studies are rarely used in Jordanian infection control studies. This study aimed to evaluate injection practices among nurses working in Jordanian governmental hospitals. A cross-sectional concealed observational design is used for this study. A convenience sampling technique was used to recruit a sample of nurses working in governmental hospitals in Jordan. Participants were unaware of the time and observer during the observation episode. A total of 384 nurses from 9 different hospitals participated in the study. A total of 835 injections events were observed, of which 73.9% were performed without handwashing, 64.5% without gloving, and 27.5% were followed by needle recapping. Handwashing rate was the lowest (18.9%) when injections were performed by beginner nurses. Subcutaneous injections were associated with the lowest rate (26.7%) of postinjection handwashing compared with other routes. This study demonstrates the need for focused and effective infection control educational programs in Jordanian hospitals. Future studies should consider exploring the whole infection control practices related to waste disposal and the roles of the infection control nurse in this process in Jordanian hospitals. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  20. Deconstructing Concealed Gayness Text in The Film Negeri van Oranje: Critical Discourse Analysis

    Directory of Open Access Journals (Sweden)

    Heri Setiawan

    2018-02-01

    Full Text Available As one of the most popular creative cultural products, film sometimes speaks beyond what it presents. It is not always produced merely for entertainment purposes, but also to spread a certain ideology and represent a particular culture. Anchored in queer theory, this research looks at the Indonesian film, Negeri Van Oranje, which was chosen purposely to be analyzed using Fairclough’s critical discourse analysis model with an aim to deconstruct the concealed gayness text in the film. From the analysis, it was found that the gay scenes in the film try to tell its audience about the positions, feelings, challenges, and rejections that Indonesian gay people experience living amongst heteronormative surroundings. Some new notions about gay people’s life in Indonesia are extracted based on the analysis of the gay scenes in the film. The strategy of inserting gay content into a film nationally released in Indonesia is also revealed. The results of the analysis could be used to create a picture of what gay life looks like in Indonesia, a multicultural country that is well-known as the place in which the world’s largest Muslim population dwells.

  1. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-11

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  2. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  3. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  4. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...who worked at an abortion clinic that had recently been bombed and whose life had been threatened was denied a license to carry because he was not...populace. The new law laid out new prohibitions and penalties enforceable statewide. Additionally, the Preemption Act was necessary to set the legal

  6. The image of the butcher (13th-20th): In search of respectability between corporate pride and blood concealment.

    OpenAIRE

    Leteux , Sylvain

    2015-01-01

    International audience; In most images that represent butchers in France since the Middle Ages, the animal’s blood and death are often eclipsed or softened, except for the realistic photographs of slaughterhouses in the 20th century. The will to conceal blood shows the butchers’ will to build an honourable image of themselves. This quest for respectability is obvious if you look at the ceremony clothes worn by butchers during civil and religious celebrations. In the 19th century, as the trade...

  7. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  8. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  9. Anxiety/Depression and Hostility/Suspiciousness in Adolescent Boys: Testing Adherence to Honor Code as Mediator of Callousness and Attachment Insecurity

    Science.gov (United States)

    Somech, Lior Y.; Elizur, Yoel

    2012-01-01

    Research of psychological distress (PD) needs to differentiate between anxiety/depression and hostility/suspiciousness, which are associated with different motivational systems. In this study, structural equation modeling was used to test two hypothesized models for the prediction of each facet of PD. Hypotheses were proposed about the effects of…

  10. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  11. Detection of suspicious malignant cervical lymph nodes of unknown origin: diagnostic accuracy of ultrasound-guided fine-needle aspiration biopsy with nodal size and central necrosis correlate

    International Nuclear Information System (INIS)

    Lo, C.-P.; Chen, C.-Y.; Chin, S-.C.; Lee, K.-W.; Hsueh, C.-J.; Juan, C.-J.; Kao, H.-W.; Huang, G.-S.

    2007-01-01

    To assess the role of ultrasound-guided fine-needle aspiration biopsy (US-guided FNAB) in the diagnostic workup of suspicious malignant cervical lymph nodes in patients with palpable neck masses and without known primary cancer. The diagnostic accuracy of imaging morphologic criteria, including sizes and central necrosis for assessing suspicious malignant nodes, were also examined. This is a retrospective study of 426 patients with palpable neck masses from an outpatient department evaluated with computed tomography, magnetic resonance imaging, or US. US-guided FNABs were performed in 102 patients with suspicious malignant cervical lymph nodes at a single institution. Cytologically positive lymph nodes (n = 12) were further validated with excisional biopsy. Negative lymph nodes (n = 90) were either excised (n = 10) or followed up by imaging studies for at least one year (n = 80). The diagnostic accuracy of the FNABs along with the imaging findings of nodal sizes and presence of central necrosis, which were classified by a consensus of 2 radiologists, were assessed. Twelve malignant nodes were detected with US-guided FNAB with one false-positive and one false-negative result. The overall sensitivity, specificity, and accuracy for FNAB were 91.7%, 98.9%, and 98.0%. respectively. The sensitivity, specificity, and accuracy were 66.7%, 30.0%, and 34.3% for size criterion and 75.0%, 83.3%, and 82.3% for central necrosis criterion. The size of cervical lymph node does not appear to be an important imaging criterion for assessing suspicious malignant lymph nodes, compared with the criterion of central necrosis. US-guided FNAB is highly specific and sensitive in the diagnostic workup of suspicious malignant cervical lymph nodes in patients without known primary cancers. (author)

  12. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    Science.gov (United States)

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  13. African land degradation in a world of global atmospheric change: fertilization conceals degradation?

    Science.gov (United States)

    Le, Lulseged Tamene, Paul L. G. Vlek, Quang Bao

    2009-04-01

    Land degradation is one of the most widespread environmental problems worldwide. The sub-Saharan Africa (SSA) is one of the most seriously affected regions with huge implications on food security and economic development. To plan plausible management measures, understanding the magnitude of the problem and identification of hotspot areas are necessary. Analysis of remote sensing and climate data observed from space for the period 1982 - 2003 showed significant improvement in vegetation productivity across 30% of SSA with decline on 5% of the subcontinent. Global change in atmospheric chemistry is likely responsible for the observed increasing trend in vegetation productivity. Such widespread greening observed from space could mask anthropogenic land degradation processes such as land conversion, selective logging, and soil nutrient mining. To assess this possible masking effect, a re-analysis of the vegetation productivity dynamics, taking into account atmospheric fertilization, was conducted. This was performed by analyzing the long-term trend in vegetation productivity of pristine lands (areas with minimum human- and climate- related impacts) identified across different biomes in SSA. The baseline slope values of biomass accrual calculated for those pristine lands were estimated and used to re-calculate the long-term trend of green biomass with and without the impact of atmospheric fertilization. This ultimately enabled to delineate the areas that would have experienced significant loss in vegetation productivity had the atmospheric chemistry not changed. The result suggests that seven times more than the area of actual productivity decline in SSA is affected by land degradation processes that are concealed by atmospheric fertilization. With this rate of surreptitious loss of vital land attributes and with the current rate of population growth (3%), the SSA subcontinent may soon lack the land resources necessary to foster economic development. Spatially

  14. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  15. Sharp and blunt force trauma concealment by thermal alteration in homicides: an in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones

    OpenAIRE

    Macoveciuc, I; Marquez-Grant, N; Horsfall, I; Zioupos, P

    2017-01-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-exi...

  16. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  17. Elegant objects

    CERN Document Server

    Bugayenko, Yegor

    2017-01-01

    There are 23 practical recommendations for object-oriented programmers. Most of them are completely against everything you've read in other books. For example, static methods, NULL references, getters, setters, and mutable classes are called evil. Compound variable names, validators, private static literals, configurable objects, inheritance, annotations, MVC, dependency injection containers, reflection, ORM and even algorithms are our enemies.

  18. Objective lens

    Science.gov (United States)

    Olczak, Eugene G. (Inventor)

    2011-01-01

    An objective lens and a method for using same. The objective lens has a first end, a second end, and a plurality of optical elements. The optical elements are positioned between the first end and the second end and are at least substantially symmetric about a plane centered between the first end and the second end.

  19. Long Distance Endovascular Growth of Jugulotympanic Paraganglioma Evident in 68Ga-DOTATATE PET but Concealed on CT.

    Science.gov (United States)

    Avramovic, Nemanja; Weckesser, Matthias; Velasco, Aglaé; Stenner, Markus; Noto, Benjamin

    2017-02-01

    A 60-year-old woman was referred to contrast-enhanced CT for evaluation of jugular vein thrombosis incidentally detected by ultrasound. Contrast-enhanced CT showed an enhanced tumor of the right skull base highly suspicious of jugulotympanic paraganglioma. However, the jugular veins showed a nearly symmetric contrast enhancement without clear evidence of thrombosis. Consecutive Ga-DOTATATE PET/CT depicted high tumor uptake, which comprised the entire internal jugular vein. Endovascular growth of paraganglioma might be missed on contrast-enhanced CT because of high vascularization of the lesion. Ga-DOTATATE PET is suited for accurate determination of tumor extent.

  20. Extended objects

    International Nuclear Information System (INIS)

    Creutz, M.

    1976-01-01

    After some disconnected comments on the MIT bag and string models for extended hadrons, I review current understanding of extended objects in classical conventional relativistic field theories and their quantum mechanical interpretation

  1. Trusted Objects

    International Nuclear Information System (INIS)

    CAMPBELL, PHILIP L.; PIERSON, LYNDON G.; WITZKE, EDWARD L.

    1999-01-01

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  2. Blood pressure shifts resulting from a concealed arteriovenous fistula associated with an iliac aneurysm: a case report.

    Science.gov (United States)

    Doi, Shintaro; Motoyama, Yoshiaki; Ito, Hiromi

    2016-01-01

    A solitary iliac aneurysm (SIA) is more uncommon than an abdominal aortic aneurysm. The aneurysm is located in the deep pelvis and is diagnosed when it reaches a large size with symptoms of compression around adjacent structures and organs or when it ruptures. A definite diagnosis of an arteriovenous fistula (AVF) associated with a SIA is difficult preoperatively because there might not be enough symptoms and time for diagnosis. Here, we present a patient with asymptomatic rupture of SIA into the common iliac vein with characteristic blood pressure shifts. A 41-year-old man with a huge SIA underwent aortobifemoral graft replacement. Preoperatively, his blood pressure showed characteristic shifts for one or two heartbeats out of five beats, indicating that an AVF was present and that the shunt was about to having a high flow. During surgery, an AVF associated with the SIA was found to be concealed owing to compression from the huge iliac artery aneurysm, and the shunt showed a high flow, resulting in shock during the surgery. No complications were noted after aortobifemoral graft replacement. Postoperatively, we noted an enhanced paravertebral vein on computed tomography (CT), which indicated the presence of an AVF. Definite diagnosis of an AVF offers advantages in surgical and anesthetic management. We emphasize that a large SIA can push the iliac vein and occlude an AVF laceration, concealing the enhancement of the veins in the arterial phase on CT. Blood pressure shifts might predict the existence of a concealed AVF that has a large shunt. Even if the vena cava and the iliac veins are not enhanced on CT, anesthesiologists should carefully determine whether their distal branches are enhanced.

  3. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  4. Presence of histopathological premalignant lesions and infection caused by high-risk genotypes of human papillomavirus in patients with suspicious cytological and colposcopy results: A prospective study

    Directory of Open Access Journals (Sweden)

    Golubović Mileta

    2017-01-01

    Full Text Available Background/Aim. In patients with premalignant cervical lesions, human papillomavirus (HPV infection, at any moment, may be spontaneously eliminated, or may persist or transform cervical epithelium from a lower to a higher degree. Due to that, it is necessary to wisely select the patients who are at high risk of cancer development. The aim of the study was to establish the interdependence between a suspicious Papanicolaou (Pap test and colposcopy with the infection caused by high-risk genotypes of human papillomavirus and the presence of premalignant cervical lesions. Methods. This prospective study used cytological, colposcopy, real-time polymerase chain reaction (PCR of high-risk genotypes of human papillomavirus and histopathological analysis of cervical biopsy specimen. Out of 2,578 female patients sent to cytological analyses in Clinical Center of Montenegro, during 2012, 2013 and 2014, the study included 80 women who had to submit their biopsy specimens due to a suspicious Pap test and atypical colposcopy results. Results. In the group of 80 (3.1%; n = 80/2,578 of the selected female patients with suspicious Pap test and colposcopy, 2/3 or 56 (70% of them had cervicitis, and 1/3 or 24 (30% had cervical intraepithelial neoplasia. The most common type in cervical intraepithelial neoplasia was HPV16 in 8 female patients, ie 61.53% out of the number of infected, or 33.33% out of the total number of premalignant lesions. Conclusion. Patients with suspicious Papanicolaou test, colposcopy results and infection which is caused by high-risk HPV infection (HPV 16 in particular often have premalignant cervical lesions. In these cases, histopathological confirmation of lesions is mandatory, since it serves as a definitive diagnostic procedure.

  5. Subcategorization of Suspicious Breast Lesions (BI-RADS Category 4) According to MRI Criteria: Role of Dynamic Contrast-Enhanced and Diffusion-Weighted Imaging.

    Science.gov (United States)

    Maltez de Almeida, João Ricardo; Gomes, André Boechat; Barros, Thomas Pitangueira; Fahel, Paulo Eduardo; de Seixas Rocha, Mário

    2015-07-01

    The purposes of this study were to investigate whether dynamic contrast-enhanced MRI is adequate for subcategorization of suspicious lesions (BI-RADS category 4) and to evaluate whether use of DWI improves diagnostic performance. The study group was composed of 103 suspicious lesions found in 83 subjects. Patient ages and lesion sizes were compiled, and two radiologists reanalyzed the images; subcategorized the findings as BI-RADS 4A, 4B, or 4C; and calculated apparent diffusion coefficient (ADC) values. The stratified variables were tested by univariate analysis and inserted in two multivariate predictive models, which were used to generate ROC curves and compare AUCs. Positive predictive values (PPVs) for each subcategory and ADC level were calculated, and interobserver agreement was tested. Forty-four (42.7%) suspicious findings proved malignant. Except for age (p = 0.08), all stratified predictor variables were significant in univariate analyses (p BI-RADS 4 subcategory (4A, 0.15; 4B, 0.37; 4C, 0.84). ADC values of 1.10 × 10(-3) mm(2)/s or less had the second highest PPV (0.77). Interobserver agreement was substantial at a kappa value of 0.80 (95% CI, 0.70-0.90; p BI-RADS category 4) can be satisfactorily performed with DCE-MRI and slightly improved when DWI is introduced.

  6. Qualitative and Semiquantitative Elastography for the Diagnosis of Intermediate Suspicious Thyroid Nodules Based on the 2015 American Thyroid Association Guidelines.

    Science.gov (United States)

    Yang, Bo Ra; Kim, Eun-Kyung; Moon, Hee Jung; Yoon, Jung Hyun; Park, Vivian Y; Kwak, Jin Young

    2018-04-01

    To evaluate qualitative and semiquantitative elastography for the diagnosis of intermediate suspicious thyroid nodules based on the 2015 American Thyroid Association (ATA) guidelines. Through a retrospective search of our institutional database, 746 solid thyroid nodules found on grayscale ultrasonography, strain elastography, and ultrasound-guided fine-needle aspiration between June and November 2009 were collected. Among them, 80 nodules from 80 patients with an intermediate suspicion of malignancy based on the 2015 ATA guidelines that were 10 mm or larger were recruited as the final study nodules. Elastographic findings were categorized according to the criteria of Rago et al (J Clin Endocrinol Metab 2007; 92:2917-2922) and Asteria et al (Thyroid 2008; 18:523-531), and strain ratio values were calculated and recorded. The independent 2-sample t test and χ 2 test (or Fisher exact test) were used to evaluate differences in clinical parameters between benign and malignant thyroid nodules. All variables were compared by univariate and multivariate logistic regression analyses, and odds ratios with 95% confidence intervals were calculated. Of the 80 nodules, 6 (7.5%) were malignant, and 74 (92.5%) were benign. No significant differences were observed in age, sex, nodule size, elasticity score, and strain ratio between benign and malignant nodules. No variables significantly predicted thyroid malignancy on the univariate analysis. On the multivariate logistic regression analysis, there were no independent variables associated with thyroid malignancy, including the elasticity score and strain ratio (all P > .05). Elastographic analysis using the elasticity score and strain ratio has limited ability to characterize the benignity or malignancy of thyroid nodules with an intermediate suspicion of malignancy based on the 2015 ATA guidelines. © 2017 by the American Institute of Ultrasound in Medicine.

  7. Clinical and molecular profile of newborns with confirmed or suspicious congenital adrenal hyperplasia detected after a public screening program implementation.

    Science.gov (United States)

    Kopacek, Cristiane; Prado, Mayara J; da Silva, Claudia M D; de Castro, Simone M; Beltrão, Luciana A; Vargas, Paula R; Grandi, Tarciana; Rossetti, Maria L R; Spritzer, Poli Mara

    2018-04-30

    To describe the results obtained in a neonatal screening program after its implementation and to assess the clinical and molecular profiles of confirmed and suspicious congenital adrenal hyperplasia cases. A cross-sectional study was conducted. Newborns with suspected disease due to high 17-hydroxyprogesterone levels and adjusted for birth weight were selected. Classical congenital adrenal hyperplasia (salt-wasting and simple virilizing forms) was diagnosed by an increase in 17-hydroxyprogesterone levels as confirmed in the retest, clinical evaluation, and genotype determined by SNaPshot and multiplex ligation-dependent probe amplification. After 24 months, 15 classic congenital adrenal hyperplasia cases were diagnosed in a total of 217,965 newborns, with an estimated incidence of 1:14,531. From 132 patients, seven non-classical and 14 heterozygous patients were screened for CYP21A2 mutations, and 96 patients presented false positives with wild type CYP21A2. On retest, increased 17-hydroxyprogesterone levels were found in classical congenital adrenal hyperplasia patients and showed significant correlation with genotype-related classical genital adrenal hyperplasia. The most frequent mutations were IVS2-13A/C>G followed by gene deletion or rearrangement events in the classical form. In non-classical and heterozygous diseases, p.Val282Leu was the most common mutation. The results underscore the effectiveness of congenital adrenal hyperplasia neonatal screening in the public health system and indicate that the adopted strategy was appropriate. The second sample collection along with genotyping of suspected cases helped to properly diagnose both severe and milder cases and delineate them from false positive patients. Copyright © 2018. Published by Elsevier Editora Ltda.

  8. The Usefulness of the Transabdominal Ultrasonography as a Screening Examination in the Evaluation of the Patient with Suspicious Gastric Disease

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Cheol; Shin, Hyeong Cheol; Kim, Hyung Hwan; Park, Seong Jin; Nam, Deok Ho; Bae, Won Kyung; Kim, Il Young; Jeong, Du Shin; Chung, Il Kwun [Soonchunhyang University, Cheonan Hospital, Cheonan (Korea, Republic of)

    2005-03-15

    To evaluate the usefulness of transabdominal ultrasonography as a screening examination in patients with suspicious gastric disease. We selected 141 patients with epigastric pain and who were found to have antral gastric wall thickening of more than 5 mm in transabdominal ultrasonography, and who underwent gastroscopy immediately following the ultrasonography examination, because we suspected that these patients had gastric disease. We measured the full thickness of the five layers of the gastric wall and evaluated the preservation of this five layered structure. We respectively compared the gastric wall thickness and the preservation of gastric layers in 26 normal, 91 gastritis, 12 gastric ulcer, and 12 gastric cancer patients, who were classified based on the gastroscopy results. The mean thicknesses of the gastric wall in the normal, gastritis, gastric ulcer and gastric cancer patients were 5.13{+-}0.14 mm, 6.71{+-}1.33 mm, 8.08{+-}2.80 mm, and 12.45{+-}3.70 mm, respectively. The gastric walls in the gastritis, gastric ulcer and gastric cancer patients were significantly thicker than that in the normal patients (p < 0.01). The gastric wall in the gastric cancer patients was significantly thicker than those in the gastritis and gastric ulcer patients (p < 0.01). However, the difference in the gastric wall thickness between the gastritis and gastric ulcer patients was not statistically significant (p > 0.01). Except for two patients with gastritis and three patients with gastric ulcer, the stratification of the gastric wall was preserved in all of the normal, gastritis and gastric ulcer patients, whereas it was disrupted in all of the patients with gastric cancer. Transabdominal ultrasonography in the fasting state may be a helpful and convenient modality, which can serve as a screening examination in the evaluation of gastric disease. Therefore, careful attention and effort are needed to evaluate the gastric wall during transabdominal ultrasonography

  9. Suspicious breast calcifications undergoing stereotactic biopsy in women ages 70 and over: Breast cancer incidence by BI-RADS descriptors.

    Science.gov (United States)

    Grimm, Lars J; Johnson, David Y; Johnson, Karen S; Baker, Jay A; Soo, Mary Scott; Hwang, E Shelley; Ghate, Sujata V

    2017-06-01

    To determine the malignancy rate overall and for specific BI-RADS descriptors in women ≥70 years who undergo stereotactic biopsy for calcifications. We retrospectively reviewed 14,577 consecutive mammogram reports in 6839 women ≥70 years to collect 231 stereotactic biopsies of calcifications in 215 women. Cases with missing images or histopathology and calcifications associated with masses, distortion, or asymmetries were excluded. Three breast radiologists determined BI-RADS descriptors by majority. Histology, hormone receptor status, and lymph node status were correlated with BI-RADS descriptors. There were 131 (57 %) benign, 22 (10 %) atypia/lobular carcinomas in situ, 55 (24 %) ductal carcinomas in situ (DCIS), and 23 (10 %) invasive diagnoses. Twenty-seven (51 %) DCIS cases were high-grade. Five (22 %) invasive cases were high-grade, two (9 %) were triple-negative, and three (12 %) were node-positive. Malignancy was found in 49 % (50/103) of fine pleomorphic, 50 % (14/28) of fine linear, 25 % (10/40) of amorphous, 20 % (3/15) of round, 3 % (1/36) of coarse heterogeneous, and 0 % (0/9) of dystrophic calcifications. Among women ≥70 years that underwent stereotactic biopsy for calcifications only, we observed a high rate of malignancy. Additionally, coarse heterogeneous calcifications may warrant a probable benign designation. • Cancer rates of biopsied calcifications in women ≥70 years are high • Radiologists should not dismiss suspicious calcifications in older women • Coarse heterogeneous calcifications may warrant a probable benign designation.

  10. Retrospective analysis of suspicious pelvic masses using the Pelvic Mass Index (PMI) scoring system from 2007 to 2014.

    Science.gov (United States)

    Sinha, Anju; Drews, Florian; Lim, Kenneth; Pugh, Neil D

    2016-06-01

    This study aims to validate the accuracy of the Pelvic Mass Index (PMI) by comparing it with Risk of Malignancy Index (RMI) in a large patient cohort. This retrospective study used data of women with ovarian masses collected from 2007 to 2014, referred to the Pelvic Mass Clinic (PMC) at University Hospital of Wales in Cardiff. The locally developed PMI was used to triage patients for surgery, surveillance or discharge. Performance measures for PMI, RMI and CA125 are reported as sensitivity, specificity, negative predictive value (NPV), positive predictive value (PPV), receiver operating characteristic (ROC) curves and area under the curve (AUC) for premenopausal and postmenopausal women alike. PMI was calculated on 1468 patients of whom 497 underwent surgery, 176 (71.0%) were in the high risk group, 63 (68.0%) intermediate and 258 (23%) amongst low risk women. Compared to RMI, PMI had a higher sensitivity (90.4%) and NPV (96.9%) for the entire cohort, as well as in the premenopausal (88.9%; 97.6%) and postmenopausal (91.5%; 95.6%) subcategories. ROC curves indicated better performance in the total group (AUC 0.823 vs. 0.770) and the premenopausal group (AUC 0.847 vs. 0.728), though AUC in the postmenopausal group was similar (0.779 vs. 0.791) - likely due to increased specificity of CA125 after menopause. Histology revealed PMI significantly outperforms RMI in diagnosing malignancy, missing only 1 compared to 20 cancers. The high sensitivity and NPV of PMI makes it a useful tool in triaging patients with suspicious ovarian masses. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. The Usefulness of the Transabdominal Ultrasonography as a Screening Examination in the Evaluation of the Patient with Suspicious Gastric Disease

    International Nuclear Information System (INIS)

    Kim, Hyun Cheol; Shin, Hyeong Cheol; Kim, Hyung Hwan; Park, Seong Jin; Nam, Deok Ho; Bae, Won Kyung; Kim, Il Young; Jeong, Du Shin; Chung, Il Kwun

    2005-01-01

    To evaluate the usefulness of transabdominal ultrasonography as a screening examination in patients with suspicious gastric disease. We selected 141 patients with epigastric pain and who were found to have antral gastric wall thickening of more than 5 mm in transabdominal ultrasonography, and who underwent gastroscopy immediately following the ultrasonography examination, because we suspected that these patients had gastric disease. We measured the full thickness of the five layers of the gastric wall and evaluated the preservation of this five layered structure. We respectively compared the gastric wall thickness and the preservation of gastric layers in 26 normal, 91 gastritis, 12 gastric ulcer, and 12 gastric cancer patients, who were classified based on the gastroscopy results. The mean thicknesses of the gastric wall in the normal, gastritis, gastric ulcer and gastric cancer patients were 5.13±0.14 mm, 6.71±1.33 mm, 8.08±2.80 mm, and 12.45±3.70 mm, respectively. The gastric walls in the gastritis, gastric ulcer and gastric cancer patients were significantly thicker than that in the normal patients (p 0.01). Except for two patients with gastritis and three patients with gastric ulcer, the stratification of the gastric wall was preserved in all of the normal, gastritis and gastric ulcer patients, whereas it was disrupted in all of the patients with gastric cancer. Transabdominal ultrasonography in the fasting state may be a helpful and convenient modality, which can serve as a screening examination in the evaluation of gastric disease. Therefore, careful attention and effort are needed to evaluate the gastric wall during transabdominal ultrasonography

  12. Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2009-01-01

    -- an outline which at the same time indicates the need for transformations of the Durkheimian model on decisive points. Thus, thirdly, it returns to Durkheim and undertakes to develop his concepts in a direction suitable for a sociological theory of fashion. Finally, it discusses the theoretical implications......This article attempts to create a framework for understanding modern fashion phenomena on the basis of Durkheim's sociology of religion. It focuses on Durkheim's conception of the relation between the cult and the sacred object, on his notion of 'exteriorisation', and on his theory of the social...... symbol in an attempt to describe the peculiar attraction of the fashion object and its social constitution. However, Durkheim's notions of cult and ritual must undergo profound changes if they are to be used in an analysis of fashion. The article tries to expand the Durkheimian cult, radically enlarging...

  13. Utilities objectives

    International Nuclear Information System (INIS)

    Cousin, Y.; Fabian, H.U.

    1996-01-01

    The policy of French and german utilities is to make use of nuclear energy as a long term, competitive and environmentally friendly power supply. The world electricity generation is due to double within the next 30 years. In the next 20 to 30 years the necessity of nuclear energy will be broadly recognized. More than for most industries, to deal properly with nuclear energy requires the combination of a consistent political will, of a proper institutional framework, of strong and legitimate control authorities, of a sophisticated industry and of operators with skilled management and human resources. One of the major risk facing nuclear energy is the loss of competitiveness. This can be achieved only through the combination of an optimized design, a consistent standardization, a proper industrial partnership and a stable long term strategy. Although the existing plants in Western Europe are already very safe, the policy is clearly to enhance the safety of the next generation of nuclear plants which are designing today. The French and German utilities have chosen an evolutionary approach based on experience and proven technologies, with an enhanced defense in depth and an objective of easier operation and maintenance. The cost objective is to maintain and improve what has been achieved in the best existing power plants in both countries. This calls for rational choices and optimized design to meet the safety objectives, a strong standardization policy, short construction times, high availability and enough flexibility to enable optimization of the fuel cycle throughout the lifetime of the plants. The conceptual design phase has proven that the French and German teams from industry and from the utilities are able to pursue both the safety and the cost objectives, basing their decision on a rational approach which could be accepted by the safety authorities. (J.S.)

  14. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  15. Eyes with Suspicious Appearance of the Optic Disc and Normal Intraocular Pressure: Using Clinical and Epidemiological Characteristics to Differentiate Those with and without Glaucoma.

    Directory of Open Access Journals (Sweden)

    Diego T Dias

    Full Text Available Among all glaucoma suspects, eyes with optic nerve head features suspicious or suggestive of early glaucoma are probably those that offer the greatest challenge for clinicians. In contrast with the robust longitudinal data published on ocular hypertension, there is no specific management guideline for these patients. Therefore, evaluating eyes with suspicious optic disc appearance and normal intraocular pressure (IOP, we sought to investigate potential differences in clinical and epidemiological characteristics to differentiate those with normal-tension glaucoma (NTG from those with presumed large physiological optic disc cups (pLPC. In this observational case-control study, we consecutively enrolled individuals with pLPC and NTG. All eyes had vertical cup-to-disc ratio (VCDR≥0.6 and untreated IOP<21 mmHg. Glaucomatous eyes had reproducible visual field defects. Eyes with pLPC required normal visual fields and ≥30 months of follow-up with no evidence of glaucomatous neuropathy. Clinical and epidemiological parameters were compared between groups. Eighty-four individuals with pLPC and 40 NTG patients were included. Regarding our main results, NTG patients were significantly older and with a higher prevalence of Japanese descendants (p<0.01. Not only did pLPC eyes have smaller mean VCDR, but also larger optic discs (p≤0.04. There were no significant differences for gender, central corneal thickness, and spherical equivalent (p≥0.38. Significant odds ratios (OR were found for race (OR = 2.42; for Japanese ancestry, age (OR = 1.05, VCDR (OR = 5.03, and disc size (OR = 0.04; p≤0.04. In conclusion, in patients with suspicious optic disc and normal IOP, those with older age, Japanese ancestry, smaller optic discs, and larger VCDR are more likely to have NTG, and therefore, deserve deeper investigation and closer monitoring.

  16. Fast and Noninvasive Characterization of Suspicious Lesions Detected at Breast Cancer X-Ray Screening: Capability of Diffusion-weighted MR Imaging with MIPs.

    Science.gov (United States)

    Bickelhaupt, Sebastian; Laun, Frederik B; Tesdorff, Jana; Lederer, Wolfgang; Daniel, Heidi; Stieber, Anne; Delorme, Stefan; Schlemmer, Heinz-Peter

    2016-03-01

    To evaluate the ability of a diagnostic abbreviated magnetic resonance (MR) imaging protocol consisting of maximum intensity projections (MIPs) from diffusion-weighted imaging with background suppression (DWIBS) and unenhanced morphologic sequences to help predict the likelihood of malignancy on suspicious screening x-ray mammograms, as compared with an abbreviated contrast material-enhanced MR imaging protocol and a full diagnostic breast MR imaging protocol. This prospective institutional review board-approved study included 50 women (mean age, 57.1 years; range, 50-69 years), who gave informed consent and who had suspicious screening mammograms and an indication for biopsy, from September 2014 to January 2015. Before biopsy, full diagnostic contrast-enhanced MR imaging was performed that included DWIBS (b = 1500 sec/mm(2)). Two abbreviated protocols (APs) based on MIPs were evaluated regarding the potential to exclude malignancy: DWIBS (AP1) and subtraction images from the first postcontrast and the unenhanced series (AP2). Diagnostic indexes of both methods were examined by using the McNemar test and were compared with those of the full diagnostic protocol and histopathologic findings. Twenty-four of 50 participants had a breast carcinoma. With AP1 (DWIBS), the sensitivity was 0.92 (95% confidence interval [CI]: 0.73, 0.98), the specificity was 0.94 (95% CI: 0.77, 0.99), the negative predictive value (NPV) was 0.92 (95% CI: 0.75, 0.99), and the positive predictive value (PPV) was 0.93 (95% CI: 0.75, 0.99). The mean reading time was 29.7 seconds (range, 4.9-110.0 seconds) and was less than 3 seconds (range, 1.2-7.6 seconds) in the absence of suspicious findings on the DWIBS MIPs. With the AP2 protocol, the sensitivity was 0.85 (95% CI: 0.78, 0.95), the specificity was 0.90 (95% CI: 0.72, 0.97), the NPV was 0.87 (95% CI: 0.69, 0.95), the PPV was 0.89 (95% CI: 0.69, 0.97), and the mean reading time was 29.6 seconds (range, 6.0-100.0 seconds). Unenhanced diagnostic

  17. Account Deletion Prediction on RuNet: A Case Study of Suspicious Twitter Accounts Active During the Russian-Ukrainian Crisis

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Bell, Eric B.

    2016-06-17

    Social networks are dynamically changing over time e.g., some accounts are being created and some are being deleted or become private. This ephemerality at both an account level and content level results from a combination of privacy concerns, spam, and deceptive behaviors. In this study we analyze a large dataset of 180,340 accounts active during the Russian-Ukrainian crisis to discover a series of predictive features for the removal or shutdown of a suspicious account. We find that unlike previously reported profile and net- work features, lexical features form the basis for highly accurate prediction of the deletion of an account.

  18. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  19. 一种基于人脸对称性的差错掩盖方法%An Error Concealment Method Based on Facial Symmetry

    Institute of Scientific and Technical Information of China (English)

    赖俊; 张江鑫

    2013-01-01

    This paper presents an error concealment method based on facial symmetry .We first execute color segmentation , determine the skin color region;then judge the symmetry of this region , conceal symmetry face regions with symmetry algorithm , conceal other regions with adaptive interpolation algorithm .Using JM86 model of H.264 standard to simulate the algorithm , the experimental results show that our method achieves better conceal results when compared with traditional interpolation algorithm .%该文提出一种基于人脸对称性的差错掩盖方法。首先进行肤色分割,判断出肤色区域;然后对检测出的肤色区域进行对称性判断,选出对称的人脸区域并采用人脸对称掩盖算法进行差错掩盖,对其它区域则采用自适应插值算法。采用H.264的JM86模型对算法进行验证,实验结果表明,与传统的插值算法相比,该文算法利用了人脸的对称性,对于对称的人脸区域获得了更好的掩盖效果。

  20. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  1. Living with a concealable stigmatized identity: the impact of anticipated stigma, centrality, salience, and cultural stigma on psychological distress and health.

    Science.gov (United States)

    Quinn, Diane M; Chaudoir, Stephenie R

    2009-10-01

    The current research provides a framework for understanding how concealable stigmatized identities impact people's psychological well-being and health. The authors hypothesize that increased anticipated stigma, greater centrality of the stigmatized identity to the self, increased salience of the identity, and possession of a stigma that is more strongly culturally devalued all predict heightened psychological distress. In Study 1, the hypotheses were supported with a sample of 300 participants who possessed 13 different concealable stigmatized identities. Analyses comparing people with an associative stigma to those with a personal stigma showed that people with an associative stigma report less distress and that this difference is fully mediated by decreased anticipated stigma, centrality, and salience. Study 2 sought to replicate the findings of Study 1 with a sample of 235 participants possessing concealable stigmatized identities and to extend the model to predicting health outcomes. Structural equation modeling showed that anticipated stigma and cultural stigma were directly related to self-reported health outcomes. Discussion centers on understanding the implications of intraindividual processes (anticipated stigma, identity centrality, and identity salience) and an external process (cultural devaluation of stigmatized identities) for mental and physical health among people living with a concealable stigmatized identity. 2009 APA, all rights reserved.

  2. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  3. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  4. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  5. Mammographic evaluation of suspicious malignant lesions based on ACR(American College of Radiology) breast imaging reporting and data system(BI-RADS)

    International Nuclear Information System (INIS)

    Lee, Jei Hee; Oh, Ki Keun; Chang, So Yong; Kim, Eun Kyung; Kim, Mi Hye

    1999-01-01

    The purpose of this study was to assess the mammographic features and pathologic outcome of category 4 lesions using the Breast Imaging Reporting and Data System(BI-RADS), and to evaluate the significance of final assessment categories. Using BI-RADS, the interpretations of 8,134 mammograms acquired between January 1997 and May 1998 were categorized. From among 161 lesions categorized as '4' ('suspicious abnormality') and pathologically confirmed by surgery or biopsy, we analysed 113, found in 66 patients. The pathologic outcome of these 113 lesions was as follows:infiltrating ductal carcinoma, 17.7%(20/113); DCIS(ductal carcinoma in sitv), 8.0%(9/113); ADH(atypical ductal hyperplasia), 5.3%(6/113); DEH(ductal epithelial hyperplasia), 1.8%(2/113); ductectasia, 0.9%(1/113), FCD(fibrocystic change), 27.4%(31/113); firoadenoma, 7.1%(8/113); stromal fibrosis, 9.7%(11/113); normal parenchyma, 7.1%(8/113); other pathology, 15.0%(17/113). The most frequent mammographic features of BI-RADS category 4 lesions were irregular mass shape(41.2%), spiculated mass margin(52.3%), amorphous calcification(47.3%) and clustered calcification distribution(37.1%). Because category 4 lesions account for about 25.7% of all breast malignancies, mammographic lesions in this category ('suspicious abnormality') should be considered for supplementary study and breast biopsy rather than short-term follow-up. Initial pathologic findings can thus be confirmed

  6. Application of classification trees for the qualitative differentiation of focal liver lesions suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging

    Energy Technology Data Exchange (ETDEWEB)

    Schelhorn, J. [Sophien und Hufeland Klinikum, Weimar (Germany). Dept. of Radiology and Nuclear Medicine; Benndorf, M.; Dietzel, M.; Burmeister, H.P.; Kaiser, W.A.; Baltzer, P.A.T. [Jena Univ. (Germany). Inst. of Diagnostic and Interventional Radiology

    2012-09-15

    Purpose: To evaluate the diagnostic accuracy of qualitative descriptors alone and in combination for the classification of focal liver lesions (FLLs) suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging. Materials and Methods: Consecutive patients with clinically suspected liver metastases were eligible for this retrospective investigation. 50 patients met the inclusion criteria. All underwent Gd-EOB-DTPA-enhanced liver MRI (T2w, chemical shift T1w, dynamic T1w). Primary liver malignancies or treated lesions were excluded. All investigations were read by two blinded observers (O1, O2). Both independently identified the presence of lesions and evaluated predefined qualitative lesion descriptors (signal intensities, enhancement pattern and morphology). A reference standard was determined under consideration of all clinical and follow-up information. Statistical analysis besides contingency tables (chi square, kappa statistics) included descriptor combinations using classification trees (CHAID methodology) as well as ROC analysis. Results: In 38 patients, 120 FLLs (52 benign, 68 malignant) were present. 115 (48 benign, 67 malignant) were identified by the observers. The enhancement pattern, relative SI upon T2w and late enhanced T1w images contributed significantly to the differentiation of FLLs. The overall classification accuracy was 91.3 % (O1) and 88.7 % (O2), kappa = 0.902. Conclusion: The combination of qualitative lesion descriptors proposed in this work revealed high diagnostic accuracy and interobserver agreement in the differentiation of focal liver lesions suspicious for metastases using Gd-EOB-DTPA-enhanced liver MRI. (orig.)

  7. A Fast-Track Referral System for Skin Lesions Suspicious of Melanoma: Population-Based Cross-Sectional Study from a Plastic Surgery Center

    Directory of Open Access Journals (Sweden)

    Reem Dina Jarjis

    2016-01-01

    Full Text Available Introduction. To minimize delay between presentation, diagnosis, and treatment of cutaneous melanoma (CM, a national fast-track referral system (FTRS was implemented in Denmark. The aim of this study was to analyze the referral patterns to our department of skin lesions suspicious of melanoma in the FTRS. Methods. Patients referred to the Department of Plastic Surgery and Breast Surgery in Zealand University Hospital were registered prospectively over a 1-year period in 2014. A cross-sectional study was performed analyzing referral patterns, including patient and tumor characteristics. Results. A total of 556 patients were registered as referred to the center in the FTRS for skin lesions suspicious of melanoma. Among these, a total of 312 patients (56.1% were diagnosed with CM. Additionally, 41 (7.4% of the referred patients were diagnosed with in situ melanoma. Conclusion. In total, 353 (63.5% patients had a malignant or premalignant melanocytic skin lesion. When only considering patients who where referred without a biopsy, the diagnostic accuracy for GPs and dermatologists was 29% and 45%, respectively. We suggest that efforts of adequate training for the referring physicians in diagnosing melanocytic skin lesions will increase diagnostic accuracy, leading to larger capacity in secondary care for the required treatment of malignant skin lesions.

  8. Post-clip placement MRI following second-look US-guided core biopsy for suspicious lesions identified on breast MRI

    International Nuclear Information System (INIS)

    Song, Sung Eun; Cho, Nariya; Han, Wonshik

    2017-01-01

    To evaluate whether the post-clip placement MRI following second-look ultrasound (US)-guided core biopsy is useful to confirm the adequate sampling of suspicious lesions identified on breast MRI. Between 2014 and 2016, 31 consecutive women with 34 suspicious lesions that had not been identified on previous mammography or US were detected using MRI. Among them, 26 women with 29 lesions (mean size 1.5 cm, range 0.5-5.8 cm) found by second-look US underwent US-guided biopsy, subsequent clip insertion and post-clip placement MRI. Five women with five lesions that were not found by second-look US underwent MRI-guided biopsy. The technical success rate and lesion characteristics were described. The technical success rate was 96.6% (28/29). One failure case was a benign, 1.1-cm non-mass enhancement. Of the 28 success cases, 23 (82.1%) were masses and 5 (17.9%) were non-mass enhancements; 17 (60.7%) were benign, 4 (14.3%) were high-risk and 7 (25.0%) were malignant lesions. The technical success rate was 100% (28/28) for masses and 83.3% (5/6) for non-mass enhancements. Post-clip placement MRI following US-guided biopsy is useful in confirming the adequate sampling of lesions identified on MRI. This method could be an alternative to MRI-guided biopsy for lesions visible on US. (orig.)

  9. Post-clip placement MRI following second-look US-guided core biopsy for suspicious lesions identified on breast MRI

    Energy Technology Data Exchange (ETDEWEB)

    Song, Sung Eun [Seoul National University Hospital, Department of Radiology, Seoul (Korea, Republic of); Korea University Anam Hospital, Korea University College of Medicine, Department of Radiology, Seoul (Korea, Republic of); Cho, Nariya [Seoul National University Hospital, Department of Radiology, Seoul (Korea, Republic of); Seoul National University College of Medicine, Department of Radiology, Seoul (Korea, Republic of); Seoul National University Medical Research Centre, Institute of Radiation Medicine, Seoul (Korea, Republic of); Han, Wonshik [Seoul National University Hospital, Department of Surgery, Seoul (Korea, Republic of)

    2017-12-15

    To evaluate whether the post-clip placement MRI following second-look ultrasound (US)-guided core biopsy is useful to confirm the adequate sampling of suspicious lesions identified on breast MRI. Between 2014 and 2016, 31 consecutive women with 34 suspicious lesions that had not been identified on previous mammography or US were detected using MRI. Among them, 26 women with 29 lesions (mean size 1.5 cm, range 0.5-5.8 cm) found by second-look US underwent US-guided biopsy, subsequent clip insertion and post-clip placement MRI. Five women with five lesions that were not found by second-look US underwent MRI-guided biopsy. The technical success rate and lesion characteristics were described. The technical success rate was 96.6% (28/29). One failure case was a benign, 1.1-cm non-mass enhancement. Of the 28 success cases, 23 (82.1%) were masses and 5 (17.9%) were non-mass enhancements; 17 (60.7%) were benign, 4 (14.3%) were high-risk and 7 (25.0%) were malignant lesions. The technical success rate was 100% (28/28) for masses and 83.3% (5/6) for non-mass enhancements. Post-clip placement MRI following US-guided biopsy is useful in confirming the adequate sampling of lesions identified on MRI. This method could be an alternative to MRI-guided biopsy for lesions visible on US. (orig.)

  10. Sonographically-guided vacuum-assisted biopsy with digital mammography-guided skin marking of suspicious breast microcalcifications: comparison of outcomes with stereotactic biopsy in Asian women.

    Science.gov (United States)

    Hahn, Soo Yeon; Shin, Jung Hee; Han, Boo-Kyung; Ko, Eun Young

    2011-02-01

    Management of suspicious microcalcifications in very thin breasts is problematic. To evaluate whether sonographically-guided vacuum-assisted biopsy (USVAB) with digital mammography-guided skin marking (DM) for the diagnosis of breast microcalcifications is comparable to stereotactic-guided vacuum-assisted biopsy (SVAB) in Asian women with thin breasts. Retrospective review was performed for 263 consecutive suspicious microcalcification lesions in 261 women who underwent USVAB with DM or SVAB using a prone table between January 2004 and December 2007. SVAB was performed for 190 lesions and USVAB for 73 lesions. Biopsy results were correlated with surgical pathology or followed up for at least 12 months. The diagnostic outcomes of SVAB and USVAB to diagnose microcalcifications were compared. Of 263 lesions, 104 (40%) underwent surgery and 159 (60%) were followed up. SVAB and USVAB groups showed similar final categories or the extent of microcalcifications. US visible lesions were 57 (78%) of 73 at USVAB and 14 (10%) of 140 at SVAB. Of 57 US visible lesions at USVAB, 29 (51%) were not found in initial US but were detectable with the help of DM. Specimen radiographs were negative in 2.1% of lesions at SVAB and in 4.1% at USVAB (p=0.4008). The under-estimation rate and false-negative rate were similar in SVAB and USVAB. US with DM facilitates US visibility of microcalcifications. USVAB with DM can produce acceptable biopsy results, as can SVAB, to diagnose breast microcalcifications in patients with thin breasts.

  11. Child sexual abuse among adolescents in southeast Nigeria: A concealed public health behavioral issue

    Science.gov (United States)

    C, Manyike Pius; M, Chinawa Josephat; Elias, Aniwada; I, Odutola Odetunde; Awoere, Chinawa T.

    2015-01-01

    Background and Objective: Child sexual abuse among adolescents is an often overlooked issue in pediatrics, yet it is a major cause of low self esteem and stigmatization in adolescents. The objective of this study was to determine the socioeconomic determinant and pattern of child sexual abuse among adolescent attending secondary schools in South East Nigeria. Methods: This was a cross-sectional study that was carried out among children in three secondary schools in Enugu and Ebonyi states of Nigeria. Five hundred and six adolescents who met inclusion criteria were consecutively recruited into our prospective study between June and October, 2014. Results: One hundred and ninety nine (40 %) of the respondents had been abused and the commonest form of abuse was to look at pornographic pictures, drawings, films, videotapes or magazine 93(18.4%). Fifty eight (11.5%) adolescents stated that they were abused once with age at first exposure being 7-12 years 57 (11.4%). When grouped together, family members and relatives are perpetrators of child sexual abuse. There was significant difference in sex abuse between males and females (p=0.014) while there were no significant difference for age (p=0.157) and social class (p=0.233). Conclusion: Overall prevalence and one time prevalence rates of sexual abuse among adolescents in south east Nigeria was 40% and 11.5% respectively with male perpetrators. There is no link between socioeconomic class, age and child sexual abuse among adolescents. PMID:26430412

  12. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    Science.gov (United States)

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  13. Instructions to suppress semantic memory enhances or has no effect on P300 in a concealed information test (CIT).

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Drapekin, Jesse; Labkovsky, Elena; Tullman, Samuel

    2017-03-01

    The present study investigated the extent to which people can suppress semantic memory as indexed with the P300 ERP and the autobiographical implicit association test (aIAT). In EXP 1, participants (22) were run in a counterbalanced repeated measures study in both simply knowledgeable (SK) and knowledgeable with suppression (SP) conditions. A P300-based, concealed information test ("Complex Trial Protocol"; CTP) with a 50/50 Target/Nontarget (T/NT) ratio was given both with and without instructions to suppress semantic memories. The results showed increased P300s to probe name stimuli, reduced (but still high positive) aIAT d-scores, and increased simple reaction times to all stimuli used in ERP tests in the SP condition. EXP 2 was similar, but with SP and SK in two separate groups, and a 20/80 T/NT ratio. Again, ERP and aIAT results failed to show a suppression effect for semantic memory. The behavioral data suggest some task demand effects under suppression instructions, and that EXP 1 was more demanding than EXP 2. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. NGC1448 and IC 3639: Two Concealed Black Holes Lurking in our Cosmic Backyard Unveiled by NuSTAR

    Science.gov (United States)

    Stern, Daniel; Boorman, Peter; Annuar, Ady; Gandhi, Poshak; Alexander, D. M.; Lansbury, George B.; Asmus, Daniel; Ballantyne, David R.; Bauer, Franz E.; Boggs, Steven E.; Brandt, W. Niel; Brightman, Murray; Christensen, Finn; Craig, William W.; Farrah, Duncan; Goulding, Andy D.; Hailey, Charles James; Harrison, Fiona; Hoenig, Sebastian; Koss, Michael; LaMassa, Stephanie M.; Masini, Alberto; Murray, Stephen S.; Ricci, Claudio; Risaliti, Guido; Rosario, David J.; Stanley, Flora; Zhang, William

    2017-01-01

    We present NuSTAR observations of two nearby Active Galactic Nuclei (AGN), NGC 1448 and IC 3639, located at distances of 12 Mpc and 54 Mpc, respectively. NuSTAR high-energy X-ray (> 10 keV) observations, combined with archival lower energy X-ray observations from Chandra and Suzaku, reveal both sources to contain heavily obscured, accreting super-massive black holes. NGC 1448 is one of the nearest luminous galaxies to the Milky Way, yet the AGN at its centre was only discovered in 2009. Using state-of-the-art models, we constrain the obscuring column density (NH) of gas concealing both AGN, finding them to be extreme, with NH values well into the Compton-thick (CT) regime with N(H) > 3e24 /cm2. NGC 1448 has an intrinsic X-ray luminosity of L(24 keV) ˜ 5e40 erg/s, making it one of the lowest luminosity CT AGN known. IC 3639, on the other hand, has one of the strongest iron fluorescence emission lines known. We also discuss multi-wavelength diagnostics at optical and mid-infrared energies as indirect indicators to penetrate through the obscuring veils and probe the intrinsic properties of the AGN. Through detailed studies such as we present here, NuSTAR is showing that there are still plenty of interesting discoveries awaiting to be made, even in the nearby Universe.

  15. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  16. Migrant workers’ occupation and healthcare-seeking preferences for TB-suspicious symptoms and other health problems: a survey among immigrant workers in Songkhla province, southern Thailand

    Directory of Open Access Journals (Sweden)

    Naing Tinzar

    2012-10-01

    Full Text Available Abstract Background Much of the unskilled and semi-skilled workforce in Thailand comprises migrant workers from neighbouring countries. While, in principle, healthcare facilities in the host country are open to those migrants registered with the Ministry of Labour, their actual healthcare-seeking preferences and practices, as well as those of unregistered migrants, are not well documented. This study aimed to describe the patterns of healthcare-seeking behaviours of immigrant workers in Thailand, emphasizing healthcare practices for TB-suspicious symptoms, and to identify the role of occupation and other factors influencing these behaviours. Methods A survey was conducted among 614 immigrant factory workers (FW, rubber tappers (RT and construction workers (CW, in which information was sought on socio-demography, history of illness and related healthcare-seeking behaviour. Mixed effects logistic regression modeling was employed in data analysis. Results Among all three occupations, self-medication was the most common way of dealing with illnesses, including the development of TB-suspicious symptoms, for which inappropriate drugs were used. Only for GI symptoms and obstetric problems did migrant workers commonly seek healthcare at modern healthcare facilities. For GI illness, FW preferred to attend the in-factory clinic and RT a private facility over government facilities owing to the quicker service and greater convenience. For RT, who were generally wealthier, the higher cost of private treatment was not a deterrent. CW preferentially chose a government healthcare facility for their GI problems. For obstetric problems, including delivery, government facilities were utilized by RT and CW, but most FW returned to their home country. After adjusting for confounding, having legal status in the country was associated with overall greater use of government facilities and being female and being married with use of both types of modern healthcare

  17. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  18. Post-clip placement MRI following second-look US-guided core biopsy for suspicious lesions identified on breast MRI.

    Science.gov (United States)

    Song, Sung Eun; Cho, Nariya; Han, Wonshik

    2017-12-01

    To evaluate whether the post-clip placement MRI following second-look ultrasound (US)-guided core biopsy is useful to confirm the adequate sampling of suspicious lesions identified on breast MRI. Between 2014 and 2016, 31 consecutive women with 34 suspicious lesions that had not been identified on previous mammography or US were detected using MRI. Among them, 26 women with 29 lesions (mean size 1.5 cm, range 0.5-5.8 cm) found by second-look US underwent US-guided biopsy, subsequent clip insertion and post-clip placement MRI. Five women with five lesions that were not found by second-look US underwent MRI-guided biopsy. The technical success rate and lesion characteristics were described. The technical success rate was 96.6% (28/29). One failure case was a benign, 1.1-cm non-mass enhancement. Of the 28 success cases, 23 (82.1%) were masses and 5 (17.9%) were non-mass enhancements; 17 (60.7%) were benign, 4 (14.3%) were high-risk and 7 (25.0%) were malignant lesions. The technical success rate was 100% (28/28) for masses and 83.3% (5/6) for non-mass enhancements. Post-clip placement MRI following US-guided biopsy is useful in confirming the adequate sampling of lesions identified on MRI. This method could be an alternative to MRI-guided biopsy for lesions visible on US. • Post-clip MRI is useful for confirming adequate sampling of US-guided biopsy. • Post-clip MRI following US-guided biopsy revealed a 96.6 % technical success rate. • One technical failure case was a benign, 1.1-cm non-mass enhancement. • The technical success rate of US-guided biopsy for non-mass enhancements was 83.3 %.

  19. Mammographic evaluation of suspicious malignant lesions based on ACR(American College of Radiology) breast imaging reporting and data system(BI-RADS)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jei Hee; Oh, Ki Keun; Chang, So Yong; Kim, Eun Kyung; Kim, Mi Hye [Yonsei Univ. College of Medicine, Research Institute of Radiological Science, Yonsei Univ., Seoul (Korea, Republic of)

    1999-12-01

    The purpose of this study was to assess the mammographic features and pathologic outcome of category 4 lesions using the Breast Imaging Reporting and Data System(BI-RADS), and to evaluate the significance of final assessment categories. Using BI-RADS, the interpretations of 8,134 mammograms acquired between January 1997 and May 1998 were categorized. From among 161 lesions categorized as '4' ('suspicious abnormality') and pathologically confirmed by surgery or biopsy, we analysed 113, found in 66 patients. The pathologic outcome of these 113 lesions was as follows:infiltrating ductal carcinoma, 17.7%(20/113); DCIS(ductal carcinoma in sitv), 8.0%(9/113); ADH(atypical ductal hyperplasia), 5.3%(6/113); DEH(ductal epithelial hyperplasia), 1.8%(2/113); ductectasia, 0.9%(1/113), FCD(fibrocystic change), 27.4%(31/113); firoadenoma, 7.1%(8/113); stromal fibrosis, 9.7%(11/113); normal parenchyma, 7.1%(8/113); other pathology, 15.0%(17/113). The most frequent mammographic features of BI-RADS category 4 lesions were irregular mass shape(41.2%), spiculated mass margin(52.3%), amorphous calcification(47.3%) and clustered calcification distribution(37.1%). Because category 4 lesions account for about 25.7% of all breast malignancies, mammographic lesions in this category ('suspicious abnormality') should be considered for supplementary study and breast biopsy rather than short-term follow-up. Initial pathologic findings can thus be confirmed.

  20. "Small intestinal biopsy and anti endomyosial sorologic test in children suspicious for celiac disease: a comparative study in Children Medical Center "

    Directory of Open Access Journals (Sweden)

    F. Mahjoub

    2006-08-01

    Full Text Available Background: Celiac is one the most common causes of malabsorption and is an autoimmune disorder resulting in damage to intestinal epithelial cells by self T lymphocytes. The main culprit is gluten. The aim of our study was to assess the histopathologic findings of patients suspicious to have celiac disease in their first admission and compare them with serologic findings (endomyosial antibody test: EMA. Methods: The study is a prospective descriptional type and 95 patients suspicious to have celiac disease were included who went under upper endoscopy and sampling and also serologic studies. Histopathologic findings were grouped by Marsh classification. Specimens in Marsh stage 0 and 1 were also stained for leukocyte common antigen by immunohistochemistry Results: Ninety five patients, 49 males and 46 females, ranging from 9 months to 17 years (mean: 6.3 ys were included in the study The most common complaint was abdominal pain. EMA test was positive in 43 patients. Most specimens were categorized as Marsh stage IIIA (51 cases by histopatholgic examination, which can be seen in many other conditions. Only 16 patients were categorized as Marsh stage IIIB & IIIC, which are seen in established celiac patients No significant correlation was found between histopathologic and serologic findings. No difference was found between H&E staining and immunohistochemical staining in counting of intra- epithelial lymphocytes. Conclusion: Most of our patients had mild partial villous atrophy which is also seen in many other disorders and also EMA test was negative in this group. It appears that current assessment of celiac disease has many drawbacks and necessity of more specific methods is highly appreciated.

  1. Application of classification trees for the qualitative differentiation of focal liver lesions suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging.

    Science.gov (United States)

    Schelhorn, J; Benndorf, M; Dietzel, M; Burmeister, H P; Kaiser, W A; Baltzer, P A T

    2012-09-01

    To evaluate the diagnostic accuracy of qualitative descriptors alone and in combination for the classification of focal liver lesions (FLLs) suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging. Consecutive patients with clinically suspected liver metastases were eligible for this retrospective investigation. 50 patients met the inclusion criteria. All underwent Gd-EOB-DTPA-enhanced liver MRI (T2w, chemical shift T1w, dynamic T1w). Primary liver malignancies or treated lesions were excluded. All investigations were read by two blinded observers (O1, O2). Both independently identified the presence of lesions and evaluated predefined qualitative lesion descriptors (signal intensities, enhancement pattern and morphology). A reference standard was determined under consideration of all clinical and follow-up information. Statistical analysis besides contingency tables (chi square, kappa statistics) included descriptor combinations using classification trees (CHAID methodology) as well as ROC analysis. In 38 patients, 120 FLLs (52 benign, 68 malignant) were present. 115 (48 benign, 67 malignant) were identified by the observers. The enhancement pattern, relative SI upon T2w and late enhanced T1w images contributed significantly to the differentiation of FLLs. The overall classification accuracy was 91.3 % (O1) and 88.7 % (O2), kappa = 0.902. The combination of qualitative lesion descriptors proposed in this work revealed high diagnostic accuracy and interobserver agreement in the differentiation of focal liver lesions suspicious for metastases using Gd-EOB-DTPA-enhanced liver MRI. © Georg Thieme Verlag KG Stuttgart · New York.

  2. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  3. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  4. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  5. Reveal or conceal?

    DEFF Research Database (Denmark)

    Giones, Ferran; Bjørnåli, Ekaterina; Billström, Anders

    2017-01-01

    with customers and other stakeholders. Nevertheless, we know little about how legitimacy is built and how new entrants build legitimacy in complex technology-intensive industries. In this research we explore how Norwegian cleantech firms use signaling and strategic actions to build legitimacy. We analyze five...... cases while investigating their actions in different phases of the venture’s evolution. The results suggest that, contrary to signaling theory expectations, young clean-tech firms do not always build legitimacy by conveying information on their strengths. Instead, we observe that they use signaling...... strategies to address the specific concerns of different stakeholders. This is very much contingent upon the evolutionary stage of the venture and the firm’s current weaknesses....

  6. Disclosing and Concealing

    DEFF Research Database (Denmark)

    Flyverbom, Mikkel

    2016-01-01

    The ubiquity of digital technologies and the datafication of many domains of social liferaise important questions about governance. In the emergent field of internet governancestudies, most work has explored novel governance arrangements, institutional developmentsand the effects of interactions...... of the argument is that there is anintimate relationship between seeing, knowing and governing, and that digitalisation anddatafication processes fundamentally shape how we make things visible or invisible, knowableor unknowable and governable or ungovernable. Having articulated this conceptual argument...

  7. Revealing/Concealing

    DEFF Research Database (Denmark)

    Isar, Nicoletta

    2017-01-01

    and potential to disrupt the dualism of Platonism challenged by Nietzsche. Yet the substance of this contribution, intended to express the symptom of perception of premodern image, must greatly differ from the grounds of phenomenology. This paper aims to bring however some arguments in support...... to disrupt the Platonic dualism, but also to provide the arguments to challenge the misunderstood dualism of Platonism itself as it was incorporated into the Western thinking. The subject of this paper will provide the means for this demonstration, and hopefully shed new lights on the nature of the premodern...... image. My argument is based on the third Platonic term – χώρα – a concept with a long tradition since Antiquity until the Byzantine era. I will take further her argument and explore the paradigmatic dimension of this syntagm which could be viewed as “an integrated part of the ancient and premodern image...

  8. Agreement Among RTOG Sarcoma Radiation Oncologists in Contouring Suspicious Peritumoral Edema for Preoperative Radiation Therapy of Soft Tissue Sarcoma of the Extremity

    Energy Technology Data Exchange (ETDEWEB)

    Bahig, Houda [Department of Radiation Oncology, Centre Hospitalier de l' Université de Montréal, Montreal, QC (Canada); Roberge, David, E-mail: david.roberge.chum@ssss.gouv.qc.ca [Department of Radiation Oncology, Centre Hospitalier de l' Université de Montréal, Montreal, QC (Canada); Bosch, Walter [Department of Radiation Oncology, Washington University, St Louis, Missouri (United States); Levin, William [Department of Radiation Oncology, University of Pennsylvania, Philadelphia, Pennsylvania (United States); Petersen, Ivy; Haddock, Michael [Department of Radiation Oncology, Mayo Clinic, Rochester, Minnesota (United States); Freeman, Carolyn [Division of Radiation Oncology, McGill University Health Centre, Montreal, QC (Canada); DeLaney, Thomas F. [Department of Radiation Oncology, Massachusetts General Hospital, Boston, Massachusetts (United States); Abrams, Ross A. [Department of Radiation Oncology, Rush University Medical Center, Chicago, Illinois (United States); Indelicato, Danny J. [Department of Radiation Oncology, University of Florida Medical Center, Jacksonville, Florida (United States); Baldini, Elizabeth H. [Department of Radiation Oncology, Brigham and Women' s Hospital and Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Hitchcock, Ying [Department of Radiation Oncology, University of Utah Medical Center, Salt Lake City, Utah (United States); Kirsch, David G. [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Kozak, Kevin R. [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States); Wolfson, Aaron [Department of Radiation Oncology, University of Miami Miller School of Medicine, Miami, Florida (United States); and others

    2013-06-01

    Purpose: Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Methods and Materials: Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. Results: The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm{sup 3} (7-413 cm{sup 3}), 280 cm{sup 3} and 360 cm{sup 3}. The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm{sup 3} (24-565 cm{sup 3}) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm{sup 3} (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm{sup 3}, respectively. There were 3 large tumors with >30 cm{sup 3} of SE not included in the CTV3cm volume. Conclusion: Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant

  9. Agreement among RTOG sarcoma radiation oncologists in contouring suspicious peritumoral edema for preoperative radiation therapy of soft tissue sarcoma of the extremity.

    Science.gov (United States)

    Bahig, Houda; Roberge, David; Bosch, Walter; Levin, William; Petersen, Ivy; Haddock, Michael; Freeman, Carolyn; Delaney, Thomas F; Abrams, Ross A; Indelicato, Danny J; Baldini, Elizabeth H; Hitchcock, Ying; Kirsch, David G; Kozak, Kevin R; Wolfson, Aaron; Wang, Dian

    2013-06-01

    Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm(3) (7-413 cm(3)), 280 cm(3) and 360 cm(3). The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm(3) (24-565 cm(3)) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm(3) (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm(3), respectively. There were 3 large tumors with >30 cm(3) of SE not included in the CTV3cm volume. Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant expansion of the CTVs is required to cover SE. Copyright © 2013 Elsevier Inc. All rights

  10. Agreement Among RTOG Sarcoma Radiation Oncologists in Contouring Suspicious Peritumoral Edema for Preoperative Radiation Therapy of Soft Tissue Sarcoma of the Extremity

    International Nuclear Information System (INIS)

    Bahig, Houda; Roberge, David; Bosch, Walter; Levin, William; Petersen, Ivy; Haddock, Michael; Freeman, Carolyn; DeLaney, Thomas F.; Abrams, Ross A.; Indelicato, Danny J.; Baldini, Elizabeth H.; Hitchcock, Ying; Kirsch, David G.; Kozak, Kevin R.; Wolfson, Aaron

    2013-01-01

    Purpose: Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Methods and Materials: Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. Results: The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm 3 (7-413 cm 3 ), 280 cm 3 and 360 cm 3 . The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm 3 (24-565 cm 3 ) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm 3 (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm 3 , respectively. There were 3 large tumors with >30 cm 3 of SE not included in the CTV3cm volume. Conclusion: Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant expansion of the CTVs is required to cover SE

  11. Molecular Testing of Nodules with a Suspicious or Malignant Cytologic Diagnosis in the Setting of Non-Invasive Follicular Thyroid Neoplasm with Papillary-Like Nuclear Features (NIFTP).

    Science.gov (United States)

    Strickland, Kyle C; Eszlinger, Markus; Paschke, Ralf; Angell, Trevor E; Alexander, Erik K; Marqusee, Ellen; Nehs, Matthew A; Jo, Vickie Y; Lowe, Alarice; Vivero, Marina; Hollowell, Monica; Qian, Xiaohua; Wieczorek, Tad; French, Christopher A; Teot, Lisa A; Cibas, Edmund S; Lindeman, Neal I; Krane, Jeffrey F; Barletta, Justine A

    2018-03-01

    Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) is an indolent thyroid tumor characterized by frequent RAS mutations and an absence of the BRAF V600E mutation commonly seen in classical papillary thyroid carcinoma (cPTC). The ability to differentiate potential NIFTP/follicular variant of papillary thyroid carcinoma (FVPTC) from cPTC at the time of fine-needle aspiration (FNA) can facilitate conservative management of NIFTP. The aim of the current study was to investigate how molecular testing may add to cytologic assessment in the pre-operative differentiation of potential NIFTP/FVPTC and cPTC. We had previously evaluated cytologists' ability to prospectively distinguish potential NIFTP/FVPTC from cPTC in a cohort of 56 consecutive FNAs diagnosed as malignant or suspicious for malignancy. We utilized this cohort to perform molecular analysis. Detected molecular abnormalities were stratified into two groups: (1) those supporting malignancy and (2) those supporting a diagnosis of potential NIFTP/FVPTC. The cytologists' characterization of cases and the detected molecular alterations were correlated with the final histologic diagnoses. Molecular testing was performed in 52 (93%) of the 56 cases. For the 37 cases cytologists favored to be cPTC, 31 (84%) had a molecular result that supported malignancy (28 BRAF V600E mutations, 2 NTRK1 fusions, 1 AGK-BRAF fusion). For the 8 cases that were favored to be NIFTP/FVPTC by cytologists, 7 (88%) had a molecular result that supported conservative management (1 NRAS mutation, 6 wild-type result). Seven cases were designated as cytomorphologically indeterminate for NIFTP/FVPTC or cPTC, of which 6 (86%) had a molecular result that would have aided in the pre-operative assessment of potential NIFTP/FVPTC or cPTC/malignancy. These included 3 BRAF V600E mutations in nodules that were cPTC on resection, an HRAS mutation, and a wild-type result in the 2 nodules that were NIFTP, and a TERT promoter

  12. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  13. Quasi-objects, Cult Objects and Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2011-01-01

    This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics. T...... as a unique opportunity for studying the interchange between these two forms of fetishism and their respective phenomenologies. Finally, returning to Serres, I briefly consider the theoretical consequences of introducing the fashion object as a quasi-object.......This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics....... These two phenomenologies are, so I argue, essential to quasi-object theory, yet largely ignored by Serres’ sociological interpreters. They correspond with the two different theories of fetishism found in Marx and Durkheim, respectively. In the second half of the article, I introduce the fashion object...

  14. Jumping to Conclusions Is Associated with Paranoia but Not General Suspiciousness: A Comparison of Two Versions of the Probabilistic Reasoning Paradigm

    Directory of Open Access Journals (Sweden)

    Steffen Moritz

    2012-01-01

    Full Text Available Theoretical models ascribe jumping to conclusions (JTCs a prominent role in the pathogenesis of paranoia. While many earlier studies corroborated this account, some newer investigations have found no or only small associations of the JTC bias with paranoid symptoms. The present study examined whether these inconsistencies in part reflect methodological differences across studies. The study was built upon the psychometric high-risk paradigm. A total of 1899 subjects from the general population took part in an online survey and were administered the Paranoia Checklist as well as one of two different variants of the probabilistic reasoning task: one variant with a traditional instruction (a and one novel variant that combines probability estimates with decision judgments (b. Factor analysis of the Paranoia Checklist yielded an unspecific suspiciousness factor and a psychotic paranoia factor. The latter was significantly associated with scores indicating hasty decision making. Subjects scoring two standard deviations above the mean of the Paranoia Checklist showed an abnormal data-gathering style relative to subjects with normal scores. Findings suggest that the so-called decision threshold parameter is more sensitive than the conventional JTC index. For future research the specific contents of paranoid beliefs deserve more consideration in the investigation of decision making in schizophrenia as JTC seems to be associated with core psychosis-prone features of paranoia only.

  15. Object permanence in cats: Analysis in locomotor space.

    Science.gov (United States)

    Thinus-Blanc, C; Poucet, B; Chapuis, N

    1982-04-01

    Stages IV and V object permanence were studied with 38-40-week-old cats. A constraining apparatus preventing animals from pursuing the bowl containing meat before it was concealed was used. Either the bowl was seen moving and disappeared from view behind a screen (stage IV trials), or after this sequence, it reappeared from behind the first screen and disappeared behind a second screen (stage V trials). In both situations cats performed significantly above chance but the paths taken to reach the food were different according to the stage. In stage V trials, cats expressed a preference for the path leading to the end of the second screen where the food was last seen disappearing. Copyright © 1982. Published by Elsevier B.V.

  16. Learning Object Repositories

    Science.gov (United States)

    Lehman, Rosemary

    2007-01-01

    This chapter looks at the development and nature of learning objects, meta-tagging standards and taxonomies, learning object repositories, learning object repository characteristics, and types of learning object repositories, with type examples. (Contains 1 table.)

  17. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications

    Directory of Open Access Journals (Sweden)

    Chan Wai-Yip

    2009-01-01

    Full Text Available Wireless-VoIP communications introduce perceptual degradations that are not present with traditional VoIP communications. This paper investigates the effects of such degradations on the performance of three state-of-the-art standard objective quality measurement algorithms—PESQ, P.563, and an "extended" E-model. The comparative study suggests that measurement performance is significantly affected by acoustic background noise type and level as well as speech codec and packet loss concealment strategy. On our data, PESQ attains superior overall performance and P.563 and E-model attain comparable performance figures.

  19. Multi-probe-based resonance-frequency electrical impedance spectroscopy for detection of suspicious breast lesions: improving performance using partial ROC optimization

    Science.gov (United States)

    Lederman, Dror; Zheng, Bin; Wang, Xingwei; Wang, Xiao Hui; Gur, David

    2011-03-01

    We have developed a multi-probe resonance-frequency electrical impedance spectroscope (REIS) system to detect breast abnormalities. Based on assessing asymmetry in REIS signals acquired between left and right breasts, we developed several machine learning classifiers to classify younger women (i.e., under 50YO) into two groups of having high and low risk for developing breast cancer. In this study, we investigated a new method to optimize performance based on the area under a selected partial receiver operating characteristic (ROC) curve when optimizing an artificial neural network (ANN), and tested whether it could improve classification performance. From an ongoing prospective study, we selected a dataset of 174 cases for whom we have both REIS signals and diagnostic status verification. The dataset includes 66 "positive" cases recommended for biopsy due to detection of highly suspicious breast lesions and 108 "negative" cases determined by imaging based examinations. A set of REIS-based feature differences, extracted from the two breasts using a mirror-matched approach, was computed and constituted an initial feature pool. Using a leave-one-case-out cross-validation method, we applied a genetic algorithm (GA) to train the ANN with an optimal subset of features. Two optimization criteria were separately used in GA optimization, namely the area under the entire ROC curve (AUC) and the partial area under the ROC curve, up to a predetermined threshold (i.e., 90% specificity). The results showed that although the ANN optimized using the entire AUC yielded higher overall performance (AUC = 0.83 versus 0.76), the ANN optimized using the partial ROC area criterion achieved substantially higher operational performance (i.e., increasing sensitivity level from 28% to 48% at 95% specificity and/ or from 48% to 58% at 90% specificity).

  20. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  1. Specification of Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    relation over two objects and an event. In the model, objects can be composed by parallel composition, encapsulation, and hiding of operations. Refinement between objects is defined as fair trace inclusion.A specification language is presented where objects can be specified operationally by abstract...

  2. Paradigms in object recognition

    International Nuclear Information System (INIS)

    Mutihac, R.; Mutihac, R.C.

    1999-09-01

    A broad range of approaches has been proposed and applied for the complex and rather difficult task of object recognition that involves the determination of object characteristics and object classification into one of many a priori object types. Our paper revises briefly the three main different paradigms in pattern recognition, namely Bayesian statistics, neural networks, and expert systems. (author)

  3. BL Lacertae objects

    International Nuclear Information System (INIS)

    Disney, M.J.; Veron, P.

    1977-01-01

    The properties of BL Lacertae objects are discussed including their spectra, variability, and brightness. The historical development of observation, and the conclusion that these objects are possibly quasar-related objects rather than variable stars as originally supposed are treated. The possible mechanisms for the unusual luminosity of these objects are considered

  4. Designing the Object Game

    DEFF Research Database (Denmark)

    Filip, Diane; Lindegaard, Hanne

    2016-01-01

    The Object Game is an exploratory design game and an experiment of developing a tangible object that can spark dialogue and retrospection between collaborative partners and act as a boundary object. The objective of this article is to show and elaborate on the development of the Object Game......, and to provide case examples of the game in action. The Object Game has two parts – Story-building and Co-rating of objects – with the aim of stimulating a collaborative reflection on knowledge sharing with different objects. In Story-building, the participants visualize their knowledge sharing process...... these facilitated knowledge transfer, knowledge exchange, knowledge generation, and knowledge integration. The participants collaborative reflected on their use of different objects for knowledge sharing and learn which objects have been effective (and which have not been effective) in their collaborative...

  5. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Testing a potential alternative to traditional identification procedures: Reaction time-based concealed information test does not work for lineups with cooperative witnesses.

    Science.gov (United States)

    Sauerland, Melanie; Wolfs, Andrea C F; Crans, Samantha; Verschuere, Bruno

    2017-11-27

    Direct eyewitness identification is widely used, but prone to error. We tested the validity of indirect eyewitness identification decisions using the reaction time-based concealed information test (CIT) for assessing cooperative eyewitnesses' face memory as an alternative to traditional lineup procedures. In a series of five experiments, a total of 401 mock eyewitnesses watched one of 11 different stimulus events that depicted a breach of law. Eyewitness identifications in the CIT were derived from longer reaction times as compared to well-matched foil faces not encountered before. Across the five experiments, the weighted mean effect size d was 0.14 (95% CI 0.08-0.19). The reaction time-based CIT seems unsuited for testing cooperative eyewitnesses' memory for faces. The careful matching of the faces required for a fair lineup or the lack of intent to deceive may have hampered the diagnosticity of the reaction time-based CIT.

  7. Sex difference in choice of concealed or exposed refuge sites by preschool children viewing a model leopard in a playground simulation of antipredator behavior

    Directory of Open Access Journals (Sweden)

    Richard G. Coss

    2016-07-01

    Full Text Available The current study of preschool children characterizes a semi-natural extension of experimental questions on how human ancestors evaded predation when encountering dangerous felids. In a pretend game on a playground, we presented full-size leopard and deer models to children (N = 39 in a repeatedmeasures experimental design. Prior to viewing the model presented 15-m away, each child was instructed by the experimenter to go where she or he would feel safe. The rationale for this study was based on the anthropological construct of “sexual dinichism,” positing that, during the Pliocene, smaller-bodied hominin females engaged in more arboreal behavior than larger-bodied males. Consistent with this construct, our previous simulation research using images of an African rock outcrop showed that, after viewing a lion, girls preferred a tree as refuge rather than a crevice or large boulder whereas boys did not differentiate these refuge sites. In this follow-up study, we predicted that, after viewing the model leopard, the preschool girls would differ from the boys by not choosing enclosed refuge sites analogous to the crevice. Analyses of a contingency table for the leopard model supported this hypothesis by yielding a significant interaction of sex and refuge location (p = .031, d = .76, the source of which was a reliably larger percentage of girls not choosing concealed refuge (p = .005, d = 2.3. The interaction of sex and refuge location for the model deer was not significant (p > .5. Our findings suggest that, in contrast to the deer, the girls selected exposed playground refuge sites rather than concealing ones to maintain visual contact with the leopard as a contingency for future action

  8. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (pvisual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Seeing Objects as Faces Enhances Object Detection.

    Science.gov (United States)

    Takahashi, Kohske; Watanabe, Katsumi

    2015-10-01

    The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  10. Seeing Objects as Faces Enhances Object Detection

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2015-09-01

    Full Text Available The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  11. Morte materna mascarada: um caminho para sua identificação Muerte materna enmascarada: un camino para su identificación Identification of concealed or presumable maternal deaths

    Directory of Open Access Journals (Sweden)

    Flávia Azevedo Gomes

    2006-12-01

    maternas no informadas.OBJECTIVE: to identify unreported concealed or presumable maternal deaths which occurred in the states of São Paulo, Paraná, Pará, Ceará, and Mato Grosso Brazil. METHODS: Data were collected from the CD-ROM Hospital Admission Authorization Database of the Hospital Information System of the Unified Health System (SIH-SUS regarding records of obstetric procedures and secondary diagnoses between the years of 1999 to 2000. RESULTS: There were 651 maternal deaths registered. From those, 55 were registered as concealed or presumable maternal deaths according to Chapter XV of the International Classification of Diseases (DID-10 - Pregnancy, Delivery and Postpartum. CONCLUSION: This study showed that this information system can be used as a complementary measure for the identification of unreported maternal deaths.

  12. Objectivity And Moral Relativism

    OpenAIRE

    Magni, Sergio Filippo

    2017-01-01

    The relativity of morals has usually been taken as an argument against the objectivity of ethics. However, a more careful analysis can show that there are forms of moral objectivism which have relativistic implications, and that moral relativism can be compatible with the objectivity of ethics. Such an objectivity is not always in contrast to moral relativism and it is possible to be relativists without having to give up the claim of objectivity in ethics

  13. Objects in Motion

    Science.gov (United States)

    Damonte, Kathleen

    2004-01-01

    One thing scientists study is how objects move. A famous scientist named Sir Isaac Newton (1642-1727) spent a lot of time observing objects in motion and came up with three laws that describe how things move. This explanation only deals with the first of his three laws of motion. Newton's First Law of Motion says that moving objects will continue…

  14. Survivability via Control Objectives

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.

    2000-08-11

    Control objectives open an additional front in the survivability battle. A given set of control objectives is valuable if it represents good practices, it is complete (it covers all the necessary areas), and it is auditable. CobiT and BS 7799 are two examples of control objective sets.

  15. Repurposing learning object components

    NARCIS (Netherlands)

    Verbert, K.; Jovanovic, J.; Gasevic, D.; Duval, E.; Meersman, R.

    2005-01-01

    This paper presents an ontology-based framework for repurposing learning object components. Unlike the usual practice where learning object components are assembled manually, the proposed framework enables on-the-fly access and repurposing of learning object components. The framework supports two

  16. Objects, materiality and meaning

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Lindegaard, Hanne

    2008-01-01

    The present research work investigates the relation between physical objects, their materiality, understood as the physical substances they are made from, and the communication from the objects. In product design of physical objects the communicative aspects are just as important as the function...... of the object, and the designers aim is therefore to tune both in order to achieve a desired goal. To do so the designer basically has 2 options: Alteration of the physical shape of the object and the selection of materials. Through the manipulation of shape and materials can symbolic and sensory information...... be written into the object. The materials are therefore carriers of communication, even though this is dependent of the cultural context and the environment which the object will be part of. However the designer has only minor influence on those....

  17. Early object relations into new objects.

    Science.gov (United States)

    Downey, T W

    2001-01-01

    Two strands of change are suggested by this review, one maturational, the other therapeutic or developmental (Hartmann and Kris, 1945). By "maturational" I mean to suggest energies that infuse the individual from earliest life in a manner that includes object relations, but for the healthy exercise of which object relations per se need not be of central and crucial importance. Within wide limits such energies may be delayed until growth conditions prevail without significant distortion of certain of the organism's ego functions. Therapeutic change is analogous to developmental change in that both involve the crucial presence of another to release energies. In therapeutic change these are energies that have been repressed beyond the reach of developmental dynamics. In everyday development crisis and synthesis alternate in conjunction with new and emerging objects to add to the psychological structures brought to the fore by maturation. In many instances, as we see with John, over time and in a less focussed manner, developmental changes can approximate therapeutic change and visa versa. Freud-Dann in their "experiment" pursued one line, in which the equipmental delay brought on by extremely adverse living circumstances was redressed by providing an interpersonally enriching, loving, developmentally facilitating milieu. The sketches of individual children and John's subsequent story provide a perspective into what becomes the stuff of growth and what remains the stuff of neurosis. The developmental reserves and ego resilience of these children were impressive but probably not extraordinary. Usual growth ensued as soon as they were provided with the rich soil of Bulldogs Bank instead of the desert sand of the Tereszin concentration camp. However, no one can escape such adverse circumstances without having taken in the stuff of neurosis. Affects and percepts that were not assimilatable or even available to consciousness at the time remain buried in the unconscious

  18. Reasoning about Function Objects

    Science.gov (United States)

    Nordio, Martin; Calcagno, Cristiano; Meyer, Bertrand; Müller, Peter; Tschannen, Julian

    Modern object-oriented languages support higher-order implementations through function objects such as delegates in C#, agents in Eiffel, or closures in Scala. Function objects bring a new level of abstraction to the object-oriented programming model, and require a comparable extension to specification and verification techniques. We introduce a verification methodology that extends function objects with auxiliary side-effect free (pure) methods to model logical artifacts: preconditions, postconditions and modifies clauses. These pure methods can be used to specify client code abstractly, that is, independently from specific instantiations of the function objects. To demonstrate the feasibility of our approach, we have implemented an automatic prover, which verifies several non-trivial examples.

  19. Birth of the Object: Detection of Objectness and Extraction of Object Shape through Object Action Complexes

    DEFF Research Database (Denmark)

    Kraft, Dirk; Pugeault, Nicolas; Baseski, Emre

    2008-01-01

    We describe a process in which the segmentation of objects as well as the extraction of the object shape becomes realized through active exploration of a robot vision system. In the exploration process, two behavioral modules that link robot actions to the visual and haptic perception of objects...... interact. First, by making use of an object independent grasping mechanism, physical control over potential objects can be gained. Having evaluated the initial grasping mechanism as being successful, a second behavior extracts the object shape by making use of prediction based on the motion induced...... system, knowledge about its own embodiment as well as knowledge about geometric relationships such as rigid body motion. This prior knowledge allows the extraction of representations that are semantically richer compared to many other approaches....

  20. Herbig-Haro objects

    International Nuclear Information System (INIS)

    Schwartz, R.D.

    1983-01-01

    Progress in the understanding of Herbig-Haro (HH) objects is reviewed. The results of optical studies of the proper motions and alignments, variability, and polarization of HH objects and the results of spectroscopic studies are discussed. Ground-based infrared studies and far-infrared observations are reviewed. Findings on the properties of molecular clouds associated with HH objects, on gas flows associated with HH IR stars, on maser emission, and on radio continuum observations are considered. A history of proposed excitation mechanisms for HH objects is briefly presented, and the salient shock-wave calculations aimed at synthesizing the spectra of HH objects are summarized along with hypotheses that have been advanced about the origin of the objects. 141 references

  1. Propelling Extended Objects

    Science.gov (United States)

    Humbert, Richard

    2010-01-01

    A force acting on just part of an extended object (either a solid or a volume of a liquid) can cause all of it to move. That motion is due to the transmission of the force through the object by its material. This paper discusses how the force is distributed to all of the object by a gradient of stress or pressure in it, which creates the local…

  2. BL Lacertae objects

    International Nuclear Information System (INIS)

    Miller, J.S.

    1978-01-01

    An overview is given of the principal characteristics and problems associated with the prototype BL Lacertae. The most important characteristics of this group and its relevance, the consideration of a few particular objects in moderate detail, the relation between these objects QSOs, and normal galaxies, and finally the possible physical nature of BL Lac objects and the important questions they raise are treated. 15 references

  3. Objective-C

    CERN Document Server

    DeVoe, Jiva

    2011-01-01

    A soup-to-nuts guide on the Objective-C programming language. Objective-C is the language behind Cocoa and Cocoa Touch, which is the Framework of applications written for the Macintosh, iPod touch, iPhone, and iPad platforms. Part of the Developer Reference series covering the hottest Apple topics, this book covers everything from the basics of the C language to advanced aspects of Apple development. You'll examine Objective-C and high-level subjects of frameworks, threading, networking, and much more.: Covers the basics of the C language and then quickly moves onto Objective-C and more advanc

  4. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...

  5. Programs as Data Objects

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second Symposium on Programs as Data Objects, PADO 2001, held in Aarhus, Denmark, in May 2001. The 14 revised full papers presented were carefully reviewed and selected from 30 submissions. Various aspects of looking at programs as data objects...... are covered from the point of view of program analysis, program transformation, computational complexity, etc....

  6. Exhibiting Epistemic Objects

    DEFF Research Database (Denmark)

    Tybjerg, Karin

    2017-01-01

    of exhibiting epistemic objects that utilize their knowledge-generating potential and allow them to continue to stimulate curiosity and generate knowledge in the exhibition. The epistemic potential of the objects can then be made to work together with the function of the exhibition as a knowledge-generating set...

  7. Object permanence in lemurs.

    Science.gov (United States)

    Deppe, Anja M; Wright, Patricia C; Szelistowski, William A

    2009-03-01

    Object permanence, the ability to mentally represent objects that have disappeared from view, should be advantageous to animals in their interaction with the natural world. The objective of this study was to examine whether lemurs possess object permanence. Thirteen adult subjects representing four species of diurnal lemur (Eulemur fulvus rufus, Eulemur mongoz, Lemur catta and Hapalemur griseus) were presented with seven standard Piagetian visible and invisible object displacement tests, plus one single visible test where the subject had to wait predetermined times before allowed to search, and two invisible tests where each hiding place was made visually unique. In all visible tests lemurs were able to find an object that had been in clear view before being hidden. However, when lemurs were not allowed to search for up to 25-s, performance declined with increasing time-delay. Subjects did not outperform chance on any invisible displacements regardless of whether hiding places were visually uniform or unique, therefore the upper limit of object permanence observed was Stage 5b. Lemur species in this study eat stationary foods and are not subject to stalking predators, thus Stage 5 object permanence is probably sufficient to solve most problems encountered in the wild.

  8. Investigating Music Information Objects

    Science.gov (United States)

    Weissenberger, Lynnsey K.

    2016-01-01

    This dissertation, titled "Investigating Music Information Objects," is a study of the nature, description, representations, and ideas related to music information objects (MIOs). This research study investigates how music practitioners from various traditions describe and conceptualize MIOs, using a theoretical framework to classify…

  9. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  10. Objects of Desire.

    Science.gov (United States)

    Zielinski, Dave

    2000-01-01

    Describes learning objects, also known as granules, chunks, or information nuggets, and likens them to help screens. Discusses concerns about how they can go wrong: (1) faulty pretest questions; (2) missing links in the learning object chain; (3) poor frames of reference; and (4) lack of customization. (JOW)

  11. Per Object statistical analysis

    DEFF Research Database (Denmark)

    2008-01-01

    of a specific class in turn, and uses as pair of PPO stages to derive the statistics and then assign them to the objects' Object Variables. It may be that this could all be done in some other, simply way, but several other ways that were tried did not succeed. The procedure ouptut has been tested against...

  12. On Objects and Events

    DEFF Research Database (Denmark)

    Eugster, Patrick Thomas; Guerraoui, Rachid; Damm, Christian Heide

    2001-01-01

    This paper presents linguistic primitives for publish/subscribe programming using events and objects. We integrate our primitives into a strongly typed object-oriented language through four mechanisms: (1) serialization, (2) multiple sub typing, (3) closures, and (4) deferred code evaluation. We...

  13. Stability of multihypernuclear objects

    International Nuclear Information System (INIS)

    Ikram, M.; Rather, Asloob A.; Usmani, A.A.; Patra, S.K.

    2016-01-01

    In present work, we analyze the stability of multi-hypernuclear objects having higher content of strangeness. The aim of this work is to test the stability of such objects which might be produced in heavy-ion reactions. Studies of such type of systems might have great implication to nuclear-astrophysics

  14. Cultivating objects in interaction

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2014-01-01

    is chapter explores patterns of repeated orientations to physical objects in interactants’ visuo-spatial and haptic surround. A number of examples are presented from advice-giving activities in various institutional settings, where participants-in-interaction initially draw on material objects...

  15. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei; Keyser, John

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many

  16. Object oriented programming

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1990-01-01

    This paper is an introduction to object oriented programming techniques. It tries to explain the concepts by using analogies with traditional programming. The object oriented approach not inherently difficult, but most programmers find a relatively high threshold in learning it. Thus, this paper will attempt to convey the concepts with examples rather than explain the formal theory

  17. Beginning Objective-C

    CERN Document Server

    Dovey, James

    2012-01-01

    Objective-C is today's fastest growing programming language, at least in part due to the popularity of Apple's Mac, iPhone and iPad. Beginning Objective-C is for you if you have some programming experience, but you're new to the Objective-C programming language and you want a modern-and fast-way forwards to your own coding projects. Beginning Objective-C offers you a modern programmer's perspective on Objective-C courtesy of two of the best iOS and Mac developers in the field today, and gets you programming to the best of your ability in this important language.  It gets you rolling fast into

  18. Hardware Objects for Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Thalinger, Christian; Korsholm, Stephan

    2008-01-01

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... an underlying middleware is an attractive architecture. When running the JVM on bare metal, we need access to I/O devices from Java; therefore we investigate a safe and efficient mechanism to represent I/O devices as first class Java objects, where device registers are represented by object fields. Access...... to those registers is safe as Java’s type system regulates it. The access is also fast as it is directly performed by the bytecodes getfield and putfield. Hardware objects thus provide an object-oriented abstraction of low-level hardware devices. As a proof of concept, we have implemented hardware objects...

  19. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which these obj......Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...

  20. Nuclear Energy General Objectives

    International Nuclear Information System (INIS)

    2011-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way it achieves this objective is to issue publications in various series. Two of these series are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III, paragraph A.6, of the IAEA Statute, the IAEA safety standards establish 'standards of safety for protection of health and minimization of danger to life and property.' The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are primarily written in a regulatory style, and are binding on the IAEA for its own activities. The principal users are Member State regulatory bodies and other national authorities. The IAEA Nuclear Energy Series consists of reports designed to encourage and assist research on, and development and practical application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in Member States, implementing organizations, academia and politicians, among others. The information is presented in guides, reports on the status of technology and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The series complements the IAEA's safety standards, and provides detailed guidance, experience, good practices and examples on the five areas covered in the IAEA Nuclear Energy Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be

  1. Functional Object Analysis

    DEFF Research Database (Denmark)

    Raket, Lars Lau

    We propose a direction it the field of statistics which we will call functional object analysis. This subfields considers the analysis of functional objects defined on continuous domains. In this setting we will focus on model-based statistics, with a particularly emphasis on mixed......-effect formulations, where the observed functional signal is assumed to consist of both fixed and random functional effects. This thesis takes the initial steps toward the development of likelihood-based methodology for functional objects. We first consider analysis of functional data defined on high...

  2. Application of deep geophysical data to the discussion on the relationship between deep faults, concealed over thrust napped structure and uranium metallogenesis in central-southern Jiangxi

    International Nuclear Information System (INIS)

    Jiang Jinyuan; Qi Liang

    1999-01-01

    Based on the comparative analysis and study on 10 profiles of telluric electromagnetic sounding (MT) and regional gravimetric, magnetic data and Moho surface, the deep geological-tectonic pattern of the central-southern Jiangxi is discussed. It is suggested that: the studied region belongs to the Soyth-China block; in the area along Pingxiang-Guangfeng, at the border with Yangzi block an approximately EW-trending mantle concave-mantle slope zone occurs; the NNE-NE trending mantle uplift-mantle slope-mantle concave structure is developed within the South-China block; deep fault zones are represented by variation sites of Moho surface. Then, a series of deep structures is inferred including the approximately EW-striking Pingxian-Guangfeng deep fault zone, the NNE-striking Fuzhou-Anyuan deep fault zone, the NNE-trending Fengcheng-Dayu deep fault zone, as well as the NE-striking Yudu-Ningdu over thrust napped and sliding thrust structural systems, the approximately E W-trending Le'an-Nancheng over thrust napped structural systems etc. According to the distribution of known uranium mineralizations it is confirmed that close time-space relation exists between the uranium metallogenesis and variations of Moho surface, and over thrust napped structures, providing clues for locating concealed uranium deposits

  3. The Burden of Stigma on Health and Well-Being: A Taxonomy of Concealment, Course, Disruptiveness, Aesthetics, Origin, and Peril Across 93 Stigmas.

    Science.gov (United States)

    Pachankis, John E; Hatzenbuehler, Mark L; Wang, Katie; Burton, Charles L; Crawford, Forrest W; Phelan, Jo C; Link, Bruce G

    2018-04-01

    Most individuals are stigmatized at some point. However, research often examines stigmas separately, thus underestimating the overall impact of stigma and precluding comparisons across stigmatized identities and conditions. In their classic text, Social Stigma: The Psychology of Marked Relationships, Edward Jones and colleagues laid the groundwork for unifying the study of different stigmas by considering the shared dimensional features of stigmas: aesthetics, concealability, course, disruptiveness, origin, peril. Despite the prominence of this framework, no study has documented the extent to which stigmas differ along these dimensions, and the implications of this variation for health and well-being. We reinvigorated this framework to spur a comprehensive account of stigma's impact by classifying 93 stigmas along these dimensions. With the input of expert and general public raters, we then located these stigmas in a six-dimensional space and created discrete clusters organized around these dimensions. Next, we linked this taxonomy to health and stigma-related mechanisms. This quantitative taxonomy offers parsimonious insights into the relationship among the numerous qualities of numerous stigmas and health.

  4. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many of these situations by explicitly modeling the piles that the objects may form into. By modeling pile behavior rather than the behavior of all individual objects, we can achieve realistic results in less time, and without directly modeling the frictional component that leads to desired pile shapes. Our method is simple to implement and can be easily integrated with existing rigid body simulations. We observe notable speedups in several rigid body examples, and generate a wider variety of piled structures than possible with strict impulse-based simulation. © 2010 ACM.

  5. Safety objectives for 2014

    CERN Multimedia

    HSE Unit

    2014-01-01

    This is the third year in which the CERN Management has presented annual safety objectives for the Organization, the “HSE Objectives”.   The HSE objectives for 2014, which were announced by the Director-General at his traditional New Year’s address to the staff and were presented at the first Enlarged Directorate meeting of the year, have been drawn up and agreed in close collaboration between the DSOs, the HSE Unit and the DG himself. From safety in the workplace to radiation and environmental protection, the document emphasises that “Safety is a priority for CERN” and that safety policy is a key element in how the Organization is run. And, like all policies, it generates objectives that “serve as a general framework for action”. The HSE objectives are broken down into the following fields: occupational health and safety on sites and in the workplace, radiation protection, radiation safety, environmental protection, emerge...

  6. Registration of Space Objects

    Science.gov (United States)

    Schmidt-Tedd, Bernhard

    2017-07-01

    Space objects are subject to registration in order to allocate "jurisdiction and control" over those objects in the sovereign-free environment of outer space. This approach is similar to the registration of ships in view of the high sea and for aircrafts with respect to the international airspace. Registration is one of the basic principles of space law, starting with UN General Assembly Resolution 1721 B (XVI) of December 20, 1961, followed by Resolution 1962 (XVIII) of December 13, 1963, then formulated in Article VIII of the Outer Space Treaty of 1967 and as specified in the Registration Convention of 1975. Registration of space objects can be seen today as a principle of customary international law, relevant for each spacefaring state. Registration is divided into a national and an international level. The State Party establishes a national registry for its space objects, and those registrations have to be communicated via diplomatic channel to the UN Register of space objects. This UN Register is handled by the UN Office for Outer Space Affairs (UNOOSA) and is an open source of information for space objects worldwide. Registration is linked to the so-called launching state of the relevant space object. There might be more than one launching state for the specific launch event, but only one state actor can register a specific space object. The state of registry gains "jurisdiction and control" over the space object and therefore no double registration is permissible. Based on the established UN Space Law, registration practice was subject to some adaptions due to technical developments and legal challenges. After the privatization of the major international satellite organizations, a number of non-registrations had to be faced. The state actors reacted with the UN Registration Practice Resolution of 2007 as elaborated in the Legal Subcommittee of UNCOPUOS, the Committee for the Peaceful Use of Outer Space. In this context an UNOOSA Registration Information

  7. Protected Objects in Java

    DEFF Research Database (Denmark)

    Løvengreen, Hans Henrik; Schwarzer, Jens Christian

    1998-01-01

    We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library.......We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library....

  8. CODAS object monitoring service

    International Nuclear Information System (INIS)

    Wheatley, M.R.; Rainford, M.

    2001-01-01

    The primary Control and Data Acquisition System (CODAS) of JET is based on a TCP/IP network of more than 150 computers. The CODAS computers provide the JET machine control and data acquisition for over 70,000 digital and analog signals. The Object Monitoring Service (OMS) is used by applications for monitoring objects for presentation to the JET machine operators and for the operation of individual software components (such as valve state, access control, mimic definition changes and internal data distribution). Each server typically handles connections from around 60 clients monitoring upwards of 2000 objects. Some servers have over 150 clients and 5000 objects. Acquisition libraries are dynamically linked into a running server as required either to acquire data values for objects or to forward requests to other OMS servers. A mechanism involving dynamic linking allows new libraries to be integrated without stopping or changing running software. OMS provides a very reliable and highly successful 'data-type independent' means of monitoring many different objects. It allows applications to take advantage of new data sources, without the need to change existing code

  9. Nuclear Fuel Cycle Objectives

    International Nuclear Information System (INIS)

    2013-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way this objective is achieved is through the publication of a range of technical series. Two of these are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III.A.6 of the IAEA Statute, the safety standards establish 'standards of safety for protection of health and minimization of danger to life and property'. The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are written primarily in a regulatory style, and are binding on the IAEA for its own programmes. The principal users are the regulatory bodies in member States and other national authorities. The IAEA Nuclear Energy Series comprises reports designed to encourage and assist R and D on, and application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in member States, implementing organizations, academia and government officials, among others. This information is presented in guides, reports on technology status and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The IAEA Nuclear Energy Series complements the IAEA Safety Standards Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series, and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be considered and the specific goals to be achieved at different stages of implementation, all of which are consistent with the Basic Principles

  10. Objects of consciousness

    Directory of Open Access Journals (Sweden)

    Donald David Hoffman

    2014-06-01

    Full Text Available Current models of visual perception typically assume that human vision estimates true properties of physical objects, properties that exist even if unperceived. However, recent studies of perceptual evolution, using evolutionary games and genetic algorithms, reveal that natural selection often drives true perceptions to extinction when they compete with perceptions tuned to fitness rather than truth: Perception guides adaptive behavior; it does not estimate a preexisting physical truth. Moreover, shifting from evolutionary biology to quantum physics, there is reason to disbelieve in preexist-ing physical truths: Certain interpretations of quantum theory deny that dynamical properties of physical objects have defi-nite values when unobserved. In some of these interpretations the observer is fundamental, and wave functions are com-pendia of subjective probabilities, not preexisting elements of physical reality. These two considerations, from evolutionary biology and quantum physics, suggest that current models of object perception require fundamental reformulation. Here we begin such a reformulation, starting with a formal model of consciousness that we call a conscious agent. We develop the dynamics of interacting conscious agents, and study how the perception of objects and space-time can emerge from such dynamics. We show that one particular object, the quantum free particle, has a wave function that is identical in form to the harmonic functions that characterize the asymptotic dynamics of conscious agents; particles are vibrations not of strings but of interacting conscious agents. This allows us to reinterpret physical properties such as position, momentum, and energy as properties of interacting conscious agents, rather than as preexisting physical truths. We sketch how this approach might extend to the perception of relativistic quantum objects, and to classical objects of macroscopic scale.

  11. Radioactive Waste Management Objectives

    International Nuclear Information System (INIS)

    2011-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way it achieves this objective is to issue publications in various series. Two of these series are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III, paragraph A.6, of the IAEA Statute, the IAEA safety standards establish 'standards of safety for protection of health and minimization of danger to life and property.' The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are primarily written in a regulatory style, and are binding on the IAEA for its own activities. The principal users are Member State regulatory bodies and other national authorities. The IAEA Nuclear Energy Series consists of reports designed to encourage and assist research on, and development and practical application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in Member States, implementing organizations, academia and politicians, among others. The information is presented in guides, reports on the status of technology and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The series complements the IAEA's safety standards, and provides detailed guidance, experience, good practices and examples on the five areas covered in the IAEA Nuclear Energy Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be

  12. TESS Objects of Interest

    Science.gov (United States)

    Guerrero, Natalia; Glidden, Ana; Fausnaugh, Michael; TESS Team

    2018-01-01

    We describe the search for TESS Objects of Interest (TOIs), led by the MIT branch of the TESS Science Office (TSO). TSO has developed a tool called TESS Exoplanet Vetter (TEV) to facilitate this process. Individuals independently examine data validation products for each target and assign a category to the object: planet candidate, eclipsing binary, other astrophysical, stellar variability, or instrument noise/systematic. TEV assigns a preliminary follow-up priority designation to each object and allows for modification when final dispositions are decided on in a group setting. When all targets are vetted, TEV exports a catalogue of TOIs which is delivered to the TESS Follow-Up Observing Program (TFOP), working with ExoFOP-TESS, and made publicly available on the official TESS website and the Mikulski Archive for Space Telescopes (MAST).

  13. [Medicine and conscientious objection].

    Science.gov (United States)

    Martínez, K

    2007-01-01

    Conscientious objection to democratically accepted laws in democratic societies is a fact, both among citizens and among professionals. Due respect for laws is a prima facie duty in these societies. But democratic justice must at the same time respect peoples' conscience for it constitutes the ethical identity of individuals. And both law and ethics are necessary - although neither of them is sufficient - for its realization. The problem of conscientious objection among healthcare professionals is analysed from this standpoint and the conclusion is that objection is not an absolute right to exemption from several duties, but that the responsibility of the professional and of the institutions towards the citizenry must always be taken into account. Some solutions are suggested that try to protect both the professionals and the citizens in a bi-directional way.

  14. Media, journalism, objectivity

    Directory of Open Access Journals (Sweden)

    Vlajki Emil

    2013-01-01

    Full Text Available This is the text around the themes: Media and Journalism, are confronted two directions of opinions: humanism and elitism. Humanism believes that media and journalism must be metaphysically objective: able to tell the truth regardless of time, place and terms of events. Another approach, elitism, is connected with Hegel's philosophy of history. Hegel's conceptual apparatus includes: Idea, History dialectic, 'cunning mind,' self- development and self-realization. In this context, media and journalism are considered as organic unity, an inseparable part of some dialectical totality. More specifically media and journalism can be objective only if they defend concrete ideological assumptions of society to which they belong. Any other understanding of these two concepts is non-objective, mere moralizing and / or demagoguery.

  15. Pinocchio: Geppetto's transitional object

    Directory of Open Access Journals (Sweden)

    Gabriele Zeloni

    2015-01-01

    Full Text Available The literature has been considered by Freud and others after him, a form of unaware exploration of mind that can leads to discoveries similar to psychoanalysis’s discoveries. From this perspective, the author puts forward the following hypothesis: Pinocchio is a puppet who comes to life and is therefore, from a child's perception, a transitional object according to Winnicott. Consequently Geppetto is nothing more than the involuntary representation of any child interacting with the transitional object. The author explains the results of the analysis of the text in support of the hypothesis and reflects on the impact of The adventure of Pinocchio on the reader.

  16. Object-oriented communications

    International Nuclear Information System (INIS)

    Chapman, L.J.

    1989-01-01

    OOC is a high-level communications protocol based on the object-oriented paradigm. OOC's syntax, semantics, and pragmatics balance simplicity and expressivity for controls environments. While natural languages are too complex, computer protocols are often insufficiently expressive. An object-oriented communications philosophy provides a base for building the necessary high-level communications primitives like I don't understand and the current value of X is K. OOC is sufficiently flexible to express data acquisition, control requests, alarm messages, and error messages in a straightforward generic way. It can be used in networks, for inter-task communication, and even for intra-task communication

  17. Quantum objective realism

    International Nuclear Information System (INIS)

    Bednorz, Adam

    2015-01-01

    The question of whether quantum measurements reflect some underlying objective reality has no generally accepted answer. We show that a description of such reality is possible under natural conditions such as linearity and causality, although in terms of moments and cumulants of finite order and without relativistic invariance. The proposed construction of observations’ probability distribution originates from weak, noninvasive measurements, with detection error replaced by some external finite noise. The noise allows us to construct microscopic objective reality, but remains dynamically decoupled and hence unobservable at the macroscopic level. (paper)

  18. Learning Objects Web

    DEFF Research Database (Denmark)

    Blåbjerg, Niels Jørgen

    2005-01-01

    Learning Objects Web er et DEFF projekt som Aalborg Universitetsbibliotek har initieret. Projektet tager afsæt i de resultater og erfaringer som er opnået med vores tidligere projekt Streaming Webbased Information Modules (SWIM). Vi har et internationalt netværk af interessenter som giver os...... sparring og feedback i forhold til udviklingskoncept både omkring de teoretiske rammer og i forhold til praktisk anvendelse af vores undervisningskoncept. Med disse rygstød og input har vi forfulgt ønsket om at videreudvikle SWIM i det nye projekt Learning Objects Web. Udgivelsesdato: juni...

  19. Big Java late objects

    CERN Document Server

    Horstmann, Cay S

    2012-01-01

    Big Java: Late Objects is a comprehensive introduction to Java and computer programming, which focuses on the principles of programming, software engineering, and effective learning. It is designed for a two-semester first course in programming for computer science students.

  20. Technical objectives of inspection

    International Nuclear Information System (INIS)

    Sorenson, R.J.; Stewart, K.B.; Schneider, R.A.

    1976-01-01

    The various technical objectives of inspection are discussed in a very general manner. The discussion includes how the inspection function is related to the assumed threat, the various degrees of assurance and reliance on criteria, and the hierarchy of assurance which is obtained from the various types or levels of inspection

  1. Testing object Interactions

    NARCIS (Netherlands)

    Grüner, Andreas

    2010-01-01

    In this thesis we provide a unit testing approach for multi-purposes object-oriented programming languages in the style of Java and C#. Our approach includes the definition of a test specification language which results from extending the programming language with new designated specification

  2. Boundary-Object Trimming

    DEFF Research Database (Denmark)

    Bossen, Claus; Jensen, Lotte Groth; Udsen, Flemming Witt

    2014-01-01

    implementation, which also coupled the work of medical secretaries more tightly to that of other staff, and led to task drift among professions. Medical secretaries have been relatively invisible to health informatics and CSCW, and we propose the term ‘boundary-object trimming’ to foreground and conceptualize...

  3. The Object of Research

    DEFF Research Database (Denmark)

    Bean, Jonathan; Figueiredo, Bernardo; Pico Larsen, Hanne

    2017-01-01

    The paper outlines a methodological approach for investigating how consumers create brand meaning using the material resources companies provide. The approach draws from Material Engagement Theory—to discuss the role of consumers in creating patterns of meaning by engaging with objects. It also e...

  4. Robust video object cosegmentation.

    Science.gov (United States)

    Wang, Wenguan; Shen, Jianbing; Li, Xuelong; Porikli, Fatih

    2015-10-01

    With ever-increasing volumes of video data, automatic extraction of salient object regions became even more significant for visual analytic solutions. This surge has also opened up opportunities for taking advantage of collective cues encapsulated in multiple videos in a cooperative manner. However, it also brings up major challenges, such as handling of drastic appearance, motion pattern, and pose variations, of foreground objects as well as indiscriminate backgrounds. Here, we present a cosegmentation framework to discover and segment out common object regions across multiple frames and multiple videos in a joint fashion. We incorporate three types of cues, i.e., intraframe saliency, interframe consistency, and across-video similarity into an energy optimization framework that does not make restrictive assumptions on foreground appearance and motion model, and does not require objects to be visible in all frames. We also introduce a spatio-temporal scale-invariant feature transform (SIFT) flow descriptor to integrate across-video correspondence from the conventional SIFT-flow into interframe motion flow from optical flow. This novel spatio-temporal SIFT flow generates reliable estimations of common foregrounds over the entire video data set. Experimental results show that our method outperforms the state-of-the-art on a new extensive data set (ViCoSeg).

  5. Objectives and Outcomes

    Energy Technology Data Exchange (ETDEWEB)

    Segalman, D.J.

    1998-11-30

    I have recently become involved in the ABET certification process under the new system - ABET 2000. This system relies heavily on concepts of Total Quality Management (TQM). It encourages each institution to define its objectives in terms of its own mission and then create a coherent program based on it. The prescribed steps in setting up the new system at an engineering institution are: o identification of constituencies G definition of mission. It is expected that the department's mission will be consistent with that of the overall institution, but containing some higher resolution language appropriate to that particular discipline of the engineering profession. o statement of objectives consistent with the mission 3G~~\\vED " enumeration of desired, and preferably measurable, outcomes of the process that would ~ `=. verify satisfaction of the objectives. ~~~ 07 !398 o establish performance standards for each outcome. o creation of appropriate feedback loops to assure that the objectives are still consistent with Q$YT1 the mission, that the outcomes remain consistent with the objectives, and that the curriculum and the teaching result in those outcomes. It is my assertion that once the institution verbalizes a mission, enumerated objectives naturally flow from that mission. (We shall try to demonstrate by example.) Further, if the mission uses the word "engineer", one would expect that word also to appear in at least one of the objectives. The objective of producing engineers of any sort must -by decree - involve the presence of the ABET criteria in the outcomes list. In other words, successful satisfaction of the ABET items a-k are a necessary subset of the measure of success in producing engineers. o We shall produce bachelor level engineers whose training in the core topics of chemical (or electrical, or mechanical) engineering is recognized to be among the best in the nation. o We shall provide an opportunity for our students to gain

  6. Influence of allocation concealment and intention-to-treat analysis on treatment effects of physical therapy interventions in low back pain randomised controlled trials: a protocol of a meta-epidemiological study.

    Science.gov (United States)

    Almeida, Matheus Oliveira; Saragiotto, Bruno T; Maher, Chris G; Pena Costa, Leonardo Oliveira

    2017-09-27

    Meta-epidemiological studies examining the influence of methodological characteristics, such as allocation concealment and intention-to-treat analysis have been performed in a large number of healthcare areas. However, there are no studies investigating these characteristics in physical therapy interventions for patients with low back pain. The aim of this study is to investigate the influence of allocation concealment and the use of intention-to-treat analysis on estimates of treatment effects of physical therapy interventions in low back pain clinical trials. Searches on PubMed, Embase, Cochrane Database of Systematic Reviews, Physiotherapy Evidence Database (PEDro) and CINAHL databases will be performed. We will search for systematic reviews that include a meta-analysis of randomised controlled trials that compared physical therapy interventions in patients with low back pain with placebo or no intervention, and have pain intensity or disability as the primary outcomes. Information about selection (allocation concealment) and attrition bias (intention-to-treat analysis) will be extracted from the PEDro database for each included trial. Information about bibliographic data, study characteristics, participants' characteristics and study results will be extracted. A random-effects model will be used to provide separate estimates of treatment effects for trials with and without allocation concealment and with and without intention-to-treat analysis (eg, four estimates). A meta-regression will be performed to measure the association between methodological features and treatment effects from each trial. The dependent variable will be the treatment effect (the mean between-group differences) for the primary outcomes (pain or disability), while the independent variables will be the methodological features of interest (allocation concealment and intention-to-treat analysis). Other covariates will include sample size and sequence generation. No ethical approval will be

  7. Suggestive Objects at Work

    DEFF Research Database (Denmark)

    Ratner, Helene Gad

    2009-01-01

    In Western secular societies, spiritual life is no longer limited to classical religious institutions but can also be found at workplace organizations. While spirituality is conventionally understood as a subjective and internal process, this paper proposes the concept of ‘suggestive objects......’, constructed by combining insights from Gabriel Tarde's sociology with Bruno Latour's actor-network theory, to theorize the material dimension of organizational spirituality. The sacred in organizations arises not from the internalization of collective values but through the establishment of material...... scaffolding. This has deep implications for our understanding of the sacred, including a better appreciation of the way that suggestive objects make the sacred durable, the way they organize it....

  8. Near Earth Objects

    DEFF Research Database (Denmark)

    Wolff, Stefan

    2006-01-01

    , Near Earth Objects: Asteroids and comets following paths that bring them near the Earth. NEOs have collided with the Earth since its formation, some causing local devastation, some causing global climate changes, yet the threat from a collision with a near Earth object has only recently been recognised...... and accepted. The European Space Agency mission Gaia is a proposed space observatory, designed to perform a highly accurate census of our galaxy, the Milky Way, and beyond. Through accurate measurement of star positions, Gaia is expected to discover thousands of extra-solar planets and follow the bending...... of starlight by the Sun, and therefore directly observe the structure of space-time. This thesis explores several aspects of the observation of NEOs with Gaia, emphasising detection of NEOs and the quality of orbits computed from Gaia observations. The main contribution is the work on motion detection...

  9. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D' Azevedo, E.F.

    1994-01-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  10. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D`Azevedo, E.F.; Romine, C.H.

    1994-10-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  11. War Journalism and 'Objectivity'

    Directory of Open Access Journals (Sweden)

    Annabel McGoldrick

    2006-10-01

    Full Text Available This article opens by considering an apparent paradox. Many professional journalists, working on many media in many countries, consider themselves 'objective'. They do not, at least, set out to skew their coverage of important issues in favour of one side or the other. And yet much of their coverage of conflicts shows a discernible dominant pattern of War Journalism - biased in favour of war. This is not because of a lack of objectivity, the article suggests, but a surfeit. The set of conventions many editors and reporters regard as defining 'objective' journalism arose in response to economic and political conditions which rewarded news that could commend itself as unobjectionable to the maximum number of potential customers. Three of the most important conventions privilege official sources; a dualistic construction of stories and event, over process. Each of these, when applied to the representation of conflicts, leads readers and audiences - or leaves them - to over-value violent, reactive responses and under-value non-violent, developmental responses. Industry conventions sit uneasily alongside equally time-honoured expectations of journalism. These are encoded in rules and regulations governing the content of broadcast news, in many jurisdictions which have a public service concept for radio and television. In some respects, War Journalism can be shown to make it more difficult for broadcast news services to fulfil their public service obligations. Awareness is now growing, of the tension between these two pressures on journalism and its influence on the way pressing public debates are shaped and mediated. More Peace Journalism would help to bring public service news back into line with legitimate public expectations.

  12. Numerical Analysis Objects

    Science.gov (United States)

    Henderson, Michael

    1997-08-01

    The Numerical Analysis Objects project (NAO) is a project in the Mathematics Department of IBM's TJ Watson Research Center. While there are plenty of numerical tools available today, it is not an easy task to combine them into a custom application. NAO is directed at the dual problems of building applications from a set of tools, and creating those tools. There are several "reuse" projects, which focus on the problems of identifying and cataloging tools. NAO is directed at the specific context of scientific computing. Because the type of tools is restricted, problems such as tools with incompatible data structures for input and output, and dissimilar interfaces to tools which solve similar problems can be addressed. The approach we've taken is to define interfaces to those objects used in numerical analysis, such as geometries, functions and operators, and to start collecting (and building) a set of tools which use these interfaces. We have written a class library (a set of abstract classes and implementations) in C++ which demonstrates the approach. Besides the classes, the class library includes "stub" routines which allow the library to be used from C or Fortran, and an interface to a Visual Programming Language. The library has been used to build a simulator for petroleum reservoirs, using a set of tools for discretizing nonlinear differential equations that we have written, and includes "wrapped" versions of packages from the Netlib repository. Documentation can be found on the Web at "http://www.research.ibm.com/nao". I will describe the objects and their interfaces, and give examples ranging from mesh generation to solving differential equations.

  13. Full-thickness rectal biopsy in children suspicious for Hirschsprung's disease is safe and yields a low number of insufficient biopsies

    DEFF Research Database (Denmark)

    Bjørn, Niels; Rasmussen, Lars; Qvist, Niels

    2018-01-01

    INTRODUCTION: The diagnosis of Hirschsprung's disease (HD) relies on the histological demonstration of aganglionosis in the bowel wall. Biopsies may be obtained by rectal suction biopsy (RSB) or by transanal full-thickness excision biopsy (FTB). The objective of the present study was to evaluate...... the frequency of complications and inconclusive biopsies after FTB in children referred with suspicion of HD. The secondary objective was to calculate the frequency of proven aganglionosis. METHODS: A retrospective chart review was performed of all patients under the age of 16years who underwent transanal FTB...... during the time period of 2008-2014. RESULTS: A total of 555 patients were included in the review. Inconclusive biopsies were found at the primary biopsy in 35 patients (5.9%). Aganglionosis was found in 12% of the cases. The complication rate was 6.6% (39 patients), 85% of which were classified...

  14. The Language of Objects

    DEFF Research Database (Denmark)

    Eskildsen, Kasper Risbjerg

    2012-01-01

    The Danish amateur scholar Christian Jürgensen Thomsen has often been described as a founder of modern “scientific” archaeology. Thomsen's innovation, this essay argues, reflects developments within neighboring fields, such as philology and history. He reacted against historians who limited....... The arrangement of artifacts not only helped him formulate his theories, but also allowed him to present his arguments in a language of objects. At the same time, Thomsen's definition of archaeology as a museum science placed his branch of archaeology in a closer relationship with other museum sciences...

  15. Remote viewing of objects

    International Nuclear Information System (INIS)

    Motin, J.D.; Reformatsky, I.A.; Sinitsyn, P.R.; Ivanov, N.M.; Ivanov, B.I.; Malakhov, I.K.

    1979-01-01

    An object in a nuclear power plant is viewed through a radiation-proof shield by means of an entrance lens, optic fibre bundle and exit lens. The optic fibre bundle being heated to ensure thermostabilization of its light conducting properties in the presence of ionising radiation. Heating is by an electric heating coil. Alternatively, heating may be by argon itself heated by an electric heating element, a coating of resistive heating material, or absorption of neutrons in the material of the fibres or a coating therefor. Viewing may be on a CRT screen. (author)

  16. Part Objects and Their Location

    DEFF Research Database (Denmark)

    Madsen, Ole Lehrmann; Møller-Pedersen, Birger

    1992-01-01

    The notion of location of part objects is introduced, yielding a reference to the containing object. Combined with locally defined objects and classes (block structure), singularly defined part objects, and references to part objects, it is a powerful language mechanism for defining objects...

  17. Object-Based Benefits without Object-Based Representations

    OpenAIRE

    Alvarez, George Angelo; Fougnie, Daryl; Cormiea, Sarah M

    2012-01-01

    The organization of visual information into objects strongly influences visual memory: Displays with objects defined by two features (e.g. color, orientation) are easier to remember than displays with twice as many objects defined by one feature (Olson & Jiang, 2002). Existing theories suggest that this ‘object-benefit’ is based on object-based limitations in working memory: because a limited number of objects can be stored, packaging features together so that fewer objects have to be remembe...

  18. Object linking in repositories

    Science.gov (United States)

    Eichmann, David (Editor); Beck, Jon; Atkins, John; Bailey, Bill

    1992-01-01

    This topic is covered in three sections. The first section explores some of the architectural ramifications of extending the Eichmann/Atkins lattice-based classification scheme to encompass the assets of the full life cycle of software development. A model is considered that provides explicit links between objects in addition to the edges connecting classification vertices in the standard lattice. The second section gives a description of the efforts to implement the repository architecture using a commercially available object-oriented database management system. Some of the features of this implementation are described, and some of the next steps to be taken to produce a working prototype of the repository are pointed out. In the final section, it is argued that design and instantiation of reusable components have competing criteria (design-for-reuse strives for generality, design-with-reuse strives for specificity) and that providing mechanisms for each can be complementary rather than antagonistic. In particular, it is demonstrated how program slicing techniques can be applied to customization of reusable components.

  19. Review of Meeting Objectives

    International Nuclear Information System (INIS)

    Braams, B.J.; Chung, H.-K.

    2011-01-01

    This is the 21st meeting of the International Atomic and Molecular Data Centres Network. The traditional DCN meeting objectives are: to exchange information about activities in the Centres and review progress; to coordinate work in the Centres; to assess priorities in data evaluation and data production; to make plans for specific evaluations; and to evaluate and revise procedures for collection and exchange of bibliographical and numerical data. All of these are objectives for the present meeting too. In addition to the presentations from DCN and prospective DCN members we have two participants from outside the field of fusion data: Dr N. Mason will tell us about coordination of the Virtual Atomic and Molecular Data Centre and Dr S. Simakov will describe the manner in which nuclear structure and cross-section database development is coordinated by our colleagues in the Nuclear Data Section. In the discussions on Thursday and Friday there are two topics that need special attention this year: the future of our bibliographical data compilation and ways in which we can strengthen data evaluation activities, all with emphasis on collision processes and plasma-material interaction. The first 3 Data Centre Network meetings were held in 1977, 1980 and 1982 and the reports of those meetings make interesting reading and can still provide inspiration for the present meeting. I show some excerpts in the presentation. In 1977 the emphasis was on the coordination of the bibliographical database, AMBDAS, and a collision data index, CIAMDA, as the initial activities of the Network and of the newly formed IAEA A+M Data Unit. In 1980 the central topic of discussion at the meeting shifted to the numerical database and to data evaluation. The Network recommended that numerical data be reviewed by a selected group of scientists and that no unevaluated numerical A+M collision data should be distributed by the IAEA. The report of the meeting in 1982 shows that the bibliographical

  20. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation.

    Science.gov (United States)

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V; Levy, Mia A

    2017-07-25

    Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score compared to the control group (0.4 points

  1. Objectives of the symposium

    International Nuclear Information System (INIS)

    Genter, N.E.

    1996-01-01

    The objective of this symposium was to discuss the sorts of evidence of molecular alterations in DNA which can be used to study causation of the stochastic effects of importance in radiation protection. Specifically, the aim was to address the following: what sort of indications might show whether a cancer was caused by radiation; whether there is a radiogenic signature to distinguish damage caused by ionizing radiation; whether bio-markers might be available for susceptibility, for exposure, for biological consequences. Despite a number of epidemiological studies (referred to), there is no clear, credible, defensible answer as to whether low-level radiation increases the risk of cancer. A new ethical question is, what rules should be in place for identifying and protecting genetically sensitive individuals. 1 tab

  2. Objectives of the symposium

    International Nuclear Information System (INIS)

    Osborne, R.V.

    1992-01-01

    The author defined the objectives of the symposium as follows: to present and examine the recent evidence associating clusters of leukemia with sources of ionizing radiation; to examine the statistical basis for the analysis of clustering; to examine the underlying assumptions in epidemiological studies that clusters must have an environmental cause; to examine the extent to which we can take into account the biological causes of non-randomness in populations, particularly those of geographic and genetic origin; to evaluate the relative merits of different kinds of epidemiological studies for yielding significant information concerning clustering; to consider the potential utility of combining the results from existing studies, and whether new epidemiological studies might be helpful; to consider what other directions, including application of the technologies of molecular biology, are likely to help clarify the underlying mechanisms or causes

  3. Technical note: Evaluation of the uncertainties in (choline+creatine)/citrate ratios measured by proton MR spectroscopic imaging in patients suspicious for prostate cancer

    Energy Technology Data Exchange (ETDEWEB)

    Zbyn, S.; Krssak, M.; Memarsadeghi, M.; Gholami, B.; Haitel, A.; Weber, M.; Helbich, T.H.; Trattnig, S.; Moser, E.; Gruber, S.

    2014-07-15

    The presented evaluation of the relative uncertainty (δ'CCC) of the (choline + creatine)/citrate (CC/C) ratios can provide objective information about the quality and diagnostic value of prostate MR spectroscopic imaging data. This information can be combined with the numeric values of CC/C ratios and provides metabolic-quality maps enabling accurate cancer detection and user-independent data evaluation. In addition, the prostate areas suffering most from the low precision of CC/C ratios (e. g., prostate base) were identified.

  4. Breaking object correspondence across saccadic eye movements deteriorates object recognition

    Directory of Open Access Journals (Sweden)

    Christian H. Poth

    2015-12-01

    Full Text Available Visual perception is based on information processing during periods of eye fixations that are interrupted by fast saccadic eye movements. The ability to sample and relate information on task-relevant objects across fixations implies that correspondence between presaccadic and postsaccadic objects is established. Postsaccadic object information usually updates and overwrites information on the corresponding presaccadic object. The presaccadic object representation is then lost. In contrast, the presaccadic object is conserved when object correspondence is broken. This helps transsaccadic memory but it may impose attentional costs on object recognition. Therefore, we investigated how breaking object correspondence across the saccade affects postsaccadic object recognition. In Experiment 1, object correspondence was broken by a brief postsaccadic blank screen. Observers made a saccade to a peripheral object which was displaced during the saccade. This object reappeared either immediately after the saccade or after the blank screen. Within the postsaccadic object, a letter was briefly presented (terminated by a mask. Observers reported displacement direction and letter identity in different blocks. Breaking object correspondence by blanking improved displacement identification but deteriorated postsaccadic letter recognition. In Experiment 2, object correspondence was broken by changing the object’s contrast-polarity. There were no object displacements and observers only reported letter identity. Again, breaking object correspondence deteriorated postsaccadic letter recognition. These findings identify transsaccadic object correspondence as a key determinant of object recognition across the saccade. This is in line with the recent hypothesis that breaking object correspondence results in separate representations of presaccadic and postsaccadic objects which then compete for limited attentional processing resources (Schneider, 2013. Postsaccadic

  5. Data quality objectives

    International Nuclear Information System (INIS)

    Haeberer, F.

    1993-01-01

    The U.S. Environmental Protection Agency (EPA) spends about $500 million annually in collecting environmental data for scientific research and regulatory decision making. In addition, the regulated community may spend as much as ten times more each year in responding to EPA compliance requirements. Among the EPA and the regulated community there are several important common concerns: both want to make informed decisions using the right type, quality, and quantity of data. Collecting new data is very resource intensive to all parties. Neither EPA nor the regulated community can afford to collect more or open-quotes betterclose quotes data than are really needed; the Data Quality Objectives (DQO) process is a systematic planning tool for ensuring that the right data will be collected for arriving at a decision within the desired confidence constraints. Using the DQO process to plan environmental data collections can help improve their effectiveness and efficiency, and enhance the defensibility of the decisions for which the data are used

  6. Data quality objectives

    Energy Technology Data Exchange (ETDEWEB)

    Haeberer, F. [Environmental Protection Agency, Washington, DC (United States)

    1993-12-31

    The U.S. Environmental Protection Agency (EPA) spends about $500 million annually in collecting environmental data for scientific research and regulatory decision making. In addition, the regulated community may spend as much as ten times more each year in responding to EPA compliance requirements. Among the EPA and the regulated community there are several important common concerns: both want to make informed decisions using the right type, quality, and quantity of data. Collecting new data is very resource intensive to all parties. Neither EPA nor the regulated community can afford to collect more or {open_quotes}better{close_quotes} data than are really needed; the Data Quality Objectives (DQO) process is a systematic planning tool for ensuring that the right data will be collected for arriving at a decision within the desired confidence constraints. Using the DQO process to plan environmental data collections can help improve their effectiveness and efficiency, and enhance the defensibility of the decisions for which the data are used.

  7. Beyond the Object

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Object orientation (OO is regained not only in all components of integrate development media but it remarks in the rest of software world from operating system to last application domain - of course, with different intensity and success. A clear prove of OO application in all situations is the development of a wide range of industrial applications. OO technology allows drawing of relation between the geometry, topology and dimensions of data on a class hierarchy; thus, the observation of the amount of data gained by research in many scientific domains is facilitated through class libraries both for graphic primitives and for events examination. In conformity to all waiting, OO asserts in every distributive system, there are very important the applications for making open systems customer-server and dis-tributed applications in Java. Finally OO application in robot's programming and modeling needn't be omitted. However, far to be panacea, OO has also shades which will be researched so on.

  8. Workshop objectives and structure

    International Nuclear Information System (INIS)

    2004-01-01

    The overall aim of the Workshop was to create a platform in order to better understand different approaches to managing uncertainty in post-closure safety cases and regulatory approaches in different national waste management programmes. The principal objectives of the Workshop were to: - To identify common elements in different approaches for managing uncertainty. - To facilitate information exchange and to promote discussion on different technical approaches to the management and characterisation of uncertainty and on the role of risk. - To explore the merits of alternative approaches to risk-informed decision making. - To identify the potential for further developments of methods or strategies to support the management of uncertainties. The workshop was organised into plenary sessions and working group discussions: The first plenary session focused on establishing a framework for understanding the management of uncertainties and the use of risk. It comprised oral presentations drawing on a range of experience from both active participants in the development and assessment of safety cases and keynotes presentations by external participants involved in risk management in other sectors. The working group discussions covered three technical themes: Risk management and decision making. Regulatory requirements and review of uncertainty and risk in safety cases. Practical approaches and tools for the management of uncertainties and the assignment of probabilities, the use of expert judgements, and the presentation of information on uncertainties and risk were examined. The aim of the working groups was to develop an understanding of the specific issues, and to identify any further activities that will support the development and/or evaluation of safety cases. The round up plenary session brought together information and conclusions from each of the working groups. Common elements in the different approaches to treating uncertainty and risk were identified, along with

  9. Effects of Selected Object Characteristics on Object Permanence Test Performance.

    Science.gov (United States)

    Lingle, Kathleen M.; Lingle, John H.

    A study was conducted to investigate the degree to which both object familiarity and motivational factors influence infants' search behavior in an object permanence test. Infants' search behavior for an unfamiliar test object was compared with search behavior for (a) an experientially familiar object that each infant had played with daily for a…

  10. Tracking in Object Action Space

    DEFF Research Database (Denmark)

    Krüger, Volker; Herzog, Dennis

    2013-01-01

    the space of the object affordances, i.e., the space of possible actions that are applied on a given object. This way, 3D body tracking reduces to action tracking in the object (and context) primed parameter space of the object affordances. This reduces the high-dimensional joint-space to a low...

  11. Object grammars and random generation

    Directory of Open Access Journals (Sweden)

    I. Dutour

    1998-12-01

    Full Text Available This paper presents a new systematic approach for the uniform random generation of combinatorial objects. The method is based on the notion of object grammars which give recursive descriptions of objects and generalize context-freegrammars. The application of particular valuations to these grammars leads to enumeration and random generation of objects according to non algebraic parameters.

  12. Visual object recognition and tracking

    Science.gov (United States)

    Chang, Chu-Yin (Inventor); English, James D. (Inventor); Tardella, Neil M. (Inventor)

    2010-01-01

    This invention describes a method for identifying and tracking an object from two-dimensional data pictorially representing said object by an object-tracking system through processing said two-dimensional data using at least one tracker-identifier belonging to the object-tracking system for providing an output signal containing: a) a type of the object, and/or b) a position or an orientation of the object in three-dimensions, and/or c) an articulation or a shape change of said object in said three dimensions.

  13. First-Class Object Sets

    DEFF Research Database (Denmark)

    Ernst, Erik

    Typically, objects are monolithic entities with a fixed interface. To increase the flexibility in this area, this paper presents first-class object sets as a language construct. An object set offers an interface which is a disjoint union of the interfaces of its member objects. It may also be used...... for a special kind of method invocation involving multiple objects in a dynamic lookup process. With support for feature access and late-bound method calls object sets are similar to ordinary objects, only more flexible. The approach is made precise by means of a small calculus, and the soundness of its type...

  14. A Wearable Goggle Navigation System for Dual-Mode Optical and Ultrasound Localization of Suspicious Lesions: Validation Studies Using Tissue-Simulating Phantoms and an Ex Vivo Human Breast Tissue Model.

    Directory of Open Access Journals (Sweden)

    Zeshu Zhang

    Full Text Available Surgical resection remains the primary curative treatment for many early-stage cancers, including breast cancer. The development of intraoperative guidance systems for identifying all sites of disease and improving the likelihood of complete surgical resection is an area of active ongoing research, as this can lead to a decrease in the need of subsequent additional surgical procedures. We develop a wearable goggle navigation system for dual-mode optical and ultrasound imaging of suspicious lesions. The system consists of a light source module, a monochromatic CCD camera, an ultrasound system, a Google Glass, and a host computer. It is tested in tissue-simulating phantoms and an ex vivo human breast tissue model. Our experiments demonstrate that the surgical navigation system provides useful guidance for localization and core needle biopsy of simulated tumor within the tissue-simulating phantom, as well as a core needle biopsy and subsequent excision of Indocyanine Green (ICG-fluorescing sentinel lymph nodes. Our experiments support the contention that this wearable goggle navigation system can be potentially very useful and fully integrated by the surgeon for optimizing many aspects of oncologic surgery. Further engineering optimization and additional in vivo clinical validation work is necessary before such a surgical navigation system can be fully realized in the everyday clinical setting.

  15. Object width modulates object-based attentional selection.

    Science.gov (United States)

    Nah, Joseph C; Neppi-Modona, Marco; Strother, Lars; Behrmann, Marlene; Shomstein, Sarah

    2018-04-24

    Visual input typically includes a myriad of objects, some of which are selected for further processing. While these objects vary in shape and size, most evidence supporting object-based guidance of attention is drawn from paradigms employing two identical objects. Importantly, object size is a readily perceived stimulus dimension, and whether it modulates the distribution of attention remains an open question. Across four experiments, the size of the objects in the display was manipulated in a modified version of the two-rectangle paradigm. In Experiment 1, two identical parallel rectangles of two sizes (thin or thick) were presented. Experiments 2-4 employed identical trapezoids (each having a thin and thick end), inverted in orientation. In the experiments, one end of an object was cued and participants performed either a T/L discrimination or a simple target-detection task. Combined results show that, in addition to the standard object-based attentional advantage, there was a further attentional benefit for processing information contained in the thick versus thin end of objects. Additionally, eye-tracking measures demonstrated increased saccade precision towards thick object ends, suggesting that Fitts's Law may play a role in object-based attentional shifts. Taken together, these results suggest that object-based attentional selection is modulated by object width.

  16. Adobe Boxes: Locating Object Proposals Using Object Adobes.

    Science.gov (United States)

    Fang, Zhiwen; Cao, Zhiguo; Xiao, Yang; Zhu, Lei; Yuan, Junsong

    2016-09-01

    Despite the previous efforts of object proposals, the detection rates of the existing approaches are still not satisfactory enough. To address this, we propose Adobe Boxes to efficiently locate the potential objects with fewer proposals, in terms of searching the object adobes that are the salient object parts easy to be perceived. Because of the visual difference between the object and its surroundings, an object adobe obtained from the local region has a high probability to be a part of an object, which is capable of depicting the locative information of the proto-object. Our approach comprises of three main procedures. First, the coarse object proposals are acquired by employing randomly sampled windows. Then, based on local-contrast analysis, the object adobes are identified within the enlarged bounding boxes that correspond to the coarse proposals. The final object proposals are obtained by converging the bounding boxes to tightly surround the object adobes. Meanwhile, our object adobes can also refine the detection rate of most state-of-the-art methods as a refinement approach. The extensive experiments on four challenging datasets (PASCAL VOC2007, VOC2010, VOC2012, and ILSVRC2014) demonstrate that the detection rate of our approach generally outperforms the state-of-the-art methods, especially with relatively small number of proposals. The average time consumed on one image is about 48 ms, which nearly meets the real-time requirement.

  17. Implications of perspective in teaching objects first and object design

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2005-01-01

    There are an increasing number of books published on the important topics of "object-oriented programming" and "object-oriented design" for use in education. However, object-orientation can be viewed from a number of different perspectives---each perspective having its benefits and liabilities...

  18. Two Types of Visual Objects

    Directory of Open Access Journals (Sweden)

    Skrzypulec Błażej

    2015-06-01

    Full Text Available While it is widely accepted that human vision represents objects, it is less clear which of the various philosophical notions of ‘object’ adequately characterizes visual objects. In this paper, I show that within contemporary cognitive psychology visual objects are characterized in two distinct, incompatible ways. On the one hand, models of visual organization describe visual objects in terms of combinations of features, in accordance with the philosophical bundle theories of objects. However, models of visual persistence apply a notion of visual objects that is more similar to that endorsed in philosophical substratum theories. Here I discuss arguments that might show either that only one of the above notions of visual objects is adequate in the context of human vision, or that the category of visual objects is not uniform and contains entities properly characterized by different philosophical conceptions.

  19. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-11-09

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  20. Foreign Objects in the Rectum

    Science.gov (United States)

    ... Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse (See ... Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse NOTE: ...

  1. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  2. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  3. Object Knowledge Modulates Colour Appearance

    Directory of Open Access Journals (Sweden)

    Christoph Witzel

    2011-01-01

    Full Text Available We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis.

  4. Object knowledge modulates colour appearance

    Science.gov (United States)

    Witzel, Christoph; Valkova, Hanna; Hansen, Thorsten; Gegenfurtner, Karl R

    2011-01-01

    We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective) colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis. PMID:23145224

  5. A Model for Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    1996-01-01

    We present a model for concurrent objects where obejcts interact by taking part in common events that are closely matched to form call-response pairs, resulting in resulting in rendez-vous like communications. Objects are built from primitive objects by parallel composition, encapsulation...

  6. Decoupling Object Detection and Categorization

    Science.gov (United States)

    Mack, Michael L.; Palmeri, Thomas J.

    2010-01-01

    We investigated whether there exists a behavioral dependency between object detection and categorization. Previous work (Grill-Spector & Kanwisher, 2005) suggests that object detection and basic-level categorization may be the very same perceptual mechanism: As objects are parsed from the background they are categorized at the basic level. In…

  7. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon

  8. SODA: Smart Objects, Dumb Archives

    Science.gov (United States)

    Nelson, Michael L.; Maly, Kurt; Zubair, Mohammad; Shen, Stewart N. T.

    2004-01-01

    We present the Smart Object, Dumb Archive (SODA) model for digital libraries (DLs). The SODA model transfers functionality traditionally associated with archives to the archived objects themselves. We are exploiting this shift of responsibility to facilitate other DL goals, such as interoperability, object intelligence and mobility, and heterogeneity. Objects in a SODA DL negotiate presentation of content and handle their own terms and conditions. In this paper we present implementations of our smart objects, buckets, and our dumb archive (DA). We discuss the status of buckets and DA and how they are used in a variety of DL projects.

  9. Object recognition memory in zebrafish.

    Science.gov (United States)

    May, Zacnicte; Morrill, Adam; Holcombe, Adam; Johnston, Travis; Gallup, Joshua; Fouad, Karim; Schalomon, Melike; Hamilton, Trevor James

    2016-01-01

    The novel object recognition, or novel-object preference (NOP) test is employed to assess recognition memory in a variety of organisms. The subject is exposed to two identical objects, then after a delay, it is placed back in the original environment containing one of the original objects and a novel object. If the subject spends more time exploring one object, this can be interpreted as memory retention. To date, this test has not been fully explored in zebrafish (Danio rerio). Zebrafish possess recognition memory for simple 2- and 3-dimensional geometrical shapes, yet it is unknown if this translates to complex 3-dimensional objects. In this study we evaluated recognition memory in zebrafish using complex objects of different sizes. Contrary to rodents, zebrafish preferentially explored familiar over novel objects. Familiarity preference disappeared after delays of 5 mins. Leopard danios, another strain of D. rerio, also preferred the familiar object after a 1 min delay. Object preference could be re-established in zebra danios by administration of nicotine tartrate salt (50mg/L) prior to stimuli presentation, suggesting a memory-enhancing effect of nicotine. Additionally, exploration biases were present only when the objects were of intermediate size (2 × 5 cm). Our results demonstrate zebra and leopard danios have recognition memory, and that low nicotine doses can improve this memory type in zebra danios. However, exploration biases, from which memory is inferred, depend on object size. These findings suggest zebrafish ecology might influence object preference, as zebrafish neophobia could reflect natural anti-predatory behaviour. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Propensity to Click on Suspicious Links

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Pavlicek, Antonin

    2017-01-01

    such behavior. Big Five Inventory traits (extraversion, agreeableness, conscientiousness, neuroticism, openness to experience) and narcissism were used. Impact of openness to experience was significant at 0.05 level, and of narcissism 0.1 level. Significance of remaining independent variables was above 0.......1. Openness to experience was linked positively linked to responsible behavior, narcissism was negatively linked....

  11. EC suspicious of Latvian audit results

    Index Scriptorium Estoniae

    2011-01-01

    Alates 1. novembrist 2010 ei ole Läti Euroopa Liidu Solidaarsusfondist finantseerimist saanud, kuigi selle abil läbiviidavad projektid pole peatatud, kuna see oli riigi otsus. Finantseerimine peaks taastuma juunis, kui Euroopa Komisjoniga lepitakse riigi rahanduse juhtimis- ja järelevalveprogrammis kokku

  12. Moderate financial incentive does not appear to influence the P300 Concealed Information Test (CIT) effect in the Complex Trial Protocol (CTP) version of the CIT in a forensic scenario, while affecting P300 peak latencies and behavior.

    Science.gov (United States)

    Rosenfeld, J Peter; Sitar, Evan; Wasserman, Joshua; Ward, Anne

    2018-03-01

    Previous research indicated that the skin conductance response (SCR) of the Autonomic Nervous System (ANS) in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor for P300 tests based on the 3-stimulus protocol or Complex Trial Protocol for detection of cognitive malingering (although these are not the same as forensic CITs). The present report extends earlier studies of malingerers by running five groups of subjects (15-16 per group yielding 78 total) in a mock crime (forensic) scenario: paid (to beat the test) and unpaid, instructed and uninstructed, and simply guilty. There was no evidence that the "CIT effect" (probe-minus-irrelevant P300 differences) differed among groups, although behavioral differences among groups were seen. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Channels as Objects in Concurrent Object-Oriented Programming

    Directory of Open Access Journals (Sweden)

    Joana Campos

    2011-10-01

    Full Text Available There is often a sort of a protocol associated to each class, stating when and how certain methods should be called. Given that this protocol is, if at all, described in the documentation accompanying the class, current mainstream object-oriented languages cannot provide for the verification of client code adherence against the sought class behaviour. We have defined a class-based concurrent object-oriented language that formalises such protocols in the form of usage types. Usage types are attached to class definitions, allowing for the specification of (1 the available methods, (2 the tests clients must perform on the result of methods, and (3 the object status - linear or shared - all of which depend on the object's state. Our work extends the recent approach on modular session types by eliminating channel operations, and defining the method call as the single communication primitive in both sequential and concurrent settings. In contrast to previous works, we define a single category for objects, instead of distinct categories for linear and for shared objects, and let linear objects evolve into shared ones. We introduce a standard sync qualifier to prevent thread interference in certain operations on shared objects. We formalise the language syntax, the operational semantics, and a type system that enforces by static typing that methods are called only when available, and by a single client if so specified in the usage type. We illustrate the language via a complete example.

  14. Rough multiple objective decision making

    CERN Document Server

    Xu, Jiuping

    2011-01-01

    Rough Set TheoryBasic concepts and properties of rough sets Rough Membership Rough Intervals Rough FunctionApplications of Rough SetsMultiple Objective Rough Decision Making Reverse Logistics Problem with Rough Interval Parameters MODM based Rough Approximation for Feasible RegionEVRMCCRMDCRM Reverse Logistics Network Design Problem of Suji Renewable Resource MarketBilevel Multiple Objective Rough Decision Making Hierarchical Supply Chain Planning Problem with Rough Interval Parameters Bilevel Decision Making ModelBL-EVRM BL-CCRMBL-DCRMApplication to Supply Chain Planning of Mianyang Co., LtdStochastic Multiple Objective Rough Decision Multi-Objective Resource-Constrained Project Scheduling UnderRough Random EnvironmentRandom Variable Stochastic EVRM Stochastic CCRM Stochastic DCRM Multi-Objective rc-PSP/mM/Ro-Ra for Longtan Hydropower StationFuzzy Multiple Objective Rough Decision Making Allocation Problem under Fuzzy Environment Fuzzy Variable Fu-EVRM Fu-CCRM Fu-DCRM Earth-Rock Work Allocation Problem.

  15. Rethinking the objectivity of ethics

    OpenAIRE

    Kurth, Charles Burke

    2011-01-01

    Commonsense says that morality is objective. But skeptics deny that the normativity and fallibility that characterize this objectivity really exist. I disagree. I develop an account of moral facts that vindicates the objectivity of ethics. Moreover, I do this without relying on either the strong foundational claims of realism and constructivism, or the revisionary logic of expressivism. Instead, I build from a moral psychology that is modest and familiar--one that focuses on the distinctive, ...

  16. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  17. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  18. Objective interpretation as conforming interpretation

    OpenAIRE

    Lidka Rodak

    2011-01-01

    The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and ...

  19. Cognitive object recognition system (CORS)

    Science.gov (United States)

    Raju, Chaitanya; Varadarajan, Karthik Mahesh; Krishnamurthi, Niyant; Xu, Shuli; Biederman, Irving; Kelley, Troy

    2010-04-01

    We have developed a framework, Cognitive Object Recognition System (CORS), inspired by current neurocomputational models and psychophysical research in which multiple recognition algorithms (shape based geometric primitives, 'geons,' and non-geometric feature-based algorithms) are integrated to provide a comprehensive solution to object recognition and landmarking. Objects are defined as a combination of geons, corresponding to their simple parts, and the relations among the parts. However, those objects that are not easily decomposable into geons, such as bushes and trees, are recognized by CORS using "feature-based" algorithms. The unique interaction between these algorithms is a novel approach that combines the effectiveness of both algorithms and takes us closer to a generalized approach to object recognition. CORS allows recognition of objects through a larger range of poses using geometric primitives and performs well under heavy occlusion - about 35% of object surface is sufficient. Furthermore, geon composition of an object allows image understanding and reasoning even with novel objects. With reliable landmarking capability, the system improves vision-based robot navigation in GPS-denied environments. Feasibility of the CORS system was demonstrated with real stereo images captured from a Pioneer robot. The system can currently identify doors, door handles, staircases, trashcans and other relevant landmarks in the indoor environment.

  20. Intuitive modeling of vaporish objects

    International Nuclear Information System (INIS)

    Sokolov, Dmitry; Gentil, Christian

    2015-01-01

    Attempts to model gases in computer graphics started in the late 1970s. Since that time, there have been many approaches developed. In this paper we present a non-physical method allowing to create vaporish objects like clouds or smoky characters. The idea is to create a few sketches describing the rough shape of the final vaporish object. These sketches will be used as condensation sets of Iterated Function Systems, providing intuitive control over the object. The advantages of the new method are: simplicity, good control of resulting shapes and ease of eventual object animation.

  1. Object 'Ukryttya' 1986-2006

    International Nuclear Information System (INIS)

    Klyuchnikov, A.A.; Krasnov, V.A.; Rud'ko, V.M.; Shcherbin, V.N.

    2006-01-01

    This monograph summarizes the materials pertaining to 'Ukryttya' Object state. The results of researches of fuel containing materials conditions and of forecast of their future behavior are demonstrated, aerosol characterizations, mechanisms of production of liquid radioactive waste, radiation conditions at SO industrial site and NSC assembly site, as well as analysis of 'Ukryttya' Objects environmental impact, are performed. The conditions of 'Ukryttya' Object building structures are described. Preparation and realization of international projects for conversion of 'Ukryttya' Object into an ecologically safe system, including the 'Ukryttya' Implementation Plan (SIP), are considered

  2. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  3. Identification of computer graphics objects

    Directory of Open Access Journals (Sweden)

    Rossinskyi Yu.M.

    2016-04-01

    Full Text Available The article is devoted to the use of computer graphics methods in problems of creating drawings, charts, drafting, etc. The widespread use of these methods requires the development of efficient algorithms for the identification of objects of drawings. The article analyzes the model-making algorithms for this problem and considered the possibility of reducing the time using graphics editing operations. Editing results in such operations as copying, moving and deleting objects specified images. These operations allow the use of a reliable identification of images of objects methods. For information on the composition of the image of the object along with information about the identity and the color should include information about the spatial location and other characteristics of the object (the thickness and style of contour lines, fill style, and so on. In order to enable the pixel image analysis to structure the information it is necessary to enable the initial code image objects color. The article shows the results of the implementation of the algorithm of encoding object identifiers. To simplify the process of building drawings of any kind, and reduce time-consuming, method of drawing objects identification is proposed based on the use as the ID information of the object color.

  4. Aggregating and Disaggregating Flexibility Objects

    DEFF Research Database (Denmark)

    Siksnys, Laurynas; Valsomatzis, Emmanouil; Hose, Katja

    2015-01-01

    In many scientific and commercial domains we encounter flexibility objects, i.e., objects with explicit flexibilities in a time and an amount dimension (e.g., energy or product amount). Applications of flexibility objects require novel and efficient techniques capable of handling large amounts...... and aiming at energy balancing during aggregation. In more detail, this paper considers the complete life cycle of flex-objects: aggregation, disaggregation, associated requirements, efficient incremental computation, and balance aggregation techniques. Extensive experiments based on real-world data from...

  5. Refining Visually Detected Object poses

    DEFF Research Database (Denmark)

    Holm, Preben; Petersen, Henrik Gordon

    2010-01-01

    to the particular object and in order to handle the demand for flexibility, there is an increasing demand for avoiding such dedicated mechanical alignment systems. Rather, it would be desirable to automatically locate and grasp randomly placed objects from tables, conveyor belts or even bins with a high accuracy...

  6. Welding. Performance Objectives. Intermediate Course.

    Science.gov (United States)

    Vincent, Kenneth

    Several intermediate performance objectives and corresponding criterion measures are listed for each of nine terminal objectives for an intermediate welding course. The materials were developed for a 36-week (3 hours daily) course designed to prepare the student for employment in the field of welding. Electric welding and specialized (TIG & MIG)…

  7. Welding. Performance Objectives. Basic Course.

    Science.gov (United States)

    Vincent, Kenneth

    Several intermediate performance objectives and corresponding criterion measures are listed for each of eight terminal objectives for a basic welding course. The materials were developed for a 36-week (2 hours daily) course developed to teach the fundamentals of welding shop work, to become familiar with the operation of the welding shop…

  8. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit

    2016-02-19

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  9. Moving eyes and naming objects

    NARCIS (Netherlands)

    Meulen, F.F. van der

    2001-01-01

    The coordination between eye movements and speech was examined while speakers were naming objects. Earlier research has shown that eye movements reflect on the underlying visual attention. Also, eye movements were found to reflect upon not only the visual and conceptual processing of an object, but

  10. [The Object Permanence Fallacy.] Commentary.

    Science.gov (United States)

    Bradley, Ben S.

    1996-01-01

    Suggests that Greenberg's challenge to the centrality of object permanence in developmental thinking reveals that developmentalists' theories about childhood speak about their own self-images. Notes that developmentalists have been guilty of not only the object permanence fallacy but also the genetic fallacy, or the mistaken belief that describing…

  11. Introducing Object-Oriented Programming

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard

    2008-01-01

    The practice of teaching programming at universities, colleges and high schools went through a major change roughly in the mid 1990s: The teaching of objectorientation in introductory courses slowly became mainstream. Fairly soon, the Object First or Objects Early school of thought was formulated...

  12. Objective interpretation as conforming interpretation

    Directory of Open Access Journals (Sweden)

    Lidka Rodak

    2011-12-01

    Full Text Available The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and should be rather linked with conforming interpretation. And what this actually implies is that it is not the virtue of certainty and predictability – which are usually associated with objectivity- but coherence that makes the foundation of applicability of objectivity in law.What could be observed from the analyses, is that both the phenomenon of conforming interpretation and objective interpretation play the role of arguments in the interpretive discourse, arguments that provide justification that interpretation is not arbitrary or subjective. With regards to the important part of the ideology of legal application which is the conviction that decisions should be taken on the basis of law in order to exclude arbitrariness, objective interpretation could be read as a question “what kind of authority “supports” certain interpretation”? that is almost never free of judicial creativity and judicial activism.One can say that, objective and conforming interpretation are just another arguments used in legal discourse.

  13. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-01

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal

  14. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit; Peterson, Joshua; Khosla, Aditya; Yang, Ming-Hsuan; Ghanem, Bernard

    2016-01-01

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  15. Turbulent wakes of fractal objects

    NARCIS (Netherlands)

    Staicu, A.D.; Mazzi, B.; Vassilicos, J.C.; Water, van de W.

    2003-01-01

    Turbulence of a windtunnel flow is stirred using objects that have a fractal structure. The strong turbulent wakes resulting from three such objects which have different fractal dimensions are probed using multiprobe hot-wire anemometry in various configurations. Statistical turbulent quantities are

  16. Taxonomies of Educational Objective Domain

    OpenAIRE

    Eman Ghanem Nayef; Nik Rosila Nik Yaacob; Hairul Nizam Ismail

    2013-01-01

    This paper highlights an effort to study the educational objective domain taxonomies including Bloom’s taxonomy, Lorin Anderson’s taxonomy, and Wilson’s taxonomy. In this study a comparison among these three taxonomies have been done. Results show that Bloom’s taxonomy is more suitable as an analysis tool to Educational Objective domain.

  17. Exploring Power with Object Theatre

    DEFF Research Database (Denmark)

    Ryöppy, Merja; Ylirisku, Salu; Knutz, Eva

    2017-01-01

    This paper explores Object Theatre as an approach to address power in design. We understand power as a relational activity that emerges and is upheld through particular ways of relating (Elias, 1991; Stacey, 2007). The spontaneity in participant actions through Object Theatre exercises renders pr...

  18. Semantic memory in object use.

    Science.gov (United States)

    Silveri, Maria Caterina; Ciccarelli, Nicoletta

    2009-10-01

    We studied five patients with semantic memory disorders, four with semantic dementia and one with herpes simplex virus encephalitis, to investigate the involvement of semantic conceptual knowledge in object use. Comparisons between patients who had semantic deficits of different severity, as well as the follow-up, showed that the ability to use objects was largely preserved when the deficit was mild but progressively decayed as the deficit became more severe. Naming was generally more impaired than object use. Production tasks (pantomime execution and actual object use) and comprehension tasks (pantomime recognition and action recognition) as well as functional knowledge about objects were impaired when the semantic deficit was severe. Semantic and unrelated errors were produced during object use, but actions were always fluent and patients performed normally on a novel tools task in which the semantic demand was minimal. Patients with severe semantic deficits scored borderline on ideational apraxia tasks. Our data indicate that functional semantic knowledge is crucial for using objects in a conventional way and suggest that non-semantic factors, mainly non-declarative components of memory, might compensate to some extent for semantic disorders and guarantee some residual ability to use very common objects independently of semantic knowledge.

  19. Object Oriented Programming in Director

    Directory of Open Access Journals (Sweden)

    Marian DARDALA

    2006-01-01

    Full Text Available Director is one of the most popular authoring software. As software for developing multimedia applications, Director is an object oriented programming environment. A very important issue to develop multimedia applications is the designing of their own classes. This paper presents the particular aspects concerning the available facilities offered by Lingo to design classes and to generate objects.

  20. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available...

  1. Properties of BL Lac objects

    International Nuclear Information System (INIS)

    Wolfe, A.M.; Pittsburgh, University, Pittsburgh, Pa.)

    1980-01-01

    The properties of BL Lacertae objects are examined in light of their recently realized similarities to quasars and associations with galactic radiation. The criteria typically used to define BL Lac objects are analyzed, with attention given to radio spectra, optical continual, radio and optical variability, optical polarization and emission lines, and evidence that BL Lac objects and optically violent variables represent the most compact and strongly variable sources among the general class of quasars is discussed. Connections between BL Lac objects and the galaxies in which they have been observed to be embedded are discussed and it is pointed out that no low-luminosity quasars have been found to be associated with first-ranked giant ellipticals. Future observations which may clarify the properties and relationships of BL Lac objects are indicated

  2. The Surrealist Collection of Objects

    Directory of Open Access Journals (Sweden)

    Pérez, Leticia

    2010-01-01

    Full Text Available In this article I shall discuss the Surrealist collection of objects as a form of art which arises out of mass production forces of the new era. These goods, deeply rooted in the capitalist laws of use-, exchange- and surplus-value, carry in themselves two materialist approaches which end in dialectical materialism. On the one hand, they epitomize the supreme forces of commodity fetishism ingrained in capitalist structures; on the other hand, they arouse unconscious desires which respond to the needs of the society of consumption. Thus, I will explore the act of object-collecting in the most radical Surrealist practices (dream objects, found objects, poème-objets, calligrammes, readymades and Surrealist objects as a way to not only delve into a new art, but also to reflect on societal ongoing transformations and paradoxes.

  3. The subjective experience of object recognition: comparing metacognition for object detection and object categorization.

    Science.gov (United States)

    Meuwese, Julia D I; van Loon, Anouk M; Lamme, Victor A F; Fahrenfort, Johannes J

    2014-05-01

    Perceptual decisions seem to be made automatically and almost instantly. Constructing a unitary subjective conscious experience takes more time. For example, when trying to avoid a collision with a car on a foggy road you brake or steer away in a reflex, before realizing you were in a near accident. This subjective aspect of object recognition has been given little attention. We used metacognition (assessed with confidence ratings) to measure subjective experience during object detection and object categorization for degraded and masked objects, while objective performance was matched. Metacognition was equal for degraded and masked objects, but categorization led to higher metacognition than did detection. This effect turned out to be driven by a difference in metacognition for correct rejection trials, which seemed to be caused by an asymmetry of the distractor stimulus: It does not contain object-related information in the detection task, whereas it does contain such information in the categorization task. Strikingly, this asymmetry selectively impacted metacognitive ability when objective performance was matched. This finding reveals a fundamental difference in how humans reflect versus act on information: When matching the amount of information required to perform two tasks at some objective level of accuracy (acting), metacognitive ability (reflecting) is still better in tasks that rely on positive evidence (categorization) than in tasks that rely more strongly on an absence of evidence (detection).

  4. Multiparty Compatibility for Concurrent Objects

    Directory of Open Access Journals (Sweden)

    Roly Perera

    2016-06-01

    Full Text Available Objects and actors are communicating state machines, offering and consuming different services at different points in their lifecycle. Two complementary challenges arise when programming such systems. When objects interact, their state machines must be "compatible", so that services are requested only when they are available. Dually, when objects refine other objects, their state machines must be "compliant", so that services are honoured whenever they are promised. In this paper we show how the idea of multiparty compatibility from the session types literature can be applied to both of these problems. We present an untyped language in which concurrent objects are checked automatically for compatibility and compliance. For simple objects, checking can be exhaustive and has the feel of a type system. More complex objects can be partially validated via test cases, leading to a methodology closer to continuous testing. Our proof-of-concept implementation is limited in some important respects, but demonstrates the potential value of the approach and the relationship to existing software development practices.

  5. Suspicious Transaction Report Mechanism Design and Its Supervision in Game Equilibrium%博弈均衡下的可疑交易报告制度设计和监管

    Institute of Scientific and Technical Information of China (English)

    侯建强

    2015-01-01

    反洗钱可疑交易报告制度的有效性,是理论界、国际组织以及世界各国致力于研究和解决的重大课题,也是制约我国当前反洗钱工作效率的现实难题。本文通过研究可疑交易报告机制的信息结构和监管博弈,建立数理模型,证明在缺乏洗钱风险信息沟通情况下,可疑交易报告机制的纯策略静态博弈是趋于无效的,并以动态博弈完美纳什均衡为条件,证明以风险为本的方法可解决可疑交易报告制度的有效性难题,研究了这一方法下的金融机构参与性约束条件和监管机制设计等问题,并对我国反洗钱体制改革和转型提出政策建议。%The effectiveness of anti-money laundering suspicious transaction report (STR) mechanism, is an important theoretical issue to be studied and solving by theorists, international organizations and other countries, but also a practical problem faced by our country. To prove and study whether and how to realize the effectiveness of STR system,we construct a signaling game model,and prove that STR mechanism could come to inefficient without mon-ey laundering risk information communication. Based on perfect Nash equilibrium in dynamic game,we prove it could come to efficient to use risk-based approach,and study the participatory constraint and incentive compatible regulation mechanism and other issues. The study and conclusions of this paper have certain theoretical reference and practical val-ue for restructuring and transformation of our anti-money laundering system.

  6. Conscientious objection in health care

    Directory of Open Access Journals (Sweden)

    Kuře Josef

    2016-12-01

    Full Text Available The paper deals with conscientious objection in health care, addressing the problems of scope, verification and limitation of such refusal, paying attention to ideological agendas hidden behind the right of conscience where the claimed refusal can cause harm or where such a claim is an attempt to impose certain moral values on society or an excuse for not providing health care. The nature of conscientious objection will be investigated and an ethical analysis of conscientious objection will be conducted. Finally some suggestions for health care policy will be proposed.

  7. Object manipulation facilitates kind-based object individuation of shape-similar objects

    DEFF Research Database (Denmark)

    Kingo, Osman Skjold; Krøjgaard, Peter

    2011-01-01

    Five experiments investigated the importance of shape and object manipulation when 12-month-olds were given the task of individuating objects representing exemplars of kinds in an event-mapping design. In Experiments 1 and 2, results of the study from Xu, Carey, and Quint (2004, Experiment 4) wer...

  8. Ghost Imaging of Space Objects

    Data.gov (United States)

    National Aeronautics and Space Administration — Ghost imaging is an optical imaging technique that utilizes the correlations between optical fields in two channels. One of the channels contains the object, however...

  9. Delphi FND Application Object Library -

    Data.gov (United States)

    Department of Transportation — Delphi FND Application Object Library contains the following data elements, but are not limited to temporary data tables for the logged in session, information about...

  10. Incremental Visualizer for Visible Objects

    DEFF Research Database (Denmark)

    Bukauskas, Linas; Bøhlen, Michael Hanspeter

    This paper discusses the integration of database back-end and visualizer front-end into a one tightly coupled system. The main aim which we achieve is to reduce the data pipeline from database to visualization by using incremental data extraction of visible objects in a fly-through scenarios. We...... also argue that passing only relevant data from the database will substantially reduce the overall load of the visualization system. We propose the system Incremental Visualizer for Visible Objects (IVVO) which considers visible objects and enables incremental visualization along the observer movement...... path. IVVO is the novel solution which allows data to be visualized and loaded on the fly from the database and which regards visibilities of objects. We run a set of experiments to convince that IVVO is feasible in terms of I/O operations and CPU load. We consider the example of data which uses...

  11. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    binding. Existing languages employ different type systems, and it can be difficult to compare, evaluate and improve them, since there is currently no uniform theory for such languages. This book provides such a theory. The authors review the type systems of Simula, Smalltalk, C++ and Eiffel and present......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity...

  12. Laser sources for object illumination

    Energy Technology Data Exchange (ETDEWEB)

    Albrecht, G.F. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    The considerations which formulate the specifications for a laser illuminator are explained, using the example of an underwater object. Depending on the parameters which define the scenario, widely varying laser requirements result.

  13. Topological objects in hadron physics

    International Nuclear Information System (INIS)

    Rho, M.

    1988-01-01

    The notion of topological objects in hadronic physics is discussed, with emphasis on the role of the Wess-Zumino term and induced transmutation of quantum numbers in chiral bag models. Some applications to nuclear systems are given

  14. On the Aging of Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2016-01-01

    The article seeks to develop a new conceptual framework suitable for analysing the ageing processes of objects in modern culture. The basic intuition is that object experience cannot be analysed separately from collective participation. The article focuses on the question of the ‘timeless’ nature...... of modernist design and seeks to understand why modernist objects age more slowly than other objects. First, inspired by the late Durkheim’s account of symbolism, I turn to the experiential effects of collective embeddedness. Second, I enter the field of architectural practices and architectural theory....... Visiting early modernist ideologue Adolf Loos, I seek to understand the modernist attitude as a direct response to experiences of the acceleration of ageing processes characteristic of modern culture. I then try to show how Loos’s explicit awareness of the collective dimension is ignored by the subsequent...

  15. Experimental Object-Oriented Modelling

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius

    through, e.g., technical prototyping and active user involvement. We introduce and examine “experimental object-oriented modelling” as the intersection of these practices. The contributions of this thesis are expected to be within three perspectives on models and modelling in experimental system...... development: Grounding We develop an empirically based conceptualization of modelling and use of models in system development projects characterized by a high degree of uncertainty in requirements and point to implications for tools and techniques for modelling in such a setting. Techniques We introduce......This thesis examines object-oriented modelling in experimental system development. Object-oriented modelling aims at representing concepts and phenomena of a problem domain in terms of classes and objects. Experimental system development seeks active experimentation in a system development project...

  16. Object detection and tracking system

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Tian J.

    2017-05-30

    Methods and apparatuses for analyzing a sequence of images for an object are disclosed herein. In a general embodiment, the method identifies a region of interest in the sequence of images. The object is likely to move within the region of interest. The method divides the region of interest in the sequence of images into sections and calculates signal-to-noise ratios for a section in the sections. A signal-to-noise ratio for the section is calculated using the section in the image, a prior section in a prior image to the image, and a subsequent section in a subsequent image to the image. The signal-to-noise ratios are for potential velocities of the object in the section. The method also selects a velocity from the potential velocities for the object in the section using a potential velocity in the potential velocities having a highest signal-to-noise ratio in the signal-to-noise ratios.

  17. Exotic objects of atomic physics

    Science.gov (United States)

    Eletskii, A. V.

    2017-11-01

    There has been presented a short survey of physical properties, methods of production and exploration as well as directions of practical usage of the objects of atomic physics which are not yet described in detail in modern textbooks and manuals intended for students of technical universities. The family of these objects includes negative and multicharged ions, Rydberg atoms, excimer molecules, clusters. Besides of that, in recent decades this family was supplemented with new nanocarbon structures such as fullerenes, carbon nanotubes and graphene. The textbook “Exotic objects of atomic physics” [1] edited recently contains some information on the above-listed objects of the atomic physics. This textbook can be considered as a supplement to classic courses of atomic physics teaching in technical universities.

  18. Precise object tracking under deformation

    International Nuclear Information System (INIS)

    Saad, M.H

    2010-01-01

    The precise object tracking is an essential issue in several serious applications such as; robot vision, automated surveillance (civil and military), inspection, biomedical image analysis, video coding, motion segmentation, human-machine interface, visualization, medical imaging, traffic systems, satellite imaging etc. This frame-work focuses on the precise object tracking under deformation such as scaling , rotation, noise, blurring and change of illumination. This research is a trail to solve these serious problems in visual object tracking by which the quality of the overall system will be improved. Developing a three dimensional (3D) geometrical model to determine the current pose of an object and predict its future location based on FIR model learned by the OLS. This framework presents a robust ranging technique to track a visual target instead of the traditional expensive ranging sensors. The presented research work is applied to real video stream and achieved high precession results.

  19. First-Class Object Sets

    DEFF Research Database (Denmark)

    Ernst, Erik

    2009-01-01

    Typically, an object is a monolithic entity with a fixed interface.  To increase flexibility in this area, this paper presents first-class object sets as a language construct.  An object set offers an interface which is a disjoint union of the interfaces of its member objects.  It may also be use...... to a mainstream virtual machine in order to improve on the support for family polymorphism.  The approach is made precise by means of a small calculus, and the soundness of its type system has been shown by a mechanically checked proof in Coq....

  20. Superluminal motion of extragalactic objects

    Energy Technology Data Exchange (ETDEWEB)

    Matveenko, L.I. (AN SSSR, Moscow. Inst. Kosmicheskikh Issledovanij)

    1983-07-01

    Extragalactic objects with active nuclei are reviewed. Experimental data are obtained with the method of superfar radiointerferometry. The main peculiarities of the complex structure of Seyfert galaxies, quasars and lacertae objects are considered: the distribution of radiobrightness, spectra, alteration of the density of radiation flux and the distance between the components of sources. The superluminal velocities of component divergence observed are explained by different reasons: fast motion of components considerable difference of the Hubble component or non-cosmologic nature of the red shift of objects, effect of echoreflection of radiation, gravitation lens, systematic alteration of the optical thickness of the object, synchronouys radiation of electrons in the dipole magnetic field, as well as different kinematic illusions connected with the final time of signal propagation.

  1. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  2. Stream Clustering of Growing Objects

    Science.gov (United States)

    Siddiqui, Zaigham Faraz; Spiliopoulou, Myra

    We study incremental clustering of objects that grow and accumulate over time. The objects come from a multi-table stream e.g. streams of Customer and Transaction. As the Transactions stream accumulates, the Customers’ profiles grow. First, we use an incremental propositionalisation to convert the multi-table stream into a single-table stream upon which we apply clustering. For this purpose, we develop an online version of K-Means algorithm that can handle these swelling objects and any new objects that arrive. The algorithm also monitors the quality of the model and performs re-clustering when it deteriorates. We evaluate our method on the PKDD Challenge 1999 dataset.

  3. Precise Object Tracking under Deformation

    International Nuclear Information System (INIS)

    Saad, M.H.

    2010-01-01

    The precise object tracking is an essential issue in several serious applications such as; robot vision, automated surveillance (civil and military), inspection, biomedical image analysis, video coding, motion segmentation, human-machine interface, visualization, medical imaging, traffic systems, satellite imaging etc. This framework focuses on the precise object tracking under deformation such as scaling, rotation, noise, blurring and change of illumination. This research is a trail to solve these serious problems in visual object tracking by which the quality of the overall system will be improved. Developing a three dimensional (3D) geometrical model to determine the current pose of an object and predict its future location based on FIR model learned by the OLS. This framework presents a robust ranging technique to track a visual target instead of the traditional expensive ranging sensors. The presented research work is applied to real video stream and achieved high precession results. xiiiThe precise object tracking is an essential issue in several serious applications such as; robot vision, automated surveillance (civil and military), inspection, biomedical image analysis, video coding, motion segmentation, human-machine interface, visualization, medical imaging, traffic systems, satellite imaging etc. This framework focuses on the precise object tracking under deformation such as scaling, rotation, noise, blurring and change of illumination. This research is a trail to solve these serious problems in visual object tracking by which the quality of the overall system will be improved. Developing a three dimensional (3D) geometrical model to determine the current pose of an object and predict its future location based on FIR model learned by the OLS. This framework presents a robust ranging technique to track a visual target instead of the traditional expensive ranging sensors. The presented research work is applied to real video stream and achieved high

  4. Well-Being and Objectivity

    Directory of Open Access Journals (Sweden)

    Jakub Bożydar Wiśniewski

    2011-03-01

    Full Text Available In this paper, I investigate the issue of whether there exists an objective element of well-being, completely independent of anyone’s desires, interests and preferences. After rejecting health-based and convention-based approaches to objectivity, I conclude that the element in question consists in respecting autonomy, voluntariness of every purposive agent and the principle of non-aggression.

  5. Training Objectives for Tank Platoon Leaders Covering Tasks Performed during Four Armor Operations

    Science.gov (United States)

    1983-01-01

    screens to conceal their movement to covered and concealed positions. The M250 grenade launcher consists of two six-barreled dischargers wired for two...generates smoke by the injestion of fuel onto the hot engine exhaust system. The smoke screen generated by VEESS is used to compli- ment the M250 smoke...grenade system by reinforcing and sustaining the screen created by the M250 system. The purpose of the smoke producing systems is to make it more

  6. Testing Object-Oriented Software

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard; Madsen, Ole Lehrmann; Skov, Stefan H.

    The report is a result of an activity within the project Centre for Object Technology (COT), case 2. In case 2 a number of pilot projects have been carried out to test the feasibility of using object technology within embedded software. Some of the pilot projects have resulted in proto-types that......The report is a result of an activity within the project Centre for Object Technology (COT), case 2. In case 2 a number of pilot projects have been carried out to test the feasibility of using object technology within embedded software. Some of the pilot projects have resulted in proto......-types that are currently being developed into production versions. To assure a high quality in the product it was decided to carry out an activ-ity regarding issues in testing OO software. The purpose of this report is to discuss the issues of testing object-oriented software. It is often claimed that testing of OO...... software is radically different form testing traditional software developed using imperative/procedural programming. Other authors claim that there is no difference. In this report we will attempt to give an answer to these questions (or at least initiate a discussion)....

  7. Object Pragmatics and Language Development.

    Science.gov (United States)

    Béguin, Marie

    2016-12-01

    The purpose of this contribution is to investigate the advent of language in the light of the appropriation of the cultural uses of the material objects related to material culture and the constitution of their public and shared meanings linked to their uses. First, we suggest that the Object Pragmatics paradigm offers a framework which allows us to take into account the uses of objects in daily life as a site of social conventions, communication and public and shared meanings. Second, we would like to underline the key role of the adult's mediations in the child's ability to evolve towards linguistic development. This contribution will discuss the notion of scenario involving primarily the object, as a possible semiotic tool to support the child's transition to language. We will finally illustrate that it is possible to take into consideration the mastery of conventional uses of the object in the child's ability to engage in a scenario and then to move towards communication and speech development. These issues will be addressed in the context of a research project which focuses on the observation of children interacting with an adult at 16, 20 and 24 months. These longitudinal data were collected by video in a semi-experimental triadic interaction design. The triadic interaction is considered as a relevant unit for the observation and analysis of the role of material culture in speech development, suggesting the existence of new mechanisms to be taken into account in addition to the interactive conditions largely mentioned in literature.

  8. Object technology: A white paper

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, S.R.; Arrowood, L.F.; Cain, W.D.; Stephens, W.M.; Vickers, B.D.

    1992-05-11

    Object-Oriented Technology (OOT), although not a new paradigm, has recently been prominently featured in the trade press and even general business publications. Indeed, the promises of object technology are alluring: the ability to handle complex design and engineering information through the full manufacturing production life cycle or to manipulate multimedia information, and the ability to improve programmer productivity in creating and maintaining high quality software. Groups at a number of the DOE facilities have been exploring the use of object technology for engineering, business, and other applications. In this white paper, the technology is explored thoroughly and compared with previous means of developing software and storing databases of information. Several specific projects within the DOE Complex are described, and the state of the commercial marketplace is indicated.

  9. Exploring object-oriented technologies

    CERN Multimedia

    2000-01-01

    Object oriented technologies are the corner stone of modern software development. A piece of software is today conceived, constructed and tested as a set of objects interacting with each other, rather than as a large sequential program. OO is present throughout the whole software life cycle allowing for maintainable code re-use, clean design and manageable complexity. OO is also the seed upon which other technologies are being built and deployed, such as distributed computing, component models, open interoperability, etc.This series of three seminars will provide a pragmatic overview on the main ideas behind OO software development and will explain the inner workings of the most outstanding technologies being built on OO, such as UML, CORBA, Component Models, Agent Oriented Computing, Business Objects, etc.

  10. Acoustic Characterization of Mesoscale Objects

    Energy Technology Data Exchange (ETDEWEB)

    Chinn, D; Huber, R; Chambers, D; Cole, G; Balogun, O; Spicer, J; Murray, T

    2007-03-13

    This report describes the science and engineering performed to provide state-of-the-art acoustic capabilities for nondestructively characterizing mesoscale (millimeter-sized) objects--allowing micrometer resolution over the objects entire volume. Materials and structures used in mesoscale objects necessitate the use of (1) GHz acoustic frequencies and (2) non-contacting laser generation and detection of acoustic waves. This effort demonstrated that acoustic methods at gigahertz frequencies have the necessary penetration depth and spatial resolution to effectively detect density discontinuities, gaps, and delaminations. A prototype laser-based ultrasonic system was designed and built. The system uses a micro-chip laser for excitation of broadband ultrasonic waves with frequency components reaching 1.0 GHz, and a path-stabilized Michelson interferometer for detection. The proof-of-concept for mesoscale characterization is demonstrated by imaging a micro-fabricated etched pattern in a 70 {micro}m thick silicon wafer.

  11. Superluminal motion of extragalactic objects

    International Nuclear Information System (INIS)

    Matveenko, L.I.

    1983-01-01

    Extragalactic objects with active nuclei are reviewed. Experimental data are obtained with the method of superfar radiointerferometry. The main peculiarities of the complex strUcture of Seyfert galaxies quasars and lacertae ob ects are considered: the distribution of radiobrightness, spectra, alteration of the density of radiation flux and the distance between the components of sources. The superluminal velocities of component divergence observed are explained by different reasons: fast motion of components considerable difference of the Hubble component or non-cosmologic nature of the red shift of objects, effect of echoreflection of radiation, gravitation lens, systematic alteration of the optical thickness of the object, synchronoUs radiation of electrons in the dipole magnetic field, as well as different kinematic illusions connected with the final time of signal propagation

  12. Frequency and spatial distribution of animal and object hoarder behavior in Curitiba, Paraná State, Brazil

    Directory of Open Access Journals (Sweden)

    Graziela Ribeiro da Cunha

    Full Text Available Abstract: This study aimed to establish the frequency and spatial distribution of animal and object hoarding in Curitiba (Paraná State, the eighth most populous city in Brazil. All hoarding complaints received by the City Secretaries of Health, Environment and Social Assistance between September 2013 and April 2015 were collected (n = 226 and suspicious cases were individually investigated. A total of 113/226 (50% of complaints were confirmed as hoarding cases, representing an overall ratio of 6.45 cases per 100,000 inhabitants in Curitiba, of which 48/113 (42.5% involved object hoarders, 41/113 (36.3% animal hoarders and 24/113 (21.2% both animal and object hoarders. A correlation of total identified cases with neighborhood population density and all population stratums analyzed (total, gender, age was significantly positive (p < 0.01, and with neighborhood mean monthly income (r = -0.2; p = 0.03 significantly negative. A spatial cluster of cases was found in the north of the city (OR = 8.57; p < 0.01. Hoarding cases were relatively frequent in Curitiba and were associated with population distribution patterns and inversely related to neighborhood income.

  13. Elaborazione didattica di Learning Objects.

    Directory of Open Access Journals (Sweden)

    Luigi Guerra

    2006-01-01

    Full Text Available L’idea di un modello didattico problematico per la realizzazione di Learning Objects riprende i temi del problematicismo pedagogico e si impegna a definire un’ipotesi formativa complessa capace di valorizzare la possibile positiva compresenza integrata di strategie didattiche diverse (finanche antitetiche ma componibili in una logica appunto di matrice problematicista. Il punto di partenza del modello proposto è rappresentato dalla opportunità di definire tre tipologie fondamentali di Learning Objects, rispettivamente centrati sull’oggetto, sul processo e sul soggetto dell’apprendimento.

  14. TACTILE SENSING FOR OBJECT IDENTIFICATION

    DEFF Research Database (Denmark)

    Drimus, Alin; Marian, Nicolae; Bilberg, Arne

    2009-01-01

    The artificial sense of touch is a research area that can be considered still in demand, compared with the human dexterity of grasping a wide variety of shapes and sizes, perform complex tasks, and switch between grasps in response to changing task requirements. For handling unknown objects...... in unstructured environments, tactile sensing can provide more than valuable to complementary vision information about mechanical properties such as recognition and characterization, force, pressure, torque, compliance, friction, and mass as well as object shape, texture, position and pose. In this paper, we...

  15. Object oriented JavaScript

    CERN Document Server

    Stefanov, Stoyan

    2013-01-01

    You will first be introduced to object-oriented programming, then to the basics of objects in JavaScript. This book takes a do-it-yourself approach when it comes to writing code, because the best way to really learn a programming language is by writing code. You are encouraged to type code into Firebug's console, see how it works and then tweak it and play around with it. There are practice questions at the end of each chapter to help you review what you have learned.For new to intermediate JavaScript developer who wants to prepare themselves for web development problems solved by smart JavaSc

  16. Object-Oriented Type Inference

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    1991-01-01

    We present a new approach to inferring types in untyped object-oriented programs with inheritance, assignments, and late binding. It guarantees that all messages are understood, annotates the program with type information, allows polymorphic methods, and can be used as the basis of an op...

  17. Interaction between beans and objects

    International Nuclear Information System (INIS)

    Farias, J.T.

    1988-01-01

    The interaction between the X-ray beans and objects are studied, with the modification in the intensity. The kilovolt, the bundle filtration, the structure and composition of the patient and the quantity of scattered radiation are also described, as the main parameters for the contrast and for the dose of the patient. (C.G.C.) [pt

  18. Photogrammetric Measurements of Heritage Objects

    Science.gov (United States)

    Tumeliene, E.; Nareiko, V.; Suziedelyte Visockiene, J.

    2017-12-01

    Cultural heritage is an invaluable example of human culture and creativity. The majority of them can become unstable or can be destroyed due to a combination of human and natural disturbances. In order to restore, preserve, and systematize data about architectural heritage objects, it is necessary to have geodetic, photogrammetric measurements of such data and to constantly monitor condition of the objects. The data of immovable cultural objects for many years are stored in photogrammetric data archives. Such archives have Germany, Lithuania, England and other countries. The article gives a brief introduction of the history of data archives formation and presents a photogrammetric and modern methods of modelling the spatial geometric properties of objects currently used to reveal immovable cultural properties and to evaluate geometric sizes. The pilot work was done with the Concept Capture simulation program that was developed by the Bentley company with photos of the Blessed Virgin Mary painting in Pivašiūnai of Trakai district. A shot from the ground with 12.4 MP resolution Pentax K-x camera was done using lenses with different focal lengths. The painting of the Blessed Virgin Mary is coordinated by 4 reference geodesic points and therefore after the modelling work it was possible to evaluate the accuracy of the created model. Based on the results of the spatial (3D) model, photo shooting and modelling recommendations are presented, the advantages of the new technology are distinguished.

  19. Michael Beitz: Objects of Communication

    Science.gov (United States)

    Hoefferle, Mary

    2014-01-01

    For this Instructional Resource, the author interviewed contemporary sculptor Michael Beitz, who uses art to explore the role of designed objects in human communication and emotional experience. This column was written in response to calls for using Enduring Understandings/Big Ideas (National Coalition for Core Arts Standards, 2013; Stewart &…

  20. Managed Objects for Infrastructure Data

    DEFF Research Database (Denmark)

    Kjems, Erik; Bodum, Lars; Kolar, Jan

    2009-01-01

    Using data objects to describe features in the real world is a new idea and several approaches have already been shown to match scientific paradigms exceedingly well. Depending on the required level of abstraction, it is possible to represent the world more or less close to reality. In the realm ...

  1. Subjectivity, objectivity, and triangular space.

    Science.gov (United States)

    Britton, Ronald

    2004-01-01

    The author reviews his ideas on subjectivity, objectivity, and the third position in the psychoanalytic encounter, particularly in clinical work with borderline and narcissistic patients. Using the theories of Melanie Klein and Wilfred Bion as a basis, the author describes his concept of triangular space. A case presentation of a particular type of narcissistic patient illustrates the principles discussed.

  2. Quantitative Nuclear Cardiology: How objective?

    International Nuclear Information System (INIS)

    Crawley, J.C.W.; Raval, U.; Soman, P.; Lahiri, A.

    1997-01-01

    The object of this study was to establish the accuracy required from the operator in indicating the centre and axis the left ventricle, and in placing regions of interest (ROIs), whilst using the MYO TOMO and MYO QUANT software to analyze tomographic data from nuclear cardiology

  3. Teachers' Careers: The Objective Dimension.

    Science.gov (United States)

    Evetts, Julia

    1986-01-01

    Analyzes the objective dimension of teachers' careers showing how 530 British male/female teachers are distributed throughout the pay scale and promotions making up the formal structure of teaching. Indicates length of experience is the rewarding but not the sole factor in bureaucratic structure and differential male/female career achievements.…

  4. Compact objects and accretion disks

    NARCIS (Netherlands)

    Blandford, Roger; Agol, Eric; Broderick, Avery; Heyl, Jeremy; Koopmans, Leon; Lee, Hee-Won

    2002-01-01

    Recent developments in the spectropolarimetric study of compact objects, specifically black holes (stellar and massive) and neutron stars are reviewed. The lectures are organized around five topics: disks, jets, outflows, neutron stars and black holes. They emphasize physical mechanisms and are

  5. The Objective of Financial Reporting.

    Science.gov (United States)

    Schermann, Kenneth R.

    1986-01-01

    Alerts public school business officials to a financial reporting concepts statement to be issued by the Governmental Accounting Standards Board in late 1986. The new directive will outline four objectives concerned with accountability procedures, resource management and compliance information, operating results, and future financial capabilities.…

  6. Objective consensus from decision trees

    International Nuclear Information System (INIS)

    Putora, Paul Martin; Panje, Cedric M; Papachristofilou, Alexandros; Pra, Alan Dal; Hundsberger, Thomas; Plasswilm, Ludwig

    2014-01-01

    Consensus-based approaches provide an alternative to evidence-based decision making, especially in situations where high-level evidence is limited. Our aim was to demonstrate a novel source of information, objective consensus based on recommendations in decision tree format from multiple sources. Based on nine sample recommendations in decision tree format a representative analysis was performed. The most common (mode) recommendations for each eventuality (each permutation of parameters) were determined. The same procedure was applied to real clinical recommendations for primary radiotherapy for prostate cancer. Data was collected from 16 radiation oncology centres, converted into decision tree format and analyzed in order to determine the objective consensus. Based on information from multiple sources in decision tree format, treatment recommendations can be assessed for every parameter combination. An objective consensus can be determined by means of mode recommendations without compromise or confrontation among the parties. In the clinical example involving prostate cancer therapy, three parameters were used with two cut-off values each (Gleason score, PSA, T-stage) resulting in a total of 27 possible combinations per decision tree. Despite significant variations among the recommendations, a mode recommendation could be found for specific combinations of parameters. Recommendations represented as decision trees can serve as a basis for objective consensus among multiple parties

  7. Objective techniques for psychological assessment

    Science.gov (United States)

    Wortz, E.; Hendrickson, W.; Ross, T.

    1973-01-01

    A literature review and a pilot study are used to develop psychological assessment techniques for determining objectively the major aspects of the psychological state of an astronaut. Relationships between various performance and psychophysiological variables and between those aspects of attention necessary to engage successfully in various functions are considered in developing a paradigm to be used for collecting data in manned isolation chamber experiments.

  8. Fast and Objective MRTD measurement

    NARCIS (Netherlands)

    Jong, A.N. de; Bakker, S.J.M.

    1988-01-01

    Manufacturers and Users of the Thermal Imagers have spent very much time upon the definition and measurement of the generally accepted performance curve: MRTD (Minimum Resolvable Temperature Difference). The need for a cheap and fast, objective measurement method has considerably increased since the

  9. Objective consensus from decision trees.

    Science.gov (United States)

    Putora, Paul Martin; Panje, Cedric M; Papachristofilou, Alexandros; Dal Pra, Alan; Hundsberger, Thomas; Plasswilm, Ludwig

    2014-12-05

    Consensus-based approaches provide an alternative to evidence-based decision making, especially in situations where high-level evidence is limited. Our aim was to demonstrate a novel source of information, objective consensus based on recommendations in decision tree format from multiple sources. Based on nine sample recommendations in decision tree format a representative analysis was performed. The most common (mode) recommendations for each eventuality (each permutation of parameters) were determined. The same procedure was applied to real clinical recommendations for primary radiotherapy for prostate cancer. Data was collected from 16 radiation oncology centres, converted into decision tree format and analyzed in order to determine the objective consensus. Based on information from multiple sources in decision tree format, treatment recommendations can be assessed for every parameter combination. An objective consensus can be determined by means of mode recommendations without compromise or confrontation among the parties. In the clinical example involving prostate cancer therapy, three parameters were used with two cut-off values each (Gleason score, PSA, T-stage) resulting in a total of 27 possible combinations per decision tree. Despite significant variations among the recommendations, a mode recommendation could be found for specific combinations of parameters. Recommendations represented as decision trees can serve as a basis for objective consensus among multiple parties.

  10. How Medical Students Use Objectives.

    Science.gov (United States)

    Mast, Terrill A.; And Others

    Two related studies were undertaken at Southern Illinois University on how students in the School of Medicine use the instructional objectives faculty prepare for them. Students in the classes of 1978 and 1979 were surveyed in their final month of training. The second survey was modified, based on responses from the first. The five research…

  11. 'Shelter' object safety. Structural aspects

    International Nuclear Information System (INIS)

    Krivosheev, P.I.; Nemchinov, Yu.I.; Bambura, A.N.; Sokolov, A.P.; Shenderovich, V.Ya.; Vasyagin, R.V.; Klyuchnikov, A.A.; Shcherbin, V.N.; Rud'ko, V.M.; Tokarevskij, V.V.; Belousov, E.L.; Khejger, D.; Gorodetskij, L.

    2001-01-01

    In 1997 the group of the international experts including Ukrainian organizations and 'Shelter' Object ChNPP are developed the plan of SO transformation into ecological safe status (plan SIP). The realization of the plan was carried out on basis of international tender. The results of structural aspects of SO safety and it transformation into ecological safe state (ESS) are resented in this report

  12. Recurrent processing during object recognition

    Directory of Open Access Journals (Sweden)

    Randall C. O'Reilly

    2013-04-01

    Full Text Available How does the brain learn to recognize objects visually, and perform this difficult feat robustly in the face of many sources of ambiguity and variability? We present a computational model based on the biology of the relevant visual pathways that learns to reliably recognize 100 different object categories in the face of of naturally-occurring variability in location, rotation, size, and lighting. The model exhibits robustness to highly ambiguous, partially occluded inputs. Both the unified, biologically plausible learning mechanism and the robustness to occlusion derive from the role that recurrent connectivity and recurrent processing mechanisms play in the model. Furthermore, this interaction of recurrent connectivity and learning predicts that high-level visual representations should be shaped by error signals from nearby, associated brain areas over the course of visual learning. Consistent with this prediction, we show how semantic knowledge about object categories changes the nature of their learned visual representations, as well as how this representational shift supports the mapping between perceptual and conceptual knowledge. Altogether, these findings support the potential importance of ongoing recurrent processing throughout the brain's visual system and suggest ways in which object recognition can be understood in terms of interactions within and between processes over time.

  13. Design of object processing systems

    NARCIS (Netherlands)

    Grigoras, D.R.; Hoede, C.

    Object processing systems are met rather often in every day life, in industry, tourism, commerce, etc. When designing such a system, many problems can be posed and considered, depending on the scope and purpose of design. We give here a general approach which involves graph theory, and which can

  14. ANNOTATION SUPPORTED OCCLUDED OBJECT TRACKING

    Directory of Open Access Journals (Sweden)

    Devinder Kumar

    2012-08-01

    Full Text Available Tracking occluded objects at different depths has become as extremely important component of study for any video sequence having wide applications in object tracking, scene recognition, coding, editing the videos and mosaicking. The paper studies the ability of annotation to track the occluded object based on pyramids with variation in depth further establishing a threshold at which the ability of the system to track the occluded object fails. Image annotation is applied on 3 similar video sequences varying in depth. In the experiment, one bike occludes the other at a depth of 60cm, 80cm and 100cm respectively. Another experiment is performed on tracking humans with similar depth to authenticate the results. The paper also computes the frame by frame error incurred by the system, supported by detailed simulations. This system can be effectively used to analyze the error in motion tracking and further correcting the error leading to flawless tracking. This can be of great interest to computer scientists while designing surveillance systems etc.

  15. Objects as closures: Abstract semantics of object oriented languages

    Science.gov (United States)

    Reddy, Uday S.

    1989-01-01

    We discuss denotational semantics of object-oriented languages, using the concept of closure widely used in (semi) functional programming to encapsulate side effects. It is shown that this denotational framework is adequate to explain classes, instantiation, and inheritance in the style of Simula as well as SMALLTALK-80. This framework is then compared with that of Kamin, in his recent denotational definition of SMALLTALK-80, and the implications of the differences between the two approaches are discussed.

  16. Objects as closures - Abstract semantics of object oriented languages

    Science.gov (United States)

    Reddy, Uday S.

    1988-01-01

    The denotational semantics of object-oriented languages is discussed using the concept of closure widely used in (semi) functional programming to encapsulate side effects. It is shown that this denotational framework is adequate to explain classes, instantiation, and inheritance in the style of Simula as well as SMALLTALK-80. This framework is then compared with that of Kamin (1988), in his recent denotational definition of SMALLTALK-80, and the implications of the differences between the two approaches are discussed.

  17. Objective-guided image annotation.

    Science.gov (United States)

    Mao, Qi; Tsang, Ivor Wai-Hung; Gao, Shenghua

    2013-04-01

    Automatic image annotation, which is usually formulated as a multi-label classification problem, is one of the major tools used to enhance the semantic understanding of web images. Many multimedia applications (e.g., tag-based image retrieval) can greatly benefit from image annotation. However, the insufficient performance of image annotation methods prevents these applications from being practical. On the other hand, specific measures are usually designed to evaluate how well one annotation method performs for a specific objective or application, but most image annotation methods do not consider optimization of these measures, so that they are inevitably trapped into suboptimal performance of these objective-specific measures. To address this issue, we first summarize a variety of objective-guided performance measures under a unified representation. Our analysis reveals that macro-averaging measures are very sensitive to infrequent keywords, and hamming measure is easily affected by skewed distributions. We then propose a unified multi-label learning framework, which directly optimizes a variety of objective-specific measures of multi-label learning tasks. Specifically, we first present a multilayer hierarchical structure of learning hypotheses for multi-label problems based on which a variety of loss functions with respect to objective-guided measures are defined. And then, we formulate these loss functions as relaxed surrogate functions and optimize them by structural SVMs. According to the analysis of various measures and the high time complexity of optimizing micro-averaging measures, in this paper, we focus on example-based measures that are tailor-made for image annotation tasks but are seldom explored in the literature. Experiments show consistency with the formal analysis on two widely used multi-label datasets, and demonstrate the superior performance of our proposed method over state-of-the-art baseline methods in terms of example-based measures on four

  18. Financial incentive does not affect P300 (in response to certain episodic and semantic probe stimuli) in the Complex Trial Protocol (CTP) version of the Concealed Information Test (CIT) in detection of malingering.

    Science.gov (United States)

    Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren

    2017-05-01

    Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.

  19. The Agency of Memory Objects

    DEFF Research Database (Denmark)

    Wiegand, Frauke Katharina

    2016-01-01

    and international tourists’ photographs and notes, especially their visual encounters with the exhibition, are understood as participatory interactions in the course of memory work. The article’s aim is twofold: introducing an ANT-inspired methodology to the field of memory studies, and mapping a Sowetan memory......This article analyses the multifarious acts of cultural memory taking place in the small, almost hidden, exhibition space of the famous Regina Mundi Church in Soweto, South Africa, home to the photographic exhibition “The Story of Soweto.” Next to the photographs (1950-2010) by well-known apartheid...... of action, examining the idea that objects, such as images, that leave a trace can act as mediators of memory. Starting from visitors’ appropriations of the exhibition space, the essay sheds light on the different life cycles of memory objects, in particular images, and their diverse mediations. Domestic...

  20. Swarm Science objectives and challenges

    DEFF Research Database (Denmark)

    Friis-Christensen, Eigil; Lühr, Hermann; Hulot, Gauthier

    Swarm is the fifth Earth Explorer mission in ESA’s Living Planet Programme to be launched in 2009. The objective of the Swarm mission is to provide the best ever survey of the geomagnetic field and its temporal evolution. The innovative constellation concept and a unique set of dedicated instrume......Swarm is the fifth Earth Explorer mission in ESA’s Living Planet Programme to be launched in 2009. The objective of the Swarm mission is to provide the best ever survey of the geomagnetic field and its temporal evolution. The innovative constellation concept and a unique set of dedicated...... instruments will provide the necessary observations that are required to separate and model the various sources of the geomagnetic field. This will provide new insights into the Earth system by improving our understanding of the Earth’s interior and Sun-Earth connection processes....

  1. Object relations in Harry Potter.

    Science.gov (United States)

    Lake, Suzanne

    2003-01-01

    Good fiction helps children address their emotional dilemmas by evoking repressed content, and offering strategies and meaningful values that help them work towards resolutions. Because certain fundamental conflicts continue to be revisited and reworked throughout adulthood, it follows that masterful children's literature might enthrall adults as well. Given the extraordinary, worldwide success of the Harry Potter stories with both children and adults, it might be inferred that they, indeed, are among such literature. Common object relations themes, as well as other intrapsychic processes, are presented in such an imaginative and resonant way that the unconscious is readily engaged. The character of Harry Potter, specifically, embodies such universal (repressed) torments as the agony of destroying and losing the mother; the ominous perception of good and bad objects at war within the self; and the earnest reparative efforts offered to save the self from eternal separation from the beloved other.

  2. Hamiltonian dynamics of extended objects

    Science.gov (United States)

    Capovilla, R.; Guven, J.; Rojas, E.

    2004-12-01

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler Lagrange equations.

  3. Ranking Specific Sets of Objects.

    Science.gov (United States)

    Maly, Jan; Woltran, Stefan

    2017-01-01

    Ranking sets of objects based on an order between the single elements has been thoroughly studied in the literature. In particular, it has been shown that it is in general impossible to find a total ranking - jointly satisfying properties as dominance and independence - on the whole power set of objects. However, in many applications certain elements from the entire power set might not be required and can be neglected in the ranking process. For instance, certain sets might be ruled out due to hard constraints or are not satisfying some background theory. In this paper, we treat the computational problem whether an order on a given subset of the power set of elements satisfying different variants of dominance and independence can be found, given a ranking on the elements. We show that this problem is tractable for partial rankings and NP-complete for total rankings.

  4. Deformation of Man Made Objects

    KAUST Repository

    Ibrahim, Mohamed

    2012-07-01

    We introduce a framework for 3D object deformation with primary focus on man-made objects. Our framework enables a user to deform a model while preserving its defining characteristics. Moreover, our framework enables a user to set constraints on a model to keep its most significant features intact after the deformation process. Our framework supports a semi-automatic constraint setting environment, where some constraints could be automatically set by the framework while others are left for the user to specify. Our framework has several advantages over some state of the art deformation techniques in that it enables a user to add new features to the deformed model while keeping its general look similar to the input model. In addition, our framework enables the rotation and extrusion of different parts of a model.

  5. Hamiltonian dynamics of extended objects

    International Nuclear Information System (INIS)

    Capovilla, R; Guven, J; Rojas, E

    2004-01-01

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler-Lagrange equations

  6. Hamiltonian dynamics of extended objects

    Energy Technology Data Exchange (ETDEWEB)

    Capovilla, R [Departamento de FIsica, Centro de Investigacion y de Estudios Avanzados del IPN, Apdo Postal 14-740, 07000 Mexico, DF (Mexico); Guven, J [School of Theoretical Physics, Dublin Institute for Advanced Studies, 10 Burlington Road, Dublin 4 (Ireland); Rojas, E [Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apdo Postal 70-543, 04510 Mexico, DF (Mexico)

    2004-12-07

    We consider relativistic extended objects described by a reparametrization-invariant local action that depends on the extrinsic curvature of the worldvolume swept out by the object as it evolves. We provide a Hamiltonian formulation of the dynamics of such higher derivative models which is motivated by the ADM formulation of general relativity. The canonical momenta are identified by looking at boundary behaviour under small deformations of the action; the relationship between the momentum conjugate to the embedding functions and the conserved momentum density is established. The canonical Hamiltonian is constructed explicitly; the constraints on the phase space, both primary and secondary, are identified and the role they play in the theory is described. The multipliers implementing the primary constraints are identified in terms of the ADM lapse and shift variables and Hamilton's equations are shown to be consistent with the Euler-Lagrange equations.

  7. WATER SUPPLY OF TRANSPORT OBJECTS

    OpenAIRE

    Badyuk, N. S.

    2009-01-01

    Badyuk N. S. WATER SUPPLY OF TRANSPORT OBJECTS. АКТУАЛЬНЫЕ ПРОБЛЕМЫ ТРАНСПОРТНОЙ МЕДИЦИНЫ № 3 (17), 2009 г. P. 96-104 DOI http://dx.doi.org/10.5281/zenodo.1020024 http://dspace.nbuv.gov.ua/bitstream/handle/123456789/23091/13-Badyuk.pdf?sequence=1 WATER SUPPLY OF TRANSPORT OBJECTS Badyuk N. S. Ukrainian Research Institute for Medicine of Transport, Odessa, Ukraine Summary In the work presented they discuss several peculiarities of wa...

  8. MDSplus objects-Python implementation

    Energy Technology Data Exchange (ETDEWEB)

    Fredian, T., E-mail: twf@psfc.mit.ed [Massachusetts Institute of Technology, Plasma Science and Fusion Center, NW17-268, 175 Albany Street, Cambridge, MA 02139 (United States); Stillerman, J. [Massachusetts Institute of Technology, Plasma Science and Fusion Center, NW17-268, 175 Albany Street, Cambridge, MA 02139 (United States); Manduchi, G. [Consorzio RFX, Euratom-ENEA Association, Corso Stati Uniti 4, Padova 35127 (Italy)

    2010-07-15

    MDSplus is a data acquisition and analysis software package used widely throughout the international fusion research community. During the past year, an important set of enhancements were designed under the project name of 'MDSobjects' which would provide a common, powerful application programming interface (API) to MDSplus in programming languages with object-oriented capabilities. This paper will discuss the Python language implementation of this API and some of the capabilities that this implementation provides for data storage and retrieval using the MDSplus system. We have implemented a new MDSplus Python module which exposes the MDSplus objects features to the language. The internal MDSplus programming language, TDI, has also been enhanced to be able to invoke Python commands from the TDI language. Now that Python is aware of the complex data structures in MDSplus such as Signals, the language becomes a very good candidate for applications ranging from data acquisition device support to analysis and visualization.

  9. MDSplus objects-Python implementation

    International Nuclear Information System (INIS)

    Fredian, T.; Stillerman, J.; Manduchi, G.

    2010-01-01

    MDSplus is a data acquisition and analysis software package used widely throughout the international fusion research community. During the past year, an important set of enhancements were designed under the project name of 'MDSobjects' which would provide a common, powerful application programming interface (API) to MDSplus in programming languages with object-oriented capabilities. This paper will discuss the Python language implementation of this API and some of the capabilities that this implementation provides for data storage and retrieval using the MDSplus system. We have implemented a new MDSplus Python module which exposes the MDSplus objects features to the language. The internal MDSplus programming language, TDI, has also been enhanced to be able to invoke Python commands from the TDI language. Now that Python is aware of the complex data structures in MDSplus such as Signals, the language becomes a very good candidate for applications ranging from data acquisition device support to analysis and visualization.

  10. Pricing objectives in nonprofit hospitals.

    OpenAIRE

    Bauerschmidt, A D; Jacobs, P

    1985-01-01

    This article reports on a survey of 60 financial managers of nonprofit hospitals in the eastern United States relating to the importance of a number of factors which influence their pricing decisions and the pricing objectives which they pursue. Among the results uncovered by the responses: that trustees are the single most important body in the price-setting process (doctors play a relatively unimportant role); that hospital pricing goals are more related to target net revenue than profit ma...

  11. Object recognition by implicit invariants

    Czech Academy of Sciences Publication Activity Database

    Flusser, Jan; Kautsky, J.; Šroubek, Filip

    2007-01-01

    Roč. 2007, č. 4673 (2007), s. 856-863 ISSN 0302-9743. [Computer Analysis of Images and Patterns. Vienna, 27.08.2007-29.08.2007] R&D Projects: GA MŠk 1M0572 Institutional research plan: CEZ:AV0Z10750506 Keywords : Invariants * implicit invariants * moments * orthogonal polynomials * nonlinear object deformation Subject RIV: JD - Computer Applications, Robotics Impact factor: 0.402, year: 2005 http:// staff .utia.cas.cz/sroubekf/papers/CAIP_07.pdf

  12. Advertising. Advanced placement of objects

    OpenAIRE

    Hassan Ali Al-Ababneh

    2016-01-01

    The article is devoted to the study of one of the most important concepts and marketing events which is advertising. The author studies the history of the formation of modern advertising and covers the main interpretations of the concept of advertising. The article presents the data on the chronology of the formation of the key objectives of the advertising process and the basic classification of types of advertising, its purpose and place in the marketing mix. It sets out the ...

  13. Magnetohydrodynamical processes near compact objects

    International Nuclear Information System (INIS)

    Bisnovatyi Kogan, G.S.

    1979-01-01

    Magnetohydrodynamical processes near compact objects are reviewed in this paper. First the accretion of the magnetized matter into a single black hole and spectra of radiation are considered. Then the magnetic-field phenomena in the disk accretion, when the black hole is in a pair are discussed. Furthermore, the magnetohydrodynamics phenomena during supernova explosion are considered. Finally the magnetohydrodynamics in the accretion of a neutron star is considered in connection With x-ray sources

  14. Hijazi Architectural Object Library (haol)

    Science.gov (United States)

    Baik, A.; Boehm, J.

    2017-02-01

    As with many historical buildings around the world, building façades are of special interest; moreover, the details of such windows, stonework, and ornaments give each historic building its individual character. Each object of these buildings must be classified in an architectural object library. Recently, a number of researches have been focusing on this topic in Europe and Canada. From this standpoint, the Hijazi Architectural Objects Library (HAOL) has reproduced Hijazi elements as 3D computer models, which are modelled using a Revit Family (RFA). The HAOL will be dependent on the image survey and point cloud data. The Hijazi Object such as Roshan and Mashrabiyah, become as vocabulary of many Islamic cities in the Hijazi region such as Jeddah in Saudi Arabia, and even for a number of Islamic historic cities such as Istanbul and Cairo. These architectural vocabularies are the main cause of the beauty of these heritage. However, there is a big gap in both the Islamic architectural library and the Hijazi architectural library to provide these unique elements. Besides, both Islamic and Hijazi architecture contains a huge amount of information which has not yet been digitally classified according to period and styles. Due to this issue, this paper will be focusing on developing of Heritage BIM (HBIM) standards and the HAOL library to reduce the cost and the delivering time for heritage and new projects that involve in Hijazi architectural styles. Through this paper, the fundamentals of Hijazi architecture informatics will be provided via developing framework for HBIM models and standards. This framework will provide schema and critical information, for example, classifying the different shapes, models, and forms of structure, construction, and ornamentation of Hijazi architecture in order to digitalize parametric building identity.

  15. Truth as a Mathematical Object

    Directory of Open Access Journals (Sweden)

    Jean-Yves Béziau

    2010-04-01

    Full Text Available In this paper we discuss in which sense truth is considered as a mathematical object in propositional logic. After clarifying how this concept is used in classical logic, through the notions of truth-table, truth-function and bivaluation, we examine some generalizations of it in non-classical logics: many-valued matrix semantics with three and four values, non-truth-functional bivalent semantics, Kripke possible world semantics.

  16. Object discrimination using electrotactile feedback.

    Science.gov (United States)

    Arakeri, Tapas J; Hasse, Brady A; Fuglevand, Andrew J

    2018-04-09

    A variety of bioengineering systems are being developed to restore tactile sensations in individuals who have lost somatosensory feedback because of spinal cord injury, stroke, or amputation. These systems typically detect tactile force with sensors placed on an insensate hand (or prosthetic hand in the case of amputees) and deliver touch information by electrically or mechanically stimulating sensate skin above the site of injury. Successful object manipulation, however, also requires proprioceptive feedback representing the configuration and movements of the hand and digits. Therefore, we developed a simple system that simultaneously provides information about tactile grip force and hand aperture using current amplitude-modulated electrotactile feedback. We evaluated the utility of this system by testing the ability of eight healthy human subjects to distinguish among 27 objects of varying sizes, weights, and compliances based entirely on electrotactile feedback. The feedback was modulated by grip-force and hand-aperture sensors placed on the hand of an experimenter (not visible to the subject) grasping and lifting the test objects. We were also interested to determine the degree to which subjects could learn to use such feedback when tested over five consecutive sessions. The average percentage correct identifications on day 1 (28.5%  ±  8.2% correct) was well above chance (3.7%) and increased significantly with training to 49.2%  ±  10.6% on day 5. Furthermore, this training transferred reasonably well to a set of novel objects. These results suggest that simple, non-invasive methods can provide useful multisensory feedback that might prove beneficial in improving the control over prosthetic limbs.

  17. Concurrent Models for Object Execution

    OpenAIRE

    Diertens, Bob

    2012-01-01

    In previous work we developed a framework of computational models for the concurrent execution of functions on different levels of abstraction. It shows that the traditional sequential execution of function is just a possible implementation of an abstract computational model that allows for the concurrent execution of functions. We use this framework as base for the development of abstract computational models that allow for the concurrent execution of objects.

  18. Cosmic objects and elementary particles

    Energy Technology Data Exchange (ETDEWEB)

    Rozental, I L [AN SSSR, Moscow. Inst. Kosmicheskikh Issledovanij

    1977-02-01

    Considered are the connections between the parameters of elementary particles (mass ''size'') and the characteristics of stars (the main sequence stars, white dwarf stars and pulsars). Presented is the elementary theory of black hole radiation in the framework of which all the regularities of the process are derived. The emphiric numerical sequence connecting nucleon mass and universe constants (G, h, c) with the masses of some cosmic objects is given.

  19. POMP - Pervasive Object Model Project

    DEFF Research Database (Denmark)

    Schougaard, Kari Rye; Schultz, Ulrik Pagh

    The focus on mobile devices is continuously increasing, and improved device connectivity enables the construction of pervasive computing systems composed of heterogeneous collections of devices. Users who employ different devices throughout their daily activities naturally expect their applications...... computing environment. This system, named POM (Pervasive Object Model), supports applications split into coarse-grained, strongly mobile units that communicate using method invocations through proxies. We are currently investigating efficient execution of mobile applications, scalability to suit...

  20. Persistent Identifiers as Boundary Objects

    Science.gov (United States)

    Parsons, M. A.; Fox, P. A.

    2017-12-01

    In 1989, Leigh Star and Jim Griesemer defined the seminal concept of `boundary objects'. These `objects' are what Latour calls `immutable mobiles' that enable communication and collaboration across difference by helping meaning to be understood in different contexts. As Star notes, they are a sort of arrangement that allow different groups to work together without (a priori) consensus. Part of the idea is to recognize and allow for the `interpretive flexibility' that is central to much of the `constructivist' approach in the sociology of science. Persistent Identifiers (PIDs) can clearly act as boundary objects, but people do not usually assume that they enable interpretive flexibility. After all, they are meant to be unambiguous, machine-interpretable identifiers of defined artifacts. In this paper, we argue that PIDs can fill at least two roles: 1) That of the standardized form, where there is strong agreement on what is being represented and how and 2) that of the idealized type, a more conceptual concept that allows many different representations. We further argue that these seemingly abstract conceptions actually help us implement PIDs more effectively to link data, publications, various other artifacts, and especially people. Considering PIDs as boundary objects can help us address issues such as what level of granularity is necessary for PIDs, what metadata should be directly associated with PIDs, and what purpose is the PID serving (reference, provenance, credit, etc.). In short, sociological theory can improve data sharing standards and their implementation in a way that enables broad interdisciplinary data sharing and reuse. We will illustrate this with several specific examples of Earth science data.